NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Africa

  • MIL-OSI Africa: Afreximbank reports strong performance for Q1 2025 in line with expectations

    Source: Africa Press Organisation – English (2) – Report:

    Afreximbank reports strong performance for Q1 2025 in line with expectations The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period CAIRO, Egypt, May 21, 2025/APO Group/ — African Export-Import Bank (“Afreximbank” or the “Group”) (www.Afreximbank.com) has released the consolidated financial statements of the Bank and its subsidiaries for the three months ended 31 March 2025. Financial Highlights Afreximbank Group delivered satisfactory financial performance for the first quarter of 2025, meeting expectations with solid profitability, strengthened liquidity and a resilient capital base. This performance provides a springboard for the Bank to continue playing its pivotal role of advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development in the months and years ahead. Net interest income grew by 4.53% to US$411.2 million compared to prior year, driven by growth in interest earning assets, complemented by effective management of borrowing costs, helping the Bank to cushion the marginal decline in total interest income due to softening benchmark rates. Fee income from Guarantees and Letters of Credit saw robust growth of 47% and 36% respectively, partially offsetting lower advisory fees to contribute to total unfunded income of US$26.9 million for Q1-2025. While this represented a 7.41% decrease from US$29.0 million in Q1 2024, the strong performance in Off-balance sheet assets is in line with the Bank’s strategy to grow unfunded business. The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period. The Group’s total assets and contingent liabilities increased by 6.4%, reaching US$42.7 billion as of 31 March 2025, up from US$40.1 billion at FY’2024. On-balance sheet assets grew by 4.85% to US$37.0 billion, driven primarily by a 58% surge in cash balances to US$7.4 billion, while Off-balance sheet assets i.e. letters of credit and guarantee volumes increased by a 19% to reach US$5.7 billion at the end of Q1-2025. Net loans and advances closed Q1-2025 at US$27.8 billion, down from the FY2024 closing position reflecting early repayments from certain customers on account of improved foreign currency balances position of some sovereign borrowers. Importantly, the Loan Asset Quality remained strong, with the Non-Performing Loans (NPL) ratio at 2.44%, a modest increase from 2.33% at FY’2024 – well below the Bank’s strategic NPL ceiling of 4%. Driven by inflationary pressures and growing personnel costs, operating expenses rose by 23% to reach US$75.4 million by 31 March 2025. Despite this, Afreximbank Group maintained a healthy Cost-to-Income Ratio of 16%, below its strategic range of 17-30%. Afreximbank’s liquidity profile strengthened considerably, with liquid assets now comprising 20% of total assets, up from 13% at the close of FY’2024. This higher liquidity position was as a result of successful fund-raising, coupled with loan repayments received during the quarter. Shareholders’ funds increased by 3.4%, reaching US$7.5 billion, driven by strong internally generated capital of US$215.4 million in addition to new equity investments under the second General Capital Increase (GCI II) programme. Operating Highlights In line with the Afreximbank strategic objective of driving Industrialisation and export development, the Bank and the Government of Kenya ratified a number of initiatives designed to support the development Industrial Parks (IPs) and Special Economic Zones (SEZs) in Kenya under the US$3 billion Kenya country programme. These projects which include Dongo Kundu Industrial Park in Mombasa and Naivasha SEZ II in Mai Mahiu, are key components of Kenya’s Vision 2030 plan to boost export manufacturing and industrialisation. Afreximbank’s support for these initiatives will specifically enhance infrastructure development, attract investment, and strategically position Kenya as a key hub for African and global commerce. The rollout of the Pan-African Payments and Settlement System (PAPSS) continues to gain momentum with KCB Group in Kenya and Bank of Kigali in Rwanda launching the platform, becoming the first banks in their respective countries to offer seamless, instant, and affordable cross-border payments in local currencies across Africa. Aligned with its mandate to promote Global Africa following the recognition of the African Diaspora as the 6th region of Africa, the Bank further cemented its expansion and presence in the Caribbean with the historic groundbreaking ceremony to kick off the construction of the first ever Afreximbank African Trade Centre (AATC) outside of Africa in Bridgetown, Barbados. AATC Barbados will also host its regional office. The Barbados AATC is an authentic icon of trade embodying the ambition, resilience, and influence of leading commercial cities in Africa and the Caribbean that serve as dynamic focal points for commerce, fostering regional and global trade connections, and is expected to enhance intra-and extra-African trade, with a focus on countries of the Global South. Mr. Denys Denya, Afreximbank’s Senior Executive Vice President, commented: “Our QI 2025 results, which were in line with expectations, reflected a strong and resilient financial performance, notwithstanding continued macroeconomic challenges. With solid profitability growth, a strengthened liquidity position, and a well-capitalised balance sheet, the Group is firmly positioned to continue playing a pivotal role in advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development.” Highlights of the results for the Group are shown below:

    Income statement Financial Metrics

    Q1-2025

    Q1-2024

    Gross Income (US$ million)

    784.9

    753.8

    Operating Income (US$ million)

    474.2

    423.5

    Net Income (US$ million)

    215.4

    178.7

    Return on average assets (ROAA)

                2.38%

    2.19%

    Return on average equity (ROAE)

    12%

    12%

    Cost-to-income ratio

    16%

    15%

    Balance sheet financial metrics

    Q1-2025

    FY-2024

    Total Assets (US$ billion)

    37.0

    35.3

    Total Liabilities (US$ billion)

    29.5

    28.1

    Shareholders’ Funds (US$ billion)

    7.5

    7.2

    Net asset value per share (US$)

    71,671

    69,695

    Non-performing loans ratio (NPL)

    2.44%

    2.33%

    Cash/Total assets

    20%

    13%

    Capital Adequacy ratio (Basel II)

    26%

    24%

    Distributed by APO Group on behalf of Afreximbank. Media Contact: Vincent Musumba Communications and Events Manager (Media Relations) Email: press@afreximbank.com Follow us on: X: https://apo-opa.co/43pfUK5  Facebook: https://apo-opa.co/43uKQbW  LinkedIn: https://apo-opa.co/4jhrbSL  Instagram: https://apo-opa.co/43DKyk2 About Afreximbank: African Export-Import Bank (Afreximbank) is a Pan-African multilateral financial institution mandated to finance and promote intra- and extra-African trade. For over 30 years, the Bank has been deploying innovative structures to deliver financing solutions that support the transformation of the structure of Africa’s trade, accelerating industrialisation and intra-regional trade, thereby boosting economic expansion in Africa. A stalwart supporter of the African Continental Free Trade Agreement (AfCFTA), Afreximbank has launched a Pan-African Payment and Settlement System (PAPSS) that was adopted by the African Union (AU) as the payment and settlement platform to underpin the implementation of the AfCFTA. Working with the AfCFTA Secretariat and the AU, the Bank has set up a US$10 billion Adjustment Fund to support countries effectively participating in the AfCFTA. At the end of December 2024, Afreximbank’s total assets and contingencies stood at over US$40.1 billion, and its shareholder funds amounted to US$7.2 billion. Afreximbank has investment grade ratings assigned by GCR (international scale) (A), Moody’s (Baa1), China Chengxin International Credit Rating Co., Ltd (CCXI) (AAA), Japan Credit Rating Agency (JCR) (A-) and Fitch (BBB). Afreximbank has evolved into a group entity comprising the Bank, its equity impact fund subsidiary called the Fund for Export Development Africa (FEDA), and its insurance management subsidiary, AfrexInsure (together, “the Group”). The Bank is headquartered in Cairo, Egypt. For more information, visit: www.Afreximbank.com Forward-Looking Statements: The Bank makes written and/or oral forward-looking statements, as shown in this presentation and in other communications, from time to time. Likewise, officers of the Bank may make forward-looking statements either in writing or during verbal conversations with investors, analysts, the media, and other key members of the investment community. Statements regarding the Bank’s strategies, objectives, priorities, and anticipated financial performance for the year, constitute forward-looking statements. They are often described with words like “should”, “would”, “may”, “could”, “expect”, “anticipate”, “estimate”, “project”, “intend”, and “believe”. By their very nature, these statements require the Bank to make assumptions that are subject to risks and uncertainties, especially uncertainties related to the financial, economic, regulatory, and social environment within which the Bank operates. Some of these risks are beyond the control of the Bank and may make actual results that are obtained to vary materially from the expectations inferred from the forward-looking statements. Risk factors that could cause such differences include regulatory pronouncements, credit, market (including equity, commodity, foreign exchange, and interest rate), liquidity, operational, reputational, insurance, strategic, legal, environmental, and other known and unknown risks. As a result, when making decisions with respect to the Bank, we recommend that readers apply further assessment and should not unduly rely on the Bank’s forward-looking statements. Any forward-looking statement contained in this presentation represents the views of management only as of the date hereof and they are presented for the purpose of assisting the Bank’s investors and analysts to understand the Bank’s financial position, strategies, objectives, priorities, anticipated financial performance in relation to the current period, and, as such, may not be appropriate for other purposes. The Bank does not undertake to update any forward-looking statement, whether written or verbal, that may be made from time to time, by it or on its behalf, except as required under applicable relevant regulatory provisions or requirements.

    Text copied to clipboard.

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Security: Lackawanna, New York, Man Going to Prison for His Role in Kidnapping Conspiracy Attempting to Force Sister to Marry in Yemen

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    BUFFALO, N.Y. – U.S. Attorney Michael DiGiacomo announced today that Waleed Abughanem, 33, of Lackawanna, NY, who was convicted of misprision of felony, was sentenced to serve 36 months in prison by U.S. District Judge John L. Sinatra, Jr.

    Assistant U.S. Attorneys Charles M. Kruly and Maeve E. Huggins, who handled the case, stated that Abughanem is the son of Khaled Abughanem and the brother of Adham Abughanem. On September 8, 2021, Khaled and Adham Abughanem flew from Buffalo, NY, to Guadalajara, Mexico to kidnap Victim 1, who is the daughter of Khaled and the sister of Adham and Waleed. Between September 10, 2021, and April 6, 2023, Waleed, Khaled and Adham Abughanem conspired to transport Victim 1 from the Western District of New York to Cairo, Egypt, and then to Sanaa, Yemen, where they confined Victim 1 for approximately 16 months with the purpose of marrying her to a man not of her choosing.

    Waleed Abughanem knew Victim 1 was being held involuntarily, and during some of this period, he was present in Yemen. When he was not present in Yemen, Waleed Abughanem instructed his wife to monitor and supervise Victim 1. In December 2022, Waleed Abughanem traveled from Yemen to the United States. When questioned by U.S. Customs and Border Protection as to the whereabouts of his siblings, Waleed Abughanem told the CBP Officer that the Victim was in the United States. By making a false statement, Waleed Abughanem concealed that Victim 1 had been kidnapped and was being involuntarily held in Yemen.

    Khaled and Adham Abughanem were previously convicted by a federal jury at trial and are awaiting sentencing.

    Waleed Abughanem’s sentencing is the result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, and the U.S. Department of State’s Diplomatic Security Service, under the direction of Diplomatic Security Director Carlos Matus and Deputy Assistant Secretary Paul Houston. Additional assistance was provided by the Lackawanna Police Department, under the direction of Chief Mark Packard, Customs and Border Protection, under the direction of Director of Field Operations Rose Brophy, and CPB in Boston, Massachusetts.

    # # # #

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Global: Eldest daughters often carry the heaviest burdens – insights from Madagascar

    Source: The Conversation – Africa – By Claire Ricard, Research Fellow at CERDI, Université Clermont Auvergne (UCA)

    In recent years, the term “eldest daughter syndrome” has gained traction on social media, as many firstborn daughters share how they had to grow up faster. They often took on caregiving and supportive roles in their families.

    In high-income countries, research shows that these responsibilities often bring long-term benefits. Firstborn daughters – and sons – tend to have higher educational attainment and stronger cognitive skills. They also enjoy better job prospects and salaries.

    Some studies in low- and middle-income countries have found similar positive effects of being the eldest. But others have found the opposite.

    In low-income contexts, economic constraints, cultural practices – such as the involvement of extended families in child-rearing – and inheritance norms may produce very different effects.

    Our research brings new insights by examining these dynamics in Madagascar. It is one of the world’s poorest countries. Birth order there strongly shapes the transition to adulthood, especially for firstborn children.

    Progress in understanding birth order effects in low-income countries is held back by the lack of detailed, sibling-level data. Our study used a dataset that followed individuals from the ages of 10 to 22, capturing their transition from adolescence to adulthood. It collected detailed information on education, work, health, marriage, and migration. The dataset also captured key demographic and educational details for all living full siblings of each respondent.

    We found that firstborns in Madagascar transition into adulthood earlier than their younger siblings. They are more likely to leave school early. They enter the workforce sooner and marry at younger ages. For example, fourth-born children are 1.5 percentage points less likely than firstborns to have never attended school, and 1.1 percentage points more likely to complete post-secondary education.
    Or, third-borns are 23% less likely to marry at age 19 than firstborns.

    Our findings suggest that later-born children benefit from greater parental investment in education. This leads to better schooling outcomes and delayed entry into the labour market.

    Birth order and the transition to adulthood

    In Madagascar, early marriage can be a way for families to ease financial pressure. This is especially true since daughters typically join their husband’s household.

    When it comes to marriage, we find that later-born children are less likely to marry early than their firstborn siblings – especially after age 17. This trend holds for both boys and girls. The difference appears earlier for girls, which aligns with their younger average age at marriage.

    Interestingly, second-born girls are not significantly less likely to marry than their older sisters. This suggests that the eldest daughter does not always bear the full brunt of early marriage risk.
    Firstborn daughters often take on caregiving and household roles. These responsibilities may delay their marriage slightly, as families rely on them for day-to-day support.

    What explains these birth order effects?

    We did not observe significant differences in cognitive skills (like reasoning) or non-cognitive traits (like personality) between firstborns and their younger siblings. Cognitive abilities were assessed through oral and written math and French tests administered at home. These findings contrast with evidence from wealthier countries, where firstborns often outperform their siblings in both cognitive and non-cognitive domains. This may result from greater early parental investment.

    In Madagascar, child development may rely less on direct parental input and more on interactions within the extended family. This is consistent with the concept of fihavanana, a cultural principle that emphasises solidarity and mutual support within the extended family.
    Rather than benefiting mostly from parental quality time, children – especially later-borns – may develop their cognitive and non-cognitive skills through broader social networks. These include relatives and older siblings.

    We also explored whether gender preferences might help explain the differences in outcomes. For instance, if later-born children were disproportionately boys, it could suggest that parents continued having children in hopes of having a son. This could lead to more resources being allocated to that later-born boy. However, our data show an even distribution of boys and girls among later-born children. This suggests that gender-based stopping rules are unlikely to explain the patterns we observe.

    Instead, our findings point to economic constraints as the main driver for firstborns transitioning into adulthood earlier than their younger siblings.

    In poorer households, particularly in rural areas, firstborn children are often asked to help out financially. This often comes at the cost of their own education. Later-born children, by contrast, receive more investment in their schooling. This may compensate for their limited access to other resources, such as land.

    We find no birth order advantage in wealthier households or among families where parents have some education. This again highlights poverty as a key factor shaping these patterns.

    The double burden of being firstborn

    To sum up, our research shows that, in Madagascar, both male and female firstborns face an earlier transition into adulthood. They leave school and enter the labour market sooner. They marry earlier, although firstborn girls may be at slightly lower risk of early marriage than their younger sisters.

    This suggests that, in poor countries, the eldest daughter syndrome is not just about emotional and care-giving responsibilities. It may also come with fewer educational opportunities, greater economic pressure, and an earlier end to childhood. A true double burden for disadvantaged girls. Economic constraints within households largely explain this pattern.

    But the story is not only one of constraint. The absence of differences in cognitive and non-cognitive skills suggests that broader community ties, rooted in fihavanana and extended kinship networks, help cushion the impact of early responsibility. These collective structures may not erase inequality, but they offer a vital source of resilience.

    As policymakers and practitioners look for ways to promote educational equity, it’s worth remembering that some of the most overlooked trade-offs happen within households. Reducing the weight of those trade-offs – through financial support, community-based programmes, or school retention efforts – could help ensure that the future of one child doesn’t come at the expense of another.

    Claire Ricard receives funding from the program “Investissements d’avenir” (ANR-10-LABX-14-01). She’s affiliated to Université Clermont Auvergne, CNRS, IRD, CERDI, F-63000, Clermont-Ferrand and works as an Economist at IDinsight, Rabat, Morocco.

    Francesca Marchetta receives funding from the program “Investissements d’avenir” (ANR-10-LABX-14-01).
    She’s affiliated to Université Clermont Auvergne, CNRS, IRD, CERDI, F-63000, Clermont-Ferrand and with PEP (Partnership for Economic Policy).

    – ref. Eldest daughters often carry the heaviest burdens – insights from Madagascar – https://theconversation.com/eldest-daughters-often-carry-the-heaviest-burdens-insights-from-madagascar-255785

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI Global: Why was St-Pierre-Miquelon targeted by both Donald Trump and a French politician?

    Source: The Conversation – Canada – By Paco Milhiet, Visiting fellow au sein de la Rajaratnam School of International Studies ( NTU-Singapour), chercheur associé à l’Institut catholique de Paris, Institut catholique de Paris (ICP)

    St-Pierre-Miquelon is a small French archipelago off the coast of Newfoundland in the northwestern Atlantic Ocean.

    A map of St-Pierre-Miquelon and its exclusive economic zone.
    (Eric Gaba)

    The territory is just 244 square kilometres with a population of only 5,800. Nonetheless, it’s recently been in the global spotlight due to its inclusion in a wave of tariffs imposed by the United States — and because of a controversial remark from a French presidential hopeful suggesting undocumented migrants should be deported there.

    These recent events provide an opportunity to examine the complex historical and geopolitical entanglements surrounding St-Pierre-Miquelon and involving France, Canada and the United States.

    Last French territory in the region

    Visited by Indigenous Peoples for nearly 5,000 years, St-Pierre-Miquelon became known to European sailors in the late 15th century and was officially claimed for France by Jacques Cartier in 1536.

    The archipelago soon emerged as a strategic base for French fishermen engaged in cod fishing and whaling. Over the ensuing centuries, the islands were fiercely contested by France and Great Britain, changing hands multiple times before being definitively restored to French control in 1816.

    In the 20th century, the archipelago was at the heart of recurring fishing disputes between Canada and France.

    These peaked in 1988 with events that included the seizure of fishing vessels, the recall of ambassadors and violations of existing agreements. Despite historic treaty-based rights, France’s access to fishing grounds declined after Canada’s 1992 cod moratorium and an arbitration ruling that gave St-Pierre-Miquelon an exclusive economic zone of just 38 kilometres around the archipelago, except for a 16-kilometre swath extending 320 kilometres south.

    Both these events had major economic repercussions for St-Pierre-Miquelon.

    Hefty tariff

    Today, the territory’s economy is small — less than 0.001 per cent of France’s GDP — and it depends heavily on public funds and external provisions, particularly from neighbouring Canada.

    Nevertheless, the territory was initially included among the targets of the so-called Liberation Day tariffs announced U.S. President Donald Trump in April. It was singled out with a hefty 50 per cent import duty, temporarily making it one of the most heavily taxed territories in the world, matched only by the landlocked African country of Lesotho.

    Although Trump reversed course and reduced the tariff to 10 per cent a few days later, the original decision was perplexing given the archipelago’s minimal economic weight and its peripheral geopolitical position. Why was this St-Pierre-Michelon targeted so brutally by the Trump administration?

    Halibut geopolitics

    St-Pierre-Miquelon and the U.S. had a balanced trade relationship from 2010 to 2025, until a sharp discrepancy appeared in July 2024. The U.S. imported US$3.4 million worth of goods from the islands, exporting only $100,000 over the entire year.

    This resulted in a reported trade imbalance of 3,300 per cent for the year 2024, which the U.S. government appears to have interpreted as evidence of a 99 per cent tariff imposed by the territory, applying the same flawed algorithm on other countries.

    Why was there such a discrepancy in July 2024?

    According to several reports, this statistical anomaly is actually the result of a long-standing dispute between France and Canada over fishing quotas in the waters surrounding St-Pierre-Miquelon.

    Traditionally, the territory mainly exports seafood products to France and Canada, and almost none to the U.S.

    But in June 2024, a French vessel offloaded several tons of halibut — an expensive fish in high culinary demand — in Saint-Pierre.

    While the catch was made in international waters and was technically legal, it occurred amid ongoing tensions between France and Canada over halibut stocks and the sustainability of the species in the area.

    Because of these tensions, the catch was redirected to the U.S. market and sold for the aforementioned US$3.4 million, an outcome that ultimately triggered the tariffs imposed by the Trump administration.

    France and Canada reached an agreement on halibut later in 2024. But their “halibut war” was just the latest example of recurring disputes between the two countries over fishing quotas in the waters off the Grand Banks of Newfoundland, one of the world’s richest fishing grounds.

    The heavy tariffs imposed by the U.S. on St-Pierre-Miquelon, even though they were swiftly reversed, wer therefore an indirect consequence of the long-standing tensions between France and Canada.

    A new Alcatraz?

    Within days of St-Pierre-Miquelon recovering from the tariff shock, it was once again thrust into the spotlight.

    This time, Laurent Wauquiez, a moderate right-wing presidential contender in France, suggested migrants under deportation orders known as obligations de quitter le territoire français — or OQTF — should be given two options: either be detained in St-Pierre-Miquelon or return to their countries of origin.

    It’s not the first time politicians have proposed deporting prisoners to French overseas territories.

    The suggestion is aligned with France’s historical use of these territories as sites for penal colonies, most notably in Cayenne in French Guyana and New Caledonia in the South Pacific.

    Wauquiez’s remarks were widely condemned as contemptuous and colonial in tone, including by members of the government.

    In response, local authorities in St-Pierre-Miquelon tried to capitalize on the controversy by launching a humorous media campaign that reappropriated the OQTF acronym.

    Social media ads from St-Pierre-Miquelon officials on the deportation proposal by Laurent Wauquiez.
    (Compiled by Paco Milhiet)

    Their goal was to shift the narrative and highlight the archipelago’s appeal: low unemployment, strong public safety, outstanding natural landscapes and a peaceful, family-friendly quality of life — and, hopefully, free from hefty American tariffs.

    Paco Milhiet does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Why was St-Pierre-Miquelon targeted by both Donald Trump and a French politician? – https://theconversation.com/why-was-st-pierre-miquelon-targeted-by-both-donald-trump-and-a-french-politician-256662

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI United Kingdom: Award-winning author to hold talk at Central Library

    Source: Scotland – City of Aberdeen

    An international award-winning author will be hosting a free talk this Saturday at Aberdeen Central Library.  

    Leila Aboulela will discuss her latest book ‘A New Year’, released as part of this year’s World Book Night, as well as talking about her career, inspirations and love of reading and writing.  

    Councillor Martin Greig, Aberdeen City Council’s culture spokesperson, said: “We are delighted to welcome such a distinguished author to our library.  

    “Leila’s work is hugely influential and insightful and I encourage everyone to come along and be inspired.” 

    Leila Aboulela said: “I am delighted to be back at the central library. Here in the early 1990s, my ambition to become a writer was first ignited.  

    “I attended creative writing workshops and author events which introduced me to the works of Scotland’s top writers. And of course I borrowed and read lots of books. I also made friends at the library, lifelong friends. The library will always be one of my favourite places in Aberdeen.” 

    The talk will be followed by a book signing, and copies of Leila’s books will be available to purchase.  

    Born in Cairo, Egypt, and brought up in Khartoum, Sudan, Leila began her literary career after moving to Aberdeen. Her work has received critical recognition for its depiction of the interior lives of Muslim women and the exploration of identity, migration and Islamic spirituality.  

    An Afternoon with Leila Aboulela will be held on Saturday 24 May at 2:30pm at Aberdeen Central Library. Booking is required to attend this event. To reserve a place, please email libraryevents@aberdeencity.gov.uk or phone 01224 070707.  

    Image credit: Rania Rustom 

    MIL OSI United Kingdom –

    May 22, 2025
  • MIL-OSI Africa: Eldest daughters often carry the heaviest burdens – insights from Madagascar

    Source: The Conversation – Africa – By Claire Ricard, Research Fellow at CERDI, Université Clermont Auvergne (UCA)

    In recent years, the term “eldest daughter syndrome” has gained traction on social media, as many firstborn daughters share how they had to grow up faster. They often took on caregiving and supportive roles in their families.

    In high-income countries, research shows that these responsibilities often bring long-term benefits. Firstborn daughters – and sons – tend to have higher educational attainment and stronger cognitive skills. They also enjoy better job prospects and salaries.

    Some studies in low- and middle-income countries have found similar positive effects of being the eldest. But others have found the opposite.

    In low-income contexts, economic constraints, cultural practices – such as the involvement of extended families in child-rearing – and inheritance norms may produce very different effects.

    Our research brings new insights by examining these dynamics in Madagascar. It is one of the world’s poorest countries. Birth order there strongly shapes the transition to adulthood, especially for firstborn children.

    Progress in understanding birth order effects in low-income countries is held back by the lack of detailed, sibling-level data. Our study used a dataset that followed individuals from the ages of 10 to 22, capturing their transition from adolescence to adulthood. It collected detailed information on education, work, health, marriage, and migration. The dataset also captured key demographic and educational details for all living full siblings of each respondent.

    We found that firstborns in Madagascar transition into adulthood earlier than their younger siblings. They are more likely to leave school early. They enter the workforce sooner and marry at younger ages. For example, fourth-born children are 1.5 percentage points less likely than firstborns to have never attended school, and 1.1 percentage points more likely to complete post-secondary education. Or, third-borns are 23% less likely to marry at age 19 than firstborns.

    Our findings suggest that later-born children benefit from greater parental investment in education. This leads to better schooling outcomes and delayed entry into the labour market.

    Birth order and the transition to adulthood

    In Madagascar, early marriage can be a way for families to ease financial pressure. This is especially true since daughters typically join their husband’s household.

    When it comes to marriage, we find that later-born children are less likely to marry early than their firstborn siblings – especially after age 17. This trend holds for both boys and girls. The difference appears earlier for girls, which aligns with their younger average age at marriage.

    Interestingly, second-born girls are not significantly less likely to marry than their older sisters. This suggests that the eldest daughter does not always bear the full brunt of early marriage risk. Firstborn daughters often take on caregiving and household roles. These responsibilities may delay their marriage slightly, as families rely on them for day-to-day support.

    What explains these birth order effects?

    We did not observe significant differences in cognitive skills (like reasoning) or non-cognitive traits (like personality) between firstborns and their younger siblings. Cognitive abilities were assessed through oral and written math and French tests administered at home. These findings contrast with evidence from wealthier countries, where firstborns often outperform their siblings in both cognitive and non-cognitive domains. This may result from greater early parental investment.

    In Madagascar, child development may rely less on direct parental input and more on interactions within the extended family. This is consistent with the concept of fihavanana, a cultural principle that emphasises solidarity and mutual support within the extended family. Rather than benefiting mostly from parental quality time, children – especially later-borns – may develop their cognitive and non-cognitive skills through broader social networks. These include relatives and older siblings.

    We also explored whether gender preferences might help explain the differences in outcomes. For instance, if later-born children were disproportionately boys, it could suggest that parents continued having children in hopes of having a son. This could lead to more resources being allocated to that later-born boy. However, our data show an even distribution of boys and girls among later-born children. This suggests that gender-based stopping rules are unlikely to explain the patterns we observe.

    Instead, our findings point to economic constraints as the main driver for firstborns transitioning into adulthood earlier than their younger siblings.

    In poorer households, particularly in rural areas, firstborn children are often asked to help out financially. This often comes at the cost of their own education. Later-born children, by contrast, receive more investment in their schooling. This may compensate for their limited access to other resources, such as land.

    We find no birth order advantage in wealthier households or among families where parents have some education. This again highlights poverty as a key factor shaping these patterns.

    The double burden of being firstborn

    To sum up, our research shows that, in Madagascar, both male and female firstborns face an earlier transition into adulthood. They leave school and enter the labour market sooner. They marry earlier, although firstborn girls may be at slightly lower risk of early marriage than their younger sisters.

    This suggests that, in poor countries, the eldest daughter syndrome is not just about emotional and care-giving responsibilities. It may also come with fewer educational opportunities, greater economic pressure, and an earlier end to childhood. A true double burden for disadvantaged girls. Economic constraints within households largely explain this pattern.

    But the story is not only one of constraint. The absence of differences in cognitive and non-cognitive skills suggests that broader community ties, rooted in fihavanana and extended kinship networks, help cushion the impact of early responsibility. These collective structures may not erase inequality, but they offer a vital source of resilience.

    As policymakers and practitioners look for ways to promote educational equity, it’s worth remembering that some of the most overlooked trade-offs happen within households. Reducing the weight of those trade-offs – through financial support, community-based programmes, or school retention efforts – could help ensure that the future of one child doesn’t come at the expense of another.

    – Eldest daughters often carry the heaviest burdens – insights from Madagascar
    – https://theconversation.com/eldest-daughters-often-carry-the-heaviest-burdens-insights-from-madagascar-255785

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI United Kingdom: Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings

    Source: United Kingdom – Government Statements

    News story

    Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings

    Joint statement from the Panel co-chairs, Lord Collins of Highbury, Parliamentary Under Secretary of State for Foreign, Commonwealth and Development Affairs and H.E. Salah Ahmed Jama, Deputy Prime Minister, Federal Government of Somalia

    Joint statement:

    “Today marks the first meeting of the High-Level Panel on Social Protection in Fragile and Conflict-Affected Settings. And the beginning of our six-month mandate.

    Nearly three-quarters of the world’s extreme poor live in fragile settings, where crises are lasting longer, forcing more people from their homes, and contributing to migration.

    When floods, cyclones and droughts hit, when conflict breaks out, when economic shocks destroy livelihoods, social protection can provide a first line of defence, an effective locally led solution that enables the most vulnerable people to withstand, survive, recover from crisis and rebuild their lives at home. One that reduces the need for humanitarian response.

    But despite its proven potential, it is often overlooked in the fragile and conflict-affected settings where it is needed most.

    Over the next six months, the Panel will gather and review lessons from across sectors and regions – including through a forthcoming global public enquiry. As co-chairs, our goal is to come up with bold, practical recommendations that can drive meaningful change.”

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Email the FCDO Newsdesk (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom –

    May 22, 2025
  • MIL-OSI Africa: Government proposes fuel levy increase

    Source: South Africa News Agency

    For the first time in three years, government has proposed an inflation-linked increase to the general fuel levy.

    “For the 2025/26 fiscal year, this is the only new tax proposal that I am announcing. It means from 4 June this year, the general fuel levy will increase by 16 cents per litre for petrol, and by 15 cents per litre for diesel,” Minister of Finance Enoch Godongwana said on Wednesday, in Parliament.

    The general fuel levy has remained unchanged for the past three years to provide consumers with relief from high fuel price inflation. 

    Re-tabling the 2025 Budget Review, Godongwana said unfortunately, this tax measure alone will not close the fiscal gap over the medium term.

    “The 2026 Budget will therefore need to propose new tax measures, aimed at raising R20 billion. We have allocated an additional R7.5 billion over the medium-term expenditure framework (MTEF), to increase the effectiveness of the South African Revenue Service (SARS) in collecting more revenue.

    “Part of this allocation will be used to increase collections from debts owed to the fiscus. SARS has indicated that this could raise between R20 billion to R50 billion in additional revenue per year,” the Minister said.

    Another part of the additional allocation to SARS will be used to improve modernisation.

    This will include targeting illicit trade in tobacco and other areas, which should boost revenue over the medium term.

    “As SARS utilises this investment to raise additional revenue, which I believe can be at least R35 billion, the R20 billion to close the current revenue gap will not have to be raised through taxes.

    “Madam Speaker, let me call on every South African, be they individuals, small business operators or large corporates, to honour their tax obligations and contribute to building a better and more equitable nation,” the Minister said.

    He thanked all the taxpayers that continue to pay their taxes while emphasising that government does not take taxpayers for granted.

    “As a government, we know that we must earn the taxpayer’s trust every day, by spending public money with care and ensuring that every rand collected is spent on its intended purpose.

    “We recognise the urgent need to do more to achieve this goal. We are not deaf to the public’s concern about wasteful and inefficient expenditure.

    “Our commitment to collect taxes must be matched by better efficiency in how that money is spent. It must be matched by much stricter oversight that quickly identifies problems and provides timely solutions when things go wrong,”  the Minister explained.

    Expansion of the zero-rated basket withdrawn

    Meanwhile, as a result of the withdrawal of the proposed increases in the VAT rate, the expansion of the zero-rated basket, which was included to cushion poorer households from the VAT rate increase, falls away.

    Last month, the Minister requested the Speaker of the National Assembly to maintain the Value-Added Tax (VAT) rate at its current level of 15% , reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.

    “Madam Speaker, compared to the March estimates, tax revenue projections have been revised down by R61.9 billion over the three years. This reflects the reversal of the VAT increase and the much weaker economic outlook.

    “In this difficult environment, it remains vital that we still take actions to increase revenue to protect and bolster frontline services, while expanding infrastructure investments to drive economic activity,” the Minister said. –SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Operation Vulindlela key to economic growth

    Source: South Africa News Agency

    In an ongoing effort to grow the economy, government will continue to implement growth enhancing structural reforms as part of Operation Vulindlela.

    “Madam Speaker, a bigger, faster-growing economy, and the larger fiscal resources that come with it, are the key to building up the fiscal room we need to meet more of our developmental goals,” Minister of Finance, Enoch Godongwana, said on Wednesday during the re-tabling of the 2025 Budget Review, in Parliament.

    Through the first phase of Operation Vulindlela, bold and far-reaching reforms were implemented in the network sectors and the visa regime.

    “As a result, numerous economic bottlenecks have eased, new investments unlocked, and the growth potential of the economy enabled. Yet the economy still faces constraints,” the Minister said.

    Operation Vulindlela is a joint initiative of the Presidency and the National Treasury to accelerate the implementation of structural reforms and support economic recovery. 

    The unit monitors progress and actively supports implementation. Its aim is to fast-track the implementation of high impact reforms, addressing obstacles or delays to ensure execution on policy commitments.

    The first phase of Operation Vulindlela aimed to reduce power cuts, fix the transport system, lower data costs, increase water supply, attract skills and support tourism.

    The second phase of Operation Vulindlela, launched by President Cyril Ramaphosa earlier this month, will not only prioritise new areas for implementation but will also deepen the implementation of current reforms.

    Upcoming reforms will focus on making it easier to find work and hire people – particularly by addressing spatial inequalities, using cities to drive economic activity and improve municipal service delivery.

    The second phase will therefore focus on the following areas:

    • Seeing-through existing reforms in energy, water, logistics and in the visa regime.
    • Improving the performance of local government. This includes professionalising utilities, appointing suitably qualified people to senior positions, and reviewing the local government fiscal framework.
    • Harnessing digital transformation, in order to drive the adoption of digital technologies in government and build digital public infrastructure for use by all South Africans.
    • Addressing the apartheid legacy of spatial inequality. Reforms will include changes to housing policy and accelerating the release of publicly owned land and buildings. This will also entail clearing the backlog of title deeds for affordable housing, and a comprehensive regulatory review aimed at removing barriers to the development of low-cost housing.

    READ I Phase two of Operation Vulindlela to further drive reforms, economic growth

    “Tackling these structural constraints will ensure that impediments to faster growth are removed,” the Minister said. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Government programmes do empower inmates – Minister Groenewald

    Source: South Africa News Agency

    Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.

    “Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said. 

    The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.

    The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes. 

    These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society.
    The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria. 

    This as the international community also celebrated the 10th anniversary of the rules. 

    The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected. 

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.

    In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration. 

    “In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.

    He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025. 

    The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”

    The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.

    “Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained. 

    He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.

    “We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.” 

    He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Improving efficiencies in government spending

    Source: South Africa News Agency

    Work is underway to enhance government’s budget process after expenditure reviews identified tens of billions of rands in potential savings from poorly performing or inefficient programmes that can be redirected in future budgets.

    “Going forward, underperforming programmes will be closed as the 2026 Medium-Term Expenditure Framework (MTEF) budget process undergoes redesign,” Finance Minister Enoch Godongwana said on Wednesday, during the re-tabling of the 2025 Budget Review in Parliament.

    In its Budget Overview, National Treasury said if government achieves significant savings from implementing the recommendations of these reviews, it may mitigate the need for additional tax measures in the 2026 Budget.

    Changes to improve the budget process will be implemented over time. 

    These reforms will be designed to strengthen government and institutional commitment to fiscal sustainability, refine budget prioritisation and the functioning of budget structures, and improve data systems and capital budgeting, monitoring and reporting.

    “When an economy underperforms, as ours has over the last decade, it generates less tax revenue, while requiring increased social spending, widening budget deficits and accelerating debt accumulation.

    “To be successful, our strategy of maintaining fiscal discipline, while investing in growth, demands that we prioritise high-impact expenditures. These are expenditures that deliver economic returns, while eliminating inefficiencies, wastage and leakage that too often plague government’s spending,” the Minister said.

    To tackle this, National Treasury has undertaken expenditure reviews, looking at more than R300 billion in government spending since 2013, with the aim of identifying duplications, waste and inefficiencies.

    “We found potential savings of R37.5 billion over time through improved oversight and operational changes through these reviews.

    “New reforms will target infrastructure planning and implementation across provinces and municipalities. A data-driven approach to detect payroll irregularities will replace the more costly method of using censuses,” the Minister said.

    This initiative will cross-reference administrative datasets to identify ghost workers and other anomalies across government departments.

    “Part of the goal of these initiatives is to also remove the regulatory burden on business. To be successful, not just technical solutions are required. Sustained political backing, at the highest levels, is needed to overcome departmental resistance and to protect whistleblowers who expose irregularities and wastage.

    “I am happy to say that this political backing has already come from President Cyril Ramaphosa, Deputy President Paul Mashatile, as well as my Cabinet colleagues.

    “The President has also undertaken to establish a committee between the Presidency and Treasury to identify wasteful, inefficient and underperforming programmes.

    “I call on Ministers, MECs, DGs, HoDs and every official responsible for public funds to embrace these efforts and play their part,” Godongwana said. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Attaining economic growth must be SA ‘obsession’

    Source: South Africa News Agency

    Global economic developments, including raised tariffs and trade wars, have lowered South Africa’s 2025 economic growth prospects from a predicted 1.9% Gross Domestic Product (GDP) growth in March down to a revised 1.4% in May.

    This is according to Finance Minister Enoch Godongwana who delivered the Budget Speech in Parliament on Wednesday.

    “[Much] has changed since our last appearance in this House. The most troubling changes are the global economic developments which have, in the short space of two months, already had a significant impact on the domestic economic outlook. The global economy is facing heightened trade tensions and elevated policy uncertainty with worrying economic consequences.

    “As a small, open economy, South Africa is dependent on global trade and financial inflows. This makes us particularly exposed to the global economic developments that I have just outlined.

    “As a result, we now estimate real GDP to grow at 1.4% in 2025. This is lower than the 1.9% we projected in March. Over the next two years, we project real GDP growth to rise moderately to 1.6% in 2026 and 1.8% in 2027,” Godongwana said.

    Risks to South Africa’s economic outlook also remain elevated going into the future.

    “These include the worsening global outlook, weaker-than-expected growth in the fourth quarter of 2024, the persistence of logistics constraints and higher borrowing costs.

    “These developments are a vivid reminder that we must urgently turn the tide on our economic prospects and get our fiscal affairs in order,” he said.

    South Africa’s downward revision is not unique with the global economy also reacting to trade tensions.

    “The International Monetary Fund now projects global growth at 2.8% in 2025. This is 0.5 percentage points lower than the January estimate.

    “Similarly, global trade is projected at 1.7% in 2025, which is also much lower than the January estimate. At the same time, inflation expectations are now above central bank targets in many advanced and emerging market economies. And new trade barriers may raise inflation and prolong the cycle of higher interest rates,” he noted.

    With these challenges arising, government’s vision of fostering faster inclusive growth remains anchored on four pillars:

    • Maintaining macroeconomic stability,
    • Implementing structural reforms,
    • Improving state capability, and
    • Accelerating infrastructure investment.

    “Faster, inclusive growth that creates jobs is the only path towards a more prosperous South Africa.

    “Attaining this growth must be our national obsession. We all have a stake and a responsibility to work towards this goal,” Godongawana asserted. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Godongwana relays government spending plans for the medium term

    Source: South Africa News Agency

    Finance Minister Enoch Godongwana has told Parliament that addressing spending pressures to restore “critical frontline services and invest in infrastructure” is key to improving access to services such as health and education.

    It is for this reason, Godongwana revealed, that over the medium term, government spending, excluding interest, will reach at least R6.69 trillion.

    “The provincial education sector baseline over the 2025 MTEF [Medium-Term Expenditure Framework]  is R1.04 trillion, and R9.5 billion will be added over the medium term to keep teachers in classrooms and hire more staff. An additional R10 billion has been added to the baseline as announced during the March 12 budget to expand access to early education is kept unchanged.

    “This will increase the ECD [early childhood development] subsidy from R17 per child per day to R24. The extra funding will also support increased access to ECD for 700,000 more children, up to the age of five years,” the Minister said on Wednesday.

    The budget for the provincial health sector will reach some R845 billion over the medium term to facilitate in part, the employment of hundreds of doctors who have already completed their in-service training. 

    “This budget will be increased by R20.8 billion over three years to employ 800 post-community service doctors and essential goods and services and reduction of accruals. This increase will also assist the sector in addressing personnel budget pressures,” he said.

    Withdrawal of troops

    Godongwana said funding for the deployment of South African National Defence Force (SANDF) troops in the Democratic Republic of the Congo will be reconfigured.

    This in light of the announcement that the troops – who were there as part of the Southern African Development Community Mission in the Democratic Republic of Congo – will be withdrawing from the East African country.

    “[The] R5 billion we had proposed to allocate to the Department of Defence for its participation in the SADC mission in the DRC is reduced. But the allocation for 2025/26 has been increased from R1.8 billion to R3 billion.

    “This will cover the immediate costs of an orderly and safe withdrawal of our troops and mission equipment,” he said.

    The spending allocations for early retirement, allocations for the Passenger Rail Agency of South Africa (PRASA) and the municipal trading entity reforms announced earlier this year remain “but at a slightly lower level than anticipated in the March 12 budget”.

    “The spending choices we are proposing today demonstrate the government’s determination to bolster the state capability needed to deliver quality, reliable and sustainable core services,” Godongwana said. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Social grant increases remain in place in Budget 3.0

    Source: South Africa News Agency

    Wednesday, May 21, 2025

    Increases to all social grants, barring the Social Relief of Distress (SRD) grant, will not be affected by the re-tabled budget.

    This according to National Treasury’s 2025 Budget Overview released on Wednesday.

    The number of social grant beneficiaries – excluding those receiving the SRD grant – is expected to rise to 19.3 million people by March 2028.

    The grant increases for 2025/26 are as follows:

    • Old age grant will increase from R2185 to R2315
    • War veterans grant will increase from R2205 to R2335
    • Disability grant will go up from R2185 to R2315
    • Foster care grant rises from R1180 to R1250
    • Care dependency grant will increase from R2185 to R2315
    • Child support grant will go up from R530 to R560
    • The grant-in-aid will increase from R530 to R560 

    “The increase in the social grants budget of R1.6 billion in 2025/26 remains. The temporary COVID-19 Social Relief of Distress grant will be extended until 31 March 2026, with R35.2 billion allocated to maintain the current R370 per month per beneficiary, including administration costs,” National Treasury said.

    While delivering the Budget Speech in Parliament on Wednesday, Finance Minister Enoch Godongwana said government is “actively exploring various options to better integrate” the SRD grant with employment opportunities.

    “This includes considering a job-seeker allowance and other measures, as part of the review of Active Labour Market Programmes. 

    “Our goal is to not only provide immediate relief. It is also to create pathways to employment, empowering our citizens to build better futures for themselves and their families,” Godongwana said. – SAnews.gov.za

    Share this post:

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Infrastructure investment aimed at propelling SA’s future

    Source: South Africa News Agency

    Infrastructure investment remains a key component in driving economic growth and government has maintained its R1 trillion allocation for infrastructure investment over the medium term to support this growth.

    This according to Finance Minister Enoch Godongwana, who delivered the Budget Speech in Parliament on Wednesday.

    “[Quality] infrastructure investment expands the productive capacity of the economy and responds to the diverse needs of the citizens. Infrastructure is also a rich source of jobs in construction, engineering, and related industries across a range of skill levels.

    “It is for these reasons that infrastructure is the fourth pillar of the growth strategy, and this budget demonstrates our resolve to change the composition of spending from consumption to investment. Allocations towards capital payments remain the fastest-growing area of spending by economic classification. Public infrastructure spending over three years will exceed the R1 trillion mark,” Godongwana said.

    Spending will focus on “maintaining and repairing existing infrastructure, building new infrastructure, and acquiring equipment and machinery” primarily in transport and logistics, energy and water and sanitation.

    “Of the R402 billion for transport and logistics, R93.1 billion is for the South African National Roads Agency to keep the 24 000-kilometer national road network in active maintenance and rehabilitation. R53.1 billion is for the maintenance and refurbishment of provincial roads.

    “R66.3 billion is allocated to PRASA, out of which R18.2 billion is for the rolling stock fleet renewal programme and R12.3 billion is provisionally allocated for the renewal of the signalling system. The spending will sustain progress in rebuilding the infrastructure to provide affordable commuter rail services. This will enable PRASA to increase passenger trips from 60 million in 2024/25 to 186 million by the end of the MTEF [Medium Term Expenditure Framework] period.

    “The energy sector will invest R219.2 billion on strengthening the electricity supply network, from generation to transmission and distribution. The water and sanitation sector will spend R156.3 billion on expanding our water resource and service infrastructure, including dams, bulk infrastructure to service mines, factories and farms,” Godongwana explained.

    Reforms for private sector participation

    The Minister announced that new regulations for public-private partnerships (PPPs), which were gazetted earlier this year, are expected to take effect next month.

    “These will reduce the procedural complexity of undertaking PPPs, increasing the deal flow and allowing government to leverage its limited resources to fast-track infrastructure provision. The National Treasury has developed enabling guidelines and frameworks to support the new regulations.

    “Specifically, the unsolicited proposals framework will create clear rules for managing proposals from the private sector. And the framework for fiscal commitments and contingent liabilities will strengthen fiscal risk governance. These guidelines and frameworks will be published in the next few weeks,” he said.

    Furthermore, the process of issuing the first infrastructure bonds in 2025/26 remains in place.

    “We are also exploring alternative financing instruments to allow pension funds, commercial banks, development banks and international financial institutions to participate in financing our infrastructure plans.

    “These reforms are how we plan to leverage infrastructure investment to ease supply side constraints to the economy and improve access to social services the people get,” Godongwana said.

    Employment boost

    Meanwhile, in the 2025 Budget Overview, National Treasury said additional funding of some R8.8 billion has been allocated to public employment programmes (PEPs).

    “Although the number of people employed was 16.8 million in the first quarter of 2025, South Africa’s unemployment rate remained very high at 32.9%.

    “Public employment programmes are crucial to address persistently high unemployment,” National Treasury noted.

    Key beneficiaries for the additional funding include:

    • The Department of Basic Education: R5.8 billion for the basic education schools employment initiative.
    • The Department of Sport, Arts and Culture: R350 000 000 for the creative industry stimulus.
    • The Department of Trade, Industry and Competition: R1.3 billion for the Social Employment Fund.

    “In addition, National Treasury and the Presidency, working with other state institutions, have begun a comprehensive review of active labour market programmes, PEPs and the social support system to improve efficiency and effectiveness.

    “With these efforts, government hopes to make significant strides in reducing unemployment,” the overview read. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Ramaphosa, Trump meeting all set for early evening, SA time

    Source: South Africa News Agency

    President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office. 

    The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.

    The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.

    According to The Presidency of SA,  President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.

    At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.

    President Ramaphosa is expected to depart from the White House at 6:30pm.

    Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.

    The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.

    Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.

    President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.

    In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.

    The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi. 

    They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.

    Meanwhile, President Trump will be flanked by several key officials during his event. 

    These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.

    SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals. 

    President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.  

    A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.

    Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.

    Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.

    Speaking to the media on Tuesday, the President appeared cheerful and optimistic. 

    He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.

    For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: Minister of Finance to deliver budget 3.0

    Source: South Africa News Agency

    Wednesday, May 21, 2025

    Minister of Finance, Enoch Godongwana, will this afternoon, return to Parliament to re-table the 2025 Budget Review.

    This decision follows the Minister’s recent announcement and subsequent request to the Speaker of the National Assembly to maintain the Value-Added Tax rate at its current level of 15 percent, reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.

    “The revised budget will adhere to all established technical processes and consultations as set out in the Money Bills and Related Matters Act. This includes formal consultations with the Financial and Fiscal Commission, thorough consultations with all political parties within the Government of National Unity as well as Cabinet approval before presentation to Parliament,” National Treasury said.

    Godongwana will deliver the 2025 Budget Speech during the National Assembly plenary at the Cape Town International Convention Centre at 2pm.

    The National Treasury has worked on a new fiscal framework that will maintain the trajectory toward debt stabilisation, a crucial element in strengthening our public finances.

    This process included:

    1. Revising economic assumptions using the latest available data.
    2. Generating a updated fiscal projects.
    3. Recalculating revenue projections and tax implications.
    4. Determining appropriate borrowing strategies.
    5. Consolidating these elements into a coherent and sustainable fiscal framework.

      – SAnews.gov.za

    Share this post:

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

    May 22, 2025
  • MIL-OSI Security: U.S. Forces Conduct Strikes Targeting al Shabaab

    Source: United States AFRICOM

    AFRICOM logo PNG_release thumbnail.png

    In coordination with the Federal Government of Somalia, U.S. Africa Command (AFRICOM) conducted airstrikes against al Shabaab on May 17, 2025.

    The airstrikes occurred approximately 200 km north of Mogadishu near Mabaax, Somalia.

    Al Shabaab has proven both its will and capability to attack U.S. forces.

    AFRICOM, alongside the Federal Government of Somalia and Somali Armed Forces, continues to take action to degrade al Shabaab’s ability to plan and conduct attacks that threaten the U.S. homeland, our forces, and our citizens abroad.

    Specific details about units and assets will not be released to ensure continued operations security.

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI: MEXC Partners with TON for Groundbreaking $1 Million Crypto Event

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, today announced an industry-disrupting partnership with The Open Network (TON) that introduces a $1 million reward pool campaign and fundamentally challenges established exchange revenue models. Launching today and running through June 20, the “TON Triumph” campaign eliminates all trading fees on TON pairs while offering staking returns that dwarf typical yields by up to 100 times.

    In an unprecedented move that signals a significant shift in exchange competition strategies, MEXC will offer new users access to staking opportunities with up to 400% APR on TON tokens—creating what analysts describe as the most aggressive user acquisition campaign in the cryptocurrency exchange sector this year.

    “This partnership represents a strategic inflection point for both the TON ecosystem and the broader exchange landscape,” said Tracy Jin, COO of MEXC. “By eliminating all typical entry costs into TON trading for a full month while simultaneously offering returns that outpace all competitors, we’re not simply running a promotion—we’re fundamentally changing how users engage with emerging Layer-1 ecosystems.”

    Campaign Transforms Market Access and Investment Returns

    The 30-day campaign introduces multiple disruptive elements that directly challenge other exchanges’ TON market dominance:

    • Zero-Fee Trading Structure: Complete elimination of fees on TON/USDT, TON/USDC, and TON/EUR spot pairs, TONUSDT futures, and all TON/USDE network withdrawals—removing traditional revenue mechanisms that have defined exchange business models.
    • Industry-Leading APR: New users can stake TON tokens to earn up to 400% APR, positioning the offering at 100 times higher than typical cryptocurrency staking returns and several hundred times above traditional banking products.
    • Democratized Trading Access: Zero-fee structure gives retail traders access to the same economics previously available only to professional and institutional traders, significantly leveling the playing field.
    • Limited-Time, First-Come Allocation: High-yield staking pools operate on a first-come, first-served basis with participants limited to 250 TON tokens per user, creating immediate urgency for early participation.

    The campaign also includes passive rewards of up to 8% daily APR for USDE holders, spot trading rewards from a pool of 32,500 TON, and a futures trading competition with 100,000 USDT in bonuses.

    TON Ecosystem Expansion and Infrastructure Advancement

    This partnership is pivotal for The Open Network, which continues to gain momentum through its connection to Telegram’s 900+ million users and growing developer ecosystem.

    The collaboration represents a significant leap forward in TON’s accessibility and adoption curve. By drastically reducing barriers to entry while providing exceptional incentives, the campaign accelerates the integration of new participants into the TON ecosystem, coinciding precisely with the network’s rapidly expanding technical capabilities and use cases.

    The campaign also showcases MEXC’s platform capabilities, demonstrating advanced infrastructure that can handle zero-fee trading across multiple markets simultaneously while managing high-volume staking operations with variable APR structures.

    Time-Sensitive Opportunity with Global Access

    The $1 million in rewards is available exclusively during the 30-day window, with certain high-value components like the 400% APR staking pool starting on May 21th and operating on a capped allocation basis.
    MEXC has created a streamlined onboarding process that allows new users to complete registration and KYC verification in minutes, with the campaign accessible to eligible participants globally through both web and mobile interfaces.

    About MEXC
    Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto.” Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding.
    MEXC Official Website| X | Telegram |How to Sign Up on MEXC

    About TON
    The Open Network (TON) is a fully decentralized layer-1 blockchain designed for mass adoption. Originally conceived by Telegram and now developed by the open TON Community, the network offers exceptional scalability, accessibility, and ease of use.

    Risk Disclaimer:
    The information provided in this article regarding cryptocurrencies does not constitute investment advice. Given the highly volatile nature of the cryptocurrency market, investors are encouraged to carefully assess market fluctuations, the fundamentals of projects, and potential financial risks before making any trading decisions.

    Source

    Contact:
    Lucia Hu
    lucia.hu@mexc.com

    Disclaimer: This is a paid post and is provided by MEXC. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/81cfe77f-6144-467b-8410-8e577b84fbb9

    The MIL Network –

    May 22, 2025
  • MIL-OSI Europe: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    From 19 to 21 May, the OSCE Secretariat in collaboration with the Government of Andorra, the US Mission to the OSCE, and University of Andorra co-organized the first-ever Model OSCE in Sant Julià de Lòria, Andorra.
    The three-day event brought together 25 young people with diverse backgrounds from Andorra, Algeria, the United States of America, Japan and Morocco, offering them a unique opportunity to strengthen their soft skills and deepen their understanding of peace and security issues through peer-to-peer learning on multilateralism, international relations and diplomacy.
    The programme featured sessions on the OSCE’s mandate, history, structure, and decision-making processes, as well as its co-operation with OSCE Partners. It also included discussions on Finland’s priorities on 2025 Chairpersonship, the Youth and Security Agenda, the role of women in diplomacy and multilateralism, and hands-on training in negotiation and mediation.
    In her opening remarks, Andorra’s Minister of Foreign Affairs, H.E. Imma Tor Faus emphasized the country’s ongoing support of youth engagement in international affairs: “After hosting the OSCE activities in 2022 focused on Youth and Security, today’s event reaffirms Andorra’s strong and ongoing commitment to the OSCE’s Youth and Security Agenda. We are proud to support the efforts of the Office of the Secretary-General, both politically and financially, to advance this vital work. The Model OSCE reflects the values we stand for and aligns closely with our priority of promoting youth participation in international organizations.”
    Omar Cardentey, Head of Public Affairs for the US. Mission to the OSCE also shared his personal experience in working in the multilateral settings and encouraged young participants to never give up or doubt their ability to make an impact.
    The Model OSCE echoed the motto “nothing about youth without youth”, underscoring the crucial role of young people in building sustainable and peaceful societies.
    One participant, Lisa Cruz Lackner from Andorra, captured the spirit of the event: “Capacity-building initiatives like this are more than trainings. They create a unique space for dialogue, understanding, and mutual learning. When we come together with different experiences, perspectives, and identities, we don’t just learn about the issues—we learn how to listen, negotiate, and collaborate beyond borders. These events empower us not only to understand global challenges, but to see ourselves as part of the solution. In a setting like the Model OSCE, you quickly realize that diversity is not a challenge to overcome—it is the key to building more inclusive, effective and lasting approaches to peace and security.”
    Participants also engaged in exchanges with young diplomats and parliamentarians from Andorra and Malta, gaining firsthand insights into diplomatic careers. The event encouraged collaborative learning and dialogue throughout its session.
    The Model OSCE was held as part of the Extra-budgetary Project “Accelerating the implementation of the Youth and Security Agenda in the OSCE region”, which aims to empower young people to shape a more secure and co-operative future across the OSCE region.

    MIL OSI Europe News –

    May 22, 2025
  • MIL-OSI Global: Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star

    Source: The Conversation – Global Perspectives – By Gwen Ansell, Associate of the Gordon Institute for Business Science, University of Pretoria

    We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.

    He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.

    As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.

    Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.

    This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.

    The economist who loved jazz

    Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.

    In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.

    Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.

    Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.




    Read more:
    Zakes Mda on his latest novel, set in Lesotho’s musical gang wars


    The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.

    Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.

    Morojele on drums for Andile Yenana.

    Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.

    His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:

    The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.

    Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.

    Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.

    The accidental writer

    He said in an interview:

    I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.

    In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.

    Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.

    There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”

    In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.

    The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.

    The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.

    For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.

    He was working on his third fiction outing – a collection of short stories – at the time of his death.

    The beauty of his work lives on

    Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.

    Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).

    Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star – https://theconversation.com/morabo-morojele-lesothos-swinging-jazz-drummer-who-became-a-literary-star-257256

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI Global: Israel has promised ‘basic amount’ of food into Gaza − but its policies have already created catastrophic starvation risk for millions

    Source: The Conversation – Global Perspectives – By Yara M. Asi, Assistant Professor of Global Health Management and Informatics, University of Central Florida

    Palestinians wait in line to receive meals in the Jabalia refugee camp in Gaza City, Gaza, on May 17, 2025. Mahmoud ssa/Anadolu via Getty Images

    After 18 months of punishing airstrikes, raids and an increasingly restrictive siege in Gaza, the United Nations on May 20, 2025, issued one of its most urgent warnings yet about the ongoing humanitarian crisis: an estimated 14,000 babies were at risk of death within the next 48 hours without an immediate influx of substantial aid, especially food.

    The assessment came a day after Israel allowed the first trickle of aid back into Gaza following its nearly three-month total blockade imposed on March 2. But on the first day of that resumption, the U.N. Office for the Coordination of Humanitarian Affairs reported that only nine trucks were allowed into Gaza, when around 500 are required every day. The U.N. called it “a drop in the ocean of what is urgently needed.”

    As an expert in Palestinian public health, I and others have long warned about the potentially devastating humanitarian consequences of Israel’s military response to the Hamas attacks of Oct. 7, 2023, given the preexisting fragility of the Gaza Strip and Israel’s history of controlling humanitarian aid into the territory. Many of those worst-case humanitarian predictions have now become reality.

    Israel’s control of food and aid into Gaza has been a consistent theme throughout the past 18 months. Indeed, just two weeks after Israel’s massive military campaign in the Gaza Strip began in late 2023, Oxfam International reported that only around 2% of the usual amount of food was being delivered to residents in the territory and warned against “using starvation as a weapon of war.”

    Yet aid delivery continues to be inconsistent and well below what was necessary for the population, culminating in a dire warning by U.N. experts in early May that “the annihilation of the Palestinian population in Gaza” was possible without an immediate end to the violence.

    Putting Palestinians ‘on a diet’

    Already, an estimated near 53,000 Palestinians have died and some 120,000 have been injured in the conflict. Starvation could claim many more.

    Amid the broader destruction to lives and infrastructure, there is now barely a food system to speak of in Gaza.

    Since October 2023, Israeli bombs have destroyed homes, bakeries, food production factories and grocery stores, making it harder for people in Gaza to offset the impact of the reduced imports of food.

    A handful of trucks loaded with humanitarian aid for the Gaza Strip are seen at the Kerem Shalom crossing in southern Israel on May 20, 2025.
    AP Photo/Maya Alleruzzo

    But as much as things have worsened in the past 18 months, food insecurity in Gaza and the mechanisms that enable it did not start with Israel’s response to the Oct. 7 attack by Hamas.

    A U.N. report from 2022 found that 65% of people in Gaza were food insecure, defined as lacking regular access to enough safe and nutritious food.

    Multiple factors contributed to this preexisting food insecurity, not least the blockade of Gaza imposed by Israel and enabled by Egypt since 2007. All items entering the Gaza Strip, including food, became subject to Israeli inspection, delay or denial.

    Basic foodstuff was allowed, but because of delays at the border, it could spoil before it entered Gaza.

    A 2009 investigation by Israeli newspaper Ha’aretz found that foods as varied as cherries, kiwi, almonds, pomegranates and chocolate were prohibited entirely.

    At certain points, the blockade, which Israel claimed was an unavoidable security measure, has been loosened to allow import of more foods. In 2010, for example, Israel started to permit potato chips, fruit juices, Coca-Cola and cookies.

    By placing restrictions on food imports, Israel has claimed to be trying to put pressure on Hamas by making life difficult for the people in Gaza. “The idea is to put the Palestinians on a diet, but not to make them die of hunger,” said one Israeli government adviser in 2006.

    To enable this, the Israeli government commissioned a 2008 study to work out exactly how many calories Palestinians would need to avoid malnutrition. The report was released to the public only following a 2012 legal battle. Echoes of this sentiment can be seen in the Israeli decision in May 2025 to allow only “the basic amount of food” to reach Gaza to purportedly ensure “no starvation crisis develops.”

    The long-running blockade also increased food insecurity by preventing meaningful development of an economy in Gaza.

    Displaced Palestinians fleeing amid ongoing Israeli military operations in the Gaza Strip arrive in Jabalia in northern Gaza on May 18, 2025.
    AP Photo/Jehad Alshrafi

    The U.N. cites the “excessive production and transaction costs and barriers to trade with the rest of the world” imposed by Israel as the primary cause of severe underdevelopment in the occupied territories, including Gaza. As a result, in late 2022 the unemployment rate in Gaza stood at around 50%. This, coupled with a steady increase in the cost of food, made affording food difficult for many Gazan households, rendering them dependent on aid, which fluctuates frequently.

    Hampering self-sufficency

    More generally, the blockade and the multiple rounds of destruction of parts of the Gaza Strip have made food sovereignty in the territory nearly impossible.

    Even prior to the latest war, Gaza’s fishermen were regularly shot at by Israeli gunboats if they ventured farther in the Mediterranean Sea than Israel permits. Because the fish closer to the shore are smaller and less plentiful, the average income of a fisherman in Gaza has more than halved since 2017.

    Much of Gaza’s farmland has been rendered inaccessible to Palestinians as a result of post-October 2023 actions by Israel.

    And the infrastructure needed for adequate food production – greenhouses, arable lands, orchards, livestock and food production facilities – has been destroyed or heavily damaged. International donors hesitate to rebuild facilities, knowing they cannot guarantee their investment will last more than a few years before being bombed again.

    The latest ongoing siege has only further crippled the ability of Gaza to be food self-sufficient. By May 2025, nearly 75% of croplands had been destroyed, along with significant amounts of livestock. Less than one-third of agricultural wells used for irrigation remain functional.

    Starvation as weapon of war

    The use of starvation as a weapon is strictly forbidden under the Geneva Conventions, a set of statutes that govern the laws of warfare. Starvation has been condemned by U.N. Resolution 2417, which decried the use of deprivation of food and basic needs of the civilian population and compelled parties in conflict to ensure full humanitarian access.

    Human Rights Watch has already accused Israel of using starvation as a weapon of war, and Amnesty International called the most recent siege evidence of genocidal intent.

    The Israeli government in turn continues to blame Hamas for any loss of life in Gaza and has increasingly made clear its aim for Palestinians to leave Gaza entirely.

    Israeli Prime Minister Benjamin Netanyahu has said publicly that Israel was permitting aid now only because allies were pressuring him over “images of mass famine.” This stance suggests that Israel will not soon increase aid beyond what his government deems politically acceptable.

    While there is more evidence than ever before that Israel is using food as a weapon of war, there is also, I believe, ample evidence that this was the reality long before Oct. 7, 2023.

    In the meantime, the implications for Palestinians in Gaza have never been more dire.

    Already, the World Health Organization estimates that 57 children have died from malnutrition just since the beginning of the March 2, 2025, blockade.

    More death is certain to follow. On May 12, the Integrated Food Security Phase Classification, a global system created to track food insecurity, released an alarming report on projections of food insecurity in Gaza.

    It warned that by September 2025, half a million people in Gaza – 1 in 5 of the population – will be facing starvation and that the entire population will experience acute food insecurity at crisis level, or worse.

    Editor’s note: Parts of this story were originally contained in an article published by The Conversation U.S. on Feb. 15, 2024.

    Yara M. Asi does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Israel has promised ‘basic amount’ of food into Gaza − but its policies have already created catastrophic starvation risk for millions – https://theconversation.com/israel-has-promised-basic-amount-of-food-into-gaza-but-its-policies-have-already-created-catastrophic-starvation-risk-for-millions-257181

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI: Flywire Surpasses $320 Million in Past-Due Tuition Collected and 161,000+ Student Enrollments Saved at U.S. Higher Education Institutions

    Source: GlobeNewswire (MIL-OSI)

    Flywire’s Student Financial Software helps U.S. institutions boost enrollment and accelerate cash flow

    Automated payment innovation fuels accelerated adoption of Flywire’s Third-Party Invoicing and 529 Disbursement solutions

    BOSTON, May 21, 2025 (GLOBE NEWSWIRE) — Flywire Corporation (Flywire) (Nasdaq: FLYW) – a global payments enablement and software company – announced today that more than 100 colleges and universities in the United States that use Flywire’s Student Financial Software (SFS) collected more than $320 million in past-due tuition to keep more than 161,000 at-risk students enrolled. These results are part of the ongoing commitment that Flywire is making to its higher education clients in the U.S. to help them accelerate revenue, while optimizing for student success.

    Faced with mounting pressure to create more sustainable revenue streams, U.S. higher education institutions have adopted Flywire’s SFS solution to better streamline the student journey and address education affordability by providing more dynamic payment plans and accelerating past-due collections to help retain students. The return on investment from Flywire’s Collection Management offering of SFS is particularly strong, as it helps institutions avoid the costly process of sending students to collections, which typically charges on average 20% to collect past-due tuition owed. As one example, Purdue University – a Flywire client for cross-border tuition payments and digital 529 disbursements since 2021 – went live with Flywire’s Collection Management offering of SFS in March of 2024 to automate communications and payment plans to collect more past-due tuition faster. Within months, Purdue saved more than 300 students from going to collections, and recovered more than $1 million in revenue that would otherwise have been written off.

    “I can’t imagine how much extra work we’d have to be doing if we were still doing collections the old way. It’s kind of a lifesaver. Our write-offs will go down because of Flywire.” – Chad Lester, Associate Bursar, Account Resolution and Loan Administration, Purdue University

    Ongoing innovation also solves payment challenges around 529 disbursements and third-party payments

    Flywire’s U.S. clients have also begun adopting its third-party invoicing solution, which streamlines the payment experience for third-party sponsors paying a student’s tuition and fees, as well as its 529 disbursements, which digitizes the otherwise manual process of 529 plan payment checks. Since the inception of its 529 solution, Flywire has digitized over $2 billion in tuition payments by eliminating the manual processing of more than 502,000 checks for institutions in the U.S., with more than 750 institutions in the U.S. signed on for the solution. This expansion of these payment capabilities demonstrates Flywire’s commitment to addressing every aspect of the student payment journey, extending its expertise beyond cross-border transactions to deliver comprehensive payment solutions that help clients work smarter.

    “When I first started with Flywire, they were just payments. Now they’ve put 529 solutions in, again a big problem in our university, all the checks. They’ve put in collections and now third-party invoicing. Everything they do makes our jobs easier.” – Janet Hicks, Associate Controller, Student Accounting Services, University of South Florida

    Strengthening partnerships to enhance capabilities for clients and embed deeper within broader education ecosystem

    Flywire directly integrates with a number of leading technology providers, from large ERPs like Ellucian, to Admission and Enrollment Providers like CommonApp, and other software systems. Through these integrations, Flywire is helping institutions improve operational efficiency to ultimately provide better staff and student experiences.

    To strengthen its footprint in the U.S., Flywire has recently partnered with some of the largest and most recognized education technology providers to provide:

    • Tuition insurance through GradGuard to provide Flywire’s higher education clients in the U.S. access to an integrated policy disclosure process that assures greater financial literacy of students and their families
    • Streamlined payment experience through BlackBaud to provide international students enables a seamless payment experience, and help independent schools streamline incoming payments, including tuition and enrollment fees
    • Digital delivery of student loan payments funded and managed by some of the largest banks and loan providers in India, including Credila and State Bank of India   
    • Strengthened international recruitment network of more than 20,000 key recruitment counselors such as IDP, KC Overseas and more to help institutes diversify their recruitment efforts and streamline enrollment from international students.

    Resources

    • Meet with Flywire at NAFSA 2025, May 26 – May 30, Booth #626 and join Flywire’s sessions with NYU, IDP, ICEF, AIRC, INTO and GeNEOus to learn more about how Flywire is powering the global education ecosystem.
    • To learn more about Flywire’s solutions for the U.S. higher education industry, visit here
    • The Flywire Fusion U.S. Education Client Conference & Awards Ceremony is taking place October 20-22 at the Lansdowne Resort in historic Leesburg, Virginia. Save your spot here.

    About Flywire

    Flywire is a global payments enablement and software company. We combine our proprietary global payments network, next-gen payments platform and vertical-specific software to deliver the most important and complex payments for our clients and their customers.

    Flywire leverages its vertical-specific software and payments technology to deeply embed within the existing A/R workflows for its clients across the education, healthcare and travel vertical markets, as well as in key B2B industries. Flywire also integrates with leading ERP systems, such as NetSuite, so organizations can optimize the payment experience for their customers while eliminating operational challenges.

    Flywire supports more than 4,600 clients with diverse payment methods in more than 140 currencies across more than 240 countries and territories around the world. The company is headquartered in Boston, MA, USA with global offices. For more information, visit www.flywire.com. Follow Flywire on X , LinkedIn and Facebook.

    Forward-Looking Statements

    ​​This release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, including, but not limited to, statements regarding Flywire’s expectations regarding the benefits of its education clients and business, Flywire’s business strategy and plans, market growth and trends. Flywire intends such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in Section 21E of the Securities Exchange Act of 1934 and the Private Securities Litigation Reform Act of 1995. In some cases, you can identify forward-looking statements by terms such as, but not limited to, “believe,” “may,” “will,” “potentially,” “estimate,” “continue,” “anticipate,” “intend,” “could,” “would,” “project,” “target,” “plan,” “expect,” or the negative of these terms, and similar expressions intended to identify forward-looking statements. Such forward-looking statements are based upon current expectations that involve risks, changes in circumstances, assumptions, and uncertainties. Important factors that could cause actual results to differ materially from those reflected in Flywire’s forward-looking statements include, among others, the factors that are described in the “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations” sections of Flywire’s Annual Report on Form 10-K for the year ended December 31, 2024 and Quarterly Report on Form 10-Q for the quarter ended March 31, 2025, which are on file with the Securities and Exchange Commission (SEC) and available on the SEC’s website at https://www.sec.gov/. The information in this release is provided only as of the date of this release, and Flywire undertakes no obligation to update any forward-looking statements contained in this release on account of new information, future events, or otherwise, except as required by law.

    Contacts

    Media:
    Sarah King
    Media@Flywire.com

    Investor Relations:
    Masha Kahn
    IR@Flywire.com

    The MIL Network –

    May 22, 2025
  • MIL-OSI Security: Defense News: USS Forrest Sherman Visits Port of Algiers

    Source: United States Navy

    The USS Forrest Sherman (DDG 98) visited Algiers on a port visit this week. The three-day visit demonstrated the ongoing friendship and security cooperation between the U.S. and Algeria, building off prior port visit stopovers in Algiers and Oran in 2023 by the USNS Trenton (T-EPF 5).

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Global: Small Boat: this slim, devastating novel about a real migrant shipwreck reminds us of the cruelty of indifference

    Source: The Conversation – UK – By Fiona Murphy, Assistant Professor in Refugee and Intercultural Studies, Dublin City University

    There’s a particular kind of story that’s rarely executed well – one without heroes, without lessons, without even the cold comfort of a villain you can confidently point at and say: there, that’s the evil. Vincent Delecroix’s Small Boat – a slim, bruising novel translated with quiet precision by Helen Stevenson – is that kind of story.

    Small Boat, which was shortlisted for the 2025 International Booker Prize, centres on a real horror: the drowning of 27 people in the English Channel on November 24 2021. They were crowded into an inflatable dinghy in the dark, reaching out over crackling radio lines, asking – in French, in English, in Kurdish – for help. They didn’t get it.

    What is known – not imagined in Delecroix’s pages – is that both French and British coastguards received their calls. And both hesitated, passing responsibility back and forth like a poisoned parcel. People died while operators discussed jurisdiction. The Cranston Inquiry, established to examine the failures of that night, is ongoing, its transcripts and testimonies peeling back the layers of bureaucratic neglect.

    Delecroix doesn’t give us the migrants’ stories directly. He focuses instead on a fictional French coastguard operator, a woman who spent that night on the radio, doing (or not doing) what her training, her weariness, her own justifications allowed. In the aftermath, she is questioned – not in a court, but in a room filled with mirrors. She faces a policewoman who looks like her, thinks like her, speaks with her same clipped, professional cadence.

    She listens back to recordings of her own voice on the rescue line promising help that would not come, offering assurances she did not believe. She is left to reckon with the unbearable fact that someone, somewhere (was it her?) spoke the words: “You will not be saved.”




    Read more:
    International Booker prize 2025: six experts review the shortlisted novels


    She isn’t especially monstrous. She’s tired. She’s professional. She has a young daughter at home and an ex-partner who sneers at her work. She runs on the beach to decompress. In one of the novel’s most arresting turns, she compares herself to a mass-produced tin opener: efficient, functional, affectless. Delecroix draws her with enough delicacy that we cannot quite hate her. And that, of course, is far more unsettling.

    Reading Small Boat, I thought – as one inevitably does – of Hannah Arendt’s banality of evil. Not evil as grand spectacle or ideology, but as administration, the quiet conviction that one is simply fulfilling a role. Arendt coined the phrase watching the trial of Adolf Eichmann, one of the chief Nazi organisers of the Holocaust. Eichmann organised the trains but claimed never to have hated the passengers. What Arendt saw was not a monster but a functionary – and that, of course, was the point.

    I thought too about my own work as an anthropologist researching forced displacement across Ireland, Turkey and Australia. I’ve sat with people whose lives are shaped not by violence in its cinematic form, but by violence as policy: the hotel room without a kitchen, the letter that never arrives, the bed that’s taken away with no warning.

    I’ve heard a senior Irish official describe the state’s provision of housing and support for asylum seekers as “sufficient”. Meanwhile people, stateless and waiting, are asked to prove their vulnerability again and again until even their grief is suspect.

    Institutional indifference

    The institutionalisation of indifference: that’s the real story here. The smugness of protocols. The liturgy of duty rosters and shift reports. It wasn’t evil that let those people drown in the Channel – it was ordinary people in warm offices, citing rules, filling forms, following scripts.

    We can see the birth of such indifference in policies like the UK’s abandoned Rwanda plan, which casually proposed outsourcing asylum itself, as if refuge were a commodity.

    Delecroix’s brilliance lies in showing how violence at the border is carried out not by villains, but by workers. By women with mortgages, men on night shifts, people who’ve learned to sort calls for help by urgency, credibility, accent. “Sorting,” the narrator explains, “is perhaps the most important part of the job.” Not all distress calls are equal. And the assumption – always lurking, never spoken – is that some lives are more likely to be saved.

    At one point, the narrator’s colleague Julien answers calls from migrants by quoting Pascal: “Vous êtes embarqués.” You are already embarked. A fatalist shrug disguised as wisdom. As if to say: you should have thought of all this before you left. The shrug does the work of a policy, the quotation the work of a wall.

    And yet, the narrator cannot fully perform indifference. She is haunted by the sea. She remembers loving it as a child. Now, it terrifies her. She feels it watching her, pursuing her, wanting to surge past the shore and swallow the continent whole. She runs along the beach to quiet her mind – a run that is almost the same length as the journey those on the dinghy tried to make.

    If Small Boat has a flaw, it’s that it sometimes flirts with making guilt into its own form of lyricism. But this too may be deliberate. It is easier, perhaps, to feel sorry than to feel implicated. And far easier to narrate moral confusion than to prevent its causes.

    What Delecroix has written is not a redemption story. It’s not a psychological thriller. It is a chamber piece for one voice and many ghosts. There are no grand gestures here. Just small refusals, small failures. And the small, flickering boats of each human life, drifting toward – or away from – one another in the dark.

    In a world ever more brutal towards those who flee war, hunger and despair, Delecroix’s novel is a necessary and merciless indictment. It reminds us that the shipwreck is not theirs alone. It is ours too.

    Fiona Murphy does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Small Boat: this slim, devastating novel about a real migrant shipwreck reminds us of the cruelty of indifference – https://theconversation.com/small-boat-this-slim-devastating-novel-about-a-real-migrant-shipwreck-reminds-us-of-the-cruelty-of-indifference-255052

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI Africa: South Africa’s Made By Basketball (MBB) bounce back, record first win in the Basketball Africa League (BAL)

    Source: Africa Press Organisation – English (2) – Report:

    KIGALI, Rwanda, May 21, 2025/APO Group/ —

    On a BAL career night (www.BAL.NBA.com), Pieter Prinsloo recorded a game-high 30 points and 11 rebounds, Teafale Lenard Jr. added 20 points, six rebounds and five assists, and Made By Basketball (MBB, South Africa) defeated Nairobi City Thunder (Kenya) 75-74 when the BAL Nile Conference resumed at BK Arena in Kigali on Tuesday afternoon. MBB overcame an 18-point deficit in the second half and it came down to a dramatic three-pointer from Robinson Opong, his second in the game, to get Sam Vincent’s team one-point ahead with just over three seconds left.

    The Thunder were led by Evans Ganapamo (21 points) and Tylor Ongwae (20 points), but were shooting 36 percent from the floor and could not hold to the lead late in the fourth. It was MBB’s first win in the competition (1-2) as they look for a slot in the upcoming BAL Playoffs and Finals back home in Pretoria (June 6-14). After three games in Kigali, the Thunder (0-3) are still searching for a win.

    In the second game, Al Ahli Tripoli (Libya) beat APR (Rwanda) 90-68, becoming the only undefeated team in the Nile Conference. Jean Jacques Boissy and Naseim Badrush combined for 52 points, 11 rebounds and six steals for Al Ahli, while Obadiah Noel and Chasson Randle scored 18 points each for APR, who were missing Aliou Diarra due to injury. After three games, Al Ahli (3-0) sits on top of the Nile Conference, with APR (2-1) losing their first game in the competition.

    The BAL continues on Thursday when Al Ahli takes on Nairobi at 4 p.m. CAT and APR faces MBB at 7 p.m. CAT.

    POSTGAME PRESS CONFERENCE:

    • MBB vs Nairobi City Thunder (https://apo-opa.co/3YT6kOi) (MBB: Head Coach Sam Vincent; Teafale Lenard Jr.; Thunder: Head Coach Bradley Thomas; Evans Ganapamo)
    • Al Ahli Tripoli vs APR (https://apo-opa.co/3H3wUy0) (Tripoli: Head Coach AbouAbou Charca Joseph Fouad; Deon Thompson; APR: Head Coach James Maye Jr.; Obadiah Noel)

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Africa: African Development Bank’s Adesina Warns of Economic Shockwaves from United States (U.S.) Tariffs, Calls for Strategic Global Engagement

    Source: Africa Press Organisation – English (2) – Report:

    ABIDJAN, Ivory Coast, May 21, 2025/APO Group/ —

    As the United States imposes higher tariffs with global ramifications, African Development Bank Group (www.AfDB.org) President Dr. Akinwumi Adesina has warned that these measures could trigger significant economic disruptions across Africa, affecting numerous nations and accelerating a strategic shift in global partnerships. 

    In an exclusive interview with CNN’s Christiane Amanpour, Dr Adesina revealed that 47 of Africa’s 54 countries will be impacted directly by the new U.S. trade policies, with potential declines in export revenues and foreign exchange reserves. 

    “When those currencies weaken, two things will happen: first, you will find that most of these countries are import-dependent. So, you’re going to find that high inflation becomes a problem,” said Adesina. “And secondly, you find that the cost of actually servicing a lot of their debt, which is foreign currency debt, but in local currencies, is going to get worse.” 

    Almost all African countries have been hit by higher tariffs announced by the Trump administration, with at least 22 nations facing up to a whopping 50 percent for almost all their products. Among the hardest hit countries are Lesotho, Madagascar, Mauritius, Botswana, Angola, Algeria, and South Africa. 

    The impacts of these higher tariffs are further exacerbated by significant cuts to USAID programs, which have already begun affecting access to essential medical supplies and humanitarian services in many countries, raising serious concerns about the future trajectory of U.S.-Africa relations. 

    Africa’s Strategic Response 

    Despite the challenges, Adesina emphasized that Africa cannot afford a trade confrontation with the United States, noting that the continent accounts for only 1.2 percent (approximately $34 billion) of America’s global trade—with a trade surplus of just $7.2 billion. 

    Instead, he proposed a pragmatic three-point strategy for the continent: Engage the U.S. through flexible and constructive trade negotiations, diversify export markets to reduce dependency on any single partner, and accelerate the African Continental Free Trade Area implementation to unlock the potential $3.4 trillion market. 

    He stressed the need to expand Africa’s domestic market and boost domestic savings to develop consumption as a bigger share of its GDP, leveraging its massive population growth. More importantly, the continent must take advantage of the increasing external interest in its natural resources, such as cobalt and lithium, to negotiate a better trade and investment deal. 

    Addressing speculation that Africa may shift more decisively toward China in response to the higher U.S. tariffs, Adesina dismissed any notion of binary alignment. “U.S is a key ally of Africa—and so is China,” he stated. “Africa is building bridges, not isolating itself.” 

    He stressed that Africa seeks balanced, transparent, and mutually beneficial partnerships with all major global players, including the U.S., China, the European Union, and the Gulf states. “I think at the end of the day, we want to make sure that whatever deals that are being done with Africa are transparent, fair, equitable, and led by Africa and in Africa’s interests,” Adesina reiterated. 

    Beyond Aid: Driving Africa’s Self-Reliance 

    Dr. Adesina, who concludes his second and final term as president of the Bank in September, firmly rejected the long-standing paradigm of foreign aid dependency. “The era of aid as we’ve known it is completely gone,” he declared, calling instead for bold investments in domestic resource mobilization, infrastructure, and value-added industrialization. 

    He said aid must be turned into concessional financing to allow multilateral financial institutions like the African Development Bank to do more for the continent by mobilizing more private capital to develop and derisk projects.  

    While Africa represents nearly 20 percent of the global population and under three percent of global GDP, the Bank Group chief pointed to a resilient and transformative growth narrative: ten of the world’s twenty fastest-growing economies are in Africa. 

    He highlighted flagship initiatives under the African Development Bank’s “High 5” agenda that have impacted more than 565 million people through investments in power, food security, industrialization, regional integration, and initiatives to improve the quality of life of the people of Africa. 

    Over the past decade, the African Development Bank has invested more than $55 billion in infrastructure to bolster economic integration across Africa, alongside other critical investments to drive inclusive growth. It is by far the largest financier of infrastructure across Africa. 

    Adesina also cited the great potential of the Mission 300 project, a joint initiative by the World Bank and the African Development Bank to connect 300 million people in Africa to electricity by 2030.  “Because without electricity, what can you do? You can’t industrialize, you can’t add value, you can’t be competitive in the dark,” he said. 

    He highlighted the achievements of the Africa Investment Forum, launched in 2018 by the Bank and eight other partners, saying it has since mobilized more than $225 billion in investment interest to the continent. The Forum is a multi-stakeholder, multi-disciplinary platform that advances projects to bankable stages, raises capital, and accelerates deals to financial closure. 

    Adesina believes that despite its challenges, Africa is the largest greenfield investment destination in the world, and it remains “the investor’s dream.” 

    “We got hydropower. We have a massive youth population that can become the labor force of the world. Sixty-five percent of the arable land left in the world to feed almost 9.5 billion people by 2050 is in Africa, so what Africa does with it will determine the future of food in the world,” he affirmed. 

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI: BitMart Research: Rising Stars in MEME Token Platforms: An In-Depth Look at the Mechanisms and Outlook of Believe and LetsBonk.fun

    Source: GlobeNewswire (MIL-OSI)

    Mahe, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — BitMart Research, the research arm of BitMart Exchange, has released a comprehensive analysis spotlighting two rapidly emerging forces in the MEME token issuance landscape: Believe and LetsBonk.fun. As competition in the meme economy intensifies, these platforms are reshaping token creation through innovative launch mechanics, deep community integrations, and disruptive incentive structures. The report examines Believe’s algorithmic, social-influence–driven token generation on X, and LetsBonk.fun’s seamless in-app token deployment rooted in the Solana ecosystem. With explosive user growth, increasing market capitalizations, and novel monetization models, both platforms are challenging incumbents like Pumpfun and setting new standards for community-led, creator-first Web3 ecosystems.

    1.Believe

    Introduction to Believe

    Believe is a MEME token issuance platform founded by Ben Pasternak. Formerly known as Clout.me—with a “celebrity token” model—the project rebranded to focus squarely on “social assetization.” Its core mechanism allows any user to tweet on X in the format $TICKER+NAME and mention @launchcoin. The system then uses an algorithm to assess the user’s social influence and, if criteria are met, automatically triggers a smart-contract–based token deployment. Approved tokens first enter a bonding-curve issuance phase and receive a $10,000 seed fund from the platform to support the founding team. Once a token’s market capitalization surpasses $100,000, it moves into a liquidity-enhancement phase by migrating to the Meteora protocol for deep market-making support.

    According to the official economic model, the platform applies a 2% transaction fee: 1% is awarded to the token creator as an incentive, 0.1% goes to community evangelists, and the remaining 0.9% funds platform maintenance. This tiered revenue structure both safeguards creators’ core interests and fuels community-driven early promotion, while providing the financial foundation for sustainable platform growth.

    Popular Projects on Believe

    1. LaunchCoin

    As the flagship token of the Believe ecosystem, LaunchCoin is an upgraded iteration of Ben Pasternak’s early PASTERNAK token, fully embodying the brand evolution from Clout.me to the Believe platform. On its first day of trading, LaunchCoin reached a $80 million market capitalization. After weathering market fluctuations, it began a strong recovery on May 11 and has since grown to a $330 million market cap—40× its launch valuation—with over 27,000 unique holders.

    1. Dupe

    Dupe is the ecosystem token for the furniture-affordable–search engine Dupe.com. The platform’s official Instagram boasts 367,000 followers, and its monthly active user base exceeds 1 million. Dupe’s market cap peaked at $70 million and currently hovers around $34 million.

    1. Goonc

    Issued by Pata van Goon—an engineer from the OpenAI tech team—GOONC quickly went viral thanks to its technical-elite endorsement. The token’s market cap once surged to $70 million and now steadies in the $45.5 million range.

    2. LetsBonk.fun

    Introduction to LetsBonk.fun

    LetsBonk.fun is a meme token issuance platform co-launched by BONK—the leading meme project in the Solana community—and Raydium. Positioned as Solana’s LaunchPad + creator-incentive hub, the platform went live on April 26. Its popularity has recently exploded thanks to meme projects like Hosico, Useless, and IKUN. Token issuance is as simple as clicking “Create Token” within the app, though a minimum 2 SOL of liquidity must be provided before the token can be listed for trading on Raydium.

    LetsBonk.fun Revenue Model

    Every trade on the platform incurs a 1% fee, which is allocated to the development fund, BONKsol validators, and BONK buy-and-burn. Specifically:

    • 35% of revenue is used to buy back and burn BONK, implementing a deflationary mechanism
    • 30% is used to purchase and stake BONKsol to secure and provide liquidity for the network
    • 19.2% is directed to an ecosystem development fund
    • 7.6% goes into strategic reserves
    • 7.6% is allocated for technical development and operations (split equally among hiring, growth & development, and integrations)
    • 12% is dedicated to user incentives and marketing, broken down into 4% BonkRewards, 4% marketing, and 4% community-governance support (SBR)

    Between April 29 and May 15, daily revenue surged from roughly 2,000 SOL to 24,000 SOL—a more than 12× increase—while token issuance spiked to nearly 50,000 tokens on May 15 (a 233% rise over average).

    Popular Projects on LetsBonk.fun

    1. Hosico

    Inspired by the Instagram-famous cat with 1.8 million followers and rendered in a Ghibli-style AI aesthetic, Hosico’s token launched at 4 AM and reached a $10 million market cap within its first hour. It later peaked at $60 million and currently sits at around $22 million.

    1. USELESS

    Born from a tweet by BONKGUY on X—“This is a useless currency; it shouldn’t be pumped”—USELESS rode its nihilistic, emotionally charged narrative to rapid fame. Since launch on BONK, its market cap soared to $34 million and now stabilizes at approximately $24 million.

    3. Competitive Analysis: Believe, LetsBonk.fun, Pumpfun, and Others

    Believe’s distinct advantage lies in its X-based token issuance mechanism: projects cannot pre-sell tokens before launch and must rely on secondary-market trading or social-tag purchases. It charges no listing fee, but requires a relatively high entry barrier of roughly 85 SOL, which may slow initial liquidity. In contrast, LetsBonk.fun supports dual issuance both on its own platform and via X, and is tightly integrated with the BONK token; it even returns 10% of fees to liquidity providers upon exit to incentivize deployment. 

    Overall, neither model represents a revolutionary departure from existing MEME-token platforms; they primarily optimize issuance methods and add ancillary features. Although both have recently captured some of Pumpfun’s daily issuance volume, they still lag significantly behind Pumpfun’s overall scale.

    Daily new MEME issuance

    4. Future Outlook

    The MEME-token space is currently crowded with largely homogeneous issuance platforms. While platforms like Believe and LetsBonk.fun may siphon off some of Pumpfun’s short-term hype, long-term sustainability—once speculative capital recedes—will be the market’s true test. To date, Believe has greatly simplified the MEME-token launch process via X, and LetsBonk.fun has created strong ecosystem synergy through deep BONK integration. As market enthusiasm cools and new competitors emerge, their ability to maintain momentum will hinge on whether they can introduce fresh innovations or incubate genuinely “wealth-creating” MEME assets.

    Read the full research article here: 

    About BitMart

    BitMart is the premier global digital asset trading platform. With millions of users worldwide and ranked among the top crypto exchanges on CoinGecko, it currently offers 1,700+ trading pairs with competitive trading fees. Constantly evolving and growing, BitMart is interested in crypto’s potential to drive innovation and promote financial inclusion. New users can register here to unlock an $8,000+ welcome bonus.

    Risk Warning:

    The information provided is for reference only and should not be considered a recommendation to buy, sell or hold any financial asset. All information is provided in good faith. However, we make no representations or warranties, express or implied, as to the accuracy, adequacy, validity, reliability, availability or completeness of such information.

    All cryptocurrency investments (including returns) are highly speculative in nature and involve significant risk of loss. Past, hypothetical or simulated performance is not necessarily indicative of future results. The value of digital currencies may rise or fall, and there may be significant risks in buying, selling, holding or trading digital currencies. You should carefully consider whether trading or holding digital currencies is suitable for you based on your personal investment objectives, financial situation and risk tolerance. BitMart does not provide any investment, legal or tax advice.

    The MIL Network –

    May 22, 2025
  • MIL-OSI Europe: AFRICA/KENYA – Priest dies after being found seriously injured along the Nakuru-Nairobi Highway

    Source: Agenzia Fides – MIL OSI

    Wednesday, 21 May 2025

    Nyahururu (Agenzia Fides) – The Diocese of Nyahururu in Kenya mourns the loss of Fr. John Ndegwa Maina, parish priest of St. Louis Church in Igwamiti.”The Catholic Diocese of Nyahururu announces the passing to eternal glory of Reverend John Maina Ndegwa. He passed away while receiving treatment at St. Joseph Hospital in Gilgil. Further information will be provided in due course. We pray for his soul and his family during this difficult time,” reads an official statement from the diocese.According to local media reports, the priest was found seriously injured on Friday, May 15, on the side of the Nakuru-Nairobi highway, several kilometers from his parish, and was taken to a hospital, where he died upon arrival.According to reconstructions and rumors, which have not yet been officially confirmed, the priest may have been fatally wounded somewhere other than where he was found. The results of the autopsy ordered by the competent authorities to determine the cause of death are expected in the coming hours.Meanwhile, the Catholic community of Igwamiti has gathered in mourning and prayer. Several ceremonies were held last weekend in memory of Father John Ndegwa Maina. (F.B.) (Agenzia Fides, 21/5/2025)
    Share:

    MIL OSI Europe News –

    May 22, 2025
←Previous Page
1 … 199 200 201 202 203 … 464
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress