tv [untitled] BELARUSTV November 25, 2022 11:00am-12:01pm MSK
11:00 am
let's discuss topical issues that we face every day. here's your limited checks, please bring it, i 'll see what you're spending it on. so here is the total control of a woman who works as a muse and a keeper of the hearth. she risks that one day. she will cease to be interested in her man, we will teach you how to safely resolve any conflict situations. and i believe that success again comes from the base, a person needs to work with the base with their roots. why didn't his tree cling to this land. see in the program the concept of neutralize on the tv channel belarus 24.
11:03 am
11:04 am
my name is sutnikov. ivan holds the position of deputy head of the main directorate of digital development of the preliminary investigation committee of the investigative committee. we are engaged in the organization of the investigation of cybercrime digital development and information security investigative committee. svetlana smolonskaya and tatyana shcherbina and today ivan sudnekovich is our guest, good afternoon ivan alexandrovich, the number of cybercrime is growing, what statistics say about this today, well, you know, in general, cybercrime is probably already
11:05 am
a big problem today, like all over the world, when the year was committed then in that period of time were not characteristic of the country. we started getting a certain signal from other countries. that cybercriminals are in our territory those countries are attacking and we have already understood that, in principle, there is cybercrime. we just don't see it. it is in our country and in order to fight it, special units were created. the first special unit in the structure of the ministry of the interior, operational for the disclosure of qr-speeches and investigative units that investigated cybercrimes. it was around 2006-2005 . and this is the creation of these units, and at that moment we, in principle, allowed us to restrain
11:06 am
cybercrime has since risen, and cybercrime from 2006 to 2010 was the same 10 times as from 2018 to 2020. that is to say, we succeeded with the professionals who were assembled, and in these units to contain the growth of cyber crime. it can be said that at that time we were protecting europe and america from a cybercriminal who was in the territory of the cis or organized cybercrime found information from there, and detained them in this way. uh, well, in fact, you can say they destroyed organized cybersporing on the we destroyed the territory of the republic of belarus for 10 years. but if we talk about that period, this is when criminals are on our territory , such other countries in 2018, changed with the help of the situation, that is, cybercriminals began to attack and organized crime that is not on the territory of our country is on the territory of other states to attack belarusians in 2018 and the system of measures
11:07 am
that we had tailored to our cybercriminals. it has already stopped working, and therefore we caught a tenfold increase in cyber crimes and if in 2018 10 to 200 2018 , we annually recorded about two and a half thousand cybercrimes, then from the eighteenth 2,500 crimes to the twentieth year for 3 years 25,000 cybercrimes. year growth 10 times thousand 1.000%. naturally, we realized that the system of measures stopped working the structure of cybercrime. it has changed and therefore it was necessary to apply some other already systemic measures 2018 to the nineteenth twentieth year investigative committee the entire law enforcement unit. uh, we have developed a new system of measures that has made it possible to contain and reduce cybercrime. if it was hard. it was hard to readjust. still, if different approaches are different methods of work. well
11:08 am
, of course, it is difficult to rebuild from one side, since the attack is serious and large, and there are not enough resources of the forces. we need to start thinking differently. and here, when, for example, attacks from some other country, the interaction of the international interaction of the cyberpolice is necessary. a with one side on the other side. we must be understood as criminals. and yes, knock on ours. citizens and how they withdraw money, the task is for you to be a criminal. it will basically steal money from all these statistics. in principle, 90% probably, this cyber-fraud is one of the first cybercrimes to be registered on the territory of belarus, and it was associated with a computer game. that is, the player. an attribute has been stolen. and as far as i remember, it was a sword, a computer sword, which he earned and spent money for this one, which is a dream and its development, and as part of the game, he was kidnapped, he turned, and
11:09 am
on this fact, law enforcement agencies and already law enforcement agencies. he argued for a long time whether this is a crime or not, but on the whole they nevertheless determined that yes. this is a crime and a guilty person. there must have been a reason for a criminal charge. for starters. i would like to emphasize that cyber crime is not only about those same scammers. it's also, uh, national security, including yes because e, a cyber attack on, let's say, some significant military or even civilian facility, e, can sometimes lead to disaster. let's remember what the head of state said about it later. the so -called cybernetics attack primarily strategic objects, they attack the state bodies of the enterprise, the banking system, that is, their goal is the main points in the life of the provision of any state, including
11:10 am
ours. this is one of the elements of hybrid warfare, a very dangerous element. the goal is to inflict maximum damage to the economy and eventually destabilize society is typical not only for belarus, but also for any states that it is aimed at in this way. well, you already said that since 2018 a rapid growth has begun. yes, all kinds of cybercrimes on our territory, but perhaps this is can be associated with the upcoming at that time in 2020. well, in principle, with such attacks how often does belarus encounter, but again, uh, this period. this is a collection of different types of cybercrime, both fraud and cyber infrastructure ysu for legal entities for
11:11 am
government agencies for individuals. that is, it was such a mixture of different types of directed. e kibera, you can say so, and today we are fixing it. uh, a large number of and uh, the growth of uh, hacking attempts, and unauthorized access sites attempts to obtain information of personal data in order to then personal data that are stolen are used to commit various kinds, as well. other cybercrime including theft is due to the price of social engineering, that is, this information is later used in the commission of other crimes phishing in general, as a concept - this translates to fishing with a bait, that is, a task. i take the criminal to catch the victim to catch his bank card details in my classic sense, and phishing is when the criminal is a scheme for committing a phishing attack, when the criminal, e, sends a phishing link to the victims via
11:12 am
e-mail, or in correspondence and the victims , by clicking on this phishing link, enter their data vision bank card details are a variation, in principle, of phishing lies in the fact that when committing, and cherry, there is a call from the criminal. that is, uh, the call center, about which we are talking, which the education of our citizens is introduced to them and the trust of the engineering scene and uh, within the framework. e. conversations in the course of the conversation they are trying to get the bank card details from our victim. and as far as ours, and the objects today are protected from these attacks, i’ll say, so about the twentieth year. uh, in principle, both the entire economic sector and the public sector went through a certain stress test, that is, security, but there was a frivolous insufficient. it can be said that there is insufficient protection from cyber, but since we did not fix them. i, since there was no such
11:13 am
interest from the outside about which we began to observe in the twentieth year. we were unprepared, one might say, and therefore this allowed the criminals, in principle, to successfully attack such a successful fig, sector and economic sector and citizens. how much we were not prepared, but in the year 20, in 21 years, we passed these tests, and we developed a system protection measures, that is, everything is absolutely from the citizens. yes , the states have developed a system of measures. which at the moment allow us to reflect. well most attacks and since the offender teaches, including us we learn from him. that is, he checks us, we see our shortcomings. we are eliminating these shortcomings even today, and the level of security of the legal, economic and public sectors is quite high. at the same time, it’s interesting to know from you how the investigator commits such a crime, it’s not there, not robbery, not murder, not robbery. yes, the offender does not
11:14 am
leave any physical trace, it is possible to follow such crimes much more difficult. it is more difficult or to investigate them. no, it’s probably not difficult, if you understand the structure of this crime, and the offender leaves traces of the numbers, the task is to understand the scheme of committing crimes and go all the way that the criminal has gone, fixing this digital traces. this proof of digital dating on the internet is found, that is, anonymity. it's a myth on the internet. which we debunk three investigations of our crimes, yes, as i said, already, organized cybercrime, prepared organized cybercrime, which was located on the territory of our country somewhere, we have not seen, and we did not have any special training over time. over time, we learned to identify our methods, which were developed on the territory of belarus by belarusian researchers
11:15 am
and employees of the ministry of internal affairs to combat cybercrime. today, they are considered among the best in the world. since our work efficiency reaches 80% on disclosure, and some crimes belarusian experience, which can be proud of the belarusian experience, which can be proud of, as i said, that is, hmm, the period of 2010. e's. we have been awarded, including the award of the international as the best er, the investigative unit in the world. and since the effectiveness of our work and reached. well, according to some uh crimes, well, up to 100%, and we, uh, actually, as i said, have eradicated organized crime, the belarussian tiger criminal today is a rarity. today we uh, we see and repel attacks that come from other countries. unfortunately, this territory of ukraine is the territory of poland, if we
11:16 am
are attacked from the territory of russia, then, in principle, within the framework of international cooperation, we receive all the necessary information and, within the framework of cooperation, we detain criminals on the territory. and in the same country, i can say frankly that any, in principle, a criminal is a cybercriminal or any criminal, i will probably talk about cyber and the criminals who are in our country and committed some kind of crime. if not today, then in some time, even in 10 years. he will be found and held accountable. well, you said so well at the beginning that belarus was clearing europe of cybercriminals, well, to protect this is not for us at vo at all, and indeed this too . we can be proud of our belarusian experience. uh, and you're not making the distinction between a cybercriminal and a criminal right now. that is, for you, in fact, he is a criminal anyway. well, of course, he is a criminal. he commits crimes. which whatever it is, it's a killer. this quiver criminal makes no difference, absolutely. okay my question. uh.
11:17 am
that's what tell me do i need to be special? and let's say, well, a newfangled specialist for this area? or not, but you started your activity in the investigative committee or in the authorities, when these crimes did not exist yet. why work its 2004? uh, in the usual district department of the city of minsk, he has been investigating ordinary crimes since 2009. i was already an investigator for the investigation of cybercrimes at the level of the central office. and of course me it was difficult, but to move away from ordinary crimes, cybercrime, certain specifics are necessary. ah, to get some experience and only through the experience of investigating such crimes. you already understand the very specifics of their methodology and then it’s easy for the police academy, for example, to train such specialists. or is it purely empirically everything, he falls for classified information. no, this is not classified information and the police academy trains such specialists, since it is now in demand for cyber
11:18 am
investigators, cyber operatives, and who reveal some crimes, including 2 years ago. in our investigative committee, the institution of the investigative committee has been created, and it is engaged in training on the basis of higher legal education and retraining. so here's the main issue. e for this institute. this is the most practice-oriented training and it is cyber investigators, that is, the methodology for investigating cybercrimes. exactly what means, methods and methods of solving the investigation of crimes is used using methods, and sint, international assistance and so on. that is, there are different methods for the specifics of investigating such crimes, which are concentrated there and are already being transferred to investigators. and even you, having an investigative base, a and e, having received such knowledge. you are already in fact, but you become a cyber investigator. and if you participate a few more times in the implementation of the detention of cybercriminals and investigated, uh, some similar criminal case. you are already
11:19 am
experienced, and the difficulty lies, er, in the fact that yes , i would like to, probably. for some combination an investigator and a programmers, for example, so you think we are all there, probably programmers cyber follow or not? we hmm first of all are investigators who understand the specifics, understand how to investigate a case and further gain experience, investigators. programmers. we have. e, in principle, and at the moment, this year, a new division of the main department of digital development of the preliminary investigation was created. and where i am the deputy head, then the unit is the head of the department for organizing the investigation of cybercrimes and digital development in this, and the digital glavka, as we call it, are either concentrated cyberheads, and the best specialists of the investigative committee are in three departments. the first department is engaged in organizing the investigation of cybercrime, the second is engaged in the digitalization of the department, that is, the development of specialized programs for the investigative
11:20 am
committee, including for investigating cybercrimes, and the third department is engaged in cybersecurity. that is protection by reflection fixing any cybernets that could uh target the infrastructure of the investigating committee. and we can assume that all a specialties in your universities, uh, are popular among applicants, if there is a prefix cyber \u200b\u200bcyber investigator in various universities, in principle, but investigators know little, but they know that there is such a profession, but uh, when you tell them about this profession, and they become interested, especially today. i mean, uh. today, it's popularity. today, every belarusian already knows that such a cybercrime. over these three or four years, that’s all, probably, every scammer tried to call everyone, but to steal money, and therefore he is completely well-known, and now, when you come to any university and talk about the profession and
11:21 am
especially what can already be and researchers and programmers and cybersecurity. and of course even. technical universities have a serious interest and desire for the work of the investigative committee. but, as for, say, a portrait of an average hacker, there is. here he is, uh some have already been drawn for the investigator. for example, when we say hackers, it immediately pops up before our eyes. here is such a cinematic image when a guy in a hood is sitting at the monitor and typing something very quickly on the keyboard. how true is this image? well, it doesn’t quite correspond, of course, you need to understand reality. and what kind of crimes are we talking about, because they are absolutely different, there are cyber-fraudsters who attack critical infrastructure. and there is cyber, which, and they are engaged in false mining, they call, supposedly there, but some school is mined, for example, a kindergarten, and so on. that is, they are different. today we are already, uh, talking,
11:22 am
including about cyber warriors, when cyberska work for some country. and they attack, and we think that these are ordinary criminals, but in fact it could be officers who sit in their office and study. yes, as a grip in ukraine , for example, and we don’t think about creating a cyber-truth policy for us, too, but i understand that today we are actually having a cyber war, including, uh, on a serious high level. it is going on. today it's open. some states. they say that they attack us at the government level, for example, and the minister of digital development of ukraine says that a cyber army has been created, and it includes 300 e thousand. uh, cyber wars of employees, cyber wars that attack belarus and russia, we have recorded cases of cyber attacks. uh, it's from this cyber army they call totally in control of us. oh her work activities know who is behind this
11:23 am
cyber army. they have organized more than 50 on the site of the current state bodies. but uh, the previous stress test, as i said, which we passed in 1920, allowed us to develop a system of protective measures, and which hmm, in principle, allowed us to prevent. uh, the serious consequences of these cyberattacks. that is, today the state is already in the open. they say we are under attack. naturally. we need to defend ourselves first and foremost. protection first creation of a protection unit the state of our citizens and e prefabricated units of the best professionals. in general, the enemy does not sleep, but we are prepared and protected at the moment. yes, i can say that today we are already prepared and protected. let's take a short break to remind you, we have a telegram channel. it's called distortion. be quiet. we are in touch. on the air
11:24 am
say it again, don't be silent. and today our guest is ivan sudnekovich, deputy head of the digital directorate of the investigative committee, ivan alexandrovich please tell us about a sensational case involving belarusian cybercriminals, when more than 200,000 citizens from 125 countries became victims of a fake antivirus. well here, uh, a little bit of information. yes , it’s wrong, you’re right, well, there are 260,000 citizens that we have established, and we will have a little more work for researchers, and the cybercrime investigation department, and then the committee, were lucky enough to investigate this case. no, naturally. no, it's uh, you know, when the volume is in the form of sh- you see the perspective. you see that you don't really have to. there for six months or a year to rest, sleep and see the family, of course, the prospects are not so bright, but, as usual, the
11:25 am
investigators are investigating the game he plays with a cybercriminal, investigating and and the interest is precisely to get that essence, to find that essence , to find the criminal, to prove, well, to restore the rights of citizens. when the victims come they will tell you. thank you, and sometimes criminals come even after serving time, and for ten years they come out and say, thank you, because you changed my life, and i went downhill because. many now criminals. they start their life, they change, they switch to drinking drugs, including going down an inclined life, since there is nowhere to spend easy money. there are a lot of temptations, yes, and here they are, uh, even when, after recoiling, they say, thank you, otherwise, i probably would, but in general i would have gone to the wrong place. here, and if e returns to this case, this is 2000 the twelfth year, and i'm an investigator. this material is included, but it is investigating that the primary information we received was from the
11:26 am
us fbi, that is, they were the first to sound the alarm, since they were the main casualties in general. this is a criminal matter. you can call it in one word, and how belarus protected the whole world, when we promoted the whole scheme it was complicated - of course it was, but it turned out that our belarus was a resident, but an ordinary hand-held guy, but organized one of the most productive cyber organized groups in all over the world that they have done, but for the present moment. e even at the moment one of the largest e cybercrimes e, everything in the world in terms of the number of victims a and a strange living scheme the fraud was to develop and developed m-m harm, but the main program that posed as a real anti-virus and e. they spread it all over the world, that is, it was infected for 3 months. we set 3 months. here are the criminal activities. although it
11:27 am
was, of course more. this is a period, and in 3 months , 2.5 billion computers around the world were infected with this malware, that is, every second computer in the world was infected with malware from this cybercriminal group. and she it is malware. posing as a real antivirus. e, and forced, but the victim, who thought that it was our anti-virus, signaled that you had a lot of viruses in order to remove them to buy me. and here and when the victim passed, there the parcels for the purchase of this program entered his details, his bank card, all the details. they accumulated on a certain server of this criminal group was developed. uh, a whole billing server that collected all the information about the activities of a criminal group, and those e colonies were infected, and data on all the victims, and the amount of stolen money, and payments to members of the cybercriminal group. this
11:28 am
cybercriminal group had about 150 people and on the territory. uh, both our countries and the strange cis, so in 3 months they infected 2 1/2 billion computers, and succumbed to their trick 260. uh, there are more than 267,000, and citizens around the world living in 125 countries of the world. here, if you look at the map, yes, for this criminal case, for clarity, i also did it and so on. here such a map, and where the number of countries is indicated and the point is reflected that this one in this country, e, the only victims lived, and the white dot , e, c. the principle all over the world is belarus cybercriminals, especially they follow such a rule in their country, they don’t steal somewhere. and because you will be delayed. uh-huh uh, that's why uh, of course, this was a serious matter. it is a large-scale any investigative action that we carried out
11:29 am
on this case, taking into account. it occupied these scales, and tens and hundreds of times more time, like any other time, that is, we needed the task of gathering all the information from all these countries on the victims. ah, that is imagine 125 countries of the world 260.000, the victims need to confirm this information about theft in all these countries. well, actually interrogate the victims or in a different way. but to clarify whether this crime was committed to collect and prove, and as part of the investigation. we went to the data management server, the criminal group was in germany, studied it and looked. uh, revealed all these uh, hmm embezzlement. we, among other things , went to the moscow bank, which is being laundered and the money went there on a business trip. well, with him, in a cunning way, we managed to confirm the technical information that this bank was laundering money, and already according to this information, according to our
11:30 am
information, this bank was subsequently closed and, uh, the head of the bank was prosecuted . it is through this criminal case. well, that is the scale. e work was uh, colossal uh, we uh hmm took out and detained uh as part of a special operations. it was held on the territory of minsk and on the territory of kiev the organizer was located he left the territory of belarus he was on the territory of kiev on the territory of belarus and minsk there were two of its main ones. well, in fact, the deputies who developed this server administered this server and a few ordinary performers who were involved in the spread of the virus. well, in fact, theft, but i'm doing it. here we are, as part of special operations, at the moment on the territory of kiev and minsk, they were detained to account, in fact, those who were delay. on the territory of minsk, they have already served time, but the organizer is belorus, who was detained on the territory of kiev for a year. he was
11:31 am
in custody, ah and ah, we repeatedly initiated the extradition to attract on the territory of the country, ah, but the ukrainian side has not given us up to now, including the victims were from ukraine from other countries, that is, hundreds of thousands of others countries that suffered, according to our information, effectively issued, uh, refugee status, and according to refugee status, he has been hiding for all these 14 years territory. e ukraine continues to hide there . and you say at the beginning you said that you have a simple runic guy. well, what kind of simple guy is he, a genius? well, in the beginning, starting with what he did, what he did exactly, that he shied away from responsibility, but still, let her ask a question. you interrogated those who worked with him, let's say. so motive, what motive is money? or is it still interesting, well, specifically. in this crime, it was money, that is, the maximum amount of money. ah. that is, i already told you that they stole during this period only for 3 months.
11:32 am
they stole 18 million dollars, and from us information , including that we could not, uh, get through the investigation, because it was, uh, confirming information about other countries, but according to primary information, about 100 million dollars were stolen, that is, when this simple tame guy was detained on the territory of ukraine of course, already, and at that time it was already difficult, the events were 2010 to the days when they committed crimes in 2012, they detained in 2 years all these 2 years. he did, that is , he already had crime proceeds. uh, was in the tens of millions of dollars, even the detention was an interesting moment there because. uh, we had operational information that he was, well, conditionally protected by the sbu of the security services of ukraine. and the ministry of internal affairs of ukraine is well with us. we cooperated and they provided us with this information . they say, if you channel through the official channel, uh, his detention won't stop him. uh, so let's manually order
11:33 am
working in order. send it to us, and this allowed us to detain him. although not, of course, he spent a year and was never extradited, but he managed to avoid and when he was detained in his garage there were five expensive cars worth about a million dollars, and then we, well, they were arrested initially and we wanted them already in income. e of the state for compensation for damage to victims or for the income of the state moving the territory of the country. well, somehow by chance it turned out not by chance in the course of the proceedings that they were issued, among other things, to the deputies of the ukrainian rada, and we were refused to issue them. well , this is an interesting coincidence. this is what corruption is. er, of course, this is our pain er, and many cybercriminals. it was such a trend, but a definite one, and it was precisely that he investigated. organized cybercrime and in many cases, uh, which we were not able to detain initially, or they were located on the territory of other countries , they are concentrated on the territory of
11:34 am
ukraine all the time, that is, they all actually left the territory of belarus because that it was impossible here, we already caught everyone absolutely, but i’m concentrating on the territory of ukraine and then back in 2010 we said that, and the law enforcement of ukraine the fruits that the crime of this you have. she will be in rank already mixed with the state, and they have reaped the benefits. if you look at today's cyberpi, what about today's fraudulent cyberattack calls, they come from there because. there already entrenched organized cyber crime that organize the work. from there, there is already an entire office. yes, in ukraine there were problems with electricity when there were problems with communication. even minister of internal affairs ivan kurakov, but said that there were fewer calls, let's listen. you know perfectly well such
11:35 am
frauds, which are popularly called. hello mom, where scammers, being outside the republic, belarus call back, mostly suffer. here they are elderly citizens who are called and they say this about some perfect illegal movement in relation to close relatives and citizens transfer e, money to scammers today in this situation is broken. and we see that basically all calls come from outside the republic of belarus, basically. these call centers are located outside, namely in ukraine, because we analyzed the situation, when information appears in the media that during a special operation on the territory of ukraine, electricity disappears. uh, there are some issues with the internet in the territory of the republic belarus does not receive a single call. well now to the cyber scammers. yes, you don’t even need to crack any passwords there. something else a person tells himself some data. actually. these same swindlers take advantage of this and are led to it
11:36 am
not only, as the comrade minister said, senior citizens. well, young people and even, uh, children of high-ranking officials. here is what, for example, the press secretary of the president of russia, dmitry peskov , said. i have a daughter, a daughter. etc. here, and she says, it was like hypnosis. she did not even understand anything, how she began to call her pinas and so on, and money was withdrawn from her two cards. that's good, by the way, the security service, the security service of banks, then reacted very quickly to the appeal and managed to return all the money. i don’t know if these, uh, not good or good talents people were caught there, or they weren’t caught, but to return the money, so i urge you to beware of those who use the power of persuasion. uh, outside of benign purposes such
11:37 am
happens too. well, please give me practical advice on what should alert a person when he receives a call, allegedly from the security services of the bank or from some other institutions. for example, they called me to beat the telecom. uh, they said that supposedly some extra money was transferred there. well, of course they tried to somehow squeeze out there when i asked a question. you want me to return the money, then i'm ready to come to any point in the city, uh, they hung up the phone, we need to alert, we fix, why not 2 years? but some kind of problem arose for us. actually, every day, probably from everyone. well, as they say, from every iron we say, you go into the subway. they say it's not reported if they call on tv all the time. i'm sitting here talking about it. we fix the order. well, probably thousands of performances a year. e ministry of internal affairs investigative committee for and. basically belarusians. everyone already knows belarusians know how cyber scammers work. everyone already knows, everyone absolutely knows how to spot a
11:38 am
scammer. in fact, they call messengers. at basically. that is, if a call comes from a cellular operator to a regular mobile connection. no, this is extremely rarely used there, a little more complicated, mostly messengers are used. that is, the call is an unfamiliar number. this is the first lock that, maybe, uh, there are signals to alert the head that, and this is a criminal, and the second object, let's say they don't call, you have a call with the logo, belarus bank, of course. well here he is to investigate. you will see that it is a mobile phone. e there dobryi ukrainy i had such calls. well, that was before. that is, uh, for example, a year ago, when they called using hmm sim cards, they registered messengers using a sim card of other states, but then, when they started saying that if they call from abroad, another number of some kind is displayed is not responsible for citizens. and after that, of course, the crime rate went down because our citizens
11:39 am
were vigilant and criminal. it was necessary to find another way, and they found a way exactly , uh, registering accounts for belarusian numbers. today, the two main problems we are struggling with are the opportunities for criminals. two main possibilities. this is the first. they must somehow get through to our citizen to get through. these are belarusian sim cards and today there are shops that sell them, they are sold by illegal people or a group of citizens who are on themselves or on figureheads. uh, registers belarusian and sells their organ. full of cybercrime, which is located on the territory of other countries, for which they are then used to commit this kind of cybercrime is how cybercrime is organized. uh, she creates such a digital identity and impersonates a belarusian. and now, when they call, you see, you already have a little belarusian number, and the suspicion is less removed. yes, the next signal that says that it is a scammer when they say that you need to do something in terms of providing
11:40 am
a bank card number. well, or other props. they may address you by your first name and patronymic, they may provide certain information about you. know but the task of the cyber scammer scammer. this is to get the details of your bank card, this is the first thing, so that you yourself tell the second, so that, for example, you go to a phishing site through a link where you entered these bank details. uh, cards, or they themselves transferred money in some way. transferred to the account, went to take a loan, transferred it. well, that is, these are the main three points to tell about the ban. enter that card somewhere with a bank card of the parcel, or go to collect loans there and transfer it somewhere, as soon as such a signal came. at this moment, our belarus must tell. i understand everything. this is a scammer. we need to stop talking. uh, do nothing , what they say, well, uh today, as you said correctly, absolutely any contingent falls for the bait. uh, including law enforcement officers and super-lawyers
11:41 am
come across. it all depends on the method that the criminal has chosen, but at some point your subconscious should work with this signal, and they asked for a card number, which means that all this is scammer. here it should be somehow e in the subcortex and the card numbers are hammered. i had a call when they asked me if i had made any transactions with money. and i just did and they had a question. do you remember how much money you have left on the card? i told myself stop. well, i think the bank should know, and he sees, how much money do i have on the card? yes, of course. i had a situation when they called me and said that here we noticed that there was absolutely some kind of transaction there for a certain amount for name there. eh, michael there is some kind of response to which i immediately realized that it was scammers that you made this transaction. i told me for the sake of the bear, i don’t feel sorry for anything and hung up about digital hygiene, as a recommendation from the investigative committee for our belarusian citizens, that is, the task of a criminal.
11:42 am
still, to find money for the horses, two of them did not lie on it. and today we are faced with the problem that a large amount of money lies at the home of the victims and, uh, those schemes when your relative is in trouble and you give the money to the courier. here this is finding large amounts of money at home, it leads to the fact that, in principle, all savings go to criminals, as a recommendation, but today it is better to keep money. well, as they say, keep a protective cash desk in a bank under reliable protection. let's take a break now. xia , after a short pause, we will return to this studio, while subscribe to our telegram channel, say, do not be silent, and look for all our releases on the youtube channel, belarus 1. in times of rapid change, it is important for us to show you. main country
11:43 am
fixed a clear position, which adheres to. today we keep history, value the achievements of generations and honor the traditions of global perspectives, high diplomacy and social research. however, the fact remains that dialogue platforms have started working. and this is a chance for everyone to be heard , we will draw detailed conclusions, see exclusive interviews and talk about the main events on the main air. watch on belarus 24 tv channel. let's show modern belarus from an unusual angle, discover the unique belarus and its culture we will provide an opportunity to see and understand what is not visible through the eyes of local residents. and when minsky arrived here, there is silence, calmness, uh, and the weather is very good. foreigners are
11:44 am
friends about life in belarus. they are always there, and they helped me a lot, and they are from krita. i feel very comfortable, i sometimes read my own at home, as i have already got used to. eh, not customary at all. watch in the program a look at belarus on the tv channel belarus 24. say it again, don’t be silent, and we have a visit from the deputy head of the cyber-head office investigative committee ivan sutnikovich ivan aleksandrovich please answer this question, do we keep up with the thoughts of the criminals and their schemes, or are we lagging behind today's problem. phishing is theft of money. the citizens. this is massive calls mass
11:45 am
theft. hmm, we didn't understand how to handle it, that is, all over the country calling all over the country. uh, some crimes are being committed and they are calling from the territory of other countries, which, including with us, for example, may not cooperate and need to it was necessary to develop a methodology defined in order to fix, but to define some groups, since they are such organized cybercrime. this does not mean that every call is every. here is theft. this is one criminal. this is some kind of organized cyber-group that just during this period of time commits such a number of crimes throughout the country in order to weed out these all sorts of counterattacks, we developed it, and the software, and for the investigator, there is definitely a register of crimes for you, call its databases next and what does it consist of? that is, the investigator for unsolved cybercrime, and puts digital traces of the cybercriminal into this database, that is, the phone number from
11:46 am
which he called, the link that he reset the account number to which the stolen funds were transferred to the database, they are placed later, and on we understand and weed out analogies for similar identifiers to similar figures. here, for example, a group of crimes committed specifically by this group, because the phone numbers of the account links, they use the same principles, if they are compromised and blocked there, there is a phone or an account, they open new ones, but they use it more than once. they won’t block it, and therefore this is the system that allows us to determine, but still, here’s the number - it’s thousands, it can be cybercrimes of one organized criminal group and quietly find some kind of interaction connection. somewhere, the criminal will still make a mistake and reveal his own, but in reality there are telephones, an ip-address, and so on, and then we will come to this criminal in our country, and in another country. uh, come and see, we'll open it. this whole scheme
11:47 am
of committing a crime, only in this way, by introducing such technologies, and they allow us to reveal both current and past crimes, about which, for example, are already somewhere on the shelf, but the system stores about them data and at any moment, even after 10 years, she will raise them and say that this crime was committed 10 years ago by this criminal, whom you have now detained and found. yes, today we, in principle, already understand the structure, and cybercrime, who we have is like us we monitor cybercriminal groups. who are attacking belarusian citizens and i want to say that in principle, uh, now we are preparing. we are already delivering some blows now, but uh, next year the ministry of the interior will deal a decisive blow to cybercrime with a joint investigation committee, which will allow us to seriously reduce the growth of cybercrime dynamics. that is, if you remember there were 25,000, last year there were already 17,000 crimes this year. we already have about 11,000. uh, crimes, but u methods
11:48 am
us prepared, that is, the percentage of clearance of such cases, the percentage of clearance today. uh hmm not exactly what we want, and as i said, we are preparing for this decisive blow. today it reaches the level of approximately thirty percent detection rate, because there are a lot of cyber crimes and, in principle, the quantitative composition, and those cyber crime fighters. he doesn't change much. that is, we must fight with the same resources. in fact, merged 10 times by cyber crime, so no more. ah, the structure has changed a bit. here is the headquarters. uh, in the investigative committee, for example, ah. e employees have been added to the ministry of the interior. but this is about the order, ten twenty percent was added there. that is, if a cybercrime has increased by 1.000%, that a-a fighters against crime in the order of 10-20% no longer need a human resource, but a modern
11:49 am
approach. today it also plays a decisive role, as there are not so many of them on the part of the cybercriminal, this is a small group that commits thousands cyberspores, and from our side, the main thing is not a large number, but the right approach, the ability and use of modern technologies. well, it is unlikely that cybercriminals are watching or will watch our programs. but all the same, the resettlement, which is not done, let's say. this is how they are committed on the internet in the virtual world, but the terms for such crimes are quite real belarusian citizens, who today are thinking about how to take this, uh, way, of committing a crime. they must understand what awaits her at the end, so one of the most common crimes, as i said, is the theft of funds, but by modifying computer information. there is such article 212 of the criminal code. there are four parts, depending on the severity of the crime. that is, if you stole a small amount there
11:50 am
using a modification. well, that is, the cards withdrew some money. yes, there we have up to 5 years in prison, the second part, if there is repeatedly committed or by a group of persons already up to 7 years. deprivation of liberty. ah, the fourth part, and the heaviest us this, if a perfectly organized group, or in a particularly large size, especially a large size. we have from 32.000 belarusian rubles. in the same place, up to 12 years in prison, that is, precisely for cyber-theft. we currently have a term of up to 12 years in prison, and i would also like to draw attention to the innovation that we have introduced in the criminal code. this is a criminal liability, the so -called drops of nominees who sell their, well, given details of their bank cards to cyber-scammers, and this is an innovation belarus and e in the middle, and last year a new article such 220 was brought, the second illegal actions
11:51 am
with means of payment. a and. e for this article. uh, also serious terms of punishment today introduced criminal liability already. and we have dozens of criminal cases, even our bank cards for registration, that is, any even a single isolated case, and the sale of our bank card for any amount. this is already criminal liability today, so i call on our citizens. do not fall for the bait of criminals. and except that you will be changed. was on liability for the sale of bank card details or other financial instruments and serious criminal liability up to imprisonment, and you will be accomplices in the commission of a crime sold for 10 dollars. yes, this card is stolen for 10,000 and you will bear it here on the territory, including this responsibility. your property will be arrested. your property will be used to compensate the victims, and that criminal is the organizer in the territory of another country. well, we'll get it, or we won't get it. it already depends on how,
11:52 am
uh, the law enforcement agencies of that country will help us, or not. by the way, about the help of law enforcement agencies of other countries. at what level is the interaction with foreign partners now, the structure has changed, so, when we defended the whole world, ah, absolutely the whole world was with us. now it doesn't work anymore. they work when they are interested, when they have a victim, when money is stolen from them, and therefore they then ask us for help, and we, of course, help laws and laws. eh, even if our belarusian - a citizen, uh, stole money in another country. and regardless of which country it is not profitable for them, no, firstly, it is once profitable to cooperate today. uh, as i said, we have overcome cybercrime, that is , the belarusian cybercriminal, which is practically attacked by other countries. no, that is, everyone is either detained, or is on guard, or left the territory of our country. and today the situation is different, when they attack us, and
11:53 am
when they attack our citizens, they don’t really care anymore. it is interesting to provide information about information quite a lot is located on the territory of other countries only through this information. we can sometimes be held accountable. in the case of the criminals, they are there, and here is the interaction. it has gone there for the last 2-3 years, but again there is a positive there is a negative example, again, law enforcement agencies and competent judicial authorities of ukraine groups that we have up to 12 years in prison, who were attacked there in the world for various crimes. they, uh, moved to the territory of ukraine, and when we say, extradite, we will attract. this is not your citizen, our belarusian, who even stole not from us , posing as no, they have a certain system organized when he issues refugee status, without fundamentally, since they will demand from us, namely, the
11:54 am
information that this citizen provides, who applied that he allegedly , there protest activities of some kind participated in repression, there will be some. and we, uh, look, we didn’t always go anywhere , a purely criminal drug addict, including and so on. we provide it there and see that they have no grounds for this assignment of this status. well, this is assigned, it's understandable and we understand where these legs grow from, but if there are positive examples, even today we cooperate well. police of spain and today they are interested, because some of our citizens are belarusians. here they are and the cybercriminals they were on the territory of spain and. uh, when e we reveal that here, within the framework of some criminal case, the side is a specific criminal case. we have been initiated at the main investigative department of the investigative committee. last year there was an international operation, when a group of belarusians, located on the territory of belarus
11:55 am
on the territory of spain a, stole uh according to the so -called clothing carding scheme, when hmm bank card details are used to buy, uh, some expensive goods, for example in america and then for less money is realized and the money thus laundered is distributed among the criminal group. so they stole about 2 million dollars within six months. well, that is, belarusians, there were about ten people in the group, but this year. we have already sent that part to the court, and now one of the uh active members of this group, he was in spain and from the territory of spain, he regulated the scheme, and the sale of goods in america found nominees, and the money was already coming to him, and he was already transmitting to territory. e belarus and here already distributed. and the code. uh, the spaniards went forward to jointly contain it on the territory, and spain
11:56 am
today, uh, the issue of extraditing him to the territory of belarus is being considered. this is an example, and even today's cooperation is positive. he is a criminal, there is a law and he must be held accountable, as well as the investigative committee. belarus belarus is also acting in spite of no one it causes damage, not even a friendly country. if you haven't already damaged belarus, committed crimes, it will or what, he is responsible for the territory of our country and we expect the same from our partners in other countries. we were very glad to see you. thank you for accepting our invitation. we will invite you again when you realize your great work, your operation that you spoke about. we tatyana shcherbna, svetlana smolonskaya say goodbye to you today. goodbye. goodbye. and now ivan sutnikovich is speaking, dear belarusians. you are under the reliable protection of law enforcement agencies. believe me. we do our best to stop cybercrime and it will be stopped by the only request to you. be vigilant, do not fall for the tricks of cybercriminals.
11:57 am
11:58 am
the heroes this is one of the main things of their lives. with the family, so i pulled the whole family. because i understood that this is just the same exception to the rule, there is no such thing, all our friends are familiar. they all left. i want to stay here to leave something here to show people that something can be done here in every issue. real stories. won. yes. you see it's an old, 17th-18th century city. this is when the master's fingers ran over this very made brick to break stereotypes, watch on belarus 24 tv channel. in times of rapid change, it is important for us to show you. the main thing is that the country has fixed a clear position, which it adheres to. today we keep history, value
11:59 am
the achievements of generations and honor traditions, global perspectives, high diplomacy and social research. however, the fact remains that dialogue platforms have started working. and this is a chance for everyone to be heard, we will draw detailed conclusions, see exclusive interviews and talk about the main events on the main air. watch on tv channel belarus 24.
12:00 pm
live main news at noon in the studio sergei lugovsky hello, watch the release of the development of agriculture, taking into account climate change, as well as the investment strategy in the agro-industrial complex , the president today in the gomel region. countries of the upcoming nato increase military spending
17 Views
IN COLLECTIONS
Belarus TV Television Archive Television Archive News Search ServiceUploaded by TV Archive on