Recruitment: How to understand that you are in danger? How to protect your child?

Russians are recruiting Ukrainian teenagers: how to protect your family?

In 2024-2025, the SSU recorded more than 600 cases of attempts to involve Ukrainians in arson, terrorist attacks or sabotage. Every 5th person was underage (22% of those recruited). In most cases, the Russian FSB is behind this.

Teenagers are promised “easy money”, but:

  • they usually don’t get the money;
  • they use them and then clean them up to leave no trace.

The consequences are death, injury and/or imprisonment.

Two teenagers (15 and 17 years old) in Ivano-Frankivsk were recruited through a local Telegram channel looking for work. They agreed to make and install two explosive devices in return for $1,700. However, the FSB supervisor paid only small amounts for the purchase of components and remotely detonated the explosives together with the children: A 17-year-old died on the spot, a 15-year-old lost both legs and almost lost his eyesight.

In Ternopil, a 14-year-old girl was blackmailed with her personal (nude) photos, forced to make explosives and plant them near the police station. Russian intelligence services planned to detonate the device remotely during the attack, but law enforcement officers managed to defuse it and save the child from death. The girl faces life imprisonment.

Who is at risk of recruitment?

  • Underage children. They fall for it because of their vulnerability, lack of experience, desire for quick money or emotional “adventure”. 
  • Young people looking for work. Students, school graduates who post “looking for a part-time job” announcements on social media and Telegram channels.
  • People with drug or alcohol addiction or financial difficulties. Criminals speculate on the desire for quick money or a new dose.

However, in fact, they can target anyone. The FSB also sent messages even to groups of military personnel, trying to recruit them. There were also attempts to establish contact with ordinary passers-by in public transport in Lviv using posters with QR codes.

How exactly does the Russian FSB recruit teenagers? 

Russian special services use various recruitment schemes. Here are three of the most common scenarios: 

  • Blackmail with personal data 

They crack into a teenager’s phone or account, find “sensitive” information (photos, videos, correspondence) and use it as leverage: “Either you do our task or everyone will know about it”. The child is frightened and, in order not to lose his or her reputation, performs tasks: photographing objects, setting fire to cars, sabotaging railways or administrative buildings

  • They pay for “small” tasks and promise more, but instead of the “final reward” they blow them up.

The victim is found online: through Telegram, TikTok, Discord, job search groups, posters with QR codes in cities. And they involve them step by step. At first, they give a “simple and safe” task: take a photo, make a graffiti, take the “package” to another place. And they pay a small amount as a guarantee that the money will continue.  But instead, they blow up the children on the “final” task in order to avoid paying the money and cover their tracks.

  • They blackmail the child with something they have already done 

The victim is found online, first instructions are given, and then blackmail and pressure begin: “You have already become an accomplice in a crime, now do more serious things, otherwise we will tell the police”. This is how a frightened teenager is persuaded to commit arson, terrorist attacks, and sabotage. 

What are the signs that a child may be recruited or may be at risk? 

They are often expressed in changes in behaviour and environment: 

  • A strange new daily schedule: the child regularly disappears without explanation, returns late.
  • Sudden mood changes that were not present before.
  • Secret correspondence: changing passwords, frequent deletion of correspondence history, hostility when you ask “What are you looking at on your phone?”.
  • New social circle: “friends” from the Internet that the child has never mentioned before.
  • New property and money: the child gets expensive things, gadgets, or money that he or she can’t explain the origin of. You may also hear a teenager talking about “easy money” on the Internet because they believe in it.

Why do children agree?

  • They want money: 2-10 thousand UAH seems like a lot of money for a teenager.
  • Need for attention and recognition: if a child lacks support at home, they look for it online.
  • An element of play or extreme: adolescents perceive it as an “adventure” without realising the consequences.
  • Manipulation and blackmail: first, they are tricked into doing “easy tasks”, then threatened.

What are the consequences for the child? 

  • Criminal liability: a child can be convicted of a terrorist attack or sabotage from the age of 14. Sentences are very serious – from 10 years in prison to life imprisonment.
  • Danger to life and health: russian curators often blow up children remotely to cover their tracks and avoid paying money.
  • Psychological trauma: even if a child doesn’t die or lose his or her health, he or she becomes a hostage to constant fear and blackmail.

How can parents prevent this? 

  • Open communication: no criticism or shouting. Talk about real cases, explain the risks.
  • Discuss “online safety” together: explain that “easy work” with quick earnings on social media is a huge risk and almost always a fraud. And teach your child that if they receive strange offers, they should contact you immediately.
  • Teach your child media literacy. Explain how to check information and why you shouldn’t trust anonymous contacts. Teach them that it’s better to lose a quick and often imaginary UAH 2-10 thousand than to lose their whole life (or risk it).
  • Regular attention: notice sudden changes in behaviour, large sums of money or new acquaintances.
  • Talk about responsibility: talk about responsibility for crimes. Their young age will not keep them out of prison.
  • Legal ways of earning money and financial literacy: if you can, give your child a fixed amount of pocket money every month. Or help your teenager find a safe part-time job, show them an alternative.

What to do if there is already contact with recruiters

  • Save evidence: screenshots, correspondence, contacts.
  • Contact law enforcement immediately:
    • police – 102
    • SSU chatbot ‘’Spaly FSB‘’ in Telegram – t.me/spaly_fsb_bot
    • Explain to your child that cooperation with law enforcement can save them from punishment and even death. If he or she is afraid to tell you, let him or her contact them on their own.

Advice from the SSU: “If someone offers to “just carry a package”, take a picture of a military unit or set a car on fire, know that they want to use you and then kill you”.

Talking to children works! In Odesa, a 9th-grade student who was planned to be recruited by the FSB did not give in. Unknown persons wrote to him on Telegram and offered to ‘’earn extra money‘’. The task was to set fire to TCR cars and administrative buildings and leave graffiti on them. He was promised money for this. The schoolboy saved the correspondence on his phone and handed it over to an inspector of the Educational Security Service. 

So how can a teenager earn money safely?

Here are some ideas for teenagers to earn extra money

  • Help at home, in the family business, or with friends. Encourage children with symbolic tasks for which they can receive money from you 
  • Tutoring younger children, looking after animals
  • Managing social media for brands
  • Handmade work: handmade, crafts, drawing
  • Participation in volunteer projects with a scholarship
  • Online freelancing (design, texts) 
  • Explain that honest earnings are possible. Help them find it and make sure that this offer is safe for the child. 

And remember that teenagers are being recruited in all regions of Ukraine, without exception. Anyone – father or mother – can spot a threat in time if they communicate with their child and are attentive.

How to protect yourself from malicious messages in messengers

The enemy doesn’t stop trying to cyberattack Ukrainians. Hackers can send dangerous files in the messengers we use.

Often, the enemy disguises such messages as coming allegedly from Ukrainian state structures or law enforcement agencies.

Remember: State structures and agencies don’t send messages in messengers with a request to open an attached file and don’t ask to provide bank card data, passport information, data of personal accounts in social media, etc.

Here are the rules for safe setting up of popular messengers:

Telegram

Open the “Settings” menu and go to the “Privacy and Security” section.

Select the following items in it:

Who can see the phone number – Nobody

Who can find via the number – My contacts

Who can see the time of my latest activity – Nobody

Who can see my profile photos and videos – My contacts

Who can link to my account when sending my messages – My contacts

Who can call me – My contacts or nobody

In the “Calls” section, Peer-to-peer should also be set to – My contacts

(this is an option that allows users who call you to receive or not to receive your IP address)

Who can add me to the chats – My contacts

Two-step verification – Set password

WhatsApp

Open the “Settings” menu, go to the “Account” section, in which select “Privacy”.

Choose the following items:

Last time online – Nobody

Profile photo – My contacts

Groups – My contacts

“Settings” – “Account” section – Two-step verification – Enable

Viber

Select the “Advanced” menu and configure the following items there:

Settings – Calls and messages – set the toggle opposite to “Block unknown callers”

* “to set” or “to remove the toggle means to press the switch next to the parameter. If it’s purple – the function is enabled, if it’s transparent, the function is not active.

Settings – General – Use a proxy server

Configure the “Privacy” tab as follows:

  • set the toggle opposite to “Automatic spam check
  • remove the toggle opposite to “Peer-to-peer
  • set the toggle opposite to “Requests
  • Control who can add you to the groups – go to “Settings to add to groups” and set a check mark opposite to “My contacts
  • remove the toggle opposite to “Offer friends
  • Personal data – remove the toggle opposite to “Collect analytics”, “Allow personalization of content” and “Allow precise geolocation services

Pay attention to functions “Request your data” and “Delete your data” and see exactly what data about you is stored in Viber’s servers.

How to protect data on social media?

Private information, especially during martial law, can be used by the enemy against Ukrainian military and civilians. In order to keep your personal social media accounts safe, we recommend that you:

  • Set a strong password to log in to your account. Read how to do this here.
  • Use the double authentication function. This means that when someone tries to log in to your account from an unfamiliar device, the service will require additional identification. In this case, a message with a confirmation code will be sent to the phone number or mailbox you specified. You will be able to prevent account hacking.
  • Review your social media profile settings and use all possible ways to protect your account.
  • When creating social media accounts, use an email address of a reliable service, such as Google or Yahoo, as a login. But by no means a Russian one!
  • Do not log in from unfamiliar or unprotected devices. After you finish your work, you may forget to log out of your account or the device may remember the login and password you used when you logged in. In addition, the device may be infected with malware that collects and transfers password and login information to third parties.
  • Do not open attachments in messages from suspicious or unfamiliar people. After all, phishing is the most common way for criminals to obtain passwords to mailboxes and social media accounts.
  • Install antivirus programs on your device. They will help protect you from viruses. Read more here
  • Russians are actively using social media to gather additional information about the locations of the Ukrainian army. It is important for the military and their families to remember:
  • Do not post information on social media that could endanger the life of your loved ones. This refers to photo and video materials that can be used to determine the location of a military or a member of their family.
  • Restrict access to private information (place of residence, date of birth, educational institution, etc.) in the privacy settings of social media.
  • Restrict access to private information (place of residence, date of birth, educational institution, etc.) in the privacy settings of social media.
  • Choose the settings that best protect additional information about the account holder. In particular, do not specify geolocation (location).
  • Periodically review your list of “friends” on social media. If there are any unfamiliar or suspicious accounts, delete them, as the “friend” status provides access to more private information about a person.

Do not use

  • Russian social media VKontakte and Odnoklassniki, as well as the messenger Qip;
  • Russian search engines Mail.ru and Yandex.

At the request of the Russian special services, they can transfer information about the personal data of account holders (email, mobile phone number, date and IP address of registration, date and IP address of the last visit, etc.)

Do not use Russian mobile applications such as DMB Timer, DMB, DMB Timer+, Dembel and others. When you register there, you provide your own personal data and the military unit in which you serve, as well as the data of your fellow soldiers. Then they get automatic access to geolocation, personal contacts, photos, multimedia, files and documents, allow them to read, modify or delete content on the SD card, view network connections and get full access to the network.

For cybersecurity tips for those in the temporarily occupied territory, please read the sections on communication under occupation and data protection.

Safe browser settings

Keeping browsers in working condition means updating them in time, as well as the rest of the programs installed on the device and the operating system itself. And also – download them only from official sites and use only a minimum of extensions for them.

Here are the indicators you need to adjust in your browsers:

Сhrome

In the “Settings” menu

Privacy and security – Security – Safe browsing – Enhanced protection

Privacy and security – Security – Advanced – Always use a secure connection

Downloaded files – Always specify the download location

 

Firefox

In the “Settings” menu

Files and Applications – Always ask where to save files

Browser privacy – Security – Block dangerous and fraudulent content

Browser privacy – Security – Enable HTTPS mode in all windows

 

Opera

In the “Settings” menu

Privacy and security – Security – Enable protection against malicious and always use secure connections

Download – Prompt for save folder before downloading

 

Tor

In the “Settings” menu

Privacy and security – Protection – Security level – High

Privacy and security – Protection – Fake content and Malware Protection – Block dangerous and fraudulent content

Privacy and security – Protection – Certificates – Request confirmation of the current status of certificates from OCSP servers

Privacy and security – Protection – Mode “Only HTTPS”

Basic – Files and Apps – Always prompt to save files

Protection from harmful software

The first thing that will help you protect your devices from viruses is to install anti-virus software.

Recommended software: Avast, ESET, McAfee, Zillya.

How not to get attacked by fake antivirus?

Only download the antivirus software from the official developer’s website or from verified sources (Play Market, App Gallery, App Store і Google Play). If you can’t buy a paid version of the program, find a free analogue, but don’t download cracked versions of paid apps.

Update your antivirus regularly. Only then will the program warn you about the threat in time.

Antivirus is installed. What’s next?

Regularly scan your device for threats that could harm your data.

Also use the anti-virus to check USB sticks and other external devices that you connect to your computer.

Periodically “reset” the settings of your smartphone.

In this way you can neutralize the “keylogger” programs that track the user’s actions.

Do not click on questionable links. Such as:

  • received from unknown senders via email, SMS or messengers and social networks;
  • messages with a call for urgent action and those that use a highly relevant and frequently mentioned topic in the media;
  • those that lead to questionable sites or channels in social networks;
  • those that do not have a security protocol: https – safe, http – potentially dangerous;
  • containing the word /download/ – these links will immediately begin downloading the file. Attackers will probably download malicious code or lead to a phishing site.

Pay attention to a sharp and noticeable change in the operation of the device: a sharp decrease in charge, slow operation, the appearance of files that you did not create or programs that you did not install, the appearance of unknown programs in autoload when the device is turned on, etc. Maybe this is a consequence of the activity of harmful programs.

Set secure messenger settings. How to do this is explained here.

Set secure browser settings. How to do this is explained here.

How to download and use apps and files safely

Cybercriminals are constantly inventing new ways to trick users with malicious apps and programs. Downloading a free movie, game or music – is always a risk of malware infection. And the gain of attackers is to gain access to your personal information.

For your data and devices security follow such rules of downloading apps and files:

  • Use only licensed software from verified sources (Play Market, App Gallery, App Store і Google Play or official developer sites). Pay attention to who published the app, as some shops have questionable copies of popular apps. Russian viruses are now often spread through “pirated” programs.
  • Don’t download files and apps from unknown sources (dubious sites, pages and channels in social networks, unknown senders).
    Potentially dangerous file extensions: .exe, .bin, .ini, .iso, .dll, .com, .sys, .bat, .js, .apk;
    Potentially safe file extensions: .docx, .zip, .rar, .pdf.
  • The file has been installed – check it with an antivirus. But new malware or code can only be detected by an antivirus which is regularly updated.
  • If you can’t purchase the paid version of the program, find a free counterpart, but don’t download cracked versions of paid programs: they usually contain malicious software code.
  • Select the prohibition of installing apps from unverified sources and automatic file downloads, and for the browser – the function “ask for the location of the file before downloading every time”. If you accidently click on a link that automatically starts the download process, it won’t start until you confirm it.
  • Avoid using applications from russian developers: VK, Odnoklassniki, Yandex.Browser, 1C, Mail.ru and others russians may track them. Before downloading, necessarily check the information about who is a developer and owner of the app, and if it’s not forbidden in Ukraine.
  • Control the permissions the program requests during installation. Not all applications need access to your geolocation or personal information to function properly.
  • Update apps on your smartphone and software on your computer. This is necessary because developers are constantly working on improving their security protocols.

How to store data securely

Keep important personal files encrypted or in hidden folders and albums. For this:

  • For Samsung devices: use Knox secret folder. You can transfer some applications, photos and other content to it.
  • For all Android devices: Gallery – Albums – press and hold the required album – in additional menu select HideOr: Gallery – Albums – slide your finger on the screen from top to bottom – a hidden folder will open, on which you need to set a password or graphic key.Or the “Second storage” function (available in some Android devices)
  • For iPhone, iPad or iPod touch: Photographs – choose photo or video, which you need to hide, – press the button more – Hide – confirm.

Use encryption to exchange information and correspondence. For E-mail, it can be asymmetric PGP encryption, for which there are special programs, and for messengers – encrypted chats and messages that disappear after a while. This will keep your data private if your computer, phone or email account is hacked. Hackers won’t be able to read your messages without the encryption key.

Keep copies of important files in cloud storage. For example, Dropbox, OneDrive, Google Drive, etc. From there you will be able to recover data if the phone will be jailbroken. Also, back up important documents to separate devices or secure cloud storage. When hackers gain access to the device, it’s not always possible to recover the information.

Don’t store information in the smartphone memory that could harm you in case of occupation and search. Immediately delete such files and chats from the smartphone memory. And what’s important to keep, pre-download to the cloud storage.

Threats to children online: how to protect them

In addition to entertainment or educational content, there are many cyber threats on the Internet that you should warn your child about. For example, your child may accidentally blab to strangers in an online game about their parents’ work schedule or an expensive purchase. And this is a threat to your family. When should you tell your children about cyber threats? What’s the best way to do it? And why can the prohibition method do even more harm? Psychologist Dmytro Vakulenko told Dovidka.info about this.

How to understand that gadgets have a negative impact on a child? What changes in behaviour can indicate this?

A child becomes more withdrawn, communicates less with peers and adults. There is less interest in the real world, in sports activities, in communicating with friends, and in learning. But the focus is not on the marks, but on the fact that he or she is not interested in it.  These are the changes that are taking place. Well, and probably one of the most striking signs is that the child is irritable, emotionally unstable, aggressive.

Name the top 3 threats that a child can face online.

The first is gaming addiction, when a child is completely focused on games.

When they are not interested in anything else. They are constantly checking their game process, their account, they are not interested in live communication, they are not interested in anything in real life at all. Only the game, only gadgets, only online processes. By the way, it’s not just about games – it can also be an addiction to social media.

Another risk – especially now, during the war – is enemy propaganda. This is the influence on a child when he or she has some kind of negative result from interacting with information.

Another risk is personal data theft. This is a very common problem that affects not only children but also adults. That is, a child may not intentionally pass on important information to outsiders.

For example, they may give their parents’ work schedule or their own schedule, so thieves will know when no one is home. How does this happen? Through communication. An adult creates an account where he or she pretends to be a child, communicates, starts a friendship, and gradually learns more and more information. This account can be either on social media or in online games. For example, in Minecraft. There is a chat room where children communicate with each other, make friends and can share personal information.

This also applies to paedophiles. That is, adults register in children’s social media or online games and get the information they need there.

As soon as you explain, show your child what the Internet is, and allow them to interact with someone there, you must immediately explain the rules of behaviour. Just as we don’t talk to strangers on the street, we shouldn’t talk to strangers online. Similarly, we should not click on any unknown links. Because just as in communication one can learn some information, it can also happen in a technical way. A child can be sent a picture of a cat, the child clicks on this picture, thus following a certain link, and this link downloads a virus to the gadget. Or the attacker gains access to the camera or microphone.

Another important point to pay attention to is the use of software. Explain to your children that they should not download software from pirate sites, as there is a high probability that you will pick up a virus.

The alternative is to use paid software that is virus-free. You need to guide your children not to use torrents, not to consume pirated content, not to break the law, and to use only paid software. This will protect both your child and you.

How should parents react when a child suddenly starts talking to a stranger during a game?

This should not be an interrogation, it should be a conversation that respects the child’s boundaries. This is a general question that relates to the formation of a trusting relationship, when you are an example and an image of love, acceptance and wisdom for your child, when he or she trusts you. And in such circumstances, it is normal to ask your child, absolutely calmly: how are you doing, with whom are you communicating, who is this person, what are you talking about, what files are you exchanging. If the child trusts you, they will tell you about it.

Is it an effective way for parents to disguise themselves as a suspicious person and get in touch with their own child?

It seems to me that the next step would be to “stab” the child in the kitchen, so that he or she gets this experience at home, not behind the garages. This is a road to nowhere. You shouldn’t deceive your child and go down this path. If he or she finds out that you disguised yourself as a third party and extorted personal data from him or her, he or she will no longer trust his or her closest, dearest, most loved people – parents. This way, the child develops a deep perception that people can’t be trusted. Because if you can’t trust your parents, you can’t trust other people either. And it is difficult for a person who doesn’t trust others to live. They may feel anxious all the time.

If a certain connection between a child and parents is lost for some reason, how can it be restored?

The most effective tool is to come to the child and say: listen, we have facts. It is a fact that we constantly quarrel, that there are always some misunderstandings, we raise our voices at each other, and this makes both of us feel uncomfortable. So it’s worth saying that there is a problem and describing it. And explain that this is not your personal problem, but a common problem. And at the same time say that it is not the child’s fault. Then you say that you think it should be solved to improve the quality of life – yours and the child’s. In other words, to establish communication.

Often parents turn to the method of prohibition: they take away the phone, tablet, and don’t allow them to play computer games. How do children perceive this method?

The child feels that if something he or she really, really needs is taken away from them, then the one who is stronger is right in this situation. You think that if you take away an object without explaining anything, by force or authority, you have given the child a better future and protected him or her from certain risks. But at that moment, the child realises a very simple story: the one who is strong is right. And as long as you are strong, it works. But at a certain point, in adolescence, the child becomes physically the same as you, and maybe even stronger than you. And it stops working.

Even if you keep fit and can resist it, a child still grows up with the idea in their head that the one who is strong is right, and this causes resistance. Because for children, especially teenagers, one of the main tasks is to form their own boundaries and develop their personality.

That’s why a teenager will fight for the right to choose, for the right to fill their life with the activities they want. If you don’t communicate, don’t build interaction, and just take away, you will encounter resistance.

How can you encourage your child to spend less time with gadgets and not share important information without prohibitions?

Create a daily plan and help your child organise their time. Model their schedule, plan the weekend together, demonstrate where they have hours of games, hours of household chores, hours of some sports activities on the street or elsewhere. Help them to see where they start and end an activity. This will also help regulate their time with gadgets.

In order for a child to understand us, we have to speak the child’s language. And game is one of the leading activities of children under 10 or 11 years old. That’s why, for example, it makes sense to drink tea with sweets with teenagers, chat, and discuss something. And for younger children, it’s better to do it through games.

How can we play? It can be puppet theatre or games with plasticine. We can mould some situations. We can draw a comic book, draw rules of information hygiene, and rules of online safety. In the format of a comic book, where the main character faces certain challenges, and the mother and child draw the comic book together and help the main character cope with those challenges. The mother adds her expertise and some good ideas on how to respond to a particular challenge. It’s fun, the child will be delighted with the process because it will be filled with love, trust and wisdom. And the information you draw will be very well absorbed by the child through a game, drawing or plasticine.

Propaganda in Minecraft. How Russians are trying to brainwash our children through games and social media

For children, the techniques of Russian propaganda are not as obvious as for adults, and it is difficult for children not to be influenced by them. They can’t filter information on their own, and that’s what the Russians use. In social media, cartoons, games – the Russian trace is everywhere. For example, in the popular Minecraft game, players from Russia reenacted the battle for an occupied Ukrainian city. And the cartoon “Masha and the Bear” was even translated into Ukrainian to increase views among our children. Psychologist Dmytro Vakulenko shared his advice for parents on how to protect children from enemy inputs with Dovidka.info.

What are the main narratives that Russia is promoting on social media for children and teenagers?

The main theses are that Russia is saving Ukrainians, that this is not a war, but a special military operation, that Ukrainians are younger brothers of Russians, that Russia is an older brother whom Ukrainians should obey. Common values, mentality, history, culture. This is what is being imposed by the Russians. And also narratives that the Ukrainian government are bad men who exploit their people, and that Ukraine will never win this war.

Russia’s resources are aimed at forming the loyalty of our youth, children, and teenagers. And also to create uncertainty, that “not everything is so clear” in this war. To prevent support for the anti-Ukrainian position. To prevent support for the anti-Ukrainian position.

Where do Russians hide their propaganda and target it specifically at children and teenagers?

The obvious platforms include social media and messengers Facebook, Instagram, TikTok, Telegram, and Discord. Discord is a messenger that is mostly used by children and young people because it is focused on the gaming community, on online games. Therefore, there are fewer adults there, and much more children and young people. So, I recommend paying more attention to this.

Other less obvious platforms are Youtube and Twitch. Twitch is a video platform where bloggers, especially gamers, often broadcast online. And, in fact, online games are also a place where certain information and psychological campaigns of the Russian Federation are often promoted.

For example, there is a very famous game called Minecraft. It has an online service feature. The point is that many children can play at the same location at the same time and communicate with each other. And Russia is using its finances to organise events there, where it demonstrates some historical moments, for example, the occupation of Ukrainian territories. And there, the Russians present it as a liberation process. And they create the appropriate atmosphere online. Children participate in this game, interact according to the rules of this game. This way, they are being led to believe that Ukraine is not under occupation, but a liberation process, and that the Russian Federation did everything right there and liberated Ukrainians from Nazi rule.

There is also a famous game about a “good” KGB officer who saves the world. This game was also created by Russians. And they promoted this game all over the world. This means that their information and psychological influence is aimed not only at Ukrainian children, but at children from all over the world.

As for cartoons, there is a striking example – “Masha and the Bear”. By the way, please note that this is a cartoon that they distribute all over the world and even translate it into Ukrainian to make it even less resistant. Some may say that it is a beautiful cartoon, but in fact it is a cartoon that imposes on children a culture and values that are not typical for Ukraine, but are inherent to our eastern neighbours. What is it about? It’s about a girl who does only what she wants and does it the way she wants. Her message to adults is that only she is right, and just as she says, so it will be, and she will never face the consequences of her wrong behaviour. That is, if she did something wrong, everything went wrong, the bear is the unfortunate one in this situation. I think this is very similar to the behaviour of our eastern neighbour.

It sounds very scary, because it seems that this propaganda is everywhere. What should parents do to protect their children from this?

It’s very scary: in fact, it is. If we want to protect our children, we have to create the conditions in which they will develop. And not rely on the fact that somehow they will grow up and everything will be fine. Here I would equate the story of information hygiene and, in general, how to behave online, how to filter content. All this should not be on the child’s shoulders alone. They are not able to think critically on their own to filter it all out. Propaganda is prepared by adults and smart people who are experts in their field. Russians are good at it.

I would compare it to the rules for using electricity. A child is not supposed to be able to use electrical appliances on their own, from birth. Parents explain the safety rules, talk about the risks of using electricity, explain how to use it, tell them what not to do. These are basic things. The same should apply to the information space, and the same should apply to nutrition. Why do I compare it to food? Because, depending on what we eat, we feel that way. It’s the same with information: depending on what information we consume, that’s how we think, and depending on how we think, that’s how we act. You need to work with your child, communicate, and talk about it. We need to teach, explain, demonstrate cause and effect, and study history together.

But this should not be done when the child is already grown up, but from an early age. As soon as the child gets access to the web and manages it independently. Then it’s time.

And in order to explain this qualitatively, not just by prohibitions, we need to understand it well ourselves, to research this issue. To unfold all the narratives that I have described and to have meaningful and thorough answers to why this is wrong.

What sources of information can be trusted

First of all, focus on the messages of government agencies. Follow the information from the State Emergency Service, the army, and the government on their websites or social media, as well as in the messages of Public Broadcasting.

Below you will find a list of trusted sources. Please note that verified (officially confirmed) accounts on social media have a special mark next to their name – a blue checkmark. This is how the social media platform confirms that this page is really managed by this person or institution. In Ukraine, not all official institutions have received it yet, so take note of the accounts from the list.

Public broadcasting:


Websites of public services:

Useful chatbots in Viber 

The enemy often creates chatbot lookalikes on Telegram to mislead Ukrainians and collect their personal data. You can check if the bot you are using is safe here. 

Unlike Telegram, Viber doesn’t have this problem. Chatbots and channels there are moderated (checked by the administration), and no one can duplicate a channel or bot created earlier. 

What useful chatbots can be used in Viber, read on. 

Chatbots for your security 

  • Security: a guide – an informational chatbot by the Dovidka.info project. It has action plans for various emergencies that may occur during the war.
  • Points of Invincibility – A chatbot with information about the Points of Invincibility in your city and their search by geolocation.
  • Where is the shelter? – A chatbot with information about shelters in your city and their search by geolocation.
  • Be Safe – Chatbot with information about hotlines of humanitarian organizations.
  • Handy Friends Bot – A digital assistant for Ukrainians abroad.

Chatbots for countering fakes

  • SPRAVDbot – A bot from the Center for Strategic Communications and Information Security. You can send fake news or news that you doubt is true, and experts will check it. If it turns out to be fake, they will debunk it.
  • FakeoBot is an information chatbot for detecting fakes and combating disinformation.

Chatbots of your city authorities 

  • 1551 Official – Kyiv hotline.
  • Ternopil Military Administration – Chatbot of the military administration of Ternopil.
  • Rivne Military Administration – Chatbot of the military administration of Rivne region.
  • Volyn Hotline – Volyn hotline.
  • Zakarpattya Military Administration – Chatbot of the military administration of Zakarpattia.

Medical chatbots 

  • Dr. Ivan Mask – Information chatbot about coronavirus in Ukraine.

Useful chatbots for government agencies and organizations 

  • Diia – Information and service chatbot by Diia.
  • Ukrzaliznytsia – Chatbot of Ukrzaliznytsia for purchasing railway tickets.
  • Ukrposhta – Chatbot of Ukrposhta with information and services.
  • Info TAX – Chatbot of the Tax Service of Ukraine.

Chatbots of human rights organizations 

Chatbots for data search

  • Opendatabot – Chatbot for accessing open data bases of Ukraine.

Useful channels on WhatsApp 

Due to the questionable reliability and security of the Telegram messenger, more and more government agencies and other organizations are creating channels of information on other platforms. In particular, in the WhatsApp messenger. 

If you have decided to stop using Telegram or want to read news not only there, here is a list of trusted channels that we recommend subscribing to in WhatsApp.

Official channels of the authorities 

Channels about Ukraine 

  • Ukraine.ua – The official channel of Ukraine 🇺🇦 – a brave country fighting for freedom in the heart of Europe. Subscribe to get verified news and explore Ukraine.
  • UNITED24 Media – UNITED24 helps you see the real Ukraine 🇺🇦 and how it affects every person in the world.

Channels of the military 

  • UA Air Force  – The official channel of the Air Force of the Armed Forces of Ukraine.
  • Defence Intelligence of Ukraine – Official channel of the Defence Intelligence of Ukraine.
  • Kyrylo Budanov – The official channel of the Chief of the Defence Intelligence of Ukraine, Lieutenant General Kyrylo Budanov.
  • Azov – Official channel of the 12th Special Forces Brigade “Azov” of the National Guard of Ukraine.

Channels for countering fakes

  • SPRAVDI is a channel of the Centre for Strategic Communications and Information Security. Debunking Russian fakes and explaining important events.
  • StopFake – A journalistic organisation that aims to verify information, increase media literacy of the audience and fight for a clear distinction between factual journalism and propaganda.

Channels of your city’s authorities

Telegram channels that disguise themselves as Ukrainian, but are actually pro-Russian

The Centre for Strategic Communications, together with the SSU, published a list of Telegram channels that claim to be “independent news channels”, but in fact their work is coordinated by the Kremlin. Among them are “Resident”, “Legitimate”, “Cartel”, “Spletnitsa” and others. 

Sometimes it is difficult to detect that these channels are dangerous because they skilfully hide propaganda messages among real news.

So, check your subscriptions using this list. We strongly recommend unsubscribing from any of the following channels:

@KrokooDil

@sheptoon

@legitimniy

@ASupersharij
@rezident_ua

@montyan2

@ZeRada1

@OpenUkraine

@ukr_leaks
@spletnicca

@ZE_kartel

@OlgaSharij 

@ukraina_ru

@MediaKiller2021

@tvdno
​​@skosoi

@odessa_typical

@warfakes

@hercon_ru

@cherniy_kvartal

@nach_shtabu

@buntariy

@maksnazar

@MonitoringUA

@news_kramatorsk

@life_odessa

@godeye_ru

@otryadkovpaka

@belshkvarka

@SBUmole

@tsibulya_ua

@melitopoladmin)

@harry_homolsky

@sharij_official

@zp_live

@kherson_news_info

@Genichesk_ru

@NewsKhersonLife

@Ukrainian_format

@melitopol_ru

@Ten_NaPleten

(@niklive

@kharkov_trempel

@HolodniyYar

@htosho

@chernobaevka_ru
@NowMelitopol

@photographermilitary

@herson_today

@HersonVestnik

@newkahovka_ru

@skadovsk_rus

@brd_zavtra

@NowMelitopol

@yug_plazdarm

@zaporojie24

@tokmak_segodna

@polohy_ru

@energodar_ru

@berdyansk_ru

@Kharkiv_antiFA

@netlenkanet