Submit project

Fo consider the project complete the form. Private and contact information will hidden.
Your name
Your Email
Project title
Project amount
Project description
Please, be as precise as possible in your descriptions. This will help to avoid misunderstandings and unnecessary clarifications.
Thank you!
We need to fund this campaign ASAP! Get your friends involved
Use this banner on social media
Together, we can achieve great things!
Завдяки вам закриті тисячі запитів для ЗСУ! Маємо продовжувати!

Rapid Response

Russian agents tried to recruit an Odesit for the attack on the oil pipeline (video)

In Odesa, the Security Service of Ukraine disclosed an espionage ring aide who worked for an anti-Ukrainian center controlled by Russian intelligence and Putin’s administration.

This is the information shared by the SSU on their FB page.

According to the SSU, the man systematically visited the occupied Crimea and Transnistria where he met his brother, a wanted former activist of the so called Kulikovo Pole organization and an acting coordinator of the pro-Russian Odesa “underground”.

”During his voyages, the Odesit first was assigned simple tasks like transferring money to moderators of the anti-Ukrainian communities over social networks, creation of botnets as well as a number of smaller responsibilities,” – the report reads.

“Among other things, he had been introduced to other agents and supervisors of the anti-Ukrainian center who were gradually preparing him for his “mission”. Still, the time for jokes ended when he was offered to perform a terroristic attack on the Odesa–Brody oil pipeline for money,” – the SSU added.

Also, the SSU press-officers mentioned that following his refusal to perform the criminal act he went back to Ukraine where started to energetically cooperate with the Ukrainian law-enforcing services giving testimonies as regards illegal activities of the anti-Ukrainian center members.

Dear friends, in our turn we have to keep in mind that Russians have been taking all efforts and spending huge resources on their main idea fix, spreading the contagion of the “Russian world” wherever it is possible. And we can prove our usefulness in resisting the aggressor. Within the Rapid Response initiative, we raise funds to buy necessary equipment the state fails to provide in time or just cannot supply due to other reasons, for our military units fighting in the front line. Why us and why we should do this? Because to make our forthcoming victory closer we need to share our efforts and stand together as one. So, dear friends, do not hesitate to join in! The enemy is not going to neutralize themselves on their own!

Donate to other projects
Founds raised Purchase in progress

Rapid Response

Quick response to military requests and timely delivery of needed item/s to military positions.

15 300 000 UAH (387 620 USD) needed
98% raised
Read more

Partners

Реквізити ПриватБанку для переказу у гривнях
Миколаївський обласний благодійний фонд “РЕГІОНАЛЬНИЙ ФОНД БЛАГОЧЕСТЯ”
ПАО КБ ПриватБанк
ЄДРПОУ: 36143302
МФО: 305299
IBAN-код: UA343052990000026000011709917
Призначення платежу: Благодійний внесок. “Оперативне реагування”
USD
Beneficiary: Mykolayiv Regional Charitable Foundation “Regional Foundation Blagochestya”
IBANcode: UA583052990000026007011702069
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
Beneficiary bank: Privatbank
50, Naberezhna Peremogy Street, Dnipropetrovsk, 49094, Ukraine
Swift code: PBANUA2X

Intermediary bank: JP Morgan Chase Bank,New York ,USA
Swift code: CHASUS33
Correspondent account: 001-1-000080
Description: Charitable donation for ‘Rapid Response’ project
or
Intermediary bank: The Bank of New York Mellon, New York, USA
Swift code: IRVT US 3N
Correspondent account: 890-0085-754
Description: Charitable donation for ‘Rapid Response’ project
EUR
Beneficiary: Mykolayiv Regional Charitable Foundation “Regional Foundation Blagochestya”
IBANcode: UA703052990000026002041702959
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
Beneficiary bank: Privatbank
50, Naberezhna Peremogy Street, Dnipropetrovsk, 49094, Ukraine
Swift code: PBANUA2X

Intermediary bank: Commerzbank AG ,Frankfurt am Main, Germany
Swift code: COBADEFF
Correspondent account: 400886700401
Description: Charitable donation for ‘Rapid Response’ project
PLZ
Beneficiary: Mykolayiv Regional Charitable Foundation "Regional Foundation Blagochestya"
IBAN Code: UA363052990000026006001705679
Name of the bank: JSC CB "PRIVATBANK", 1D HRUSHEVSKOHO STR., KYIV, 01001, UKRAINE
Bank SWIFT Code: PBANUA2X
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
CORRESPONDENT BANK: Bank Pekao/Grupa Pekao S.A., Warsaw, Poland
Account in the correspondent bank: PL13124000013140533111120301
SWIFT Code of the correspondent bank: PKOPPLPW
Description: Charitable donation for "Rapid Response" project.
GBP
Beneficiary: Mykolayiv Regional Charitable Foundation “Regional Foundation Blagochestya”
IBANcode: UA583052990000026007011702069
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
Beneficiary bank: Privatbank
50, Naberezhna Peremogy Street, Dnipropetrovsk, 49094, Ukraine
Swift code: PBANUA2X

Intermediary bank: JP Morgan Chase Bank,New York ,USA
Swift code: CHASUS33
Correspondent account: 001-1-000080
Description: Charitable donation for ‘Rapid Response’ project
or
Intermediary bank: The Bank of New York Mellon, New York, USA
Swift code: IRVT US 3N
Correspondent account: 890-0085-754
Description: Charitable donation for ‘Rapid Response’ project

Press about us