Search Results
51 results found for ""
Blog Posts (45)
- Mortality in Belarus during the COVID-19 pandemic - real statistics!
Over 90,000 people - mortality in Belarus during the COVID-19 pandemic. That's roughly how many lives the virus will claim between 2020 and 2022. This is one of the most horrifying statistics in the history of the Republic of Belarus as a state. How did we get this number Official statistics on birth and death rates in the Republic of Belarus stopped being published in May 2020. The real situation with birth rate, mortality, and the outflow of the working population from the country is so terrible that officials keep it secret from the people. However, Cyberpartisans have obtained databases on all deceased citizens of Belarus up to 2024 with official causes of death. Thanks to this, we have established the real statistics of deaths during the COVID-19 pandemic in Belarus. According to the Belstat data , from 2014 to 2020 on average in the whole country 10,000 people died per month, that's 120,000 per year. We checked these figures by counting the number of people who died in 2018-2019. Thus, when summarizing the statistics, we conditionally took as excess mortality all indicators above 10 thousand per month. The data on the total number of deaths in the Republic of Belarus for each month from 2020 to 2022 are presented in the graphs below. Hence, the excess mortality in Belarus for the period 2020-22 was more than 90,000. We have also summarized the total mortality statistics for several years from 2018 to 2023. These data illustrate an increase in mortality in 2020-21, coinciding with the coronavirus pandemic, and a return to lower rates in 2022-2023. 90 000 deaths is the result of Lukashenko's cowardice in denying the epidemic problem in favour of his supposed “popularity” while the whole world was fighting COVID. But all this is not only on the dictator's conscience. It is also the fault of all those who are trying to create an illusion of stability in the country under a “strong householder” according to the old Soviet methodology. All those employees of state agencies who know but hide the truth from the people and continue to work for the tyrant. Such people think that the system protects them. But the truth is, we already know their secrets. And each of them by name. How many Belarusians have been diagnosed with coronavirus as the cause of death? Since doctors in Belarus were often forbidden to diagnose COVID-19 as the official cause of death during the pandemic, documents reflected this restriction. We did not focus on this indicator to determine the real mortality from coronavirus. But for statistical purposes, we give the number of people who were diagnosed as the official cause of death: B34.2 Coronavirus infection unspecified B97.2 Coronaviruses as a cause of diseases classified in other headings Data transfer for research Cyber partisans are providing databases on deceased persons in the Republic of Belarus (without sensitive personal data) for research to the Belarus Medical Solidarity Foundation ByMedSol . We hope that the detailed analysis of the specialists will help to clarify the picture of the real mortality rate in the Republic of Belarus, which is still carefully hidden by the Lukashenko regime from Belarusians. By the way, earlier we have already published partial statistics on real mortality in the Republic of Belarus during the COVID epidemic . With the updated data, these statistics can now be presented in a more comprehensive manner.
- YouTube for Lukashenko
In late May 2024, the network broke the news that Belarus would be creating its own media platform. It's a YouTube analogue, but only for the media controlled by Lukashenko's regime. Irina Akulovich, Director General of the propaganda agency BelTA, stated this on air on the TV channel Belarus 1. She stated that the order to create the media platform came directly from Lukashenko. At the end of 2023, the Cyberpartisans infiltrated the internal network of the BelTA. This gave us access to internal documents that shed light on the first stages of the project. How propagandists will find a way to bypass the blocking of their videos for inaccurate information and propaganda of violence? How much is the Lukashenko regime willing to spend on this? What well-known IT companies negotiated about the development of the portal for propaganda? Are they preparing to block Youtube in Belarus and what to do if this threat becomes a reality? Read the article or watch the video at the link below. Why Does the Dictator Need His Own YouTube? On Lukashenko's order, BelTA news agency engaged in the project of the Belarusian video service from the beginning of 2023. It will initially feature content from the republican TV channels, Sovetskaya Belorussia and BelTA itself. Then engage the regional media supporting the dictator. You see an internal document that describes the concept of creating such an Internet resource. Its authors argue that the publication of video content on YouTube makes the state-owned Belarusian media segment vulnerable. Materials of the dictatorship-controlled media are regularly blocked and deleted on international Internet resources. Therefore, it is necessary to create your own resource where materials are stored permanently and always available. Over the last few years, YouTube and Facebook have blocked many channels and accounts that openly support the Putin and Lukashenko regimes. Thus, in the 21st year, YouTube blocked the video with the speech of the Belarusian dictator on Victory Square on 9 May. In the 22nd year, the so-called channel of the Union State 'BelRos', which received warnings from the administration for spreading false information and propaganda of violence, was blocked. Of course, on the dictator's own media portal, there will be no such moderation. According to the developed concept, what and when to publish is decided by BelTA employees themselves, while the representatives of TV channels have to coordinate their plans with them. How Many Viewers Does Propaganda Expect? As for the popularity of the portal, which will host all the main state media, in the first year, they expect a maximum of 3 000 simultaneous visitors. And in the second year, they expect no more than 20 000 simultaneous connections and up to 50 000 during socially significant events. As we learned from the working correspondence of BelTA employees, in the first stages of the project discussion, the name of the state-owned video hosting was proposed in Belarusian. However, according to BelTA Director General Irina Akulovich, it has a bad effect on search queries. Perhaps that's why they agreed on the working name ‘Video.bel’. Which IT Companies in Belta Considered Entrusting the Development of Video Hosting? To implement the technical part of the project, it was planned to attract one of the provider companies, which should provide its infrastructure and basic software, and then deal with the maintenance and security of video hosting. To find such a provider, in the second half of the 23rd year, BelTA employees began to send requests to many relevant organisations in Belarus and Russia. Thus, the companies Softec Lab’, ‘Telebreeze’, ‘Ontide Soft’, and ‘Studio Infolio’ were particularly interested in the project. Their representatives sent commercial proposals for the implementation of the media service based on their capabilities. At the same time, BelTA management actively negotiated cooperation on the project with two companies: InDev Solutions OJSC and A1 provider . On the screen, you can see the roadmap for August 2023, developed by InDev Solutions team, which outlines BelTA's work with these two organisations in stages. The full document: ‘InDev Solutions' is an IT Company under the Control of the OAC 'InDev Solutions' was only recently registered in December 2022. However, in the first few months after its launch, it started cooperating with the country's leading universities and the Ministry of Health, as well as becoming a resident of the High Technology Park. The explanation for such rapid success and high trust of the state authorities is not difficult to find. The director of InDev Solutions is Oleg Belyakov, a former employee of the Operational and Analytical Centre, abbreviated as OAC. He is also a member of the working group for the formation and implementation of the State Programme ‘Digital Development of Belarus’ as a representative of the OAC. Moreover, according to the legal address on the InDev Solutions website, the company is located in the same building as the ‘National Traffic Exchange Centre’ under the management of the OAC. Sergey Sudakov, a former employee of the OAC, holds the position of Deputy Director General for Information Technologies at InDev Solutions. The company's leading legal adviser is Yulia Brizinskaya, who also has a decent track record. Previously, Brizinskaya worked in the Interior Ministry, KGB, as a legal adviser to the military information agency ‘Vayar’ of the Armed Forces of the Republic of Belarus, as well as in the OAC-affiliated company BeCloud. By the way, since late 2023, Becloud owns a controlling stake in InDev Solutions. So the company in fact is managed by the OAC. Negotiations with A1 The roadmap for the development of video hosting for the republican TV channels also includes the Belarusian subsidiary of the Austrian provider A1. According to the working correspondence of BelTA employees, negotiations on the joint implementation of the project have been held since the early summer of 2023. Namely with the deputy director general for digital platforms and content of A1 Anton Bladik (he has now resigned from this position), who, by the way, previously worked as a chief specialist in the state military-industrial committee of the Republic of Belarus. According to an internal BelTA document, which you can see on the screen, specific costs and plans were even discussed. Thus, the launch and maintenance of the video hosting for a year was estimated by the representatives of ‘A1’ at 600-700 thousand US dollars, if we take a ready-made solution based on the software ‘Voka’. The full document: However, the costs were already significantly adjusted upwards after a month of discussions. BelTA employees estimated the amount needed to launch and operate the media platform in the first year at about $1.5-2 million, and the annual costs starting from the second year of operation at about $1 million. You can see below one of the variants of such calculation. The full document: At that time, in November 2023, negotiations with A1 on the development of a Belarusian video service were so close that they directly discussed bypassing open tender procedures. You can see below a retelling of the negotiations with A1 in the working chat of BelTA employees. According to this message, both sides are dissatisfied with the fact that any participant can formally win the open tender and get the state order. The representatives of A1 offered their options to bypass these procedures. Judging by the data from the site of public procurement, in February and March 2024 BelTA attempted to hold open tenders for video broadcasting services. Based on the data on the same portal, it is not difficult to establish that the company ‘A1’ participated in tenders. The well-known provider was competing with Mediatek Ltd, whose bid was rejected by the procurement commission. Since this summer BelTA Director General Irina Akulovich confidently promised that the state video portal would start working at the end of August, we can assume that the contractor for the project has been found after all. Are They Preparing to Switch off Youtube in Belarus? At this time, we are not aware of any documents or plans that would support this. But we cannot completely deny this possibility. Belarusians have already faced problems with loading the service on New Year's Eve. We would like to remind you that at that time Youtube did not load for 20 minutes in Belarus. The easiest way to fight such restrictions is to use VPN services. Among other things, modern technologies allow you to bypass even the blocking of VPNs themselves. According to our assessment, the development of a separate video resource for Lukashenka's propagandists is mainly aimed at avoiding blocking of their content. But whether Belarusians will use such a site en masse is doubtful. Write in the comments on our channel what you think about it. Subscribe to our channel in Telegram, where we publish other investigations on the data obtained from the internal networks of the regime.
- Partisan Telegram is NOT ONLY for partisans
P-Telegram from Cyberpartisan has advantages over the original Telegram, thanks to which it will come in handy NOT only in countries with dictatorships and military conflicts. We've gathered in one post some of the main features that make Partisan Telegram worth using even in a democratic world.
Other Pages (6)
- About Us | Belarusian Cyber Partisans
The Cyber Partisans is a group of hacktivists fighting against dictatorship and lawlessness in Belarus. Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights and the rule of law in the country. The group emerged in the aftermath of the 2020 protests in Belarus against the tyrant Lukashenko, who had unlawfully taken control of the country. There are no professional hackers among us; most participants are ordinary IT specialists who are unwilling to tolerate lawlessness and are committed to combating dictatorship in any feasible way. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. Our principles The Belarusian Cyber Partisans is a group of activists who, under conditions of severe political repression in Belarus, have chosen the only possible form of civil protest and resistance: challenging the institutions of Lukashenko's regime through online means. We are unequivocally a group of hacktivists, not a hacking organization, bringing together professionals from various fields without any commercial objectives. We do not conduct attacks that could endanger people's health and safety. Our targets are solely entities that support the dictatorial regime. We do not carry out commercial orders. Our group works to overthrow the dictatorship in Belarus, and not for personal enrichment. We do not use the obtained information for personal gain. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Our operations As our fight persists, we are unable to discuss the majority of our hacks, access to sensitive systems, and data that we have. Among the publicized operations, the most remarkable ones include: September 26, 2020 Hacking of state-run news websites The group hacked the transmissions of Belarus' state channels (ONT and Belarus-1), which regularly disseminated content in favor of the Lukashenko regime. They broadcasted videos featuring scenes of torture inflicted on individuals detained by Interior Ministry officers during peaceful protests in August 2020. July 26-30, 2021 The beginning of Operation Heat Hacking of numerous state databases of Belarus, including the traffic police database, the AIS Passport system, the database recording citizens' appeals to the Ministry of Internal Affairs, and the operational drone video recordings service of the Ministry of Internal Affairs, among others. August 9, 2021 Hacking of the servers of the Department of Operational and Investigative Activity Provision of the Ministry of Internal Affairs of the Republic of Belarus The group successfully infiltrated the database of the Department of Operational and Investigative Activity Provision under the Ministry of Internal Affairs of Belarus. Consequently, we obtained terabytes of phone conversation records of Belarusian citizens, unveiling extensive surveillance orchestrated by entities controlled by the dictator Lukashenko. August 29, 2021 Hacking of phone databases of all operators in Belarus The group hacked databases containing details of all mobile numbers in Belarus September 2, 2021 Hacking of Unified State Register of Real Estat databases The Unified State Register of Real Estate was hacked. The group gained access to information about all real estate in Belarus. November 1, 2021 Hacking of the Social Security Fund database The National Social Security Fund was hacked. The group obtained access to records concerning official employment in Belarus and the corresponding salary information. November 8, 2021 Hacking of the Passenger Trafic Database November 17, 2021 The beginning of Operation Heat. The group obtained access to information about all individuals who crossed the border of Belarus through official checkpoints. Hacking of the internal network of the Academy of Public Administration of Belarus (so-called Lukashenko’s personal school). November 29, 2021 Cyberattack on the computer network of Belaruskali, one of the largest state-owned companies of Belarus. It used to be one of the largest producers of potash fertilizers in the world. We encrypted the computers and servers of the academy. We set wallpapers on the computers in honor of Roman Bondarenko - a Belarusian who was killed by employees of the Ministry of Internal Affairs after a peaceful protest in the yard of his own home. November 30, 2021 Hacking of the wiretapped conversations within prison cells in Belarus Obtained recordings of conversations from prisoners in Belarus, which were illegally created by prison staff. December 10, 2021 Cyberattack on the computer network of "MogilevTransMash", the largest car company in Belarus The internal network of the enterprise was encrypted, all databases were downloaded. Wallpapers in honor of Andrey Zeltser, a protester killed by KGB employees, were installed on the computers of the staff. January 24, 2022 Cyberattack on the computer network of the Belarusian Railway The primary part of servers, databases, and workstations was encrypted to slow down and disrupt the operations of the Belarusian Railway, through which Russian occupation forces were permitted. Backups were destroyed. Automation and security systems were intentionally NOT affected by the cyberattack to prevent emergency situations. February 27, 2022 Attack on communication nodes and gateways of the Belarusian Railway Restriction on the movement of Russian military equipment through the territory of Belarus towards the borders of Ukraine. November 18, 2022 Cyberattack on the General Radio Frequency Centre, a subdivision of Roskomnadzor We encrypted workstations and extracted over 2 TB of data, which was then passed on to journalists from independent media. This exposure led to the revelation of extensive surveillance by Roskomnadzor of individuals who don't support the Kremlin's policies. May 22, 2023 Cyberattack on "WAGON-SERVICE", Russian logistic company "WAGON-SERVICE" logistics company maintains trains for Russian Railways, which in turn supplies military equipment and ammunition to the front. Workstations were encrypted. All document flow, emails, and data from servers (over 2 TB) were extracted. July 4, 2023 Cyberattack on the Belarusian State University The university's administration is involved in the political suppression of both students and faculty members. Workstations have been encrypted, and more than 3 terabytes of data have been downloaded. All websites were inaccessible. December 31, 2023 Attack on the Belarusian Telegraphic Agency The computer network of the main state propagandists of Lukashenko's criminal regime was attacked. Internal network and main sites hacked. (web archive available here ). Domain controllers affected. Downloaded 90GB of data. Cleared workstations, archives, backups, website servers. April 17, 2024 Cyber Attack on "Grodno Azot" "Grodno Azot" is one of the largest enterprises in Belarus. It's an open joint-stock company, state-run producer of nitrogen compounds and fertilizers. The management of "Grodno Azot" is engaged in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Internal emails, document circulation, and hundreds of workstations have been encrypted. Backups of databases, servers, emails, and document circulation have been destroyed. Security systems and surveillance cameras have been breached. The operation of the boiler room has been disrupted. The official website has been targeted (web archive accessible via link ). April 26, 2024 Breach of Belarusian KGB Website We announced that the Belarusian State Security Committee (KGB) website was hacked in the fall of 2023. The database of the website has been made public, which includes approximately 40 thousand inquiries to the KGB from citizens of various countries between September 2014 and August 2023. May 5, 2024 Second Cyber-Attack on Grodno Azot The management of the Grodno Azot plant engages in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Our group has erased data from many hundreds of worker computers, cleared document circulation, and affected domain controllers and other servers. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment , which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing cyber intelligence, and ensuring cybersecurity.
- Volunteers | Belarusian Cyber Partisans
Anyone who shares the group's main goals and values can become a Cyber Partisan. We are looking for volunteers with various talents and experience! (not just in IT) How to Become a Cyber Partisan We welcome volunteers who share the primary goals and principles of the Cyber Partisan group. Having free time is crucial. You can be a professional specialist, but you won't help the group if you only devote a couple of hours a month to the tasks. No prior experience in IT? No problem. Our group comprises individuals with various specialties such as designers, video editors, managers, and more. There are tasks suitable for anyone who's proactive. Not a citizen of Belarus? No issue. We welcome individuals from various countries , as long as they have the enthusiasm to help us accomplish our objectives. We are looking for volunteers! Even if you lack expertise in the listed specialties, you can join us and aid in testing security applications such as P-Telegram and P-SMS. You don't need IT knowledge , just free time, attentiveness and willingness to help. Any form of participation will bring us closer to victory over dictatorship! Long Live Belarus ❤️ 🔹 Pentester: Penetration Testing & Cybersecurity Software 🔹 System Administrator 🔹 Network Engineer 🔹 Desktop Developers C++ (Windows/Linux/Mac) 🔹 Android Developers (Java) 🔹 Video Editor & Designer 🔹 Grant Writing manager / Grant Writer (IT) How to join 01 Reach out to the Telegram bot @cpartisans_join_bot or email cyberpartisans@protonmail.com with the following details: - How you can help. - Your skills and experience. 02 Do NOT block the bot and anticipate a response. Due to the workload of our administrators, the answer may not be immediately, please wait a while. 03 We will reach out to you as soon as possible.
- Our Security Apps | Belarusian Cyber Partisans
Partisan Telegram (P-TG) and Partisan SMS (P-SMS) - applications for secure communication and news exchange in conditions of dictatorship. Install on Android, iOS, MacOS, Windows, Linux. Our Security Apps Partisan Telegram (P-Telegram) Partisan Telegram is a modification of the well-known messenger program Telegram adapted for the purpose of data protection of politically engaged users living under repressive regimes. After installation, all your chats, contacts, saved messages, and channels are migrated to it. However, P-Telegram distinguishes itself from the original application by enabling the creation of a fake code-password or accessing the messenger along with the standard code-password. This additional code is utilized when forced to grant access to your account by strangers. When you enter a fake code-password, P-Telegram automatically executes pre-set actions, such as concealing specific chats, channels, or even the entire account. The app offers added security features like the capability to: - Read channels without subscribing. - Send messages that vanish once read. - Apply password protection. - Alert chosen contacts in emergencies, and more. Find additional information about P-Telegram on YouTube Answers to common questions and a settings guide Support the project via BTC (Bitcoin) - bc1qw4yqlzgjxnl9dtzchxj7nkjdlw6uz2gdkp0679 Download for Android Download for PC Partisan SMS (P-SMS) Partisan SMS is employed for urgent SMS communication during Internet blackouts. With its help, you can send encrypted SMS messages, the contents of which are decipherable only by those possessing the encryption key. Both you and your correspondent must have the application installed and an encryption key shared beforehand, either in person or through secure methods. Anyone without the key who tries to read the text will only see an unintelligible encryption, including the mobile operator. More about P-SMS on Youtube Settings Guide Support the project (BTC) - bc1qw4yqlzgjxnl9dtzchxj7nkjdlw6uz2gdkp0679 Download for Android Download for iOS P-Telegram reviews Belarus Ukraine A year ago, during interrogation, they tried to get into my Telegram [on the phone]. I ‘helped’ them by entering with the fake passcode and showed them through ([during which] dialogues, channels, etc. were all removed [automatically by PTG behind the scenes]). I guess they did not understand or did not show that they noticed that this was a PTG. They simply tried to get through the two-factor authentication. I was saved by your app. I hid the Ukrainian chats, and those chats in which I sent positions of the occupiers to the Ukrainian Armed Forces. They [Russians] grabbed me on the street and first beat me and then checked my phone. They asked me what the Telegram code was, I gave them the fake passcode. And then they stopped beating me. And after a few minutes they let me go. I think if I'd turned on that new thing where the app goes into a mode where it's like there's no code, maybe I wouldn't have been beaten at all. Cybersecurity Partisan Telegram is NOT ONLY for partisans P-Telegram from Cyberpartisan has advantages over the original Telegram, thanks to which it will come in handy NOT only in countries with... Vartagram has been upgraded to Telegram version 10.5.2 Exciting new features include: 🔹 Creation dates are now displayed not only for channels but also for chats, provided you have access to... Telegram for iOS by Cyberpartisans – Vartagram Externally, Vartagram is NOT masquerading as Telegram (as per Apple's policy), but you can transfer your accounts with all your data into... 1 2 3 4