{"id":5721,"date":"2025-05-20T08:15:28","date_gmt":"2025-05-20T06:15:28","guid":{"rendered":"https:\/\/dovidka.info\/?post_type=informations&#038;p=5721"},"modified":"2026-04-02T16:35:56","modified_gmt":"2026-04-02T14:35:56","slug":"recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child","status":"publish","type":"informations","link":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/","title":{"rendered":"Recruitment: How to understand that you are in danger? How to protect your child?"},"content":{"rendered":"\n<section class=\"title_anchor\">\n    <span id=\"f1\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to Talk to a Child About the Danger of Recruitment: Advice for Parents and Teachers        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <p><span style=\"font-weight: 400;\">It is important for adults to know how to discuss difficult topics with children calmly \u2014 without intimidation, but with a clear understanding of the risks. The online recruitment of teenagers is a real threat, and the main tools of protection are trust, knowledge, and open dialogue. In this article, psychologist, Gestalt therapist, and savED expert <\/span><b>Iryna Pleshakova<\/b><span style=\"font-weight: 400;\"> explains how to have this conversation.<\/span><\/p>\n<p><b>How can you talk to a child about the danger of recruitment without scaring them?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is best to begin not with fear, but with trust. A child listens to an adult when they feel safe, not when they are being frightened. Remember: fear either paralyzes or drives a child toward defiance. Our goal is proactivity, critical thinking, and inner readiness.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Start with context. For example:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cYou know that many of us now \u2013 even children \u2013 are facing different forms of war not only on the front line, but also online. I want to explain how this happens so that you are aware and know how to protect yourself.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Your position should be one of partnership. Not \u201cI know and you don\u2019t,\u201d but \u201cI am here with you, and we will figure this out together.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Say clearly:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cI do not think you would do anything wrong. But I want you to be able to recognize it if someone tries to use you. Because unfortunately, this does happen.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is important to explain what recruitment is: when someone, usually through deception or manipulation, gets a person to do something, often against their values or against the law. And explain that it does not look like a spy movie. It may be a bot, someone they know from a game or chat, or a \u201cfriend\u201d from social media.<\/span><\/p>\n<p><b>At what age should these conversations begin? How do you choose the right words and examples?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is worth starting from <\/span><b>ages 9\u201310<\/b><span style=\"font-weight: 400;\">. This is the age when a child already has digital access, reads or hears the news, even if they do not want to, and begins thinking about justice, power, and truth.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The tone and language should depend on the child\u2019s age.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For <\/span><b>younger adolescents (ages 9\u201312)<\/b><span style=\"font-weight: 400;\">, use simple examples. For instance:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cImagine that someone in a game tells you that you are really cool and can give you even more points if you take a photo of your school or a railway station. That is a trap. Even if it seems harmless, it may be part of a dangerous plan.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">For <\/span><b>teenagers aged 13\u201317<\/b><span style=\"font-weight: 400;\">, you can speak more directly:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cThere are cases where teenagers are used for real wartime tasks. Through Telegram, through games. Often they are lured with flattery: \u2018You are special, we need your help.\u2019 But this is manipulation. And it is a crime for which you are responsible, even if you are still a school student.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Should they be afraid? No. Fear does not teach; it encourages avoidance. What we need is alertness, not panic. Awareness, not anxiety. We do not want a child to be afraid of the internet. We want them to have an inner filter: what feels suspicious, what is not for them, and when adult help is needed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main message in the conversation should not be <\/span><b>\u201cyou are weak and someone may trick you,\u201d<\/b><span style=\"font-weight: 400;\"> but rather:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cYou are smart, and I trust that you can handle this, but I want you to be informed.\u201d<\/b><\/p>\n<p><b>How can you build enough trust so that a child is not afraid to say that someone offered them a way to \u201cearn money\u201d?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many parents want to hear a magic phrase that will make a child tell them everything. But trust is neither a trick nor a method. It is a process. And it begins not when \u201csomething has already happened,\u201d but much earlier.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let us start with something simple but unpleasant: a child is not afraid only of punishment. They are also afraid of being dismissed, mocked, not heard, or not seen in what they are going through. So trust is not something you either \u201chave\u201d or \u201cdo not have.\u201d It is built every day through your reactions to small situations: when you do not cut them off with <\/span><b>\u201cDon\u2019t make things up!\u201d<\/b><span style=\"font-weight: 400;\">, when you do not laugh and say <\/span><b>\u201cSeriously, you fell for that?\u201d<\/b><span style=\"font-weight: 400;\">, when you do not yell, but sit down beside them and listen.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cHelp me help you\u201d<\/b><span style=\"font-weight: 400;\"> is an excellent phrase for building trust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want your child to tell you about a \u201cside job\u201d they were offered online, they need to be sure that you will not scold them, that you will not \u201cexplode,\u201d that you will not take away their phone, but instead say:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cThank you for trusting me. Let\u2019s think together about what this really was.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Your reaction to the first mention of money is crucial. If you immediately lash out or punish them, next time the child will turn to YouTube, a chat, or someone else who will not scold them. Teenagers are not looking for permission. They are looking for support.<\/span><\/p>\n<p><b>How can you remove the fear of punishment if the child has already taken some step toward danger?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This is the moment when it is very easy to lose trust and very important to handle the situation correctly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Say honestly:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cIt is important for me to know what happened. And whatever it is, I am with you. I want to protect you, not punish you. We will get through this if we speak openly.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Your task is not to \u201cfix\u201d the child, but to <\/span><b>maintain the connection<\/b><span style=\"font-weight: 400;\">. Yes, it may be frightening or painful to hear that the child has already done something: sent a photo, agreed to meet, installed a bot. But the center of attention should not be your emotions. It should be the child\u2019s state.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do not lecture them. Ask questions, once the immediate danger has passed:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cWhat were you feeling when you did that?\u201d<\/b><b><br \/>\n<\/b><b>\u201cWhy did you decide it was worth trying?\u201d<\/b><b><br \/>\n<\/b><b>\u201cHow do you feel about it now?\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If the child genuinely regrets it or told you on their own, support them. Say:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cI really appreciate your courage in telling me. That was a brave thing to do. Let\u2019s think together about what to do next.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Because in this conversation, the child forms an idea about themselves: <\/span><i><span style=\"font-weight: 400;\">I made a mistake, but people still trust me. I took a risky step, but I was not punished. I can talk about difficult things, and people will not turn away from me.<\/span><\/i><\/p>\n<p><b>How do you explain the danger of \u201ceasy money\u201d and offers of quick earnings?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The recruitment of teenagers does not begin with ideology. It begins with <\/span><b>\u201ceasy money.\u201d<\/b><span style=\"font-weight: 400;\"> The need for recognition, independence, and money often becomes the first bait.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main task is not to criticize, mock, or moralize. A teenager does not want money because they are \u201cgreedy,\u201d but because they want to feel grown-up, to have freedom, and not to have to ask their parents for everything. That is a normal need. Start from there. Say:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cI understand that you want your own money and want to feel independent. That is natural. But when someone offers you money easily, quickly, and without effort, that is always a warning sign. Such offers often hide fraud or danger.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Use real-life examples without moralizing:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cIf someone offers money for a photo of a school, that is not \u2018work\u2019 \u2014 that is exploitation.\u201d<\/b><b><br \/>\n<\/b><b>\u201cIf someone says, \u2018This is a secret mission, don\u2019t tell anyone,\u2019 that is a sign of manipulation.\u201d<\/b><\/p>\n<p><b>Do pocket money and personal funds reduce the risk of recruitment? How much should children get, and in what form?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Yes, having their own money does reduce vulnerability. Not because the child \u201chas everything,\u201d but because they do not have to look for shady ways to cover basic needs such as coffee, a gift, or transport. Pocket money is not a privilege; it is a tool for education.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From around <\/span><b>age 10<\/b><span style=\"font-weight: 400;\">, you can begin with a small weekly amount in cash.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From <\/span><b>ages 12\u201313<\/b><span style=\"font-weight: 400;\">, it is worth moving to cashless payments, such as a child\u2019s bank card with parental access and spending limits. The amount should be predictable and discussed in advance. For example:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cYou get 150 hryvnias each week. You can spend it or save it. If you run out, the next amount comes on schedule.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This helps form an understanding that money has limits, accounting, and responsibility. And that greatly reduces the chance that a child will agree to a suspicious offer \u201cbecause they did not have enough.\u201d<\/span><\/p>\n<p><b>How can you teach financial literacy so that a child learns to assess the risks of fraud independently?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This should not be taught through lectures, but through practice and dialogue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Create a monthly budget together. Try to answer questions such as:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cHow much do we need for food? How much for entertainment? What can be saved?\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Look at suspicious \u201cjob offers\u201d together. Suggest:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cLet\u2019s find five ads promising \u2018easy money\u2019 and see together what signs of fraud they contain.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">This can turn into an interesting analytical game.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Discuss fake offers and fraud schemes. Say:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cThere are many TikTok videos about how to make money \u2018without effort.\u2019 Let\u2019s watch a few and figure out what is true and what is manipulation.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Teach them to ask themselves questions before every financial decision:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cWho is offering this?\u201d<\/b><b><br \/>\n<\/b><b>\u201cWhat exactly do I have to do?\u201d<\/b><b><br \/>\n<\/b><b>\u201cWhat am I risking?\u201d<\/b><b><br \/>\n<\/b><b>\u201cWould I be able to tell my parents about this?\u201d<\/b><\/p>\n<p><b>What warning signs in a child\u2019s online behavior should concern parents?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Most dangerous contacts with teenagers begin not outside, but in chats. And unfortunately, parents often find out only after something has already happened.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first step is not to panic, but to observe. Warning signs do not always mean that a child is already being recruited, but they do mean that something is happening.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What should you watch for?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A change in online behavior. The child spends more time in closed chats, often switches screens, and reacts irritably when someone tries to see who they are messaging.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Increased secrecy. New passwords, cleared browsing history, refusal to hand over the phone even for a moment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A change in the themes of their interests. Fascination with war aesthetics, violent games, the \u201cheroism\u201d of self-sacrifice, conspiracy, secrecy, or \u201cfighting the system.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">New acquaintances with strange names or accounts without photos or personal information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Money. The child suddenly has money and cannot explain where it came from, or on the contrary asks for money \u201cfor something urgent.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Emotional changes. Anxiety, withdrawal, overexcitement, or irritability without a clear explanation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These are not a \u201cdiagnosis,\u201d but an invitation to start a conversation. If you feel that something is \u201coff,\u201d trust your intuition.<\/span><\/p>\n<p><b>How can you discuss a child\u2019s online communication without violating personal boundaries?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The important thing here is not to \u201cstorm into their inner world.\u201d If a child feels watched or invaded, they will simply disappear into the digital shadows: a new account, anonymous platforms, VPNs, closed chats. Modern teenagers are technically literate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What works?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explain your motivation. Not <\/span><b>\u201cI am controlling you,\u201d<\/b><span style=\"font-weight: 400;\"> but <\/span><b>\u201cI am worried and want to understand what surrounds you.\u201d<\/b><span style=\"font-weight: 400;\"> For example:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cI do not want to dig through your phone. But I want to be sure that you are safe. If you ever receive a strange message, you can show it to me, and I will not scold you. We will just look at it together.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Create a \u201cwindow of trust.\u201d Once a week, sit down together and look at TikTok trends or popular chats. This is not an inspection. It is a shared immersion in the digital world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Discuss not the child\u2019s private messages, but general situations.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cI heard there was a dangerous chat situation in School N. How do you think children end up in those chats?\u201d<\/b><b><br \/>\n<\/b><b>\u201cA lot of fake bots are now offering money for simple tasks. Why do you think teenagers fall for that?\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">These conversations activate critical thinking and remove the barrier of <\/span><i><span style=\"font-weight: 400;\">\u201cI am being checked.\u201d<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Agree on a safety signal. Suggest a simple phrase the child can say or text if they find themselves under pressure or in a questionable contact situation:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cMom\/Dad, I need to talk, and I need you not to get angry.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">This should become a promise of no punishment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our goal is not to take away the child\u2019s phone or control, but to give them an inner filter and a safe connection with us. No antivirus can replace an adult who is present, listens, and does not dismiss the child\u2019s feelings.<\/span><\/p>\n<p><b>How can you teach a child to recognize recruiters\u2019 manipulations?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This is the key question for prevention. No ban and no technical filter protects as well as awareness. And that is exactly what we need to develop \u2014 not by instilling fear, but by building the ability to recognize manipulation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First of all, talk about it as an ordinary life situation, not as something extraordinary or far removed from reality. Recruitment is not a movie scene. It is a psychological game. And it can be learned and recognized.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are several common tactics that should be discussed with teenagers through examples, scenarios, and dialogues.<\/span><\/p>\n<ol>\n<li><b> \u201cYou are special. We need your help specifically.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Tactic: flattery and inclusion in a \u201csecret circle.\u201d The recruiter creates a sense of uniqueness: <\/span><b>\u201cWe chose you because we see potential in you.\u201d<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">What to explain to a child:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cReal worth never requires secrecy. If someone tells you that you are chosen, but everything has to stay hidden, that is manipulation.\u201d<\/b><\/p>\n<ol start=\"2\">\n<li><b> \u201cIt is really nothing serious. Just take a photo \/ move a box \/ create an account.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Tactic: minimizing the risk, making it seem normal. The task looks safe, everyday, even childish.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">What to explain:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cRecruitment rarely begins with something frightening. At first the task seems simple, but then it becomes more dangerous.\u201d<\/b><\/p>\n<ol start=\"3\">\n<li><b> \u201cDo not tell anyone. This is very important.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Tactic: isolation and control. The manipulator creates an atmosphere of trust, but immediately forbids the child from talking to parents or teachers.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">What to explain:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cAnything that requires secrecy from your loved ones is a reason to be cautious. Trust never fears the light.\u201d<\/b><\/p>\n<ol start=\"4\">\n<li><b> \u201cYou are not a snitch, are you?\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Tactic: pressure on loyalty. If the child hesitates, they are pushed through shame or a \u201ctest of loyalty.\u201d<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">What to explain:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cReal friends and honest adults do not pressure you into silence. Sometimes the bravest thing is to ask for help.\u201d<\/b><\/p>\n<ol start=\"5\">\n<li><b> \u201cYou can make good money from this.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Tactic: financial bait. The teenager is offered money without effort, for something \u201csmall.\u201d<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">What to explain:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cIn real life, people rarely pay a lot for something worthless. If something seems suspiciously easy, there is always a trap.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">How can you communicate all this without turning it into a lecture?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Interactively. Try suggesting a game:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cImagine that someone you do not know sends you a message. I will show you examples, and you tell me whether it is okay or suspicious.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Through examples. Discuss real news stories, cases, even films.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Teach them to recognize phrases such as:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">\u2014 <\/span><b>\u201cOnly you can help us\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">\u2014 <\/span><b>\u201cIt is safe, we have thought it all through\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">\u2014 <\/span><b>\u201cYou get the money immediately\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">\u2014 <\/span><b>\u201cThe main thing is, do not tell anyone\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">This last phrase should become an internal red flag.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Emphasize:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cYou can always come and say: \u2018Someone offered me something strange. I will tell you, but no yelling.\u2019\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Teenagers want to be useful, brave, and independent. And that is exactly what manipulators often exploit. But these same qualities can become protection if we help teenagers learn to see the reality behind the words.<\/span><\/p>\n<p><b>Psychological support: where to turn if a child is panicking<\/b><\/p>\n<p><b>National Children and Youth Hotline:<\/b><b><br \/>\n<\/b><b>116 111<\/b><span style=\"font-weight: 400;\"> (from mobile phones) \/ <\/span><b>0 800 500 225<\/b><\/p>\n<h3><b>If you are a teacher, how should you discuss this topic in class without increasing anxiety? How can it be integrated into education and pastoral work?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This is an absolutely strategic question. School is not only a place of learning, but also a social space where a worldview is formed. And often it is the teacher who first notices that \u201csomething is going wrong.\u201d But how can teachers speak with students about the danger of recruitment in a way that does not traumatize or frighten them, but instead strengthens awareness and responsibility?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Shift the tone from <\/span><b>\u201cthreat\u201d<\/b><span style=\"font-weight: 400;\"> to <\/span><b>\u201cskill.\u201d<\/b><span style=\"font-weight: 400;\"> Not \u201cchildren are in danger,\u201d but \u201cchildren are able to recognize risks if we help them.\u201d This is a position of strength, not fear. And it is contagious.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use facts, not scare tactics. Instead of saying, <\/span><b>\u201cYou may be recruited,\u201d<\/b><span style=\"font-weight: 400;\"> it is better to say:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cInformation warfare is also being waged against young people. There are known cases where teenagers were drawn into dangerous tasks through an ordinary game chat. Today we will analyze how this works and what you can do to protect yourself.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Offer situation analysis. Not a lecture, but case studies:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cImagine that someone messages you and offers you money to take a photo of a train station. What do you do?\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">This activates decision-making, not anxiety.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use discussion instead of \u201cdelivering the truth.\u201d Helpful questions include:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cWhy do teenagers agree to risky offers?\u201d<\/b><b><br \/>\n<\/b><b>\u201cHow would you understand that this is manipulation?\u201d<\/b><b><br \/>\n<\/b><b>\u201cWhat should you do if one of your friends gets involved in something suspicious?\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Do not create the image of a \u201cbad child\u201d who did something wrong. On the contrary, emphasize that telling an adult is a sign of strength, not weakness.<\/span><\/p>\n<p><b>How can this topic be integrated into the educational process?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This should not be a separate \u201cscary\u201d lesson. It should become part of a broader culture of safety, critical thinking, and digital hygiene.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During homeroom or advisory periods, discuss digital safety, manipulation, and fraud \u2014 not only from the side of \u201cthe enemy,\u201d but also in everyday life.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In subjects such as <\/span><b>Civic Education<\/b><span style=\"font-weight: 400;\"> or <\/span><b>Personal Development<\/b><span style=\"font-weight: 400;\">, explore concepts such as critical thinking, information security, civic responsibility, and recognizing influence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In computer science classes, talk about phishing, bot attacks, safe use of messengers, and privacy and security settings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In language, literature, history, and art lessons, discuss how information shapes society, how narratives are formed, and where the line lies between truth and influence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The teacher should be a role model \u2014 a figure of trust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When students know:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cMy teacher will not mock me, scare me, or ignore me,\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">then a child comes not to a Telegram bot, but to a real person. Schools can create:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">a <\/span><b>digital safety corner<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">an anonymous question box<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">joint student-teacher projects on digital literacy<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Preventing recruitment is not about \u201cbeing afraid of the Russians.\u201d It is about teaching a person to think, to see patterns, to protect themselves, and to act according to values.<\/span><\/p>\n<p><b>What should you do if contact with a recruiter has already happened?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This is critically important. Even if we have done everything right, a child can still end up in contact with a recruiter. And the adult\u2019s reaction at that moment determines whether the child receives help or withdraws even further.<\/span><\/p>\n<p><b>How should parents act if the child has already received a suspicious offer?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">First of all, preserve contact and act calmly. Do not panic and do not try to solve everything in the first five minutes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thank the child for trusting you. If they told you on their own, that is already a big step. Say directly:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cThank you for telling me. That was very brave. You did the right thing, and I am with you. We will get through this.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Gather information without judgment. Ask to see the correspondence, screenshots, and accounts involved. If the child is nervous, do not pressure them, but explain:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cI need to see exactly what was written to you so that we can protect you. I will not yell or scold you. I just want to help. I am with you.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Report the incident through official channels. If this involves requests to photograph facilities, \u201cearn money\u201d by acting in the enemy\u2019s interests, or suspicious bot accounts, contact the Cyber Police or the Security Service of Ukraine. This can be done anonymously through the relevant channels:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the <\/span><b>\u201cBurn an FSB Agent\u201d<\/b><span style=\"font-weight: 400;\"> chatbot from the Security Service of Ukraine<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"http:\/\/cyberpolice.gov.ua\"><b>cyberpolice.gov.ua<\/b><\/a><b>\u00a0<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the Cyber Police hotline: <\/span><b>0 800 50 51 70<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Be sure to discuss how the child felt, once the immediate danger has passed.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cWhat made this offer seem worth your attention?\u201d<\/b><b><br \/>\n<\/b><b>\u201cWhat felt uncomfortable or strange?\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">This is important not to analyze mistakes, but to help them rethink the experience.<\/span><\/p>\n<p><b>What should you absolutely not do, so as not to make the situation worse?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Do not shout, accuse, or humiliate the child, even if you are shocked. Emotional aggression will cut the child off from you for a long time. Next time they will stay silent, even if the situation is even more dangerous.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do not take away the phone \u201cforever\u201d or block internet access completely. Temporary restrictions may be possible. But a total ban will only push the child \u201cinto the shadows\u201d \u2014 other accounts, other people\u2019s devices, VPNs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do not ignore or minimize the situation.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cIt was probably just a joke,\u201d<\/b><b><br \/>\n<\/b><b>\u201cYou did not actually do anything, so it is fine.\u201d<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Even if the threat was not carried out, the very fact of contact is a warning sign that deserves attention.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most importantly, the child should feel support, not shame. Not:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><i><span style=\"font-weight: 400;\">\u201cI made a mistake and now I will be punished,\u201d<\/span><\/i><i><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/i><span style=\"font-weight: 400;\">but: <\/span><i><span style=\"font-weight: 400;\">\u201cI got into danger, and I was supported, helped, and protected.\u201d<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Only in this way do we avoid losing the child and give them the strength to learn, grow, and become a responsible adult.<\/span><\/p>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"1\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            Russians are recruiting Ukrainian teenagers: how to protect your family?        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <p><span style=\"font-weight: 400;\">In 2024-2025, the SSU recorded more than 600 cases of attempts to involve Ukrainians in arson, terrorist attacks or sabotage. Every 5th person was underage (22% of those recruited). In most cases, the Russian FSB is behind this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Teenagers are promised &#8220;easy money&#8221;, but:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">they usually don&#8217;t get the money;<\/span><\/li>\n<li>they use them and then clean them up to leave no trace.<\/li>\n<\/ul>\n<p><b>The consequences are death, injury and\/or imprisonment.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Two teenagers (15 and 17 years old) in Ivano-Frankivsk were recruited through a local Telegram channel looking for work. They agreed to make and install two explosive devices in return for $1,700. However, the FSB supervisor paid only small amounts for the purchase of components and remotely detonated the explosives together with the children: A 17-year-old died on the spot, a 15-year-old lost both legs and almost lost his eyesight.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In Ternopil, a 14-year-old girl was blackmailed with her personal (nude) photos, forced to make explosives and plant them near the police station. Russian intelligence services planned to detonate the device remotely during the attack, but law enforcement officers managed to defuse it and save the child from death. The girl faces life imprisonment.<\/span><\/p>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <p><b>Who is at risk of recruitment?<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Underage children. <\/b><span style=\"font-weight: 400;\">They fall for it because of their vulnerability, lack of experience, desire for quick money or emotional &#8220;adventure&#8221;.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Young people looking for work.<\/b><span style=\"font-weight: 400;\"> Students, school graduates who post &#8220;looking for a part-time job&#8221; announcements on social media and Telegram channels.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>People with drug or alcohol addiction or financial difficulties.<\/b><span style=\"font-weight: 400;\"> Criminals speculate on the desire for quick money or a new dose.<\/span><\/li>\n<\/ul>\n<p><b>However, in fact, they can target anyone.<\/b><span style=\"font-weight: 400;\"> The FSB also sent messages even to groups of military personnel, trying to recruit them. There were also attempts to establish contact with ordinary passers-by in public transport in Lviv using posters with QR codes.<\/span><\/p>\n<p><b>How exactly does the Russian FSB recruit teenagers?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Russian special services use various recruitment schemes. Here are <\/span><b>three of the most common scenarios:\u00a0<\/b><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Blackmail with personal data\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">They crack into a teenager&#8217;s phone or account, find &#8220;sensitive&#8221; information (photos, videos, correspondence) and use it as leverage: &#8220;Either you do our task or everyone will know about it&#8221;. The child is frightened and, in order not to lose his or her reputation, performs tasks: photographing objects, setting fire to cars, sabotaging railways or administrative buildings<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>They pay for &#8220;small&#8221; tasks and promise more, but instead of the &#8220;final reward&#8221; they blow them up.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The victim is found online: through Telegram, TikTok, Discord, job search groups, posters with QR codes in cities. And they involve them step by step. At first, they give a &#8220;simple and safe&#8221; task: take a photo, make a graffiti, take the &#8220;package&#8221; to another place. And they pay a small amount as a guarantee that the money will continue.\u00a0 But instead, they blow up the children on the &#8220;final&#8221; task in order to avoid paying the money and cover their tracks.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>They blackmail the child with something they have already done\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The victim is found online, first instructions are given, and then blackmail and pressure begin: &#8220;You have already become an accomplice in a crime, now do more serious things, otherwise we will tell the police&#8221;. This is how a frightened teenager is persuaded to commit arson, terrorist attacks, and sabotage.\u00a0<\/span><\/p>\n<p><b><\/b><b>What are the signs that a child may be recruited or may be at risk?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">They are often expressed in changes in behaviour and environment:\u00a0<\/span><\/p>\n<ul>\n<li><b>A strange new daily schedule:<\/b><span style=\"font-weight: 400;\"> the child regularly disappears without explanation, returns late.<\/span><\/li>\n<li aria-level=\"1\"><b>Sudden mood changes that were not present before.<\/b><\/li>\n<li aria-level=\"1\"><b>Secret correspondence:<\/b><span style=\"font-weight: 400;\"> changing passwords, frequent deletion of correspondence history, hostility when you ask &#8220;What are you looking at on your phone?&#8221;.<\/span><\/li>\n<li aria-level=\"1\"><b>New social circle: <\/b><span style=\"font-weight: 400;\">&#8220;friends&#8221; from the Internet that the child has never mentioned before.<\/span><\/li>\n<li aria-level=\"1\"><b>New property and money:<\/b><span style=\"font-weight: 400;\"> the child gets expensive things, gadgets, or money that he or she can&#8217;t explain the origin of. You may also hear a teenager talking about &#8220;easy money&#8221; on the Internet because they believe in it.<\/span><\/li>\n<\/ul>\n<p><b>Why do children agree?<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>They want money:<\/b><span style=\"font-weight: 400;\"> 2-10 thousand UAH seems like a lot of money for a teenager.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Need for attention and recognition:<\/b><span style=\"font-weight: 400;\"> if a child lacks support at home, they look for it online.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>An element of play or extreme:<\/b><span style=\"font-weight: 400;\"> adolescents perceive it as an &#8220;adventure&#8221; without realising the consequences.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Manipulation and blackmail<\/b><span style=\"font-weight: 400;\">: first, they are tricked into doing &#8220;easy tasks&#8221;, then threatened.<\/span><\/li>\n<\/ul>\n<p><b>What are the consequences for the child?\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Criminal liability: <\/b><span style=\"font-weight: 400;\">a child can be convicted of a terrorist attack or sabotage from the age of 14. Sentences are very serious \u2013 from 10 years in prison to life imprisonment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Danger to life and health:<\/b><span style=\"font-weight: 400;\"> russian curators often blow up children remotely to cover their tracks and avoid paying money.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Psychological trauma: <\/b><span style=\"font-weight: 400;\">even if a child doesn&#8217;t die or lose his or her health, he or she becomes a hostage to constant fear and blackmail.<\/span><\/li>\n<\/ul>\n<p><b>How can parents prevent this?\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Open communication: <\/b><span style=\"font-weight: 400;\">no criticism or shouting. Talk about real cases, explain the risks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Discuss &#8220;online safety&#8221; together: <\/b><span style=\"font-weight: 400;\">explain that &#8220;easy work&#8221; with quick earnings on social media is a huge risk and almost always a fraud. And teach your child that if they receive strange offers, they should contact you immediately.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Teach your child media literacy.<\/b><span style=\"font-weight: 400;\"> Explain how to check information and why you shouldn&#8217;t trust anonymous contacts. Teach them that it&#8217;s better to lose a quick and often imaginary UAH 2-10 thousand than to lose their whole life (or risk it).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regular attention: <\/b><span style=\"font-weight: 400;\">notice sudden changes in behaviour, large sums of money or new acquaintances.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Talk about responsibility: <\/b><span style=\"font-weight: 400;\">talk about responsibility for crimes. Their young age will not keep them out of prison.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Legal ways of earning money and financial literacy:<\/b><span style=\"font-weight: 400;\"> if you can, give your child a fixed amount of pocket money every month. Or help your teenager find a safe part-time job, show them an alternative.<\/span><\/li>\n<\/ul>\n<p><b>What to do if there is already contact with recruiters<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Save evidence:<\/b><span style=\"font-weight: 400;\"> screenshots, correspondence, contacts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Contact<\/b><span style=\"font-weight: 400;\"> law enforcement<\/span><b> immediately:<\/b>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">police \u2013 102<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SSU chatbot \u2018\u2019Spaly FSB\u2018\u2019 in Telegram &#8211; <\/span><a href=\"http:\/\/t.me\/spaly_fsb_bot\"><b>t.me\/spaly_fsb_bot<\/b><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain to your child that cooperation with law enforcement can save them from punishment and even death. If he or she is afraid to tell you, let him or her contact them on their own.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Advice from the SSU: &#8220;If someone offers to \u201cjust carry a package\u201d, take a picture of a military unit or set a car on fire, know that they want to use you and then kill you&#8221;.<\/b><\/p>\n<p><b>Talking to children works! <\/b><span style=\"font-weight: 400;\">In <\/span><a href=\"https:\/\/www.facebook.com\/Bilosh\/posts\/10233215173593959?ref=embed_post\"><span style=\"font-weight: 400;\">Odesa<\/span><\/a><span style=\"font-weight: 400;\">, a 9th-grade student who was planned to be recruited by the FSB did not give in. Unknown persons wrote to him on Telegram and offered to \u2018\u2019earn extra money\u2018\u2019. The task was to set fire to TCR cars and administrative buildings and leave graffiti on them. He was promised money for this. The schoolboy saved the correspondence on his phone and handed it over to an inspector of the Educational Security Service.\u00a0<\/span><\/p>\n<p><b>So how can a teenager earn money safely?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Here are some ideas for teenagers to earn extra money<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Help at home, in the family business, or with friends. Encourage children with symbolic tasks for which they can receive money from you\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tutoring younger children, looking after animals<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Managing social media for brands<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Handmade work: handmade, crafts, drawing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Participation in volunteer projects with a scholarship<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Online freelancing (design, texts)\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain that honest earnings are possible. Help them find it and make sure that this offer is safe for the child.\u00a0<\/span><\/li>\n<\/ul>\n<p><b>And remember that teenagers are being recruited in all regions of Ukraine, without exception. Anyone \u2013 father or mother \u2013 can spot a threat in time if they communicate with their child and are attentive.<\/b><\/p>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"2\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to protect your device from being hacked        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <p><span style=\"font-weight: 400;\">Russian intelligence services use various methods to achieve their goals. They may hack devices in order to use the stolen information against you or your children, blackmail you, or force you into committing crimes. That is why using strong passwords is one of the key elements of protection. Make sure your devices and accounts are secure \u2014 weak passwords are easy prey for hostile hackers and fraudsters.<\/span><\/p>\n<p><b>Follow these simple rules:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Replace the passwords for your social media accounts, bank accounts, and all websites where your personal information may be stored with stronger ones. Change your password immediately if you suspect your account has been hacked, if you receive a notification about a data breach, or if you have ever used the same password anywhere else.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Check your passwords regularly for data breaches using this service.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Here is how it works<\/b><span style=\"font-weight: 400;\">: enter your email address or phone number on the website. If the passwords for accounts linked to them have been compromised, the site will notify you immediately. If not, your data has not been exposed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use a <\/span><b>password manager<\/b><span style=\"font-weight: 400;\"> \u2014 a dedicated application that stores your passwords in encrypted form, so you only need to remember one master password rather than every complex combination.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Recommended options include:<\/b><span style=\"font-weight: 400;\"> 1Password, KeePassXC, Dashlane, or password managers built into antivirus programs.<\/span><\/p>\n<p><b>Two-factor authentication<\/b><span style=\"font-weight: 400;\"> adds a second verification step when signing in to an account. Enable it \u2014 then, if someone tries to access your account without permission, you will receive an SMS asking you to confirm the login.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Set up a <\/span><b>screen lock using a PIN, pattern, or biometric method<\/b><span style=\"font-weight: 400;\"> (fingerprint, facial recognition, or voice recognition) to secure your devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Change the <\/span><b>default PIN code <\/b><span style=\"font-weight: 400;\">on your SIM card.<\/span><\/p>\n<p><b>What makes a password strong?<\/b><\/p>\n<p><b>\u00a0A strong password:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">does <\/span><b>not<\/b><span style=\"font-weight: 400;\"> contain common letter or word combinations; repeated or sequential characters (0000, 1111, abc123); your first name, surname, or date of birth; or the names, surnames, or birth dates of family members;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>does<\/b><span style=\"font-weight: 400;\"> contain special characters, numbers, and uppercase and lowercase letters, with more than 8 characters in total, as well as words that do not exist in Ukrainian, English, or ideally any other language;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">is generated using a <\/span><b>password generator <\/b><span style=\"font-weight: 400;\">(for example, cyberpolice.gov.ua\/generate-password);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">is used <\/span><b>for one service only<\/b><span style=\"font-weight: 400;\"> \u2014 each account should have its own unique password;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">is <\/span><b>not stored<\/b><span style=\"font-weight: 400;\"> in notes on your smartphone or laptop, or on a sticky note on your desk;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">is <\/span><b>not found<\/b><span style=\"font-weight: 400;\"> in the haveibeenpwned.com database;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">is <\/span><b>not known<\/b><span style=\"font-weight: 400;\"> to your relatives, loved ones, or colleagues;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">is <\/span><b>significantly different<\/b><span style=\"font-weight: 400;\"> from any previous password used for the same service.<\/span><\/li>\n<\/ul>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"3\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to protect yourself from malicious messages in messengers        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p>The enemy doesn\u2019t stop trying to cyberattack Ukrainians. Hackers can send dangerous files in the messengers we use.<\/p>\n<p>Often, the enemy disguises such messages as coming allegedly from Ukrainian state structures or law enforcement agencies.<\/p>\n<p><b>Remember:\u00a0<\/b>State structures and agencies don\u2019t send messages in messengers with a request to open an attached file and don\u2019t ask to provide bank card data, passport information, data of personal accounts in social media, etc.<\/p>\n<p>Here are the rules for safe setting up of popular messengers:<\/p>\n<p><b data-fusion-font=\"true\">Telegram<\/b><\/p>\n<p>Open the \u201cSettings\u201d menu and go to the \u201cPrivacy and Security\u201d section.<\/p>\n<p><b>Select the following items in it:<\/b><\/p>\n<p>Who can see the phone number \u2013\u00a0<b>Nobody<\/b><\/p>\n<p>Who can find via the number \u2013\u00a0<b>My contacts<\/b><\/p>\n<p>Who can see the time of my latest activity \u2013\u00a0<b>Nobody<\/b><\/p>\n<p>Who can see my profile photos and videos \u2013\u00a0<b>My contacts<\/b><\/p>\n<p>Who can link to my account when sending my messages \u2013\u00a0<b>My contacts<\/b><\/p>\n<p>Who can call me \u2013<b>\u00a0My contacts or nobody<\/b><\/p>\n<p>In the \u201cCalls\u201d section, Peer-to-peer should also be set to \u2013\u00a0<b>My contacts<\/b><\/p>\n<p>(this is an option that allows users who call you to receive or not to receive your IP address)<\/p>\n<p>Who can add me to the chats \u2013 My contacts<\/p>\n<p>Two-step verification \u2013 Set password<\/p>\n<p><b><span data-fusion-font=\"true\">WhatsApp<\/span><\/b><\/p>\n<p>Open the \u201cSettings\u201d menu, go to the \u201cAccount\u201d section, in which select \u201cPrivacy\u201d.<\/p>\n<p><b>Choose the following items:<\/b><\/p>\n<p>Last time online \u2013\u00a0<b>Nobody<\/b><\/p>\n<p>Profile photo \u2013 My contacts<\/p>\n<p>Groups \u2013\u00a0<b>My contacts<\/b><\/p>\n<p>\u201cSettings\u201d \u2013 \u201cAccount\u201d section \u2013\u00a0<b>Two-step verification \u2013 Enable<\/b><\/p>\n<p><b data-fusion-font=\"true\">Viber<\/b><\/p>\n<p>Select the \u201cAdvanced\u201d menu and configure the following items there:<\/p>\n<p>Settings \u2013 Calls and messages \u2013\u00a0<b>set the toggle opposite to \u201cBlock unknown callers\u201d<\/b><\/p>\n<p>* \u201cto set\u201d or \u201cto remove the toggle means to press the switch next to the parameter. If it\u2019s purple \u2013 the function is enabled, if it\u2019s transparent, the function is not active.<\/p>\n<p>Settings \u2013 General \u2013\u00a0<b>Use a proxy server<\/b><\/p>\n<p>Configure the \u201cPrivacy\u201d tab as follows:<\/p>\n<ul>\n<li>set the toggle opposite to \u201c<b>Automatic spam check<\/b>\u201d<\/li>\n<li>remove the toggle opposite to \u201c<b>Peer-to-peer<\/b>\u201d<\/li>\n<li>set the toggle opposite to \u201c<b>Requests<\/b>\u201d<\/li>\n<li>Control who can add you to the groups \u2013 go to \u201c<b>Settings to add to groups<\/b>\u201d and set a check mark opposite to \u201c<b>My contacts<\/b>\u201d<\/li>\n<li>remove the toggle opposite to \u201c<b>Offer friends<\/b>\u201d<\/li>\n<li>Personal data \u2013 remove the toggle opposite to \u201c<b>Collect analytics<\/b>\u201d, \u201c<b>Allow personalization of content<\/b>\u201d and \u201c<b>Allow precise geolocation services<\/b>\u201d<\/li>\n<\/ul>\n<p>Pay attention to functions \u201cRequest your data\u201d and \u201cDelete your data\u201d and see exactly what data about you is stored in Viber\u2019s servers.<\/p>\n<p><b>Signal<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In the <\/span><b>Settings<\/b><span style=\"font-weight: 400;\"> menu, adjust the following:<\/span><\/p>\n<p><b>Privacy \u2192 Disappearing Messages<\/b><span style=\"font-weight: 400;\"> \u2014 choose how long messages will remain in a chat. Options range from 30 seconds to 4 weeks, and you can also set a custom timer.<\/span><\/p>\n<p><b>Privacy \u2192 App Security<\/b><span style=\"font-weight: 400;\"> \u2014 enable the <\/span><b>Screen Lock<\/b><span style=\"font-weight: 400;\"> toggle.<\/span><\/p>\n<p><b>Privacy \u2192 App Security<\/b><span style=\"font-weight: 400;\"> \u2014 enable the <\/span><b>Incognito Keyboard<\/b><span style=\"font-weight: 400;\"> toggle.<\/span><\/p>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"4\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to protect data on social media?        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p>Private information, especially during martial law, can be used by the enemy against Ukrainian military and civilians. In order\u00a0<b>to keep your personal social media accounts safe, we recommend that you:<\/b><\/p>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"checklist\">\n<div class=\"container\">\n<div class=\"checklist__item simple-text body body-2\">\n<ul>\n<li>Set a strong password to log in to your account. Read how to do this\u00a0<a href=\"https:\/\/dovidka.info\/kiberbezpeka\/#passwords\">here<\/a>.<\/li>\n<li>Use the double authentication function. This means that when someone tries to log in to your account from an unfamiliar device, the service will require additional identification. In this case, a message with a confirmation code will be sent to the phone number or mailbox you specified. You will be able to prevent account hacking.<\/li>\n<li>Review your social media profile settings and use all possible ways to protect your account.<\/li>\n<li>When creating social media accounts, use an email address of a reliable service, such as Google or Yahoo, as a login. But by no means a Russian one!<\/li>\n<li>Do not log in from unfamiliar or unprotected devices. After you finish your work, you may forget to log out of your account or the device may remember the login and password you used when you logged in. In addition, the device may be infected with malware that collects and transfers password and login information to third parties.<\/li>\n<li>Do not open attachments in messages from suspicious or unfamiliar people. After all, phishing is the most common way for criminals to obtain passwords to mailboxes and social media accounts.<\/li>\n<li>Install antivirus programs on your device. They will help protect you from viruses. Read more <a href=\"https:\/\/dovidka.info\/kiberbezpeka\/#programs\">here<\/a><\/li>\n<li>Russians are actively using social media to gather additional information about the locations of the Ukrainian army. It is important for the military and their families to remember:<\/li>\n<li>Do not post information on social media that could endanger the life of your loved ones. This refers to photo and video materials that can be used to determine the location of a military or a member of their family.<\/li>\n<li>Restrict access to private information (place of residence, date of birth, educational institution, etc.) in the privacy settings of social media.<\/li>\n<li>Restrict access to private information (place of residence, date of birth, educational institution, etc.) in the privacy settings of social media.<\/li>\n<li>Choose the settings that best protect additional information about the account holder. In particular, do not specify geolocation (location).<\/li>\n<li>Periodically review your list of \u201cfriends\u201d on social media. If there are any unfamiliar or suspicious accounts, delete them, as the \u201cfriend\u201d status provides access to more private information about a person.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"checklist\">\n<div class=\"container\">\n<div class=\"checklist__item simple-text body body-2\">\n<p>Do not use<\/p>\n<ul>\n<li>Russian social media VKontakte and Odnoklassniki, as well as the messenger Qip;<\/li>\n<li>Russian search engines Mail.ru and Yandex.<\/li>\n<\/ul>\n<\/div>\n<div class=\"checklist__item simple-text body body-2\">\n<p>At the request of the Russian special services, they can transfer information about the personal data of account holders (email, mobile phone number, date and IP address of registration, date and IP address of the last visit, etc.)<\/p>\n<\/div>\n<div class=\"checklist__item simple-text body body-2\">\n<p>Do not use Russian mobile applications such as DMB Timer, DMB, DMB Timer+, Dembel and others. When you register there, you provide your own personal data and the military unit in which you serve, as well as the data of your fellow soldiers. Then they get automatic access to geolocation, personal contacts, photos, multimedia, files and documents, allow them to read, modify or delete content on the SD card, view network connections and get full access to the network.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<div class=\"fusion-text fusion-text-15\">\n<div class=\"fusion-text fusion-text-14\">\n<p>For cybersecurity tips for those in the temporarily occupied territory, please read the sections on\u00a0<a href=\"https:\/\/dovidka.info\/yak-povodytysya-na-okupovanij-terytoriyi\/#call\">communication under occupation<\/a>\u00a0and\u00a0<a href=\"https:\/\/dovidka.info\/yak-povodytysya-na-okupovanij-terytoriyi\/#gadget\">data protection.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"5\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n             Safe browser settings        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <p>Keeping browsers in working condition means updating them in time, as well as the rest of the programs installed on the device and the operating system itself. And also \u2013 download them only from official sites and use only a minimum of extensions for them.<\/p>\n<p>Here are the indicators you need to adjust in your browsers:<\/p>\n<p><b><span data-fusion-font=\"true\">\u0421hrome<\/span><\/b><\/p>\n<p>In the \u201cSettings\u201d menu<\/p>\n<p>Privacy and security \u2013 Security \u2013 Safe browsing \u2013\u00a0<b>Enhanced protection<\/b><\/p>\n<p>Privacy and security \u2013 Security \u2013 Advanced \u2013\u00a0<b>Always use a secure connection<\/b><\/p>\n<p>Downloaded files \u2013\u00a0<b>Always specify the download location<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b data-fusion-font=\"true\">Firefox<\/b><\/p>\n<p>In the \u201cSettings\u201d menu<\/p>\n<p>Files and Applications \u2013\u00a0<b>Always ask where to save files<\/b><\/p>\n<p>Browser privacy \u2013 Security \u2013\u00a0<b>Block dangerous and fraudulent content<\/b><\/p>\n<p>Browser privacy \u2013 Security \u2013\u00a0<b>Enable HTTPS mode in all windows<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b data-fusion-font=\"true\">Opera<\/b><\/p>\n<p>In the \u201cSettings\u201d menu<\/p>\n<p>Privacy and security \u2013 Security \u2013\u00a0<b>Enable protection against malicious and always use secure connections<\/b><\/p>\n<p>Download \u2013\u00a0<b>Prompt for save folder before downloading<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b data-fusion-font=\"true\">Tor<\/b><\/p>\n<p>In the \u201cSettings\u201d menu<\/p>\n<p>Privacy and security \u2013 Protection \u2013 Security level \u2013\u00a0<b>High<\/b><\/p>\n<p>Privacy and security \u2013 Protection \u2013 Fake content and Malware Protection \u2013\u00a0<b>Block dangerous and fraudulent content<\/b><\/p>\n<p>Privacy and security \u2013 Protection \u2013 Certificates \u2013\u00a0<b>Request confirmation of the current status of certificates from OCSP servers<\/b><\/p>\n<p>Privacy and security \u2013 Protection \u2013\u00a0<b>Mode \u201cOnly HTTPS\u201d<\/b><\/p>\n<p>Basic \u2013 Files and Apps \u2013\u00a0<b>Always prompt to save files<\/b><\/p>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"6\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            Protection from harmful software        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p>The first thing that will help you protect your devices from viruses is to install anti-virus software.<\/p>\n<p>Recommended software: Avast, ESET, McAfee, Zillya.<\/p>\n<p><b>How not to get attacked by fake antivirus?<\/b><\/p>\n<p>Only download the antivirus software from the official developer\u2019s website or from verified sources (Play Market, App Gallery, App Store \u0456 Google Play). If you can\u2019t buy a paid version of the program, find a free analogue, but don\u2019t download cracked versions of paid apps.<\/p>\n<p>Update your antivirus regularly. Only then will the program warn you about the threat in time.<\/p>\n<p><b>Antivirus is installed. What\u2019s next?<\/b><\/p>\n<p><b>Regularly scan your device for threats that could harm your data.<\/b><\/p>\n<p>Also use the anti-virus to check USB sticks and other external devices that you connect to your computer.<\/p>\n<p><b>Periodically \u201creset\u201d the settings of your smartphone.<\/b><\/p>\n<p>In this way you can neutralize the \u201ckeylogger\u201d programs that track the user\u2019s actions.<\/p>\n<p><b>Do not click on questionable links. Such as:<\/b><\/p>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"checklist\">\n<div class=\"container\">\n<div class=\"checklist__item simple-text body body-2\">\n<div class=\"fusion-li-item-content\">\n<ul>\n<li>received from unknown senders via email, SMS or messengers and social networks;<\/li>\n<li>messages with a call for urgent action and those that use a highly relevant and frequently mentioned topic in the media;<\/li>\n<li>those that lead to questionable sites or channels in social networks;<\/li>\n<li>those that do not have a security protocol: https \u2013 safe, http \u2013 potentially dangerous;<\/li>\n<li>containing the word \/download\/ \u2013 these links will immediately begin downloading the file. Attackers will probably download malicious code or lead to a phishing site.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p><b>Pay attention to a sharp and noticeable change in the operation of the device:\u00a0<\/b>a sharp decrease in charge, slow operation, the appearance of files that you did not create or programs that you did not install,\u00a0the appearance of unknown programs in autoload when the device is turned on, etc.\u00a0Maybe this is a consequence of the activity of harmful programs.<\/p>\n<p><b>Set secure messenger settings.<\/b>\u00a0How to do this\u00a0<a href=\"https:\/\/dovidka.info\/en\/cybersecurity\/#spam\">is explained here<\/a>.<\/p>\n<p><b>Set secure browser settings.\u00a0<\/b>How to do this\u00a0<a href=\"https:\/\/dovidka.info\/en\/cybersecurity\/#browser\">is explained here<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"7\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to download and use apps and files safely        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<div class=\"fusion-text fusion-text-11\">\n<div class=\"fusion-text fusion-text-11\">\n<p>Cybercriminals are constantly inventing new ways to trick users with malicious apps and programs. Downloading a free movie, game or music \u2013 is always a risk of malware infection. And the gain of attackers is to gain access to your personal information.<\/p>\n<p>For your data and devices security follow such rules of downloading apps and files:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"checklist\">\n<div class=\"container\">\n<div class=\"checklist__item simple-text body body-2\">\n<div class=\"fusion-li-item-content\">\n<div class=\"fusion-li-item-content\">\n<ul>\n<li><b>Use only licensed software from verified sources<\/b> (Play Market, App Gallery, App Store \u0456 Google Play or official developer sites). Pay attention to who published the app, as some shops have questionable copies of popular apps. Russian viruses are now often spread through \u201cpirated\u201d programs.<\/li>\n<li><b>Don\u2019t download files and apps from unknown sources\u00a0<\/b>(dubious sites, pages and channels in social networks, unknown senders).<br \/>\nPotentially dangerous file extensions: .exe, .bin, .ini, .iso, .dll, .com, .sys, .bat, .js, .apk;<br \/>\nPotentially safe file extensions: .docx, .zip, .rar, .pdf.<\/li>\n<li><b>The file has been installed \u2013 check it with an antivirus.\u00a0<\/b>But new malware or code can only be detected by an antivirus which is regularly updated.<\/li>\n<li>If you can\u2019t purchase the paid version of the program, <b>find a free counterpart<\/b>, but don\u2019t download cracked versions of paid programs: they usually contain malicious software code.<\/li>\n<li>Select <b>the prohibition of installing apps from unverified sources and automatic file downloads<\/b>, and for the browser \u2013 the function \u201c<b>ask for the location of the file before downloading every time<\/b>\u201d. If you accidently click on a link that automatically starts the download process, it won\u2019t start until you confirm it.<\/li>\n<li><b>Avoid using applications from russian developers<\/b>: VK, Odnoklassniki, Yandex.Browser, 1C, Mail.ru and others russians may track them. Before downloading, necessarily check the information about who is a developer and owner of the app, and if it\u2019s not forbidden in Ukraine.<\/li>\n<li><b>Control the permissions<\/b> the program requests during installation. Not all applications need access to your geolocation or personal information to function properly.<\/li>\n<li><b>Update apps<\/b>\u00a0on your smartphone and software on your computer. This is necessary because developers are constantly working on improving their security protocols.<\/li>\n<\/ul>\n<p><b>How to hide information on your devices<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To conceal sensitive information during wartime, you can use a method called steganography.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Steganography is a method of storing or transmitting information in which the very existence of the data is concealed. It allows important information to be hidden inside another file \u2014 such as an ordinary image that does not raise suspicion. Programs will recognize and open only the image, making it difficult to detect that another file is hidden inside.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To hide information within another file, you will need special programs or apps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For Windows (free):<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.openstego.com\/\"><span style=\"font-weight: 400;\">OpenStego<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For Android (free):<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=info.guardianproject.pixelknot&amp;hl=uk&amp;gl=US\"><span style=\"font-weight: 400;\">PixelKnot<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For iOS (paid):<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/apps.apple.com\/ru\/app\/steganography-hidden-message\/id1565634629\"><span style=\"font-weight: 400;\">Steganography: Hidden Message<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/apps.apple.com\/ru\/app\/paranoia-text-encryption-pro\/id935278498\"><span style=\"font-weight: 400;\">Paranoia Text Encryption PRO<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To retrieve the hidden information, open the corresponding application and enter the password that was used when the data was hidden.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To hide information using the OpenStego:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Select the file you want to hide.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enter the desired file name and destination folder in the appropriate field.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Choose the encryption algorithm and key.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Click <\/span><b>Hide Data<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Steganography can be used to conceal and transmit photos of personal documents or files containing coordinates of enemy positions. It is best to hide such files inside neutral images so that the communication appears ordinary and does not raise suspicion.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"8\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            Protection against phishing        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <div class=\"checklist__item simple-text body body-2\">\n<div class=\"checklist__item simple-text body body-2\">\n<p><span style=\"font-weight: 400;\">Fraudsters often try to trick trusting or inattentive internet users into revealing personal data \u2014 such as bank card access codes, login credentials for financial apps, social media accounts, or email. Their main tactic is to exploit your emotions, which is why they send messages designed to provoke an immediate reaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>\u201cIs this you in the photo?\u201d<\/b><b><br \/>\n<\/b><b>\u201cLook who got into an accident\u2026\u201d<\/b><b><br \/>\n<\/b><b>\u201cSomeone is trying to access your account. Please confirm your identity.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">After clicking such a link, the user is redirected to a <\/span><b>fake website<\/b><span style=\"font-weight: 400;\"> and asked to enter their login and password. Once entered, attackers gain access to the personal data and can use it for their own purposes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing messages are often recognizable because they <\/span><b>urge you to act immediately or manipulate your emotions<\/b><span style=\"font-weight: 400;\">. They also frequently contain <\/span><b>spelling or grammar mistakes<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To avoid falling victim to phishing, follow two key rules:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do not click on suspicious or unfamiliar links.<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enable two-factor authentication (2FA) f<\/b><span style=\"font-weight: 400;\">or your most important accounts, such as email, primary social media accounts, and banking applications.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">You can find instructions on how to set up two-factor authentication and protect your social media accounts in this <\/span><a href=\"https:\/\/dovidka.info\/en\/kiberbezpeka\/#spam\"><span style=\"font-weight: 400;\">section<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/div>\n<\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"9\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to store data securely        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <div class=\"checklist__item simple-text body body-2\">\n<div class=\"checklist__item simple-text body body-2\">\n<p>Keep important personal files encrypted or in hidden folders and albums. For this:<\/p>\n<ul>\n<li aria-level=\"1\"><b>For Samsung devices<\/b>: use\u00a0<b>Knox<\/b>\u00a0secret folder. You can transfer some applications, photos and other content to it.<\/li>\n<li aria-level=\"1\"><b>For<\/b>\u00a0<b>all Android devices<\/b>: Gallery \u2013 Albums \u2013 press and hold the required album \u2013 in additional menu select\u00a0<b>Hide<\/b>Or: Gallery \u2013 Albums \u2013 slide your finger on the screen from top to bottom \u2013 a hidden folder will open, on which you need to set a password or graphic key.Or the \u201cSecond storage\u201d function (available in some Android devices)<\/li>\n<li aria-level=\"1\"><b>For iPhone, iPad or iPod touch:<\/b>\u00a0Photographs \u2013 choose photo or video, which you need to hide, \u2013 press the button more \u2013 Hide \u2013 confirm.<\/li>\n<\/ul>\n<\/div>\n<div class=\"checklist__item simple-text body body-2\">\n<div class=\"fusion-li-item-content\">\n<div class=\"fusion-li-item-content\">\n<p><b>Use encryption to exchange information and correspondence.\u00a0<\/b>For E-mail, it can be asymmetric PGP encryption, for which there are special programs, and for messengers \u2013 encrypted chats and messages that disappear after a while. This will keep your data private if your computer, phone or email account is hacked. Hackers won\u2019t be able to read your messages without the encryption key.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"checklist__item simple-text body body-2\">\n<div class=\"fusion-li-item-content\">\n<div class=\"fusion-li-item-content\">\n<p><b>Keep copies of important files in cloud storage.\u00a0<\/b>For example, Dropbox, OneDrive, Google Drive, etc. From there you will be able to recover data if the phone will be jailbroken. Also, back up important documents to separate devices or secure cloud storage. When hackers gain access to the device, it\u2019s not always possible to recover the information.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"checklist__item simple-text body body-2\">\n<div class=\"fusion-li-item-content\">\n<div class=\"fusion-li-item-content\">\n<p><b>Don\u2019t store information in the smartphone memory that could harm you<\/b>\u00a0in case of occupation and search. Immediately delete such files and chats from the smartphone memory. And what\u2019s important to keep, pre-download to the cloud storage.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"10\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            How to protect your child online        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <p><span style=\"font-weight: 400;\">Law enforcement agencies have already recorded cases where occupiers used the internet to involve minors in gathering information about the locations of strategically important facilities. That is why it is important to explain to children that <\/span><b>online safety is just as important as safe behavior in real life<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key rule is<\/span><b> to talk with your children about cybersecurity.<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain the risks of communicating with strangers online and the possible consequences.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remind them not to post private photos or share personal information \u2014 such as their address, phone numbers, or other personal data \u2014 on social media, in messaging apps, chats, or online surveys.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Warn them about the risk of malware and viruses when opening suspicious links, attachments, or files. Help your child install protective software and configure security settings on their devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Agree on time limits for games and internet use on smartphones, and check that these limits are being followed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Talk with your child about what they read online, including fake news and misinformation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Teach your child how to create strong passwords and never share them with anyone.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You may also periodically check which websites your child visits \u2014 this can be done through the &#8220;History&#8221; tab in the browser.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">At the same time, make sure your child does not feel afraid if they accidentally do <\/span><b>\u201csomething wrong\u201d<\/b><span style=\"font-weight: 400;\"> on a computer or smartphone. In any unusual situation, it is important not to hide the problem but to <\/span><b>seek help immediately<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And remember: <\/span><b>strict prohibitions rarely work<\/b><span style=\"font-weight: 400;\">. It is more important to build a relationship based on trust and teach your child to be responsible and careful online.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These recommendations were prepared jointly with the <\/span><b>State Service of Special Communications and Information Protection of Ukraine<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"11\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            Threats to children online: how to protect them        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p>In addition to entertainment or educational content, there are many cyber threats on the Internet that you should warn your child about. For example, your child may accidentally blab to strangers in an online game about their parents\u2019 work schedule or an expensive purchase. And this is a threat to your family. When should you tell your children about cyber threats? What\u2019s the best way to do it? And why can the prohibition method do even more harm? Psychologist Dmytro Vakulenko told Dovidka.info about this.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"accordions\">\n<div class=\"container\">\n<h3 class=\"title title-6\">How to understand that gadgets have a negative impact on a child? What changes in behaviour can indicate this?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>A child becomes more withdrawn, communicates less with peers and adults. There is less interest in the real world, in sports activities, in communicating with friends, and in learning. But the focus is not on the marks, but on the fact that he or she is not interested in it.\u00a0 These are the changes that are taking place. Well, and probably one of the most striking signs is that the child is irritable, emotionally unstable, aggressive.<\/p>\n<\/div>\n<h3 class=\"title title-6\">Name the top 3 threats that a child can face online.<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>The first is gaming addiction, when a child is completely focused on games.<\/p>\n<p>When they are not interested in anything else. They are constantly checking their game process, their account, they are not interested in live communication, they are not interested in anything in real life at all. Only the game, only gadgets, only online processes. By the way, it\u2019s not just about games \u2013 it can also be an addiction to social media.<\/p>\n<p>Another risk \u2013 especially now, during the war \u2013 is enemy propaganda. This is the influence on a child when he or she has some kind of negative result from interacting with information.<\/p>\n<p>Another risk is personal data theft. This is a very common problem that affects not only children but also adults. That is, a child may not intentionally pass on important information to outsiders.<\/p>\n<p>For example, they may give their parents\u2019 work schedule or their own schedule, so thieves will know when no one is home. How does this happen? Through communication. An adult creates an account where he or she pretends to be a child, communicates, starts a friendship, and gradually learns more and more information. This account can be either on social media or in online games. For example, in Minecraft. There is a chat room where children communicate with each other, make friends and can share personal information.<\/p>\n<p>This also applies to paedophiles. That is, adults register in children\u2019s social media or online games and get the information they need there.<\/p>\n<p>As soon as you explain, show your child what the Internet is, and allow them to interact with someone there, you must immediately explain the rules of behaviour. Just as we don\u2019t talk to strangers on the street, we shouldn\u2019t talk to strangers online. Similarly, we should not click on any unknown links. Because just as in communication one can learn some information, it can also happen in a technical way. A child can be sent a picture of a cat, the child clicks on this picture, thus following a certain link, and this link downloads a virus to the gadget. Or the attacker gains access to the camera or microphone.<\/p>\n<p>Another important point to pay attention to is the use of software. Explain to your children that they should not download software from pirate sites, as there is a high probability that you will pick up a virus.<\/p>\n<p>The alternative is to use paid software that is virus-free. You need to guide your children not to use torrents, not to consume pirated content, not to break the law, and to use only paid software. This will protect both your child and you.<\/p>\n<h3 class=\"title title-6\">How should parents react when a child suddenly starts talking to a stranger during a game?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>This should not be an interrogation, it should be a conversation that respects the child\u2019s boundaries. This is a general question that relates to the formation of a trusting relationship, when you are an example and an image of love, acceptance and wisdom for your child, when he or she trusts you. And in such circumstances, it is normal to ask your child, absolutely calmly: how are you doing, with whom are you communicating, who is this person, what are you talking about, what files are you exchanging. If the child trusts you, they will tell you about it.<\/p>\n<h3 class=\"title title-6\">Is it an effective way for parents to disguise themselves as a suspicious person and get in touch with their own child?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>It seems to me that the next step would be to \u201cstab\u201d the child in the kitchen, so that he or she gets this experience at home, not behind the garages. This is a road to nowhere. You shouldn\u2019t deceive your child and go down this path. If he or she finds out that you disguised yourself as a third party and extorted personal data from him or her, he or she will no longer trust his or her closest, dearest, most loved people \u2013 parents. This way, the child develops a deep perception that people can\u2019t be trusted. Because if you can\u2019t trust your parents, you can\u2019t trust other people either. And it is difficult for a person who doesn\u2019t trust others to live. They may feel anxious all the time.<\/p>\n<h3 class=\"title title-6\">If a certain connection between a child and parents is lost for some reason, how can it be restored?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>The most effective tool is to come to the child and say: listen, we have facts. It is a fact that we constantly quarrel, that there are always some misunderstandings, we raise our voices at each other, and this makes both of us feel uncomfortable. So it\u2019s worth saying that there is a problem and describing it. And explain that this is not your personal problem, but a common problem. And at the same time say that it is not the child\u2019s fault. Then you say that you think it should be solved to improve the quality of life \u2013 yours and the child\u2019s. In other words, to establish communication.<\/p>\n<h3 class=\"title title-6\">Often parents turn to the method of prohibition: they take away the phone, tablet, and don\u2019t allow them to play computer games. How do children perceive this method?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>The child feels that if something he or she really, really needs is taken away from them, then the one who is stronger is right in this situation. You think that if you take away an object without explaining anything, by force or authority, you have given the child a better future and protected him or her from certain risks. But at that moment, the child realises a very simple story: the one who is strong is right. And as long as you are strong, it works. But at a certain point, in adolescence, the child becomes physically the same as you, and maybe even stronger than you. And it stops working.<\/p>\n<p>Even if you keep fit and can resist it, a child still grows up with the idea in their head that the one who is strong is right, and this causes resistance. Because for children, especially teenagers, one of the main tasks is to form their own boundaries and develop their personality.<\/p>\n<p>That\u2019s why a teenager will fight for the right to choose, for the right to fill their life with the activities they want. If you don\u2019t communicate, don\u2019t build interaction, and just take away, you will encounter resistance.<\/p>\n<h3 class=\"title title-6\">How can you encourage your child to spend less time with gadgets and not share important information without prohibitions?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>Create a daily plan and help your child organise their time. Model their schedule, plan the weekend together, demonstrate where they have hours of games, hours of household chores, hours of some sports activities on the street or elsewhere. Help them to see where they start and end an activity. This will also help regulate their time with gadgets.<\/p>\n<p>In order for a child to understand us, we have to speak the child\u2019s language. And game is one of the leading activities of children under 10 or 11 years old. That\u2019s why, for example, it makes sense to drink tea with sweets with teenagers, chat, and discuss something. And for younger children, it\u2019s better to do it through games.<\/p>\n<p>How can we play? It can be puppet theatre or games with plasticine. We can mould some situations. We can draw a comic book, draw rules of information hygiene, and rules of online safety. In the format of a comic book, where the main character faces certain challenges, and the mother and child draw the comic book together and help the main character cope with those challenges. The mother adds her expertise and some good ideas on how to respond to a particular challenge. It\u2019s fun, the child will be delighted with the process because it will be filled with love, trust and wisdom. And the information you draw will be very well absorbed by the child through a game, drawing or plasticine.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"12\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            Propaganda in Minecraft. How Russians are trying to brainwash our children through games and social media        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p>For children, the techniques of Russian propaganda are not as obvious as for adults, and it is difficult for children not to be influenced by them. They can\u2019t filter information on their own, and that\u2019s what the Russians use. In social media, cartoons, games \u2013 the Russian trace is everywhere. For example, in the popular Minecraft game, players from Russia reenacted the battle for an occupied Ukrainian city. And the cartoon \u201cMasha and the Bear\u201d was even translated into Ukrainian to increase views among our children. Psychologist Dmytro Vakulenko shared his advice for parents on how to protect children from enemy inputs with Dovidka.info.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"accordions\">\n<div class=\"container\">\n<h3 class=\"title title-6\">What are the main narratives that Russia is promoting on social media for children and teenagers?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>The main theses are that Russia is saving Ukrainians, that this is not a war, but a special military operation, that Ukrainians are younger brothers of Russians, that Russia is an older brother whom Ukrainians should obey. Common values, mentality, history, culture. This is what is being imposed by the Russians. And also narratives that the Ukrainian government are bad men who exploit their people, and that Ukraine will never win this war.<\/p>\n<p>Russia\u2019s resources are aimed at forming the loyalty of our youth, children, and teenagers. And also to create uncertainty, that \u201cnot everything is so clear\u201d in this war. To prevent support for the anti-Ukrainian position. To prevent support for the anti-Ukrainian position.<\/p>\n<h3 class=\"title title-6\">Where do Russians hide their propaganda and target it specifically at children and teenagers?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>The obvious platforms include social media and messengers Facebook, Instagram, TikTok, Telegram, and Discord. Discord is a messenger that is mostly used by children and young people because it is focused on the gaming community, on online games. Therefore, there are fewer adults there, and much more children and young people. So, I recommend paying more attention to this.<\/p>\n<p>Other less obvious platforms are Youtube and Twitch. Twitch is a video platform where bloggers, especially gamers, often broadcast online. And, in fact, online games are also a place where certain information and psychological campaigns of the Russian Federation are often promoted.<\/p>\n<p>For example, there is a very famous game called Minecraft. It has an online service feature. The point is that many children can play at the same location at the same time and communicate with each other. And Russia is using its finances to organise events there, where it demonstrates some historical moments, for example, the occupation of Ukrainian territories. And there, the Russians present it as a liberation process. And they create the appropriate atmosphere online. Children participate in this game, interact according to the rules of this game. This way, they are being led to believe that Ukraine is not under occupation, but a liberation process, and that the Russian Federation did everything right there and liberated Ukrainians from Nazi rule.<\/p>\n<p>There is also a famous game about a \u201cgood\u201d KGB officer who saves the world. This game was also created by Russians. And they promoted this game all over the world. This means that their information and psychological influence is aimed not only at Ukrainian children, but at children from all over the world.<\/p>\n<p>As for cartoons, there is a striking example \u2013 \u201cMasha and the Bear\u201d. By the way, please note that this is a cartoon that they distribute all over the world and even translate it into Ukrainian to make it even less resistant. Some may say that it is a beautiful cartoon, but in fact it is a cartoon that imposes on children a culture and values that are not typical for Ukraine, but are inherent to our eastern neighbours. What is it about? It\u2019s about a girl who does only what she wants and does it the way she wants. Her message to adults is that only she is right, and just as she says, so it will be, and she will never face the consequences of her wrong behaviour. That is, if she did something wrong, everything went wrong, the bear is the unfortunate one in this situation. I think this is very similar to the behaviour of our eastern neighbour.<\/p>\n<h3 class=\"title title-6\">It sounds very scary, because it seems that this propaganda is everywhere. What should parents do to protect their children from this?<\/h3>\n<div class=\"body body-2 simple-text\">\n<p>It\u2019s very scary: in fact, it is. If we want to protect our children, we have to create the conditions in which they will develop. And not rely on the fact that somehow they will grow up and everything will be fine. Here I would equate the story of information hygiene and, in general, how to behave online, how to filter content. All this should not be on the child\u2019s shoulders alone. They are not able to think critically on their own to filter it all out. Propaganda is prepared by adults and smart people who are experts in their field. Russians are good at it.<\/p>\n<p>I would compare it to the rules for using electricity. A child is not supposed to be able to use electrical appliances on their own, from birth. Parents explain the safety rules, talk about the risks of using electricity, explain how to use it, tell them what not to do. These are basic things. The same should apply to the information space, and the same should apply to nutrition. Why do I compare it to food? Because, depending on what we eat, we feel that way. It\u2019s the same with information: depending on what information we consume, that\u2019s how we think, and depending on how we think, that\u2019s how we act. You need to work with your child, communicate, and talk about it. We need to teach, explain, demonstrate cause and effect, and study history together.<\/p>\n<p>But this should not be done when the child is already grown up, but from an early age. As soon as the child gets access to the web and manages it independently. Then it\u2019s time.<\/p>\n<p>And in order to explain this qualitatively, not just by prohibitions, we need to understand it well ourselves, to research this issue. To unfold all the narratives that I have described and to have meaningful and thorough answers to why this is wrong.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"title_anchor\">\n    <span id=\"13\" class=\"title_anchor__anchor\"><\/span>\n    <div class=\"container\">\n        <h2 class=\"title title-5\">\n            What sources of information can be trusted        <\/h2>\n    <\/div>\n<\/section>\n\n\n<section class=\"text_block\">\n    <div class=\"container\">\n        <div class=\"body body-2 simple-text\">\n            <section class=\"text_block\">\n<div class=\"container\">\n<div class=\"body body-2 simple-text\">\n<p><span style=\"font-weight: 400;\">First of all, focus on the messages of government agencies. Follow the information from the State Emergency Service, the army, and the government on their websites or social media, as well as in the messages of Public Broadcasting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Below you will find a list of trusted sources. Please note that verified (officially confirmed) accounts on social media have a special mark next to their name &#8211; a blue checkmark. This is how the social media platform confirms that this page is really managed by this person or institution. In Ukraine, not all official institutions have received it yet, so take note of the accounts from the list.<\/span><\/p>\n<p><b><\/b><b>Public broadcasting:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/suspilne.media\/\"><span style=\"font-weight: 400;\">UA:Pershyi TV channel<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/promin.fm\/\"><span style=\"font-weight: 400;\">UA: Radio Promin<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"http:\/\/ukr.radio\/\"><span style=\"font-weight: 400;\">UA: Ukrainian radio<\/span><\/a><\/li>\n<\/ul>\n<p><b><br \/>\n<\/b><b>Websites of public services:<\/b><\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/www.dsns.gov.ua\/\"><b>State Emergency Service of Ukraine<\/b><\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.facebook.com\/DSNS.GOV.UA\/\"><span style=\"font-weight: 400;\">facebook<\/span><\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/twitter.com\/SESU_ua\"><span style=\"font-weight: 400;\">twitter<\/span><\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.instagram.com\/dsns_ukraine\/\"><span style=\"font-weight: 400;\">instagram<\/span><\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/t.me\/dsns_telegram\"><span style=\"font-weight: 400;\">telegram<\/span><\/a><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/mod.gov.ua\/\"><b>Armed Forces of Ukraine<\/b><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.facebook.com\/GeneralStaff.ua\"><span style=\"font-weight: 400;\">facebook<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/twitter.com\/GeneralStaffUA\"><span style=\"font-weight: 400;\">twitter<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.instagram.com\/uaf_general_staff\/\"><span style=\"font-weight: 400;\">instagram<\/span><\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/mvs.gov.ua\/uk\"><b>Ministry of Defense of Ukraine<\/b><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.facebook.com\/MinistryofDefence.UA\"><span style=\"font-weight: 400;\">facebook<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/twitter.com\/defenceu\/\"><span style=\"font-weight: 400;\">twitter<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.instagram.com\/ministry_of_defense_ua\/\"><span style=\"font-weight: 400;\">instagram<\/span><\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/mvs.gov.ua\/uk\"><b>Ministry of Internal Affairs of Ukraine<\/b><\/a><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.facebook.com\/mvs.gov.ua\"><span style=\"font-weight: 400;\">facebook<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/twitter.com\/mvs_ua\"><span style=\"font-weight: 400;\">twitter<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.instagram.com\/mvs_ua\/\"><span style=\"font-weight: 400;\">instagram<\/span><\/a><\/li>\n<\/ul>\n<p><b>Useful chatbots in Viber\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The enemy often creates chatbot lookalikes on Telegram to mislead Ukrainians and collect their personal data. You can check if the bot you are using is safe here.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike Telegram, Viber doesn&#8217;t have this problem. Chatbots and channels there are moderated (checked by the administration), and no one can duplicate a channel or bot created earlier.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What useful chatbots can be used in Viber, read on.\u00a0<\/span><\/p>\n<p><b><\/b><b>Chatbots for your security\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/dovidkainfo_bot\"><span style=\"font-weight: 400;\">Security: a guide<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; an informational chatbot by the Dovidka.info project. It has action plans for various emergencies that may occur during the war.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/nezlamnistbot\"><span style=\"font-weight: 400;\">Points of Invincibility<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; A chatbot with information about the Points of Invincibility in your city and their search by geolocation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/shelteruabot\"><span style=\"font-weight: 400;\">Where is the shelter?<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; A chatbot with information about shelters in your city and their search by geolocation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/handyfriends\"><span style=\"font-weight: 400;\">Handy Friends Bot<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; A digital assistant for Ukrainians abroad.<\/span><\/li>\n<\/ul>\n<p><b>Chatbots for countering fakes<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/spravdi\"><span style=\"font-weight: 400;\">SPRAVDbot<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; A bot from the Center for Strategic Communications and Information Security. You can send fake news or news that you doubt is true, and experts will check it. If it turns out to be fake, they will debunk it.<\/span><\/li>\n<\/ul>\n<p><b>Useful chatbots for government agencies and organizations\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/diia_help_bot\"><span style=\"font-weight: 400;\">Diia<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Information and service chatbot by Diia.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/ukrposhta\"><span style=\"font-weight: 400;\">Ukrposhta<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Chatbot of Ukrposhta with information and services.<\/span><\/li>\n<\/ul>\n<p><b>Chatbots of human rights organizations\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/warcrime\"><span style=\"font-weight: 400;\">Warcrime bo<\/span><\/a><span style=\"font-weight: 400;\">t &#8211; Chatbot for registering war crimes.<\/span><\/li>\n<\/ul>\n<p><b>Chatbots for data search<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/chats.viber.com\/opendatabot\"><span style=\"font-weight: 400;\">Opendatabot<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Chatbot for accessing open data bases of Ukraine.<\/span><\/li>\n<\/ul>\n<p><b>Useful channels on WhatsApp\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Due to the questionable reliability and security of the Telegram messenger, more and more government agencies and other organizations are creating channels of information on other platforms. In particular, in the WhatsApp messenger.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have decided to stop using Telegram or want to read news not only there, here is a list of trusted channels that we recommend subscribing to in WhatsApp.<\/span><\/p>\n<p><b><\/b><b>Official channels of the authorities\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va4ubceCsU9GgR40rM1c\"><span style=\"font-weight: 400;\">Volodymyr Zelenskyi <\/span><\/a><span style=\"font-weight: 400;\">&#8211; The official channel of the President of Ukraine Volodymyr Zelenskyi.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va41uJBHLHQdQDuNA41K\"><span style=\"font-weight: 400;\">Olena Zelenska<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of the First Lady of Ukraine Olena Zelenska.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va0MGKa65yDKulApah01\">Minister of Defense of Ukraine<\/a> \u2013 Mykhailo Fedorov \u2013 the official channel of the Minister of Defense of Ukraine, Mykhailo Fedorov<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va56gx5HrDZae89g9z23\"><span style=\"font-weight: 400;\">SES of Ukraine<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Official channel of the State Emergency Service of Ukraine.<\/span><\/li>\n<li><a href=\"https:\/\/whatsapp.com\/channel\/0029VaBjrEdGk1Fo6nr40o3t\"><span style=\"font-weight: 400;\">Kyrylo Budanov<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official WhatsApp channel of Kyrylo Budanov, Head of the Office of the President of Ukraine.<\/span><\/li>\n<\/ul>\n<p><b>Channels about Ukraine\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VZzb5gV77qVXJHJHaK1S\"><b>Ukraine.ua<\/b><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of Ukraine \ud83c\uddfa\ud83c\udde6 &#8211; a brave country fighting for freedom in the heart of Europe. Subscribe to get verified news and explore Ukraine.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va0S5Ei5q08guUvBFp2a\"><b>UNITED24 Media<\/b><\/a><span style=\"font-weight: 400;\"> &#8211; UNITED24 helps you see the real Ukraine \ud83c\uddfa\ud83c\udde6 and how it affects every person in the world.<\/span><\/li>\n<\/ul>\n<p><b>Channels of the military\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaE2uSwAInPla0otdW2O\"><b>UA Air Force<\/b><\/a> <span style=\"font-weight: 400;\">\u00a0&#8211; The official channel of the Air Force of the Armed Forces of Ukraine.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaBdhmsJkK7Cayjyq30f\"><span style=\"font-weight: 400;\">Defence Intelligence of Ukraine<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Official channel of the Defence Intelligence of Ukraine.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va7Fxxl0bIdmcd6xbb1v\"><span style=\"font-weight: 400;\">Azov<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Official channel of the 12th Special Forces Brigade \u201cAzov\u201d of the National Guard of Ukraine.<\/span><\/li>\n<\/ul>\n<p><b>Channels for countering fakes<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaEEIIrI7BeFa8pCWA0z\"><span style=\"font-weight: 400;\">SPRAVDI<\/span><\/a><span style=\"font-weight: 400;\"> is a channel of the Centre for Strategic Communications and Information Security. Debunking Russian fakes and explaining important events.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va0RdK8FnSz8tnuiKc3j\"><span style=\"font-weight: 400;\">StopFake<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; A journalistic organisation that aims to verify information, increase media literacy of the audience and fight for a clear distinction between factual journalism and propaganda.<\/span><span style=\"font-weight: 400;\"><br \/>\n<b><\/b><\/span><b><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><b>Channels of your city&#8217;s authorities<\/b><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va5SAG7LdQeZMivHYp2L\"><span style=\"font-weight: 400;\">Kyiv City Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of the Kyiv City Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaAltpO60eBgwuVi5F2G\"><span style=\"font-weight: 400;\">Kyiv Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of the Kyiv Regional Military Administration. Here are the news and main events of the region.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaGgEjrBvvsi03gUS046\"><span style=\"font-weight: 400;\">Vitaliy Kim \/ Mykolaiv Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The channel of the Head of Mykolaiv Regional Military Administration Vitaliy Kim.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va6A7dD90x2yGiUqWl0R\"><span style=\"font-weight: 400;\">Lviv Regional Military Administration <\/span><\/a><span style=\"font-weight: 400;\">&#8211; The official channel of the Lviv Regional Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaAPgEf6WaKlIwf7xZ1Q\"><span style=\"font-weight: 400;\">Poltava Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of the Poltava Regional Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va5fa3VHwXb3xoqFBG1y\"><span style=\"font-weight: 400;\">Khmelnytskyi Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of the Khmelnytskyi Regional Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va5nInR4IBhCpFujEP2q\"><span style=\"font-weight: 400;\">Chernihiv Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Official channel of the Chernihiv Regional Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va52KJRBA1f4wys8lq2I\"><span style=\"font-weight: 400;\">Mykolaiv Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Channel of Mykolaiv Regional Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va63H9K2975Is1raRA0u\"><span style=\"font-weight: 400;\">Rivne Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The official channel of the Rivne Regional State Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va5tSgg47Xe6EySa1g2b\"><span style=\"font-weight: 400;\">Cherkasy Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Official information about Cherkasy region.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029VaAQn2FC6ZvdmiosC50u\"><span style=\"font-weight: 400;\">Ternopil Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Official channel of the Ternopil Regional Military Administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/whatsapp.com\/channel\/0029Va5zvI1It5rytNl1D42k\"><span style=\"font-weight: 400;\">Chernivtsi Regional Military Administration<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; The page of the Chernivtsi Regional Military Administration.<\/span><\/li>\n<\/ul>\n<p><b>Telegram channels that disguise themselves as Ukrainian, but are actually pro-Russian<\/b><b><br \/>\n<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Centre for Strategic Communications, together with the SSU, published a <a href=\"https:\/\/spravdi.org\/spilna-zayava-z-pryvodu-zahystu-informaczijnogo-prostoru-ukrayiny-vid-rosijskyh-vorozhyh-telegram-kanaliv\/\">list of Telegram channels<\/a> that claim to be &#8220;independent news channels&#8221;, but in fact their work is coordinated by the Kremlin. Among them are &#8220;Resident&#8221;, &#8220;Legitimate&#8221;, &#8220;Cartel&#8221;, &#8220;Spletnitsa&#8221; and others.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sometimes it is difficult to detect that these channels are dangerous because they skilfully hide propaganda messages among real news.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, check your subscriptions using this list. We strongly recommend unsubscribing from any of the following channels:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@KrokooDil<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@sheptoon<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@legitimniy<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@ASupersharij<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">@rezident_ua<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@montyan2<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@ZeRada1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@OpenUkraine<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@ukr_leaks<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">@spletnicca<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@ZE_kartel<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@OlgaSharij\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@ukraina_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@MediaKiller2021<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@tvdno<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">\u200b\u200b@skosoi<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@odessa_typical<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@warfakes<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@hercon_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@cherniy_kvartal<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@nach_shtabu<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@buntariy<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@maksnazar<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@MonitoringUA<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@news_kramatorsk<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@life_odessa<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@godeye_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@otryadkovpaka<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@belshkvarka<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@SBUmole<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@tsibulya_ua<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@melitopoladmin)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@harry_homolsky<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@sharij_official<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@zp_live<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@kherson_news_info<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@Genichesk_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@NewsKhersonLife<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@Ukrainian_format<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@melitopol_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@Ten_NaPleten<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(@niklive<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@kharkov_trempel<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@HolodniyYar<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@htosho<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@chernobaevka_ru<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">@NowMelitopol<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@photographermilitary<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@herson_today<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@HersonVestnik<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@newkahovka_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@skadovsk_rus<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@brd_zavtra<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@NowMelitopol<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@yug_plazdarm<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@zaporojie24<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@tokmak_segodna<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@polohy_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@energodar_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@berdyansk_ru<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@Kharkiv_antiFA<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@netlenkanet<\/span><\/p>\n<\/div>\n<\/div>\n<\/section>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":5707,"template":"","class_list":["post-5721","informations","type-informations","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recruitment: How to understand that you are in danger? How to protect your child? - Dovidka.info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recruitment: How to understand that you are in danger? How to protect your child? - Dovidka.info\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/\" \/>\n<meta property=\"og:site_name\" content=\"Dovidka.info\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T14:35:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dovidka.info\/wp-content\/uploads\/2025\/05\/verbuvannya.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/\",\"url\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/\",\"name\":\"Recruitment: How to understand that you are in danger? How to protect your child? - Dovidka.info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dovidka.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/verbuvannya.png\",\"datePublished\":\"2025-05-20T06:15:28+00:00\",\"dateModified\":\"2026-04-02T14:35:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dovidka.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/verbuvannya.png\",\"contentUrl\":\"https:\\\/\\\/dovidka.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/verbuvannya.png\",\"width\":800,\"height\":440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u041f\u043e\u0440\u0430\u0434\u0438\",\"item\":\"https:\\\/\\\/dovidka.info\\\/en\\\/informations\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recruitment: How to understand that you are in danger? How to protect your child?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dovidka.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/dovidka.info\\\/en\\\/\",\"name\":\"Dovidka.info\",\"description\":\"\u041f\u043e\u0440\u0430\u0434\u0438 \u043d\u0430 \u043a\u043e\u0436\u0435\u043d \u0434\u0435\u043d\u044c \u0432\u0456\u0439\u043d\u0438\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dovidka.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recruitment: How to understand that you are in danger? How to protect your child? - Dovidka.info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/","og_locale":"en_US","og_type":"article","og_title":"Recruitment: How to understand that you are in danger? How to protect your child? - Dovidka.info","og_url":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/","og_site_name":"Dovidka.info","article_modified_time":"2026-04-02T14:35:56+00:00","og_image":[{"width":800,"height":440,"url":"https:\/\/dovidka.info\/wp-content\/uploads\/2025\/05\/verbuvannya.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/","url":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/","name":"Recruitment: How to understand that you are in danger? How to protect your child? - Dovidka.info","isPartOf":{"@id":"https:\/\/dovidka.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/#primaryimage"},"image":{"@id":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/#primaryimage"},"thumbnailUrl":"https:\/\/dovidka.info\/wp-content\/uploads\/2025\/05\/verbuvannya.png","datePublished":"2025-05-20T06:15:28+00:00","dateModified":"2026-04-02T14:35:56+00:00","breadcrumb":{"@id":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/#primaryimage","url":"https:\/\/dovidka.info\/wp-content\/uploads\/2025\/05\/verbuvannya.png","contentUrl":"https:\/\/dovidka.info\/wp-content\/uploads\/2025\/05\/verbuvannya.png","width":800,"height":440},{"@type":"BreadcrumbList","@id":"https:\/\/dovidka.info\/en\/recruitment-how-to-understand-that-you-are-in-danger-how-to-protect-your-child\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u041f\u043e\u0440\u0430\u0434\u0438","item":"https:\/\/dovidka.info\/en\/informations\/"},{"@type":"ListItem","position":2,"name":"Recruitment: How to understand that you are in danger? How to protect your child?"}]},{"@type":"WebSite","@id":"https:\/\/dovidka.info\/en\/#website","url":"https:\/\/dovidka.info\/en\/","name":"Dovidka.info","description":"\u041f\u043e\u0440\u0430\u0434\u0438 \u043d\u0430 \u043a\u043e\u0436\u0435\u043d \u0434\u0435\u043d\u044c \u0432\u0456\u0439\u043d\u0438","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dovidka.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/dovidka.info\/en\/wp-json\/wp\/v2\/informations\/5721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dovidka.info\/en\/wp-json\/wp\/v2\/informations"}],"about":[{"href":"https:\/\/dovidka.info\/en\/wp-json\/wp\/v2\/types\/informations"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dovidka.info\/en\/wp-json\/wp\/v2\/media\/5707"}],"wp:attachment":[{"href":"https:\/\/dovidka.info\/en\/wp-json\/wp\/v2\/media?parent=5721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}