
Polish medics at unique facility help evacuate Ukraine's wounded soldiers
Rzeszów-Jasionka Airport, about 70km from the western Ukrainian border, in southeastern Poland, was a small regional airport before Russian President Vladimir Putin launched his full-scale invasion of Ukraine on 24 February 2022.
After that, Ukraine closed its airspace, and now the airport has become the key strategic and logistical hub for Nato support to Ukraine. About 95% of arms and other material assistance flows through the airport, which is guarded by Patriot anti-missile batteries.
Rzeszów-Jasionka is also the departure point for Ukrainian officials, including President Volodymyr Zelensky, to travel abroad.
Poland has been one of the strongest supporters of its neighbour Ukraine in its war against Russia.
Apart from being a conduit for the supply of weapons and other materiel to Ukraine, Rzeszów-Jasionka is also a hub for humanitarian assistance to the embattled country, including the evacuation of war-wounded.
Key to that effort is the Polish Center for International Aid (PCPM) Medevac Hub Jasionka, which established a 40-bed hospital close to the Rzeszów-Jasionka Airport in a converted warehouse in August 2022.
Mateusz Stojanowicz, the medical coordinator of the hub, explains that its function is to receive patients who have travelled by road, mainly from the frontlines in the east, through the western Ukrainian city of Lviv — a major humanitarian hub for Ukraine — and to stabilise them before they are flown from Rzeszow-Jasionka to hospitals across Europe for further treatment.
More than 4,000 patients and their families have been transported, most to Germany, followed by Norway, the Netherlands, Sweden, and 12 other countries. Medevac Hub Jasionka is sponsored by the European Union (EU) and is part of the EU's Civil Protection Pool, which comprises 28 states, some of which, like Norway and Turkey, are not members of the EU.
Stojanowicz says the number of daily patients is irregular because it is dependent on the fighting in Ukraine. The hub can manage as many as 50 in a day, although the average has been around 30 to 40 per week. The two wards of the hub together have 40 beds, with room for about 25 more stretchers if necessary.
The main purpose of the hub is to prepare patients for onward travel to Europe.
'We are keeping patients fit to fly,' says Adam Szyszka, the medevac team leader, noting that sometimes patients arrive with difficulties, dressings need to be changed, infections treated and unexpected lapses managed.
'And we have less than 24 hours, and we may have to deal with 50 in one time.'
A logistical feat
Normally, patients stay here no longer than a day before being moved to the special Medevac aircraft of Scandinavian Airlines (SAS) to be transported to hospitals across Europe.
This regular SAS Boeing 737 passenger plane has been converted into a flying hospital, with medical equipment, around 20 hospital beds — some of which are for intensive care patients — and around 30 seats, though the configuration can be changed. Medical personnel from the Norwegian Armed Forces provide the treatment and care on board the aircraft.
The medevac team does not take patients requiring critical care.
'They need to be able to breathe by themselves,' says Stojanowicz. 'If they are critical, they are taken straight to the aircraft, which has six ICU beds.'
If the condition of a patient deteriorates en route to the hub, it will call 911 and order an ambulance or use one of its own to take the patient to a regular hospital in Rzeszów.
'Our job is to be a buffer for the local healthcare system,' says Adams. 'Without this place, these 3,000-plus people would have to go to the local hospitals.'
The medevac team has three regular ambulances as well as an ambulance bus donated by Norway that can take four supine patients and 11 sitting people.
Szyszka says the ambulance bus cuts down on the number of medical staff needed to accompany patients and saves space on the tarmac of the busy airport. Instead of 11 ambulances, one bus can transport 11 patients. The bus has a 220-volt power output, which covers all medical equipment they might need.
A tent can be attached to extend the capacity of the hospital if the hospital is overstretched or has to be evacuated for any reason.
'It was made just for this purpose,' says Szyszka. 'No one was expecting that during the 21st century in the middle of geographic Europe, we were going to face war again, the same like 100 years ago. We have to adapt a crisis management system to the current situation.'
The hub is equipped with enough water and generation capacity to be self-sufficient for three days, in case it's cut off from the water and power grid.
Trauma services
Although the medevac hub treats mainly wounded soldiers, it also handles children suffering from cancer who are being transferred abroad, in large part because of Russia's bombing of hospitals in Ukraine. They are strictly segregated from the war casualties to prevent infections, as the immune systems of cancer patients are compromised.
Psychological counselling is also a major part of the hub's activities, including dealing with the trauma of injury. The Jasionka medevac hub is often the first place where wounded soldiers meet their relatives after their injuries, which is traumatic for all.
The emergency medical team tries to prepare the patients psychologically for the countries they are travelling to by providing them with a small library that includes books written in Ukraine about those countries.
Szyszka says the team made a big breakthrough by hiring a psychologist from Ukraine.
Patients increasing
Stojanowicz says the number of patients is accelerating. Like most others, they thought this would be a quick war, but they are seeing more patients on average this year than last year.
The team is part of the World Health Organization's (WHO's) global emergency medical team system. 'And we are the only WHO team certified in Poland. We have more than 150 medics,' says Szyszka.
He adds that the PCPM Jasionka Medevac hub is 'unique in Europe … [and] … never before anything like this exists in the world'.
PCPM performs three main activities: development aid, humanitarian aid and medical relief assistance, as the Jasionka medevac hub is doing. The WHO emergency medical team (EMT) initiative was conceived to deal mainly with single events such as earthquakes or floods.
'The EMT initiative was designed to provide medical assistance for two weeks, or maximum two rotations per two weeks, one month only.'
'After an earthquake, for instance, with buildings collapsing causing injuries, after one month there is nothing left for medics to do.'
However, this wartime emergency had been going on for three years, turning it into 'the longest EMT mission in the world, in the history of the WHO EMT initiative'.
Whereas the emergency medical team can roughly predict the number of casualties from disasters such as earthquakes, war is unpredictable.
'One day we can have a lower number of patients … and the next week will be a huge peak,' says Szyszka.
Szyszka notes, proudly, that the emergency medical team on duty at any moment — one doctor, two nurses, two paramedics, two ambulance drivers, one psychologist, one pharmacist, an interpreter, admin officer, logistician, hub medical coordinator and hub information coordinator — is at all times ready to deal with an influx of up to 50 people. DM
Peter Fabricius visited Poland, Czechia and Ukraine in June 2025 on an African journalists' study tour sponsored by those three countries and the European Union.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

The Star
9 hours ago
- The Star
Does the BRICS currency threaten the dollar?
Some people may be wondering why the US President has been acting out in recent months, threatening to impose tariffs, at times in a seemingly excessive manner. Economists and political analysts suggest that one of the main reasons for Trump's economic rhetoric is the United States' concern that BRICS countries are initiating a strategic plan to undermine the dollar, a process some observers refer to as "de-dollarisation''. The BRICS grouping includes Brazil, Russia, India, China, and South Africa and a few other countries that joined in the past couple of years. It all started in Kazan, Russia, during the 16th BRICS summit last year when these countries unveiled a symbolic BRICS banknote, unleashing hot debate regarding the US dollar's dominance. At the time, Russian President Vladimir Putin emphasised that the dollar is being used as a ''weapon.'' A year before, meanwhile, Brazilian President Luiz Inácio Lula da Silva proposed creating a new, common currency in South America to reduce its reliance on the dollar in international trade. India has also been advocating for local currency settlements among BRICS nations. The unveiling of the BRICS currency bill, featuring the Taj Mahal, added controversy, as the bloc explores challenging the US dollar's global financial power. Despite research showing that the US dollar remains the primary reserve currency, Trump would take none of that as he continued his criticism of BRICS. "We are going to require a commitment from these seemingly hostile countries that they will neither create a new BRICS currency, nor back any other currency to replace the mighty US dollar or, they will face 100% Tariffs,'' he wrote in his Social Truth platform in January. The statement was similar to the one he posted last November. According to Bloomberg, Brazil and South Africa have criticised Trump separately for his anti-BRICS comments, while India has refrained from responding publicly, signalling that it is walking a fine line in maintaining its relationship with Washington. Would a BRICS currency threaten the dollar? Political analyst Anda Mbikwana offers his insights on the issue. 'The unveiling of a symbolic BRICS banknote at the St. Petersburg International Economic Forum represents far more than ceremonial posturing — it signals a deliberate escalation in the bloc's strategy to construct alternative financial architectures that could fundamentally reshape global monetary dynamics. ''While critics may dismiss this $200 denomination note as mere symbolism, the careful design choices reveal sophisticated strategic thinking. The front's display of founding member flags alongside the reverse featuring partner nations creates a visual narrative of expanding multipolarity that directly challenges the hierarchical nature of the dollar-dominated system. ''This imagery reinforces BRICS' positioning as what President Putin has characterised as 'non-western' rather than 'anti-western' — a crucial distinction that broadens its appeal across the Global South.'' The Technological Infrastructure Behind De-dollarisation ''The symbolic banknote masks more substantive developments in BRICS' financial infrastructure. Russia's emphasis on blockchain-based payment systems and central bank digital currencies represents a technologically sophisticated approach to circumventing traditional dollar-denominated channels. ''These systems offer practical alternatives to SWIFT and correspondent banking relationships that have become increasingly weaponised through sanctions regimes.'' And how does this directly affect South Africa, one might ask. Said Mbikwana: ''For South Africa, this development presents both opportunities and challenges. Greater financial integration within BRICS could reduce transaction costs and currency exposure risks in trade with major partners. ''However, it also requires careful navigation of relationships with Western economies that remain crucial for South African exports and investment. The Reserve Bank's approach to central bank digital currency development will become increasingly strategic as these alternative payment systems mature.'' According to Mbikwana, despite BRICS' banknote symbolic significance, fundamental economic realities limit BRICS' ability to quickly displace dollar dominance. ''The United States retains unparalleled capital market depth, institutional credibility, and network effects that have historically proven resilient to challengers. Moreover, internal coordination challenges within BRICS — particularly between China and India — limit the bloc's ability to present a unified monetary alternative.'' The BRICS symbolic banknote, added Mbikwana, should be understood not as an immediate threat to dollar hegemony, but as a manifestation of longer-term structural shifts in global economic governance. ''Its significance lies not in its current form, but in its representation of institutional momentum toward financial multipolarity. ''American opposition to these developments may paradoxically accelerate their adoption by reinforcing perceptions of dollar weaponisation among emerging economies. ''The ultimate question is not whether BRICS can immediately supplant the dollar, but whether it can create sufficient institutional alternatives to reduce the international community's dependence on dollar-denominated systems. In this context, symbolic gestures serve as important markers of political will and institutional capacity — prerequisites for any serious challenge to existing monetary hierarchies.'' The purpose of the banknote will serve as a payment system designed to facilitate transactions within the BRICS bloc using local currencies and potentially central bank digital currencies. While a BRICS currency could potentially challenge the US dollar's dominance, it's unlikely to replace it entirely soon . There is ongoing development and testing, with a pilot programme potentially appearing before the end of 2026. Some economists are criticising Trump for threatening the BRICS, according to a CBS News report, saying it makes the US look weak. "It isn't a good look, as it indirectly elevates the stature of a non-threat and suggests a lack of confidence in the dollar," Brad Setser, a senior fellow at the Council on Foreign Relations and former Treasury Department economist, wrote on X.


Daily Maverick
13 hours ago
- Daily Maverick
Command line to control room: SA's infrastructure vulnerable to cyberattacks
South Africa is rapidly digitising its infrastructure, but not necessarily legislating protections against cyberattacks at the same pace. This means we run the risk of becoming a frontline where attackers don't merely steal data, but tamper with infrastructure, and our defences are dangerously out of date. On 23 December 2015, about 23,000 residents of western Ukraine found themselves without electricity. The cause? An Advanced-Persistent-Threat (APT) — that is, a non-state actor, often a proxy for a nation-state, hacking into the power grid and turning off local substations. While that incident was later traced to a Russian-backed Advanced-Persistent-Threat, it was the first noted example of a power grid being disabled by cyberattacks. That was almost a decade ago — connectivity, and the corresponding vulnerability, has only accelerated since then. 'In today's world, you don't need to physically access infrastructure to disable it. You can disable it from a continent away. That's the terrifying shift in power we've seen in cyberwarfare,' says cybersecurity firm ESET's chief security evangelist Tony Anscombe. With more than 25 years of cybersecurity experience, Anscombe paints a picture of both a capable state and private sector where not enough attention is being devoted to the threat that cyberattacks pose. Despite producing world-class cybersecurity experts, South Africa's infrastructure is lagging — and increasingly in the crosshairs of both cybercriminals and state-aligned attackers. Prominent breaches such as those at the South African National Defence Force (SANDF), the Government Employees Pension Fund, and the National Health Laboratories Services show that this is no longer just a consumer nuisance — it's costing the country billions, and is a national security vulnerability. The 2023 SANDF breach exposed both classified data and President Cyril Ramaphosa's personal contact details — underscoring how deeply these attacks can cut. (Not) OK computer South Africa has featured prominently in cybersecurity reports over recent years, especially with regard to our continental performance — and not in a good way. South Africa's connected society and developed telecoms make it a prime target for cybercriminals. Interpol's Africa Cyberthreat Assessment Report of 2025 placed us fifth on the continent in terms of suspected scam attacks, and second in terms of cybercrime detections. This underscores both the benefits — and pitfalls — of our connectivity: we can better detect attacks, but we're also more likely to be targeted. While this offers some defensive potential, South Africa's rapid digitisation without legislative guardrails has left critical systems exposed. The infrastructure that governs water flow, power grids and chemical treatments is increasingly vulnerable to manipulation by both cybercriminals and hostile states. If this seems remote, recall that cyberattacks during the Israel-Iran conflict were used to cause actual flooding in Israeli towns. The 2010 Stuxnet virus reportedly sabotaged Iranian nuclear centrifuges. These are not sci-fi threats — they're documented precedents. And they're not limited to global players. 'We've also seen things like the Uganda water treatment system being targeted,' Check Point's global research group manager Eli Smadja said. 'That's a real infrastructure breach. It wasn't publicised much, but the fingerprints were there. If they can go for Uganda, they can go for anyone.' Target-rich environment 'South Africa is actually among the most attacked countries in Africa, but also one of the most capable at detecting and reporting,' continued Smadja. 'That makes it a double-edged sword: threat actors know there's infrastructure to exploit, but defenders are watching. 'We monitor threat activity across Africa. The same techniques used in Ukraine are now being adapted here — and we've observed probes in South African infrastructure,' he said. According to Smadja, this isn't hypothetical. 'We've seen entire playbooks reused — reconnaissance activity, credential stuffing, port scanning — these are standard steps before a full-scale intrusion.' Check Point has also observed code injections targeting legacy industrial control systems. Probes into protocol vulnerabilities, particularly on outdated systems, often come from known botnets and command-and-control servers. 'South Africa's critical infrastructure is particularly attractive because it operates in a hybrid environment: old tech connected to new interfaces. That creates blind spots,' Smadja said. 'You'll often have a 1998-era controller (a system used to control industrial processes) that is remotely accessed through a 2020s web interface. That kind of mismatch is what attackers look for.' South Africa's geopolitical and economic role in the Southern African Development Community may further raise the country's threat profile. 'If you want to send a message or disrupt a region, targeting South Africa's systems — power, water, or logistics — achieves impact,' said Smadja. And not all attackers are foreign. Local ransomware gangs are increasingly mimicking the tactics of Advanced-Persistent-Threats, including delayed payloads, supply chain infiltration, and backup disabling. What this means for you If a substation is hacked, your power could be cut without explanation. If a water system is tampered with, your supply could change without warning — and you'd never know if it was a cyberattack. Even when no data is stolen, critical services can be disrupted, with no public communication or accountability. Infrastructure on the edge 'If you're going to run an industrial system, you should segment the network so that operational tech is not accessible through the corporate side. That's not always happening,' warned Anscombe. Municipal water systems show similar gaps. Check Point has recorded targeted scans and login attempts. 'We've seen reconnaissance scans and access attempts directed at water systems, power grids, logistics. These aren't random — they're calculated,' said Smadja. South Africa's current attack surface: large targets, small defences Despite solid detection capability, South Africa lacks a mandatory breach reporting regime for infrastructure. 'There needs to be an obligation to report. If an entity suffers a cyberattack, there should be a legal requirement to notify a central authority,' said Anscombe. Under the Protection of Personal Information Act (Popia), only personal data breaches must be disclosed. If a water pump is hacked, or a substation disabled, there's no legal requirement to inform the public. 'When systems go dark, people assume it is load shedding. But there is a real risk of an invisible trigger. The threats we track in Africa show real intent,' said Smadja. The law vs the reality South Africa's cyber governance remains fragmented. The Critical Infrastructure Protection Act (Cipa) addresses fences and guards, but not firewalls. The Protection of Personal Information Act protects personal data but offers little for industrial control systems that govern our infrastructure, and despite escalating cyber threats, no dedicated critical information infrastructure law exists. Oversight is split with the State Security Agency (SSA) running the cybersecurity hub without legal enforcement powers, while the Department of Communications and Digital Technologies sets policy but lacks operational control. Experts say this siloed architecture leads to regulatory paralysis. Professor Sizwe Snail ka Mtuze, adjunct professor of cyberlaw at Nelson Mandela University and a key drafter of the Cybercrimes Act, told Daily Maverick that South Africa is struggling with 'a lack of centralised legal authority on cybersecurity.' He notes, 'Right now, you've got POPIA looking at data breaches, SSA managing the hub, and DCDT working on policy, but no one really able to enforce infrastructure-specific protections.' The Information Regulator confirmed this in response to Daily Maverick's queries, warning of systemic non-compliance in the public sector. 'Public entities do not invest in compliance with POPIA as compared to private entities,' the regulator stated. 'In some instances mitigation measures are not implemented, leading to repeat compromises of identified vulnerabilities.' Notably, none of South Africa's major infrastructure operators – including Eskom, Rand Water, or Transnet – reported a single high-risk data breach in the past two years, despite ongoing cyberattacks. This, combined with the Regulator's statements and the data showing cyberattacks in South Africa suggests a worrying culture of under-reporting or non-compliance. In her 15 July Budget vote speech, Minister in the Presidency Khumbudzo Ntshavheni noted: 'We are finalising consultation on the draft cybersecurity strategy' and emphasised a state investment push into advanced interception, AI, and analytics capabilities. But without a unified legal regime or enforcement authority, implementation remains uncertain. The Department of Communications and Digital Technologies and the Information Regulator of South Africa had not responded to Daily Maverick's queries by the time of publication. IoT: innovation or open door? South Africa's infrastructure future hinges on Internet of Things (IoT) — but it is being rolled out without minimum standards. Devices like smart meters and programmable logic controllers, which govern a lot of industrial processes in factories and utilities, are often installed without firmware update paths or password security. 'The problem with IoT is two-fold: there's no update mechanism, and many of these devices are built without even basic password protections,' warned Anscombe. Many were foreign-made and integrated via local vendors — increasing supply chain exposure. What must be done, and urgently Establish a national computer security incident response team with enforcement powers. Mandate disclosure of infrastructure-related cyber breaches. Pass legislation to govern Critical Information Infrastructure. Enforce cybersecurity procurement standards for public infrastructure. 'The adversary only needs one entry point. And if it's your power grid or water supply, the consequences go far beyond business disruption,' said Anscombe. DM


eNCA
14 hours ago
- eNCA
UK to lower voting age to 16 in general elections
LONDON - The British government said Thursday it would allow 16 year-olds to vote in general elections, a landmark change giving the UK one of the lowest voting ages worldwide. The ruling Labour Party pledged to lower the age from 18 ahead of winning power last year. It is among several planned changes to the democratic system. Some argue Britain's democracy is "in crisis", in particular due to low turnout. The voting age change is contentious, however, with critics previously arguing it is self-serving as newly-enfranchised teenagers are seen as more likely to support centre-left Labour. "I think it's really important that 16- and 17-year-olds have the vote, because they are old enough to go out to work, they are old enough to pay taxes, so (they) pay in," Prime Minister Keir Starmer said. "And I think if you pay in, you should have the opportunity to say what you want your money spent on, which way the government should go," Starmer added. The government will have to bring legislation before parliament, where it has a comfortable majority, to make the changes. Only a small number of countries allow 16-year-olds to vote in national elections, according to online databases. They include Austria the first EU country to lower the voting age to 16 in 2007 as well as Argentina, Brazil, Ecuador and Cuba. - 'Democracy in crisis ' - Labour ministers insist the change is intended to "modernise our democracy", while aligning general elections with the existing voting age for elections for the devolved regional parliaments in Scotland and Wales. Other planned changes include introducing automated voter registration which is already used in Australia and Canada and making UK-issued bank cards an accepted form of ID at polling stations. It follows changes to the electoral law introduced by the previous Conservative government which required voters to show a photo ID. The Electoral Commission found that rule led to around 750,000 people not voting in last year's election. Harry Quilter-Pinner, executive director of the Institute For Public Policy Research think tank, called the changes "the biggest reform to our electoral system since 1969", when the voting age was lowered to 18. He noted lowering the voting age and introducing automated voter registration could add 9.5 million more people to the voter rolls. "Our democracy is in crisis, and we risk reaching a tipping point where politics loses its legitimacy," he added, backing the changes. The main Conservative opposition however accused Labour of inconsistency as 16- and 17-year-olds will still not be able to stand as election candidates, buy lottery tickets or alcohol or get married. "This is a brazen attempt by the Labour Party whose unpopularity is scaring them into making major constitutional changes without consultation," the party's communities spokesman Paul Holmes said. By Joe Jackson