The Cyber Police Department of the National Police of Ukraine now accept crypto donations as per the martial law in the country, and have created crypto wallets for the charity. The wallets will be used for the National Guard, National Police, State Emergency Service and State Border Guard Service.
The decision comes right after Ukrainian government and the Come Back Alive NGO started accepting crypto donation from the world. As per the tweet posted by Ukraine Cyber Police on March 09, 2022 the law enforcement organization is also now open to crypto donations.
The accepted cryptocurrency includes Bitcoin (BTC), Ether (ETH), USDT Teter (USDT), Tron (TRX), Polygon (MATIC), Binance Exchange token (BNB) and Polygon (MATIC). The law+ enforcement emphasized this initiative is because of the martial law that’s in place.
The donations will be used for purchasing medicines, basic necessities and to offer medical care for victims of Russian attacks. Right from the beginning of the Russian Ukraine conflict, Ukraine officials and authorities have been seeking financial assistance in multiple ways.
The Ukrainian Government has been raising funds via cryptocurrency donations, and have already received around $60.5 million in Bitcoin, USDT Tether, Ether and other virtual currencies. The donations were raised via a Decentralized Autonomous Organization, UkraineDAO which raised $6.5 million by auctioning the NFT of the Ukrainian flag.
These donations have facilitated Ukraine with the volunteer groups like Come Back Alive as well. Similarly the donations for Ukraine Cyber Police will be used for the victims of the war and for other high priority medical cases.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…
Patch My PC is a widely-used solution that simplifies third-party application management by automating app…
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…