tv [untitled] BELARUSTV December 23, 2022 6:30pm-7:01pm MSK
6:30 pm
6:31 pm
figure. what are the nicknames in the networks of the kardar forum, and cyber thieves only connects the network. it was a big surprise for him to understand that the game is over scammers, skillers, shimmer carders, high-profile detentions. we met face to face. probably four times, but a girl. he did not pay attention to me and international operations, where the belarusians deciphered. a lot of new technologies are being introduced, so we have to comply with and also develop labor-intensive work, colossal work. it’s like standing in minsk in the fall of 2022, the detainee is sent to the
6:32 pm
eu to his apartment among other things, a pair of wristwatches, each such watch is about 20,000 dollars in the yard of a premium car, i’ll tell you. well, i swear to you , this is not my brother’s business, which the operatives were hunting for, perhaps a dozen countries are an example of how the digital trace from belarus led to a criminal 4,500 km away. for nearly 15 years , a fake passport has been wanted. perhaps, partial plasticity of the face is all in the classics of the genre and counted on the purity of the biography, taking into account the expired statute of limitations for belarusian fighters. cyber front. they overtook him in bishkek . i didn’t expect to cry like a child, because i was sure that it was literally ending, there six months after six months, and
6:33 pm
the first question of responsibility was how they found me began. and that the citizens of the republic of belarus suffered, he is still affected by the impact of the citizen of the republic here, the family here, the parents. yes, he studied, as they say, he got married. everything was here, for now. she is not on them. came out. all this time in belarus, methodically for many years, they collected evidence of his crimes, who were detained in bishkek and a member of an international criminal group that hunted for pictures in cases. millions of dollars are figured for a long time hiding in europe as well as his fall, which is notably inherited in our country of great support. our mida organized a whole corridor for you to be in spain for joint police operations in spain, that is, we exchanged contacts, changed digital evidence that allowed to detain this person for 20 years. it is clear that this is a high-profile case of the belarusian fighters of the cyber front today in the arsenal of modern complexes for analytics, internet intelligence, operatives who know
6:34 pm
a lot about not only entering every police department and solving crimes. in the field of high technology, a separate operational unit of the criminal police has grown from the wanted list and later from the departments of five people, the capital of 90 in belarus appears the first mobile phones are launched by the internet after the collapse of the soviet union the belarusian law enforcement system, like all the young sovereign country, is wondering what further automation processes are starting from processing traces of places of unsolved crimes, creating accounting electronic databases to service special systems to automation. and one expert could, during his working time, process somewhere about one print or one trace seized of an unsolved crime scene and 10. tokard and that’s all, and the array is actually from a deptacard of a million, minsk as usual, the major general was a legislator
6:35 pm
boris starletsky at that time was debugging the work of the metropolitan police even then. it was obvious that crime was changing and it was not enough for the operative to have only the mind and deduction began to understand that, in general, if some kind of automation was created, then there would definitely be people who, in general, like as if to be interested and willing to penetrate these systems in order to get some of their own benefit , such concepts as it country, an online payment system, have not yet been born, but in belarus it raised its head. the first generation of it intruders 1998 the crime in the bulletins attracted attention. a trojan horse in the victim's computer gained access to the network details of users, the country's largest service provider appeared. password and internet access, which were sold, as i remember now, for 10 dollars. we then worked in the criminal investigation department for such words as internet and provider. well, they were in the deco, acting, according to
6:36 pm
the principles of the criminal investigation department. we have installed. this is the face of jail. he sat down, though for fraud, and not for the so-called computer crime. criminal code was not yet familiar with this phenomenon. like operatives, where there could be one computer for the entire department, and the internet was a luxury at all, the bright heads of our scientific circles created a whole head in the criminal code called a crime against information security. which included the main components of crimes. which were as close as possible to those offenses that were set out in the european convention on cybercrime. after that, the process went the first cyber thieves. loners mined pin codes for other people's payment cards, but after only a few years. this is a criminal environment, taken by organized groups. their connections were reaching out to cops in other countries. it was necessary to urgently put things in order,
6:37 pm
because if in the ninety-eighth year there was one crime per day, then they approached mileniya already with the figure of a thousand in 2001. i was appointed to the post of first deputy minister of internal affairs of the republic of belarus prepared a memorandum to the minister of internal affairs without attachments. here, to form such units and the central office to the ministry of internal affairs and in all departments of internal affairs of the regions november 28, 2002 is the date when belarus began to actively strengthen its cyberfront to strengthen fighters capable of thinking outside the box with the ability to read and record digital traces. analyze and calculate the moves of attackers. thus, an independent operational unit appeared in the ministry of internal affairs. and then investigators were needed for prosecutors and judges who knew what they were dealing with, in fact, the creation of the unit was the start of the formation of a new system of counteraction
6:38 pm
this type of crime in our unit is served by very versatile developed people. and they must be very versatile. this person must be both an operative and a person with a fairly wide and deep knowledge in the technical plan. this is where an operative is needed. the mentality of the belarusians loudly declared themselves almost from the very start of the special operation, the tornado, carried out on the initiative of the ministry of internal affairs with the participation of interpol, revealed more than 5,000 sites with child pornography around the world, they were closed by employees three times at the request of the states they were sent to participate special operations in baltimore, but a twenty-year-old digital criminal is still a layman compared to what current criminals are operating in digital, the same carding is more technologically advanced today. an apartment on surganova street in minsk, the arrest group is ready for the criminal and does not suspect in a matter of
6:39 pm
seconds. on his hands, the bracelets close up, he had to wake up and even in his underwear such an effect of surprise laptops digital biography, versatile criminal activity silver bars currency jewelry flash drives with information useful to operatives. modern cybercrime is not the action of one person in the vast majority of cases. this is the action of a group of people, they can find each other on the internet in various messengers, agree on the commission of this or that action, distribute roles far away. members of this criminal group are not always located on the territory of our country. and this is capital street. gaya kardor was sure he was smarter and more cunning, the police
6:40 pm
control fighters proved back that they have been doing this for 10 years. your actions were recorded throughout one year, what a crappy video there are answers from international systems for the purchase of a control reproducer from your carder product to a friend, and this theft on an especially large scale using bank card details to understand the bystander, the criminal did not steal the plastic itself, we are talking about already stolen data in digit. household themselves for the owners of these cards made purchases. on the internet site, to perform an internet massage, it was enough to enter the card number and the confirmation code for this information is stolen by frames on fresh online stores, that is, by using such phishing powers. having sold golf clubs , the spanish police operatives tried to launder money by selling golf clubs, in these frames they examine the goods at the apartment of one
6:41 pm
of the accomplices of the detained belarusians in close cooperation, law enforcement officers of the two countries stopped the activities of an international group, the victims of which were hundreds of people fed on the card accounts of american citizens who were on the territory of the republic of belarus at the speed of spain simultaneously. on this day, a resident of spain was detained, through which the resale of these goods was directly carried out, the damage was more than a million us dollars in order to protect themselves when cashing in the stolen goods and confuse the tracks. cardders came up with an intricate scheme on foreign internet sites, paid for expensive goods, then resold them for cash, shared successful cases that were carried out for 20 years, we do not even today, first of all, in order not to disclose the tactics of the technique, because if criminal the world will know, and certain features of the moments where we are present, it will be much
6:42 pm
more difficult for us to counteract this today, the kids are at that level and i am absolutely not afraid to say that the unit performs those tasks that no one has done. hands behind his head, everything is calm this man with tattooed pictures on his body is a cybercriminal on the carter forums of the shadow side of the internet his nickname, is known, to many networks, the card forum was last used by iran all evening from spain hello on the ceiling camera witness of an explicit the desire to retire, perhaps just during this communication session in instant messengers, numerous thematic forms. the twentieth year of the belarusians is in a fever from the hybrid war launched against us. it’s not easy for everyone to test the strength of new political technologies that went in close
6:43 pm
adhesion with the psycho-emotional impact through telegram channels, not everyone feels this and crime, but the assumption that law enforcement officers are distracted from their immediate task of catching criminals was false and shimmer is another concept from cyber sary. it was calculated that the operative was a woman, a foreign citizen installed specialized equipment on atms of various banking institutions, and in order to remove information from the magnetic strip of a bank payment card, as well as pin codes , this data was later overwritten on duplicate bank cards and used to commit theft, the criminal disguised himself as a hood , not the most original remedy. glove wigs were in use, and the technological plate could not be seen by the layman's eye, it was used. shimmer it a specialized plate that is immersed in the kart. the atm receiver and
6:44 pm
is invisible to the average user of an ordinary citizen, either an invoice, a keyboard is installed, with which you can get a pin code for a specific bank card, or an overlay is installed and a video is made of the fact that a person, in principle, drives a car on the keyboard quit for a few blocks, as it will become known later, this is a man with two higher educations, a business analyst, gave advice, famous people. install it, and even more so it was difficult to catch it by the hand, but at one fine moment. passing by, the operative noticed traces of criminal interference in the operation of the atm. then it's a matter of observation technique, long, hours and patience. we met eye to eye with him, probably four times the good thing is that i’m a girl, he didn’t pay attention to me, while he was extremely careful, i watched the passers-by,
6:45 pm
if anyone was sitting on the opposite side of the stop, we managed to fix the car on which he moves to set address instead of living and detaining directly red-handed, the offender worked out an article with theft on a large scale, more than two dozen suffered. man the political situation in the region is a global crisis against the backdrop of a pandemic of instability. all these are impulses for cybercrime . recently, attacks on our country have increased many times over. digital crime. it depends on many factors, primarily on what is happening in the country. and what happens on the nearest axes of the economic political situation on strength is already being tested not only by ordinary people, but by subjects of the economy. management specialists today, in fact, at the forefront of the cyber front, attacks are being carried out on our country, and including a somewhat different kind, that is, attempts to convey
6:46 pm
disinformation to our people, attempts to compromise certain state institutions, organizations, including by replacing them with e, real internet -resources for fake each crime, its disclosure is an opportunity to compete with the attacker with knowledge to test deduction and when in minsk once from atm on the street near the administrative building. they stole all the money. it was just such a case had to quickly look for a breach in the attacker's protection system. e, i connected, but let’s say in a certain atm, relying on the fact that the atm was of the old system, and with it the atm forced the atm with updated security systems and malware. give out all the cash that he had, that is, in principle, not hacking. as such, there was no open non-theft, as it will later become known to collect money from an atm into a bag about a cyberthief. gone
6:47 pm
half an hour after we looked at, uh, hmm and analyzed the legs. how long did he give out this money? how did you count and so on? well, naturally, the reasons why this has become established? perhaps he had tasks to perform. he had to do it one second third. action. then the program performed the most necessary manipulation. well, it was also installed on remote access the next day while withdrawing money from an atm, similar to the outdated system with a bag of cash the offender was caught and his accomplices from russia were caught at the suggestion of belarusian operatives. they were detained by the russians at a similar atm back that it is the most promising rapidly developing among the crime service. unfortunately, not everyone sees people and can appreciate that pedantic scrupulousness must be understood. how much time is spent on this effort so that the digital traces later form an evidence base among
6:48 pm
extraordinary cases, the disclosure of which brings moral satisfaction to the operatives , undoubtedly, and this was what two scammers were looking for. abby dale and dennis. patton found himself alone in the two-faced woman in her talented legends, numerous family ties with senior officials, including the power bloc, where they are supposedly always ready to help resolve the issue. come on money. and if someone had some questions, there, for example, with the pro-horoprotective authorities plainly or with indicated that there are acquaintances there in the prosecutor's office, if there are questions whist in embassy institutions and by allegedly giving bribes. is it possible to resolve these issues? i communicate for a very long time for a period of time transferred these funds. and at the same time, they managed photographs of their bank payment cards, including on the reverse side, with the cv code that this person was later not inspired to use. helen elya eva, aka
6:49 pm
albina yana barbara, communicated with belarusians exclusively with an accent, calling herself citizens of great britain a citizen of israel sometimes. poland chatting online with foreigners. at the same time, she spoke purely russian, easily reincarnated from a woman into a man, changed her voice and the victims did not suspect that they benefactor and face. let's say from the organs. this is the same person. as it were installed was previously prosecuted in 2011 on the territory of the russian federation for fraud, after which, according to our information, she was on the territory of ukraine and committed a crime there, however, bring her. there to criminal responsibility. for the same crimes, they could not, because this person kept his real document. e in a separate apartment, which she rented herself, she used a number of intermediaries and, accordingly, when she received information that law enforcement agencies somewhere came out with something. but if it was she who simply left the territory of this
6:50 pm
state. this is already a conspiracy scheme used by them in belarus, due to her victim in our country of latvia more than ukraine and other countries goes to hundreds, they tried to figure it out by law enforcement officers of many states, but they found it was detained. great britain and demanded. this state for her was a big surprise when we went to another address in the city of minsk where her real documents were stored, after which this person, of course, realized that the game was over, a woman by education, a psychologist, mastered the methods of changing consciousness and perception of reality with their help, quickly collected the necessary dossier . and then just parasitized on the problems. how operatives joke. today, it is enough for an attacker to simply look at the card and there will be no bank left on it.
6:51 pm
what are you calling from the russian number. enough already brains to compost belarusians. the most common crime today, there is fraud in this area, when the victim, under any pretext, is forced to give bank card details. this is cherry phishing, where a certain behavior pattern is thrown already in a telephone conversation. in order to fully control his attention, get personal information, or simply force e-e to do certain actions. well, roughly speaking, the criminal uses the number substitution system to transfer money, and this is no surprise to anyone. now stepped out of the city, brest, brest region, so we must go fixed and called you inattention, gullibility carelessness excellent water. for such fishing, they work according to a template to change scenarios for more relevant ones. and then it-technologies are coming to khot, the
6:52 pm
criminals stopped introducing themselves as bank employees, law enforcement officers began to introduce themselves. and, in principle, the mechanism itself is the same - providing phishing links on various resources, that is, buying and selling services hacks of the messenger themselves, uh, recently popular acquaintance links to a site on which, in principle, they made details using these details. uh, then cash is always stolen from criminals. there are consultants in the darknet, the community works in the shadow markets and acquires card details from foreign banks. further , the withdrawal of funds for the disclosure of such crimes is carried out by a team of professionals, where everyone has accurate knowledge from different areas of the criminal group. by the young people who were assisted by e to malefactors in deception of our citizens by means of calls in total more than 60 people at the moment more than 2,000 are already established. eh, the offenders who have suffered are young
6:53 pm
people under twenty-five who wanted to earn money quickly and without doing anything, but, of course, the kind of income that they find. uh, online. the internet is taking them to places not so far away the popular rise of the internet marketplace is also a tasty morsel for cyber-scammers, especially when it comes to goods from hand to ice when only one of them was contacted by dozens of buyers per day who lost all their savings from the card in the minsk region, a group of persons committing a crime in the field of fraud on the site was identified, and these persons created software that could automatically generate a phishing page . subsequently, and this phishing page was sent to persons, the attacker communicated with the seller on behalf of the buyer and offered him to purchase the goods, but for some certain price. and begging for a discount asked from an accident, that is, a bicycle, how a simple buyer one
6:54 pm
of them agreed on the amount the attacker sent a link, when the seller in this link went he got to the chips on the page on the fake page gave the criminal the opportunity to withdraw all the money responsibilities were clearly divided hand walked as citizens of the republic of belarus such citizens were two organizers who created the software that they themselves links were created and which were managed by the whole scheme where, what to whom were taught in the course on youtube thanks to the preventive work carried out, the number of crimes is reduced and yet 20% of all crimes are summaries. this is a crime with a prefix, cyber one of the new criminal trends is svating or svating, if you are close to transcription from english, but the word managed to assimilate in a short time. this is a false hazard message, usually. these messages come to e-mail, or an
6:55 pm
enterprise or organization in which it is indicated that the building of the premises given there is mined and either some demands of this young man are put forward. the guy was taken by surprise. i had to answer the questions of the operatives and for myself and for my friends, in truth, with what mail? which computer question? with the windows operating system, the firefox browser and this detained ninth-grader from a small village in the vitebsk region and judging by the digital footprints with a decent experience in the shadow segment of the internet, who was three or four months ago, for what purpose did the war help the matchmaking community guy smiles when asked about finances and it seems that even the city with them their objects can be anywhere, as a rule, belarus is interested in russia, other
6:56 pm
countries of the post-soviet space, there are times when email messages arrive about a hundred objects are mined in one day, it is very difficult to calculate them, but perhaps, it is indeed a laborious work of interaction. again, here you need different law enforcement agencies of different states. and only in this case it is possible to really get success. the goals of swatting are different from the banal desire of teenagers to have fun and excite the operational services to see the result from the news, then the desire to make money on blackmail, the main goal is panic in a particular object. perhaps in some region there is a desire that we evacuate people to conduct some kind of mass checks. all this will cause a certain proportion of negative manifestations. what is the main goal? that is, a few years ago with this form of cybercrime. basically, not
6:57 pm
faced with each message it is necessary to respond and for each message all the necessary services drop out - this is close. this is the ministry of emergency situations , this is an ambulance, sappers - these are cynologists with dogs. a lot of forces and means are involved - 250,000 russian rubles. the teenager explained his actions. his like-minded people were nervous in the presence of people in black in russia, the joint operations of belarusian and russian law enforcement officers identified and detained a group that in 3 months created more than 80 fake messages about the terrorist attacks on the telegram channel and took orders for money. reports were posted there, and the work was done. and let's go back to the beginning, the criminal of whom, with the help of belarusians, was recently introduced by operatives from four states, he was self-confident and wounded by his
6:58 pm
content. alive. an example that everything secret is becoming clear is the main thing is endurance and the ability to make an operational decision in time, but also rationalism, that a fake passport was in my last name yesterday. he detained her, like a wolf was driven to certain lighthouses by a certain state, they controlled satisfaction unconditionally. you have to be a fan professions. there, maybe take a week of a month. even years is one development. accompanying a particular situation. it's all in the head. you live with it, as focused as possible in rhythm, because either a task can be set, or the situation can change dramatically at the time of our shooting . years expected.
6:59 pm
you know how to determine the question that the participants will never answer, everything is very simple. ask anyone you can’t go wrong, erudite smart belarusians. i still the question has not yet been fully formulated. and natasha already wrote something there. repin, you all think so, although what i ask them. they generally do not come to competitions ready to give all their strength to win the top rat prize. i heard a mouse. you say rat again. i accept the answer rat. this is an absolutely correct answer. yes? what does diligence do? 821 days and not a day more and not a day more, watch in the intellectual entertainment project tower on our tv channel.
7:00 pm
10 Views
IN COLLECTIONS
Belarus TVUploaded by TV Archive on
