Category: Africa

  • MIL-OSI Africa: Dr. Rania Al-Mashat Discusses with World Bank Regional Director Advancing Multilateral Cooperation to Enhance Economic Development in Egypt

    Source: APO


    .

    H.E. Dr. Rania Al-Mashat, Minister of Planning, Economic Development, and International Cooperation, held a meeting with Mr. Stephane Guimbert, Regional Director of the World Bank for Egypt, Yemen, and Djibouti, to discuss avenues to strengthen joint cooperation to achieve economic development in Egypt.

    The Minister of Planning, Economic Development and International Cooperation discussed with the World Bank Regional Director the joint efforts to enhance economic development by leveraging the World Bank’s international expertise and capabilities, emphasizing the importance of the partnership with the World Bank Group as a knowledge partner to the Egyptian government. Where joint work is underway to develop a comprehensive implementation plan to achieve economic development in cooperation with ministries and national entities, aiming to support macroeconomic stability, provide development financing, promote industrial development and trade, mobilize foreign direct investment (FDI), and increase investment in human capital.

    H.E. also highlighted the Ministry’s efforts to implement the national narrative for economic development, which includes several pillars such as the preparation of the National Strategy for Industrial Development, which aims to increase exports, and enhance the value-added of manufacturing industries, and expand the contribution of the green economy to the GDP, as well as on enhancing integration and coherence between the FDI strategy and industrial development, supporting the labor market strategy focused on skills, and promote investment in human capital. She pointed out that this document comes within the framework of the effort to formulate a unified development discourse that reflects the state’s priorities, enhances the consistency of macroeconomic policies, and serves as a common reference for the government, international institutions, and development partners.

    The meeting also discussed updates regarding the World Bank’s portfolio, including the Universal Health Insurance Project, the Sustainable Rural Sanitation Services Program, and the Takaful and Karama Program. Discussions also covered the latest developments in the Upper Egypt Local Development Program and the Cairo-Alexandria Trade Logistics Development Project, which is being implemented in cooperation with the National Railways Authority of Egypt (NRA).

    For his part, Mr. Stephane Guimbert, Regional Director of the World Bank for Egypt, presented an overview of a new global health initiative led by the World Bank, which aims to expand basic health coverage to an additional 1.5 billion people worldwide, focusing on middle- and low-income countries. The idea of Egypt joining as a key participant in this initiative was raised in light of its significant progress in health sector reforms, particularly through the implementation of the Universal Health Insurance system, which is considered one of the largest social protection projects in the region.

    Distributed by APO Group on behalf of Ministry of Planning, Economic Development, and International Cooperation – Egypt.

    MIL OSI Africa

  • MIL-OSI Africa: Morocco: Portugal Welcomes Atlantic Initiatives Launched by His Majesty (HM) the King in Favor of Africa

    Source: APO


    .

    Portugal, as an Atlantic country, welcomes the Atlantic Initiatives launched by His Majesty King Mohammed VI in favor of the African continent.

    This position was expressed by the Portuguese Minister of State and Foreign Affairs, Mr. Paulo Rangel, in a Joint Statement signed following his meeting on Tuesday in Lisbon with the Minister of Foreign Affairs, African Cooperation and Moroccan Expatriates, Mr. Nasser Bourita.

    In this Joint Statement, Portugal, as an Atlantic country, thus welcomed the Atlantic Initiatives launched by His Majesty King Mohammed VI in support of the African continent, notably the Initiative of the Atlantic African States Process, the Royal International Initiative to facilitate access of Sahel countries to the Atlantic Ocean, and the Nigeria-Morocco Atlantic African Gas Pipeline Project.

    Rangel also praised the role of the Kingdom of Morocco as a driver of development and a provider of stability in the region and across Africa. In this regard, he commended the reforms undertaken by the Kingdom under the enlightened leadership of His Majesty King Mohammed VI.

    The Kingdom of Morocco and the Republic of Portugal emphasized their positive and constructive roles in maintaining stability, security, and peace in their respective regions. They also reaffirmed their commitment to these principles, as well as to the peaceful resolution of conflicts and respect for the territorial integrity and sovereignty of States, the Joint statement adds.

    The Minister of Foreign Affairs, African Cooperation and Moroccan Expatriates, Mr. Nasser Bourita, paid an official visit to Portugal at the invitation of the Portuguese Minister of State and Foreign Affairs, Mr. Paulo Rangel.

    Distributed by APO Group on behalf of Kingdom of Morocco – Ministry of Foreign Affairs, African Cooperation and Moroccan Expatriates.

    MIL OSI Africa

  • MIL-OSI Africa: Central African Pipeline System Gains Traction as Committee President Returns to African Energy Week (AEW) 2025

    Source: APO

    In line with the African Energy Week (AEW): Invest in African Energies conference’s vision to make African energy poverty history by 2030, Gabriel Mbaga Obiang Lima, President of the Strategic Partnership and Fund Committee for the Central African Pipeline System (CAPS), is returning to this year’s edition as a speaker. Lima’s participation comes as the development of CAPS – an integrated network of downstream and midstream oil and gas infrastructure – is advancing with an aim to enhance energy access, reduce fuel imports and spur industrial growth in Central Africa.

    In July 2025, a significant milestone was achieved when the Central African Economic and Monetary Community, the African Petroleum Producers’ Organization (APPO) and the Central Africa Business & Energy Forum signed a Memorandum of Understanding (MoU) to kick-start a feasibility study for CAPS. The MoU sets the foundation for participation from up to 11 Central African countries in evaluating the project’s viability, regional impact and national contributions. The 6,500km pipeline network will enhance Central Africa’s energy market resilience and affordability by optimizing the exploitation, local beneficiation and distribution of Africa’s estimated 125.3 billion barrels of crude oil and 620 trillion cubic feet of gas resources.

    With APPO finalizing the launch of the multi-billion African Energy Bank with the African Export-Import Bank this year, the organization’s participation in the MoU and interest in CAPS is timely. The MoU not only strengthens regional collaboration but also strategically positions CAPS to be shortlisted for financing from the new bank. Furthermore, with 18 oil-producing APPO member states focused on accelerating the exploitation of hydrocarbon resources, the organization’s involvement in CAPS represents a powerful step toward eradicating energy poverty and enhancing regional energy security. The CAPS project will encompass oil, gas and LPG pipelines, pumping stations, storage terminals, refineries and gas-fired power plants, all contributing to regional energy access and industrial transformation.

    AEW: Invest in African Energies serves as the continent’s premier platform for connecting high-impact African projects such as CAPS with global investors. Under the theme, Invest in African Energy: Positioning Africa as the Global Energy Champion, the event provides a strategic venue for Lima to present updates on CAPS milestones, development timelines and its alignment with Africa’s broader industrialization agenda. With the pipeline set to span various countries such as Angola, Burundi, Cameroon, Chad, Republic of the Congo, Democratic Republic of the Congo, Equatorial Guinea, Gabon, Rwanda and São Tomé & Príncipe, AEW: Invest in African Energies enables Lima to engage directly with policymakers and stakeholders vital to advancing the initiative.

    “As Africa advances its ‘drill baby drill’ agenda, building robust downstream and midstream infrastructure for local energy beneficiation and distribution is critical,” stated NJ Ayuk, Executive Chairman of the African Energy Chamber. “The CAPS project, under Lima’s leadership, is a testament to Africa’s breakthrough in closing infrastructure gaps. Projects like CAPS are essential to lifting 600 million people out of energy poverty and providing access to clean cooking for over 900 million.”

    Distributed by APO Group on behalf of African Energy Chamber.

    About African Energy Week:
    AEW: Invest in African Energies is the platform of choice for project operators, financiers, technology providers and government, and has emerged as the official place to sign deals in African energy. Visit www.AECWeek.com for more information about this exciting event.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: Independent Operators Join Angola Oil & Gas (AOG) 2025 to Discuss Frontier Drilling, Onshore Prospects

    Source: APO

    Angola witnessed a surge in Merger & Acquisitions in recent months, as independent oil and gas companies strengthened their presence across the market. As the country prepares to launch its next licensing round in 2025 and continues promoting acreage available through its permanent offer scheme, this positive momentum is expected to continue. Leading independent oil and gas companies have joined the Angola Oil & Gas (AOG) conference to discuss investment strategies and upcoming projects.  

    John Hamilton, CEO of Panoro Energy, is speaking at AOG 2025 – taking place September 3-4. The company has seen significant success in regional offshore markets, reporting steady production growth in Gabon, Equatorial Guinea and Tunisia this year. In 2025, Panoro Energy also made an offshore oil discovery at the Dussafu block in Gabon. The well contains up to 25 million barrels of recoverable resources and is set to support future production growth at the site. While the company does not have a presence in Angola as of yet, the country offers a wealth of block and partnership opportunities for Panoro Energy, particularly in offshore acreage where the company has extensive expertise.  

    Onshore, companies such as ReconAfrica are making a play for frontier discoveries. The company signed an agreement with Angola’s upstream regulator – the National Oil, Gas & Biofuels Agency – in April 2025 to explore 5.2 million acres in the Etosha-Okavango basin. Signaling ReconAfrica’s entrance into Angola, the deal lays the foundation for a series of exploration activities over the next 24 months. ReconAfrica is also exploring in Namibia, where it has a license covering 6.3 million acres. During AOG 2025, Brian Reinsborough, CEO of ReconAfrica, is expected to shed light into the company’s ongoing exploration activities.  

    Robert Bose, CEO of, Sintana Energy, and Scott Gilbert, CEO of Corcel, are also expected to share insight into onshore exploration in Angola. With a majority interest in Block KON 16 – situated in the onshore Kwanza basin in Angola – Corcel has been working to advance exploration at the block. The company signed two agreements to this affect in 2025, increasing its share in KON 16 to 71.5%. The first agreement was signed with Intank Global DMCC for a 30% stake in the block. The second deal was signed with Sintana Energy in May 2025 for a 5% indirect interest. The transaction seeks to boost exploration activities at the block by mobilizing additional capital for exploration activities planned in 2026. The companies also signed an agreement to evaluate and pursue other exploration and production opportunities in Angola. The partners committed to collaborating on the identification and review of new opportunities.  

    Meanwhile, George Toriola, Chief Strategy Officer at FIRST E&P, is also speaking at AOG 2025. While the company is not yet active in Angola, FIRST E&P has proven industry experience through its strong portfolio of producing assets in Nigeria. The company is exploring regional growth opportunities, seeking to leverage its experience in Nigeria’s onshore and shallow water blocks to unlock additional production opportunities across sub-Saharan Africa. For Angola, which offers a wealth of onshore and shallow water opportunities, this experience stands to support the country’s production goals while creating new opportunities for regional collaboration and trade.  

    Distributed by APO Group on behalf of Energy Capital & Power.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: New Higher Education Minister and Deputy sworn in

    Source: Government of South Africa

    Tuesday, July 22, 2025

    Deputy Minister of Higher Education and Training, Buti Manamela, has been sworn in as Minister of that portfolio in Cape Town this afternoon.

    During the same ceremony, former KwaZulu-Natal (KZN) Premier, Dr Nomusa Dube-Ncube, was sworn in as his deputy.

    The swearing-in ceremony was held at Tuynhuys in the presence of President Cyril Ramaphosa and Deputy President Paul Mashatile.

    Manamela and Dube-Ncube were appointed following the removal of Dr Nobuhle Nkabane from the role of Minister and Higher Education and Training on Monday evening.

    Dube-Ncube was appointed in terms of Section 93 (b) of the Constitution, which allows the President to appoint no more than two Deputy Ministers from outside the National Assembly. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania

    Source: The Conversation – Africa – By Jonathan Salerno, Associate Professor, Colorado State University, Colorado State University

    Protecting livestock in areas where large carnivores (like lions) live is increasingly important as human land use expands, wildlife habitat shrinks, and climatic changes reshape the ways in which humans and wildlife interact. Protecting the carnivores from livestock owners is important too. Intact carnivore populations support more resilient food webs and the ecosystem services they provide.

    It’s not easy for people, livestock, and carnivores to live together without conflict, though. One of the best ways to reduce conflict is to protect livestock like cattle and sheep from being attacked by predators.

    There are various methods to do this, like guarding livestock or erecting fences. That’s all very well for the livestock inside the fences, but do predators simply turn to the nearest unprotected livestock for their meal instead? Are the neighbours’ cattle, sheep, and goats at greater risk? This question hasn’t been explored much by researchers.

    We’re a group of conservation practitioners and scientists who have studied the interactions of carnivores, livestock, and people in Tanzania and elsewhere for decades to try and find solutions to conflict problems.

    Our study area is next to a national park which protects important populations of lion, leopard, hyena, African wild dog, and cheetah. The people who live here have traditionally kept their livestock overnight in enclosures made of acacia-thorn branches. More recently, some of them have built pens, or corrals, from tall chain link fencing. We knew from years working with communities and from previous research that these fortified corrals were effective at keeping livestock safe from predators.

    Our next step was to find out whether this made other nearby livestock less safe.


    Read more: What’s behind the conflict between people and animals in Tanzania


    The results were intriguing. We found that the new enclosures made predation less likely in the nearby traditional enclosures too.

    This type of beneficial spillover effect had yet to be documented in other systems where interventions aim to protect livestock from large carnivores.

    Our results show that in conservation, it’s important to look closely at complex local dynamics. The findings may help explain why there’s so much uncertainty about the effectiveness of various human–wildlife conflict mitigation strategies.

    Beneficial spillover effects

    People who keep livestock in east Africa have long had strategies to keep their animals safe from large carnivores. Sometimes acacia-thorn night enclosures (known locally as bomas), intensive herding practices, and guarding dogs work well.

    Other times, and especially in communities within and adjacent to large, protected carnivore populations, traditional strategies fall short.

    This is the case in Tanzania’s Ruaha-Rungwa Landscape. In our study area adjacent to Ruaha National Park, any pastoralist or agropastoralist (herding and crop farming) household has about a 30% chance of losing one or more animals to predation each year. This is a serious economic loss on top of important cultural and emotional costs.


    Read more: Losing a calf to wolves in Sweden hurts. But if lions take one in Uganda, a farming family’s income is gone


    Lion Landscapes, an organisation that some of us have been running for over a decade, works to support human-carnivore coexistence. Adjacent to Ruaha, we have been partnering with households to build 1.8-metre chain-link corrals. We subsidise them. Households contribute 25% of the cost and some of the labour for construction.

    We analysed about 25,000 monthly reports of livestock predation in fenced and traditional enclosures, using statistical models. There were 846 predation events over nearly four years. Unexpectedly, while we did detect spillover effects, these appeared to be beneficial. Rather than displacing conflicts, fortified enclosures actually conferred protective effects on their traditional-enclosure neighbours.

    For example, households within 50 metres (the minimum observed distance) of a fortified enclosure were half as likely to experience predation compared with distant households 2 kilometres away. And these beneficial effects increased with the number of fortified enclosures in a neighbourhood. Finally, the effects appeared to be durable over time.

    The fortified enclosures were extremely effective. We showed that households could break even after paying for the fence in just a few years through avoided livestock losses. And we know that when domestic animals aren’t being killed, their owners are more tolerant of predators. We didn’t record carnivore killings in this study but it has happened fairly frequently in the area in the past.

    In a few of the world’s human-wildlife conflict systems, where data exist to assess spillover effects, there is evidence that detrimental spillovers do occur. For instance, beehive deterrents may redirect elephants to nearby crop fields, or lethal removal of individual wolves may redirect the surviving pack to prey on adjacent ranches. Nevertheless, these are very under-studied interactions.

    Livestock management and carnivore coexistence

    In systems where humans, livestock, and wildlife overlap and sometimes come into conflict, management strategies too often focus on wildlife. Another option is to reduce whatever attracts wildlife. In the case of large carnivores, this means managing livestock.


    Read more: Livestock are threatened by predators – but old-fashioned shepherding may be an effective solution


    Our results support this approach by demonstrating that management and protection of livestock is fundamental for reducing conflict, and can benefit not only livestock owners but landscape-level coexistence.

    Conservationists and policy-makers need to encourage these practices that benefit people, carnivores, and livestock in shared landscapes.

    – Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania
    – https://theconversation.com/livestock-and-lions-make-uneasy-neighbours-how-a-fence-upgrade-helped-protect-domestic-and-wild-animals-in-tanzania-258113

    MIL OSI Africa

  • MIL-OSI Africa: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.


    Read more: West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.


    Read more: Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.


    Read more: West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.


    Read more: Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    – Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach
    – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Africa

  • MIL-OSI Africa: Learning statistics through story: students get creative with numbers

    Source: The Conversation – Africa – By Johan Ferreira, Professor, University of the Witwatersrand

    Statistics professor Johan Ferreira was feeling overwhelmed by the amount of “screen time” involved in online learning in 2021. He imagined students must be feeling the same way, and wondered what he could do to inspire them and make his subject matter more appealing.

    One of the topics in statistics is time series analysis: statistical methods to understand trend behaviour in data which is measured over time. There are lots of examples in daily life, from rainfall records to changes in commodity prices, import or exports, or temperature.

    Ferreira asked his students to write a short, fictional “bedtime” story using “characters” from time series analysis. The results were collected into a book that is freely available. He tells us more about it.


    Why use storytelling to learn about statistics?

    I’m fortunate to be something of a creative myself, being a professional oboe player with the Johannesburg Philharmonic Orchestra. It’s a valuable outlet for self-expression. I reflected on what other activity could inspire creativity without compromising the essence of statistical thinking that was required in this particular course I was teaching.

    Example of a time series, the kind of data analysed using statistical methods. Author provided (no reuse)

    I invited my third-year science and commerce students at the University of Pretoria to take part in a voluntary storytelling exercise, using key concepts in time series analysis as characters. Students got some guidelines but were free to be creative. My colleague and co-editor, Dr Seite Makgai, and I then read, commented on and edited the stories and put them together into an anthology.

    Students gave their consent that their stories could be used for research purposes and might be published. Out of a class of over 200 students, over 30 contributions were received; 23 students permitted their work to be included in this volume.

    We curated submissions into two sections (Part I: Fables and Fairy Tales and Part II: Fantasy and Sci-Fi) based on the general style and gist of the work.

    The project aimed to develop a new teaching resource, inspire students to take ownership of their learning in a creative way, and support them through informal, project-based peer learning.

    This collection is written by students, for students. They used personal and cultural contexts relevant to their background and environment to create content that has a solid background in their direct academic interests. And the stories are available without a paywall!

    What are some of the characters and stories?

    Student Lebogang Malebati wrote Stationaryville and the Two Brothers, a tale about AR(1) and AR(2). In statistics, AR refers to processes in which numerical values are based on past values. The brothers “were both born with special powers, powers that could make them stationary…” and could trick an evil wizard.

    David Dodkins wrote Zt and the Shadow-spawn. In this story, Zt (common notation in time series analysis) has a magic amulet that reveals his character growth through a sequence of models and shows the hero’s victory in the face of adversity. He is a function of those that came before him (through an AR process).

    Then there’s Nelis Daniels’ story about a shepherd plagued by a wolf called Arma (autoregressive moving average) which kept making sheep disappear.

    And Dikelede Rose Motseleng’s modern fable about the love-hate relationship between AR(1) (“more of a linear guy” with a bad habit of predicting the future based on the past) and MA(1), “the type of girl who would always provide you with stationarity (stability).”

    What was the impact of the project?

    It was a deeply enriching experience for us to see how students see statistics in a context beyond that of the classroom, especially in cases where students reformulated their stories within their own cultural identities or niche interests.

    Three particular main impacts stand out for us:

    • students have a new additional reference and learning resource for the course content

    • new students can refer to the experiences and contextualisation of this content of former students, leading to informal peer learning

    • students engage in a cognitive skill (higher-order and creative thinking) that is not frequently considered and included in this field and at this level.

    In 2024, shortly after the book was published, we asked students in the time series analysis course of that year to read any one of four stories (related to concepts that were already covered in the course material at that point in time). We asked them to complete a short and informal survey to gauge their experience and insights regarding the potential of this book as a learning resource for them.

    The 53 responses we got indicated that most students saw the book as a useful contribution to their learning experience in time series analysis.

    Student perceptions of value of stories. Author supplied, Author provided (no reuse)

    One positive comment from a student was:

    I will always remember that the Random Walk is indeed not stationary but White Noise is. I already knew it, but now I won’t forget it.

    Will you build on this in future?

    It is definitely valuable to consider similar projects in other branches of statistics, but also, in other disciplines entirely, to develop content by students, for students.

    At this stage, we’re having the stories and book translated into languages beyond English. In large classes that are essential to data science (such as statistics and mathematics), many different home languages may be spoken. Students often have to learn in their second, third, or even fourth language. So, this project is proving valuable in making advanced statistical concepts tactile and “at home” via translations.

    Our publisher recently let us know that the Setswana translation is complete, with the Sepedi and Afrikaans translations following soon. To our knowledge, it’ll be the first such project not only in the discipline of statistics, but in four of the official languages in South Africa.

    – Learning statistics through story: students get creative with numbers
    – https://theconversation.com/learning-statistics-through-story-students-get-creative-with-numbers-261198

    MIL OSI Africa

  • MIL-OSI Analysis: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa (2) – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.




    Read more:
    West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.




    Read more:
    Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.




    Read more:
    West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.




    Read more:
    Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Analysis

  • MIL-OSI Analysis: Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania

    Source: The Conversation – Africa (2) – By Jonathan Salerno, Associate Professor, Colorado State University, Colorado State University

    Protecting livestock in areas where large carnivores (like lions) live is increasingly important as human land use expands, wildlife habitat shrinks, and climatic changes reshape the ways in which humans and wildlife interact. Protecting the carnivores from livestock owners is important too. Intact carnivore populations support more resilient food webs and the ecosystem services they provide.

    It’s not easy for people, livestock, and carnivores to live together without conflict, though. One of the best ways to reduce conflict is to protect livestock like cattle and sheep from being attacked by predators.

    There are various methods to do this, like guarding livestock or erecting fences. That’s all very well for the livestock inside the fences, but do predators simply turn to the nearest unprotected livestock for their meal instead? Are the neighbours’ cattle, sheep, and goats at greater risk? This question hasn’t been explored much by researchers.

    We’re a group of conservation practitioners and scientists who have studied the interactions of carnivores, livestock, and people in Tanzania and elsewhere for decades to try and find solutions to conflict problems.

    Our study area is next to a national park which protects important populations of lion, leopard, hyena, African wild dog, and cheetah. The people who live here have traditionally kept their livestock overnight in enclosures made of acacia-thorn branches. More recently, some of them have built pens, or corrals, from tall chain link fencing. We knew from years working with communities and from previous research that these fortified corrals were effective at keeping livestock safe from predators.

    Our next step was to find out whether this made other nearby livestock less safe.




    Read more:
    What’s behind the conflict between people and animals in Tanzania


    The results were intriguing. We found that the new enclosures made predation less likely in the nearby traditional enclosures too.

    This type of beneficial spillover effect had yet to be documented in other systems where interventions aim to protect livestock from large carnivores.

    Our results show that in conservation, it’s important to look closely at complex local dynamics. The findings may help explain why there’s so much uncertainty about the effectiveness of various human–wildlife conflict mitigation strategies.

    Beneficial spillover effects

    People who keep livestock in east Africa have long had strategies to keep their animals safe from large carnivores. Sometimes acacia-thorn night enclosures (known locally as bomas), intensive herding practices, and guarding dogs work well.

    Other times, and especially in communities within and adjacent to large, protected carnivore populations, traditional strategies fall short.

    This is the case in Tanzania’s Ruaha-Rungwa Landscape. In our study area adjacent to Ruaha National Park, any pastoralist or agropastoralist (herding and crop farming) household has about a 30% chance of losing one or more animals to predation each year. This is a serious economic loss on top of important cultural and emotional costs.




    Read more:
    Losing a calf to wolves in Sweden hurts. But if lions take one in Uganda, a farming family’s income is gone


    Lion Landscapes, an organisation that some of us have been running for over a decade, works to support human-carnivore coexistence. Adjacent to Ruaha, we have been partnering with households to build 1.8-metre chain-link corrals. We subsidise them. Households contribute 25% of the cost and some of the labour for construction.

    We analysed about 25,000 monthly reports of livestock predation in fenced and traditional enclosures, using statistical models. There were 846 predation events over nearly four years. Unexpectedly, while we did detect spillover effects, these appeared to be beneficial. Rather than displacing conflicts, fortified enclosures actually conferred protective effects on their traditional-enclosure neighbours.

    For example, households within 50 metres (the minimum observed distance) of a fortified enclosure were half as likely to experience predation compared with distant households 2 kilometres away. And these beneficial effects increased with the number of fortified enclosures in a neighbourhood. Finally, the effects appeared to be durable over time.

    The fortified enclosures were extremely effective. We showed that households could break even after paying for the fence in just a few years through avoided livestock losses. And we know that when domestic animals aren’t being killed, their owners are more tolerant of predators. We didn’t record carnivore killings in this study but it has happened fairly frequently in the area in the past.

    In a few of the world’s human-wildlife conflict systems, where data exist to assess spillover effects, there is evidence that detrimental spillovers do occur. For instance, beehive deterrents may redirect elephants to nearby crop fields, or lethal removal of individual wolves may redirect the surviving pack to prey on adjacent ranches. Nevertheless, these are very under-studied interactions.

    Livestock management and carnivore coexistence

    In systems where humans, livestock, and wildlife overlap and sometimes come into conflict, management strategies too often focus on wildlife. Another option is to reduce whatever attracts wildlife. In the case of large carnivores, this means managing livestock.




    Read more:
    Livestock are threatened by predators – but old-fashioned shepherding may be an effective solution


    Our results support this approach by demonstrating that management and protection of livestock is fundamental for reducing conflict, and can benefit not only livestock owners but landscape-level coexistence.

    Conservationists and policy-makers need to encourage these practices that benefit people, carnivores, and livestock in shared landscapes.

    Amy Dickman works for Lion Landscapes as the Joint CEO

    Jonathan Salerno, Kevin Crooks, Rekha Warrier, and Stewart Breck do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania – https://theconversation.com/livestock-and-lions-make-uneasy-neighbours-how-a-fence-upgrade-helped-protect-domestic-and-wild-animals-in-tanzania-258113

    MIL OSI Analysis

  • MIL-OSI Analysis: Learning statistics through story: students get creative with numbers

    Source: The Conversation – Africa – By Johan Ferreira, Professor, University of the Witwatersrand

    Photo by Markus Krisetya via Unsplash

    Statistics professor Johan Ferreira was feeling overwhelmed by the amount of “screen time” involved in online learning in 2021. He imagined students must be feeling the same way, and wondered what he could do to inspire them and make his subject matter more appealing.

    One of the topics in statistics is time series analysis: statistical methods to understand trend behaviour in data which is measured over time. There are lots of examples in daily life, from rainfall records to changes in commodity prices, import or exports, or temperature.

    Ferreira asked his students to write a short, fictional “bedtime” story using “characters” from time series analysis. The results were collected into a book that is freely available. He tells us more about it.


    Why use storytelling to learn about statistics?

    I’m fortunate to be something of a creative myself, being a professional oboe player with the Johannesburg Philharmonic Orchestra. It’s a valuable outlet for self-expression. I reflected on what other activity could inspire creativity without compromising the essence of statistical thinking that was required in this particular course I was teaching.

    I invited my third-year science and commerce students at the University of Pretoria to take part in a voluntary storytelling exercise, using key concepts in time series analysis as characters. Students got some guidelines but were free to be creative. My colleague and co-editor, Dr Seite Makgai, and I then read, commented on and edited the stories and put them together into an anthology.

    Students gave their consent that their stories could be used for research purposes and might be published. Out of a class of over 200 students, over 30 contributions were received; 23 students permitted their work to be included in this volume.

    We curated submissions into two sections (Part I: Fables and Fairy Tales and Part II: Fantasy and Sci-Fi) based on the general style and gist of the work.

    The project aimed to develop a new teaching resource, inspire students to take ownership of their learning in a creative way, and support them through informal, project-based peer learning.

    This collection is written by students, for students. They used personal and cultural contexts relevant to their background and environment to create content that has a solid background in their direct academic interests. And the stories are available without a paywall!

    What are some of the characters and stories?

    Student Lebogang Malebati wrote Stationaryville and the Two Brothers, a tale about AR(1) and AR(2). In statistics, AR refers to processes in which numerical values are based on past values. The brothers “were both born with special powers, powers that could make them stationary…” and could trick an evil wizard.

    David Dodkins wrote Zt and the Shadow-spawn. In this story, Zt (common notation in time series analysis) has a magic amulet that reveals his character growth through a sequence of models and shows the hero’s victory in the face of adversity. He is a function of those that came before him (through an AR process).

    Then there’s Nelis Daniels’ story about a shepherd plagued by a wolf called Arma (autoregressive moving average) which kept making sheep disappear.

    And Dikelede Rose Motseleng’s modern fable about the love-hate relationship between AR(1) (“more of a linear guy” with a bad habit of predicting the future based on the past) and MA(1), “the type of girl who would always provide you with stationarity (stability).”

    What was the impact of the project?

    It was a deeply enriching experience for us to see how students see statistics in a context beyond that of the classroom, especially in cases where students reformulated their stories within their own cultural identities or niche interests.

    Three particular main impacts stand out for us:

    • students have a new additional reference and learning resource for the course content

    • new students can refer to the experiences and contextualisation of this content of former students, leading to informal peer learning

    • students engage in a cognitive skill (higher-order and creative thinking) that is not frequently considered and included in this field and at this level.

    In 2024, shortly after the book was published, we asked students in the time series analysis course of that year to read any one of four stories (related to concepts that were already covered in the course material at that point in time). We asked them to complete a short and informal survey to gauge their experience and insights regarding the potential of this book as a learning resource for them.

    The 53 responses we got indicated that most students saw the book as a useful contribution to their learning experience in time series analysis.

    One positive comment from a student was:

    I will always remember that the Random Walk is indeed not stationary but White Noise is. I already knew it, but now I won’t forget it.

    Will you build on this in future?

    It is definitely valuable to consider similar projects in other branches of statistics, but also, in other disciplines entirely, to develop content by students, for students.

    At this stage, we’re having the stories and book translated into languages beyond English. In large classes that are essential to data science (such as statistics and mathematics), many different home languages may be spoken. Students often have to learn in their second, third, or even fourth language. So, this project is proving valuable in making advanced statistical concepts tactile and “at home” via translations.

    Our publisher recently let us know that the Setswana translation is complete, with the Sepedi and Afrikaans translations following soon. To our knowledge, it’ll be the first such project not only in the discipline of statistics, but in four of the official languages in South Africa.

    Johan Ferreira receives funding from the Centre of Excellence in Mathematical and Statistical Sciences, based at the University of the Witwatersrand, towards this Scholarship of Learning and Teaching project.

    ref. Learning statistics through story: students get creative with numbers – https://theconversation.com/learning-statistics-through-story-students-get-creative-with-numbers-261198

    MIL OSI Analysis

  • MIL-OSI United Kingdom: Multilateralism remains the best tool we have to meet the shared challenges of the 21st century: UK statement at the UN Security Council

    Source: United Kingdom – Executive Government & Departments

    Speech

    Multilateralism remains the best tool we have to meet the shared challenges of the 21st century: UK statement at the UN Security Council

    Statement by Lord Collins of Highbury, Minister for Africa and the UN, at the UN Security Council debate on peace and security.

    Mr President, the United Kingdom thanks Pakistan for convening this timely debate at a time when multilateralism faces unprecedented strain.

    As the Secretary-General has said, the world is witnessing more conflict than at any time since the founding of the United Nations.

    From Russia’s illegal invasion of Ukraine to the protracted crisis in Gaza, the international community is being tested.

    Our response must strive for peace and be guided by the principles of the UN Charter.
    Multilateralism remains the best tool we have to meet the shared challenges of the 21st century.

    And this Council, as the UN organ with the primary responsibility for international peace and security, should play a central role.

    That includes through a collective commitment to the rule of law, including international humanitarian law, and to the peaceful settlement of disputes.

    These are not abstract ideals.

    They are principles by which we could collectively prevent and resolve conflict.

    That is why the United Kingdom has kept these principles at the heart of its foreign policy.
    But as we mark the UN’s 80th anniversary, we must seize this moment to revitalise the peace and security architecture, champion human rights, and strengthen the UN development system and humanitarian architecture to ensure all three pillars are collectively fit for purpose.

    We should make full use of the UN’s mediation and conflict prevention capabilities.
    In Sudan, we continue to urge the warring parties to engage meaningfully with existing diplomatic initiatives, including the United Nations’ mediation efforts to achieve a lasting national ceasefire and political solution.

    Here and elsewhere, we need the UN to help address the root causes of conflict.
    Peace operations should be more adaptable, politically attuned and better coordinated with other UN and regional actors, leveraging new technologies and local expertise.
    We must focus not only on brokering peace but on sustaining it.

    The UN’s efforts to verify the implementation of the Peace Agreement in Colombia is a good example of this work in the field.

    And here in New York, we can make better use of the UN Peacebuilding Architecture to support national efforts to sustain peace.

    Underscoring this, we must recall that crucially, sustainable peace can only be achieved through inclusive peace processes, with the full, equal, meaningful and safe participation of women.

    Mr President, the UN Charter is our shared foundation.

    In this moment of global uncertainty, we must recommit to multilateralism, not as a slogan, but as a strategy.

    The United Kingdom stands ready to work with all Member States to this end, including to uphold peace, security, and the rule of law.

    Thank you.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Modernised aid budget will focus on impact, value for money and transparency

    Source: United Kingdom – Executive Government & Departments 3

    Press release

    Modernised aid budget will focus on impact, value for money and transparency

    New aid funding figures published today show how the international aid budget will deliver value for money for the British taxpayer – and maximum impact for the most vulnerable overseas.

    • New figures released today (Tuesday, 22 July) set out how the government will spend the aid budget in 2025/2026, prioritising areas where Britain can make the biggest difference. 

    • The new approach means the UK will prioritise spending through the most impactful multilateral organisations like the World Bank and Gavi, the vaccine alliance, while working to drive reform of these institutions. 

    • Development Minister Baroness Chapman today confirms UK support for the World Bank’s International Development Association – with the fund expected to benefit 1.9 billion people in next three years.

    New aid funding figures published today (Tuesday, 22 July 2025) show how the international aid budget will deliver value for money for the British taxpayer – and maximum impact for the most vulnerable overseas. The cut in the aid budget to 0.3% of Gross National Income from 2027 means every penny must count if the UK is to make progress on its biggest development priorities: to tackle humanitarian, health and climate crises.

    Today’s aid figures, published in the FCDO’s annual report and the first to be released since the cut was announced in February, give an indication of the new approach the Development Minister Baroness Chapman will take. They follow a comprehensive line-by-line strategic review of aid conducted by the Minister, which focused on prioritisation, efficiency, protecting planned humanitarian support and live contracts while ensuring responsible exit from programming where necessary. 

    The pivot will see global organisations with a proven track record of impact, like the World Bank and Gavi, prioritised to deliver better results for the UK taxpayer and the world’s poorest people.  

    The UK will also continue to play a key humanitarian role supporting those in crisis, including in Gaza, Ukraine and Sudan, and will hold a reserve fund to respond to future crises at pace.

    However, underperforming multilateral organisations will face funding cuts in future, and as the UK moves to spend less on aid, bilateral support to some countries is also dropping.  

    While bilateral support for some countries will drop, the UK will instead increasingly share expertise, like that of our world leading scientists and financial sector. It will focus on tackling the climate crisis, health threats and humanitarian emergencies, creating stability and growth to help deliver the Plan for Change at home. The National Security Strategy published earlier this year said British interests are best served through effective multilateral cooperation.

    As part of its growing support for impactful multilateral organisations, the UK today confirmed it will honour a pledge to the International Development Association (IDA) – the World Bank’s fund for the poorest countries – having agreed a new way to make payments that reduces costs to UK taxpayers and provides the same value to the Bank. IDA is expected to benefit 1.9 billion people in the next three years.

    Minister for Development Baroness Chapman said: 

    We are modernising our approach to international development. Every pound must work harder for UK taxpayers and the people we help around the world and these figures show how we are starting to do just that through having a clear focus and priorities. 

    The UK is moving towards a new relationship with developing countries, becoming partners and investors, rather than acting as a traditional aid donor. We want to work with countries and share our expertise – from world leading science to the City of London – to help them become no longer dependent on aid, and organisations like the World Bank and Gavi are central to how we can work with others to solve some of the biggest challenges of our time: humanitarian disasters, pandemics and the climate crisis.

    The UK’s support for the multilateral system will come with a renewed push for its reform to maximise efficiency and impact for people on the ground.  It follows UK funding announced for another multilateral organisation Gavi, the vaccine alliance, last month, which will help save up to 8 million lives. 

    The World Bank support was originally announced last November, but all UK aid funding was subsequently reviewed following the 0.3% announcement in February this year. Every £1 the UK invests in the World Bank’s IDA fund, enables £4 of finance for developing countries. The IDA fund is expected to benefit 1.9 billion people in next three years.

    The World Bank President Ajay Banga today welcomed the UK’s funding commitment. He said:

    We are grateful to the United Kingdom for honouring its pledge to IDA. In a time of tight budgets and growing global risks, this is not just generosity – it’s strategy. Every taxpayer pound is multiplied many times over through the Bank’s ability to mobilise capital and partner with the private sector.

    These resources help create jobs in developing countries – jobs that build self-reliant economies, reduce the drivers of instability, crime, and migration, and grow the middle class. In turn, they create future consumers of UK products and investment opportunities that strengthen the UK economy over the long term.

    The UK’s new approach aligns with recent calls from Global South leaders for a move away from traditional aid to a focus on investment and partnerships, including from the African Development Bank, and the former Kenyan President. 

    Alongside the figures released today, the government has also published an Equality Impact Assessment which found plans to reduce the aid budget will “protect against disproportionate impacts on equalities” overall.

    The government will publish indicative multi-year allocations for 2026-2029 in the autumn, providing an even clearer picture of the UK’s future direction in international development. 

    Background:

    1. The full ODA spending allocations were published in the FCDO’s Annual Report and Accounts on GOV.UK on Tuesday, July 22, 2025. See here for further details: FCDO Annual Report and Accounts 2024 to 2025- GOV.UK
    2. The Equality Impact Assessment was published alongside the Annual Report and Accounts: FCDO Official Development Assistance programme allocations 2025 to 2026: equality impact assessment – GOV.UK
    3. The UK announced last November it would pledge £1.98 billion to the World Bank’s IDA21 – from July 2025 to June 2028. All UK aid funding was subsequently reviewed following the decision to reduce the aid budget in February. We have now agreed to accelerate our payments to the Bank, reducing their need to borrow from markets. This means that while the UK will provide the Bank with around 10% less cash in total, the Bank will regard our contribution as equivalent to our original pledge. A number of other donors accelerate their payments to provide early support to the Bank and to increase the value of their funding in the same way. 
    4. The Foreign Secretary announced new humanitarian support for Gaza on Monday, July 21, 20225. See here for further details: UK pledges lifesaving aid for Gaza – GOV.UK

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Email the FCDO Newsdesk (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: UK Carrier Strike Group contributes to Exercise Talisman Sabre

    Source: United Kingdom – Executive Government & Departments 3

    News story

    UK Carrier Strike Group contributes to Exercise Talisman Sabre

    The UK Carrier Strike Group has led a major British contribution to the large multinational exercise in Australia.

    Crown copyright

    More than 3,000 British forces are taking part in the largest military exercise Australia has ever hosted, as the UK’s Carrier Strike Group (CSG25) demonstrates Britain’s unwavering commitment to Indo-Pacific security. 

    The Carrier Strike Group is in Australia as part of Operation Highmast, the major global deployment that demonstrates Britain’s strategic commitment to the Indo-Pacific. 

    From British Gurkhas to US Marines to Australian Defence Force amphibious specialists, Exercise Talisman Sabre 25 serves as one of the deployment’s key moments, bringing together multinational forces to strengthen and test how nations can work together to safeguard global trade routes and maintain regional stability. 

    Spanning across a vast area in Western Australia, the Northern Territory, Queensland, and New South Wales, the Australian-US led biennial exercise is bigger than ever, involving over 35,000 military personnel from 19 nations – making Talisman Sabre the largest exercise of the CSG’s deployment and one of the largest military exercises in the world this year. For the first time, offshore activities will also be conducted in Papua New Guinea.    

    Defence Secretary John Healey said:  

    The historic bonds between Britain and Australia run deep, and through AUKUS and exercises like Talisman Sabre we are strengthening these ties for the challenges of tomorrow.  

    Our commitment to the Indo-Pacific is unwavering, as this huge military exercise demonstrates. The unprecedented scale showcases the growing importance of cooperation in addressing shared challenges. We will continue to work alongside our closest allies to maintain the security and stability that underpins global prosperity. 

    Commodore James Blackmore said:  

    This is a real demonstration of the UK and our partners’ warfighting capabilities.   

    As the first UK-led multinational Carrier Strike Group to Talisman Sabre this is a powerful demonstration of our commitment to the Indo-Pacific region.  

    Exercise Talisman Sabre is also an opportunity for the UK to develop new levels of integration between systems and capabilities with the US, Australia, and other partners, enhancing our interoperability even further and to unprecedented levels.

     All three branches of the UK Armed Forces are engaged, with the Royal Marines playing a central role throughout the exercise alongside a Ranger Battalion from the Army and RAF Voyager aircraft. 

    The exercise strengthens operational cooperation with international partners, ensuring our collective ability to maintain the rules-based international order that underpins global trade and security.  

    The Royal Navy, alongside its AUKUS partners, is testing cutting-edge sub-sea and seabed warfare capabilities, showcasing interoperability across our navies. Additionally, for the first time, AUKUS nations will demonstrate the ability to remotely control Extra Large Uncrewed Underwater Vehicles (XL-UUVs) from a remote operating centre. 

    Through DSTL via the Resilience Autonomy and AI Technology collaboration, nations tested autonomy-enabled systems able to find and strike an advancing adversary. This experimentation provided a realistic combat environment for AUKUS to operate as an AI-enabled, integrated force, exploiting cutting-edge technology to ensure strategic advantage against a range of simulated adversaries. 
     
    The CSG25 deployment reinforces the government’s Plan for Change by strengthening international partnerships that underpin economic growth and national security, keeping Britain secure at home and strong abroad. Operation Highmast occurs against the backdrop of the government’s landmark commitment to increasing defence spending to 2.6% of GDP. 

    This historic investment underpins the government’s mission-led approach to securing Britain’s future, providing the economic stability necessary for growth whilst ensuring the UK maintains cutting-edge capabilities such as the Carrier Strike Group to meet emerging global threats.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: Secretary-General’s remarks to the Security Council – on Multilateralism and Peaceful Settlement of Disputes [bilingual as delivered; scroll down for all-English and all-French versions]

    Source: United Nations secretary general

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation. 

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.  

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.

    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.
    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    [all-English]

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.    

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  
    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.
    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the  sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of states.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.

    The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its 80th anniversary next year.

    Mr. President,    

    As we mark the 80th anniversary of our organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.

    I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    Thank you.

    [all-French]

    Monsieur le Président, Excellences,

    Je tiens à remercier le Vice-Premier Ministre et Ministre des affaires étrangères Ishaq Dar et le Pakistan d’avoir organisé le débat public de ce jour.

    Le thème de ce débat met en lumière le lien évident qui existe entre la paix internationale et le multilatéralisme.

    Il y a 80 ans, l’Organisation des Nations Unies a été fondée dans le but premier de préserver l’humanité du fléau de la guerre.

    Les architectes de la Charte des Nations Unies ont considéré que le règlement pacifique des différends était la seule issue possible lorsque les tensions géopolitiques s’intensifiaient, lorsque des différends non résolus attisaient les conflits et lorsque les États perdaient confiance les uns dans les autres.

    La Charte renferme un certain nombre d’outils majeurs destinés à forger la paix.

    Son Article 2.3 est clair :

    « Les Membres de l’Organisation règlent leurs différends internationaux par des moyens pacifiques, de telle manière que la paix et la sécurité internationales ainsi que la justice ne soient pas mises en danger ».

    Son Chapitre VI est tout aussi clair en ce qui concerne les responsabilités confiées au Conseil de sécurité, qui doit contribuer à assurer le règlement pacifique des différends « par voie de négociation, d’enquête, de médiation, de conciliation, d’arbitrage, de règlement judiciaire, de recours aux organismes ou accords régionaux, ou par d’autres moyens pacifiques » du choix des parties.

    La mesure 16 du Pacte pour l’avenir appelle les États Membres à démontrer leur attachement à la diplomatie préventive et au règlement pacifique des différends en recourant davantage à tous les mécanismes existants en la matière.

    Je félicite le Pakistan d’avoir mis à profit sa présidence pour présenter une résolution exhortant tous les États Membres à utiliser pleinement les outils en question dans le cadre de notre quête collective de la paix dans le monde.

    Nous en avons besoin plus que jamais.

    Partout dans le monde, nous observons un mépris total pour le droit international – voire des violations pures et simples de ce droit, notamment du droit international des droits humains, du droit international des réfugiés, du droit international humanitaire et de la Charte des Nations Unies elle-même –, sans que la responsabilité de quiconque ne soit engagée.

    Ces manquements aux obligations internationales surviennent à un moment où les divisions et les conflits géopolitiques s’aggravent.

    Et le coût – en vies humaines, en communautés brisées et en avenirs perdus – est accablant.

    Il suffit de regarder l’horreur qui se déroule à Gaza, avec un niveau de mort et de destruction sans équivalent dans l’histoire récente.

    La malnutrition explose.  La famine frappe à toutes les portes. 

    Et maintenant, nous assistons à l’agonie d’un système humanitaire fondé sur des principes humanitaires.

    Ce système se voit refuser les conditions nécessaires à son fonctionnement.  On lui refuse l’espace nécessaire pour agir.  On lui refuse la sécurité nécessaire pour sauver des vies.

    Alors que les opérations militaires israéliennes s’intensifient et que de nouveaux ordres de déplacement sont émis à Deir al-Balah, la dévastation s’ajoute à la dévastation.

    Je suis consterné que des locaux de l’ONU aient été touchés, notamment ceux du Bureau des Nations Unies pour les services d’appui aux projets et de l’Organisation mondiale de la Santé, y compris son entrepôt principal.

    Ceci alors que toutes les parties ont été informées de l’emplacement de ces installations de l’ONU.

    Ces locaux sont inviolables et doivent être protégés par le droit international humanitaire, sans exception.

    De Gaza à l’Ukraine, du Sahel au Soudan, de Haïti au Myanmar, et dans bien d’autres régions du monde, les conflits font rage, le droit international est bafoué, et la faim et les déplacements atteignent des niveaux record.

    Et le terrorisme, l’extrémisme violent et la criminalité transnationale restent des fléaux tenaces qui rendent la sécurité encore plus inaccessible.

    La diplomatie ne permet pas toujours de prévenir les conflits, la violence et l’instabilité.

    Mais elle a toujours le pouvoir de les arrêter.

    Monsieur le Président,

    La paix est un choix.

    Et le monde attend du Conseil de sécurité de l’Organisation qu’il aide les pays à faire ce choix.

    Ce Conseil est au cœur de l’architecture mondiale pour la paix et la sécurité.

    Sa création reposait sur une vérité fondamentale.

    La rivalité entre les États est une réalité géopolitique.

    Mais la coopération – ancrée dans des intérêts partagés et le bien commun – représente la voie durable vers la paix.

    Nous observons trop fréquemment que les divisions, les positions tranchées et la surenchère verbale bloquent la mise en place de solutions et sape l’efficacité de ce Conseil.

    Mais nous avons également observé des exemples admirables de cas où il a été possible de trouver un terrain d’entente et des solutions aux problèmes mondiaux.

    Ainsi, nous marquons aujourd’hui le troisième anniversaire de la signature de l’Initiative de la mer Noire et du mémorandum d’accord avec la Fédération de Russie – des mesures qui montrent ce que nous pouvons accomplir grâce à la médiation et aux bons offices de l’ONU, y compris dans les moments les plus difficiles.

    Et plus récemment, nous avons été témoins de bien d’autres exemples.

    De la Conférence de Séville sur le financement du développement à la Conférence de Nice sur l’océan, en passant par l’Accord sur la diversité biologique marine des zones ne relevant pas de la juridiction nationale, la Convention sur la cybercriminalité et le Pacte pour l’avenir, adopté l’année dernière.

    Le Pacte, en particulier, témoigne d’une claire volonté du monde de s’engager de nouveau à renforcer le système de sécurité collective des Nations Unies.

    Inspiré du Nouvel Agenda pour la paix, il donne la priorité à la diplomatie préventive et à la médiation, autant de domaines dans lesquels le Conseil peut jouer un rôle essentiel.

    En ce qui concerne le thème du débat qui nous réunit aujourd’hui, il y a selon moi trois domaines dans lesquels nous pouvons nous montrer à la hauteur de l’appel, contenu dans le Pacte, à renouveler notre engagement – et la confiance du monde – envers l’architecture multilatérale dont nous disposons pour régler les problèmes.

    Premièrement, les membres de ce Conseil, en particulier les membres permanents, doivent continuer à s’efforcer de surmonter les dissensions.

    La majorité des situations inscrites à l’ordre du jour du Conseil de sécurité sont complexes et ne se prêtent pas à des solutions rapides.

    Mais même dans les jours les plus sombres de la guerre froide, le dialogue et la prise de décision collective au sein de ce Conseil ont permis de maintenir un système de la sécurité mondiale commun et efficace.

    Un système qui a déployé avec succès toute une série de missions de maintien de la paix.

    Un système qui a ouvert la voie à l’acheminement d’une aide humanitaire vitale aux personnes dans le besoin.

    Et un système qui a permis d’éviter une troisième guerre mondiale.

    Je vous exhorte à adopter le même état d’esprit en maintenant la communication, en continuant d’écouter de bonne foi, en vous employant à surmonter les divergences et à rechercher le consensus.

    Nous devons également veiller à ce que ce Conseil soit à l’image du monde d’aujourd’hui, et non de celui d’il y a 80 ans.

    Ce Conseil devrait être plus représentatif des réalités géopolitiques actuelles.

    Et nous devons continuer de perfectionner ses méthodes de travail afin de le rendre plus inclusif, plus transparent, plus efficace, et plus responsable.

    Je vous demande instamment de continuer d’œuvrer à la recherche du consensus pour faire avancer les négociations intergouvernementales.

    Deuxièmement, ce Conseil doit continuer de renforcer la coopération avec les partenaires régionaux et sous-régionaux.

    L’adoption historique de la résolution 2719 du Conseil de sécurité, visant à financer les opérations d’appui à la paix menées par l’Union africaine au moyen de contributions statutaires, est un bon exemple de la manière dont nous pouvons unir nos forces à celles des organisations régionales pour favoriser la mise en place de mesures plus efficaces.

    Je salue également les mesures prises par ce Conseil pour renforcer et rebâtir les cadres de sécurité régionaux afin d’encourager le dialogue et de favoriser le règlement pacifique des différends.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    MIL OSI United Nations News

  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI

  • MIL-OSI Africa: Food lifeline fading for millions in South Sudan hit by conflict and climate shocks

    Source: APO

    South Sudan’s dramatic hunger crisis is worsening and millions of people there could miss out on food aid because of the worsening global humanitarian funding crisis, the UN World Food Programme (WFP) said on Tuesday.

    Earlier this month, the UN agency began airdropping emergency food assistance in Upper Nile State after surging conflict forced families from their homes and pushed communities to the brink of famine.

    Nationwide, the picture is just as alarming, with half the country’s population – more than 7.7 million people – officially classified as food insecure by UN partner the IPC platform. This includes more than 83,000 face “catastrophic” levels of food insecurity.

    “The scale of suffering here does not make headlines but millions of mothers, fathers, and children are spending each day fighting hunger to survive,” said WFP Deputy Executive Director Carl Skau, following a visit to South Sudan last week. 

    The worst-hit areas include Upper Nile State, where fighting has displaced thousands and relief access is restricted. Two counties are at risk of tipping into famine: Nasir and Ulang.

    South Sudan, the world’s youngest country, gained independence in 2011. This gave way to a brutal and devastating civil war which ended in 2018 thanks to a peace agreement between political rivals which has largely held.

    However, recent political tensions and increased violent attacks – especially in the Upper Nile State – threaten to unravel the peace agreement and return the nation to conflict.

    The humanitarian emergency crisis has been exacerbated by the war in neighbouring Sudan. 

    Since April 2023, nearly 1.2 million people have crossed the border into South Sudan, many of them hungry, traumatised, and without support. WFP says that 2.3 million children across the country are now at risk of malnutrition.

    Crucial, yet fragile gains

    Despite these challenges, the UN agency has delivered emergency food aid to more than two million people this year. In Uror County, Jonglei State, where access has been consistent, all known pockets of catastrophic hunger have been eliminated. Additionally, 10 counties where conflict has eased have seen improved harvests and better food security, as people were able to return to their land.

    To reach those in the hardest-hit and most remote areas, WFP has carried out airdrops delivering 430 metric tons of food to 40,000 people in Greater Upper Nile. River convoys have resumed as the most efficient way to transport aid in a country with limited infrastructure. These included a 16 July shipment of 1,380 metric tons of food and relief supplies. WFP’s humanitarian air service also continues flights to seven Upper Nile destinations.

    At the same time, a cholera outbreak in Upper Nile has placed additional pressure on the humanitarian response. Since March, WFP’s logistics cluster has airlifted 109 metric tons of cholera-related supplies to affected areas in Upper Nile and Unity states.

    However, the UN agency says it can currently support only 2.5 million people – and often with just half-rations. Without an urgent injection of $274 million, deeper cuts to aid will begin as soon as September.

    “WFP has the tools and capacity to deliver,” said Mr. Skau. “But without funding – and without peace – our hands are tied.” 

    Distributed by APO Group on behalf of UN News.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: The International Islamic Trade Finance Corporation (ITFC) Reports Strong Results and Sustainability Progress in 2024 Annual Development Effectiveness Report

    Source: APO

    The International Islamic Trade Finance Corporation (ITFC) (www.ITFC-IDB.org), a member of the Islamic Development Bank (IsDB) Group, announced the release of its 2024 Annual Development Effectiveness Report (ADER).

    The ADER serves as an essential reporting and transparency tool, enabling ITFC to measure, communicate, and continually refine its strategies and interventions for achieving sustainable development outcomes. The 2024 report highlights ITFC’s expanding role as a driver of sustainable trade, economic resilience, and inclusive growth across its member countries.

    “The ADER showcases ITFC’s ability to provide innovative, impactful solutions that address the complex needs of our member countries,” said Eng. Adeeb Y. Al Aama, Chief Executive Officer of ITFC. “While we celebrate key milestones, we are also assessing our interventions to ensure we continue advancing toward a more inclusive, resilient, and sustainable future.”

    Key Highlights of 2024 ADER

    In 2024, ITFC delivered tangible results, demonstrating its focus on resilience and economic inclusion. The key highlights include:

    • Filling Trade Finance Gaps. ITFC allocated US$2.66 billion, 38% of its total portfolio, to LDMCs, supporting inclusive growth. Additionally, US$268 million directly benefited over 380,000 smallholder farmers, enabling the procurement of 840,000 metric tons of local agricultural products.
    • Securing Critical Supply Chains. Disbursements to the energy sector amounted to US$4 billion, bringing reliable electricity to approximately 13.8 million households. Food security interventions provided over 5.6 million metric tons of essential commodities worth US$1.45 billion, benefiting more than 30 million households.
    • Strengthening Private Sector Participation. ITFC financed 312 small and medium enterprises (SMEs) and corporates through partnerships with 23 financial institutions, promoting financial inclusion and economic diversification.
    • Fostering Regional Integration. Intra-OIC trade financing reached US$4.8 billion. Through strategic programs such as the Arab Africa Trade Bridges (AATB) and the Aid for Trade Initiative for Arab States (AfTIAS), ITFC strengthened regional value chains and institutional capacities.
    • Investing in Capacity Development. Technical assistance and training initiatives reached over 3,100 individuals, a 32% increase from the previous year, with nearly 40% women participants.

    Embedding Sustainability into Core Operations

    The Corporation adopted its first Environmental and Social (E&S) Policy and launched a Ten-Year E&S Action Plan. A new governance structure was also introduced to guide implementation, laying the foundation for more responsible trade finance operations.

    Empowering Growth through the SDGs

    ITFC made significant strides in advancing multiple Sustainable Development Goals through its trade finance and development initiatives. Its efforts have helped reduce poverty (SDG 1), strengthen food security (SDG 2), and expand access to clean and affordable energy (SDG 7). By supporting smallholder farmers, empowering local economies, and promoting intra-OIC trade, ITFC has also played a key role in fostering strong global partnerships to accelerate sustainable development across member countries (SDG 17).

    The 2024 ADER affirms ITFC’s deepening commitment to transparency, sustainability, and measurable impact. As the Corporation looks ahead, it remains focused on bold innovation, collaborative partnerships, and leveraging Islamic finance to build a more inclusive and sustainable global trade ecosystem.

    Access the full English version here – https://ADER.ITFC-IDB.org

    Distributed by APO Group on behalf of International Islamic Trade Finance Corporation (ITFC).

    Contact us:
    Tel: +966 12 646 8337  
    Fax: +966 12 637 1064   
    E-mail: ITFC@itfc-idb.org      

    Social media:
    Twitter: http://apo-opa.co/3GYB6PJ  
    Facebook: http://apo-opa.co/4f7UruK  
    LinkedIn: International Islamic Trade Finance Corporation (ITFC) (http://apo-opa.co/44Go3M4)  

    About the International Trade Finance Corporation (ITFC):
    The International Islamic Trade Finance Corporation (ITFC) is the trade finance arm of the Islamic Development Bank (IsDB) Group. It was established with the primary objective of advancing trade among OIC member countries, which would ultimately contribute to the overarching goal of improving the socio-economic conditions of the people across the world. Commencing operations in January 2008, ITFC has provided more than US$83 billion of financing to OIC member countries, making it the leading provider of trade solutions for these member countries’ needs. With a mission to become a catalyst for trade development for OIC member countries and beyond, the Corporation helps entities in member countries gain better access to trade finance and provides them with the necessary trade-related capacity-building tools, which would enable them to successfully compete in the global market.  

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Europe: AFRICA/NIGERIA – Father Afina, kidnapped on June 1, has been released

    Source: Agenzia Fides – MIL OSI

    Abuja (Agenzia Fides) – Father Alphonsus Afina, who was kidnapped on June 1 (see Fides, 5/6/2025), has been released thanks to an operation by security forces.The priest was rescued yesterday, July 21, along with ten women who were also held hostage, during a joint operation by the Department of State Services (DSS, the internal intelligence service under the Federal Presidency) and the Nigerian army, carried out in Borno State, in northeastern Nigeria.“We are deeply grateful for the professionalism and courage demonstrated by the DSS and the Nigerian army,” said Msgr. John Bogna Bakeni, Auxiliary Bishop of Maiduguri (capital of Borno State). “The safe return of Father Afina after nearly two months of captivity is a testament to the commitment of our security agencies.”Father Afina was kidnapped on the evening of Sunday, June 1, near Gwoza while returning to Maiduguri after celebrating Mass. Bishop Bakeni recalled that the priest was traveling from Mubi, in Adamawa State, to Maiduguri when an armed group ambushed his convoy near a military checkpoint. The attackers fired shots and threw a grenade at one of the vehicles, killing one passenger and taking the others hostage.The Gwoza area is unsafe due to the presence of Boko Haram’s two main factions: Jama’tu Ahlis Sunna Lidda’awati wal-Jihad (JAS) and the Islamic State West Africa Province (ISWAP), which has joined the Islamic State as its “West Africa Province” (see Fides, 2/7/2024).The news of Father Afina’s kidnapping caused great shock in the US diocese of Fairbanks, where the priest had served for six and a half years in the villages of the Seward Peninsula, from 2017 to 2024. (L.M.) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI United Nations: Food lifeline fading for millions in South Sudan hit by conflict and climate shocks

    Source: United Nations 2

    Earlier this month, the UN agency began airdropping emergency food assistance in Upper Nile State after surging conflict forced families from their homes and pushed communities to the brink of famine.

    Nationwide, the picture is just as alarming, with half the country’s population – more than 7.7 million people – officially classified as food insecure by UN partner the IPC platform. This includes more than 83,000 face “catastrophic” levels of food insecurity.

    “The scale of suffering here does not make headlines but millions of mothers, fathers, and children are spending each day fighting hunger to survive,” said WFP Deputy Executive Director Carl Skau, following a visit to South Sudan last week. 

    The worst-hit areas include Upper Nile State, where fighting has displaced thousands and relief access is restricted. Two counties are at risk of tipping into famine: Nasir and Ulang.

    South Sudan, the world’s youngest country, gained independence in 2011. This gave way to a brutal and devastating civil war which ended in 2018 thanks to a peace agreement between political rivals which has largely held.

    However, recent political tensions and increased violent attacks – especially in the Upper Nile State – threaten to unravel the peace agreement and return the nation to conflict.

    The humanitarian emergency crisis has been exacerbated by the war in neighbouring Sudan. 

    Since April 2023, nearly 1.2 million people have crossed the border into South Sudan, many of them hungry, traumatised, and without support. WFP says that 2.3 million children across the country are now at risk of malnutrition.

    Crucial, yet fragile gains

    Despite these challenges, the UN agency has delivered emergency food aid to more than two million people this year. In Uror County, Jonglei State, where access has been consistent, all known pockets of catastrophic hunger have been eliminated. Additionally, 10 counties where conflict has eased have seen improved harvests and better food security, as people were able to return to their land.

    To reach those in the hardest-hit and most remote areas, WFP has carried out airdrops delivering 430 metric tons of food to 40,000 people in Greater Upper Nile. River convoys have resumed as the most efficient way to transport aid in a country with limited infrastructure. These included a 16 July shipment of 1,380 metric tons of food and relief supplies. WFP’s humanitarian air service also continues flights to seven Upper Nile destinations.

    At the same time, a cholera outbreak in Upper Nile has placed additional pressure on the humanitarian response. Since March, WFP’s logistics cluster has airlifted 109 metric tons of cholera-related supplies to affected areas in Upper Nile and Unity states.

    However, the UN agency says it can currently support only 2.5 million people – and often with just half-rations. Without an urgent injection of $274 million, deeper cuts to aid will begin as soon as September.

    “WFP has the tools and capacity to deliver,” said Mr. Skau. “But without funding – and without peace – our hands are tied.” 

    MIL OSI United Nations News

  • MIL-OSI Africa: Southern Africa Enhances Early Warning Systems as Event-Based Surveillance Guidelines are Launched in Three Countries

    Source: APO


    .

    Three Southern African countries now have Event-Based Surveillance (EBS) Guidelines—a critical tool for detecting and responding to emerging health risks. Event-based surveillance systems collect and analyse information from diverse sources, including communities, the media, and healthcare workers, to detect unusual health events in real time. They complement traditional indicator-based surveillance and are designed to support rapid public health responses.

    Botswana, Namibia, and Zimbabwe were supported in developing their guidelines by the Africa Centres for Disease Control and Prevention (Africa CDC), in collaboration with the World Health Organization (WHO) and the United States Centers for Disease Control and Prevention (US CDC).

    The Botswana Event-Based Surveillance Guidelines were launched on 24 June in Gaborone.

    “By institutionalising a robust early warning system, the health sector will be empowered to detect signals of potential disease threats at their earliest stages,” said Dr Stephen Modise, MP, Minister of Health and Wellness.

    Speaking on Dr Modise’s behalf, Dr Rex Kealebile Segadimo, Acting Secretary for Specialised Health Care, said the launch of these guidelines marks a significant milestone in Botswana’s efforts to strengthen its public health system.

    “This will enable the country to assess risks with precision and respond in a science-based manner, preventing threats from escalating into full-blown crises.”

    Dr Modise further stated: “The institutionalisation of a robust early warning system will enable us to stay ahead of emerging health risks and respond effectively to protect the health and well-being of our citizens.”

    Dr Lul Riek, the Africa CDC Regional Director for Southern Africa, reaffirmed his commitment to supporting Botswana and all AU Member States in operationalising these guidelines. This support will include capacity building, mentorship, digital tools, and regional coordination—as well as fostering peer learning and cross-border collaboration—recognising that no country can achieve health security in isolation.

    With these guidelines in place, Botswana is now better equipped to respond quickly and effectively to emerging health threats, ultimately protecting the health and well-being of its citizens.

    Officiating the launch in Windhoek, Namibia, also on 24 June, the country’s Minister of Health and Social Services, Dr Esperance Luvindao, noted that EBS plays a critical role in addressing the increasing number of public health emergencies in the country. The new surveillance system is a timely intervention, as the country faces rising risks of communicable diseases such as malaria and cholera, increasingly influenced by climate-related factors.

    She described the launch as a true demonstration of Namibia’s commitment to being proactive in disease preparedness. “Real-time detection of public health threats is essential to mitigate the impact of outbreaks, especially in the face of shifting disease patterns,” she said.

    The Minister also called for a multifaceted approach to health security and emphasised the importance of establishing and prioritising National Public Health Institutes (NPHIs) to coordinate preparedness, response, and mitigation efforts.

    The Ministry of Health and Child Care (MoHCC) in Zimbabwe launched its EBS Guidelines on 18 June in Harare.

    “We are not gathered here merely to unveil a policy document,” said Dr Aspect Maunganidze, Secretary for Health and Child Care. “We are here to affirm a national commitment—to declare that the health and safety of every Zimbabwean is our highest priority.”

    He explained that the EBS guidelines represent a strategic shift from reactive to proactive preparedness, empowering health authorities to detect early warning signs of public health threats before they escalate.

    Ms Batsirai Mbodza, Regional Programme Lead for Africa CDC, emphasised the critical importance of implementation.

    “Guidelines alone will not stop outbreaks. The real impact lies in how well they are implemented,” she said. “These tools must reach health workers in clinics, surveillance officers in the field, and community leaders, often the first to sense when something is amiss.”

    On behalf of UNICEF, Mr Diop Daouda stressed the need for inclusivity in the country’s surveillance systems.

    “Surveillance systems must be inclusive, they must reach the most remote villages, informal settlements, and border communities,” he said, adding: “They must consider gender dynamics, disability, and cultural norms. No signal should go unnoticed, because no life is dispensable.”

    Distributed by APO Group on behalf of Africa Centres for Disease Control and Prevention (Africa CDC).

    MIL OSI Africa

  • MIL-OSI Africa: Financing Agreements to Strengthen Education in Mauritania and Chad

    Source: APO


    .

    The Governments of Mauritania and Chad today signed funding agreements for the Regional Engagement for Learning and Collaboration in Education (RELANCE) Project, supported by the World Bank and the Federal Republic of Germany, for a total of $137 million.

    This ambitious project aims to transform education systems in both countries by strengthening sector governance and expanding access to flexible and inclusive learning pathways. It targets more than 850,000 young people, half of whom are girls, while promoting access to learners with special needs.

    In a regional context of sustained demographic growth, disparities in access to education, and increasing demand for job-relevant skills, RELANCE offers a collaborative and integrated approach. It builds on ongoing efforts to strengthen education systems while introducing regional mechanisms for coordination, resource sharing, and innovation.

    The project includes the establishment of a Regional Institute of Education in Nouakchott to strengthen executive capacity in the education sector, drive applied research, and inform policy through data and evidence. Supported by the Association of African Universities, the institute is positioned to become a center of academic excellence for both countries, fostering structured, long-term collaboration and knowledge exchange.

    “The signing of the financing agreements for the RELANCE Sahel project reflects our collective commitment to building a resilient, educated, and forward-looking Sahel,” said Sid’Ahmed Bouh, Minister of Economy and Finance.

    The initiative includes the creation of a regional Open School in each country, designed to meet the needs of young people outside the traditional education circuits, especially in areas where access to education remains limited. This hybrid system will combine digital learning, face-to-face support and professional training.

    “The Regional Open School is a concrete response to the educational realities of our country. It will allow thousands of young people, often far from traditional structures, to have access to adapted learning paths that bring skills and hope,” said Dr. Aboubakar Assidick Tchoroma, Minister of National Education and Civic Promotion of Chad.

    The project also benefits from significant financial support from the Federal Republic of Germany, through KfW, under the Sahel and West Africa Coast Multi-Donor Trust Fund. This partnership reflects a shared commitment to enhanced regional cooperation.

    “RELANCE reflects an ambitious and pragmatic regional approach. By supporting this initiative, Germany reaffirms its willingness to support Sahel countries in their efforts to build more inclusive education systems that are better grounded in local realities,” said H.E. Dr. Florian Reindel, Ambassador of the Federal Republic of Germany to Mauritania.

    The World Bank is supporting participating countries through a strategic partnership that combines technical support with long-term financing. RELANCE builds on the achievements of existing national projects, such as the Basic Education Sector Support Project (PASEB II) in Mauritania and the Project to Improve Learning Outcomes in Basic Education (PARAEB) in Chad, while introducing a unique regional dimension.

    “Shaping minds is about charting the path to a brighter future. Like a carefully planted seed, an ambitious education policy carries the promise of progress. The RELANCE project thus reflects our shared commitment to making education a transformative force in Mauritania and Chad, by training informed, empowered generations ready to take on the challenges of tomorrow,” said Ousmane Diagana, World Bank Vice President for Western and Central Africa.

    Designed as an open regional platform, the project will be open to other Sahel countries interested in joining. It marks an important step towards building a more integrated Sahelian educational space capable of meeting the aspirations of a dynamic and committed youth.

    Distributed by APO Group on behalf of The World Bank Group.

    MIL OSI Africa

  • MIL-OSI Africa: New Roadmap to Strengthen Health Security in Central Africa

    Source: APO


    .

    Africa CDC and strategic health partners operating in Central Africa have drawn up an outline of a joint 2026–2027 roadmap to strengthen health security in the Central African region.

    Central Africa, like the rest of the continent, is deeply affected by recurrent or prolonged health crises, with the emergence and re-emergence of infectious threats. These threats challenge the resilience of healthcare systems and underline the need for an integrated, multi-sectoral and proactive approach. These public health emergencies are a powerful reminder that no country can effectively and sustainably deal with cross-border health threats on its own.

    “This joint planning process is much more than a technical exercise. It is a key moment to strengthen our regional public health architecture, foster the interoperability of our alert systems, promote data sharing and expertise, and facilitate more effective mobilisation of available resources,” said Dr Brice Wilfried Bicaba, Director of Africa CDC’s Regional Coordinating Centre for Central Africa (CA RCC).

    Africa CDC, through its CA RCC, brought together technical and institutional representatives from regional bodies including the Commission of the Economic Community of Central African States (ECCAS) and the Organisation for Coordination in the Fight Against Endemic Diseases in Central Africa (OCEAC) of the Economic and Monetary Community of Central Africa (CEMAC), from 16 to 18 June 2025 in Equatorial Guinea.

    The inaugural strategic joint planning workshop was aimed at strengthening collaboration and coordination between Africa CDC, Regional Economic Communities and health institutions to improve prevention, preparedness and response to health emergencies in Central Africa. Africa CDC and its partners also came up with a consolidated 2025 plan.

    “The 2025 joint action plan will serve as an operational guide for the coming months, focusing on concrete actions to strengthen regional coordination and governance, reinforce integrated health systems and the control of high-burden diseases, enhance surveillance, data collection and early warning, as well as build national capacity in terms of networks and laboratory systems,” added Dr Bicaba.

    The joint roadmap 2026–2027 lays the foundations for a structured response that is more effective, efficient, sustainable and aligned with continental and regional frameworks such as the New Public Health Order for Africa, the Africa CDC Strategic Plan 2023–2027, the Regional Strategic Plans for Preparedness and Response to Public Health Emergencies, cross-border surveillance of diseases with epidemic potential under the ‘One Health’ approach, and the ECCAS ‘One Health’ Platform for the period 2025–2029, as well as the 2023–2027 Five-Year Strategic Plan of the OCEAC.

    “This roadmap reflects our collective commitment to building a community that is better prepared, more resilient and more responsive to health threats. Coordination with Africa CDC and other regional health organisations is essential if we are to achieve genuine health security in Central Africa,” said Dr Peggy Raymonde Conjugo-Batoma, Head of the Health Department of the Commission of ECCAS.

    The various stakeholders have also defined a coordination and monitoring framework for the joint implementation of health initiatives in the Central African region over the period 2025–2027. The main aim of this framework is to establish an effective coordination and accountability mechanism for the implementation, monitoring and evaluation of joint regional health security activities in Central Africa, while ensuring optimum synergy between the key players.

    “I welcome this initiative, which strengthens regional solidarity around our shared priorities,” said Mr Mitoha Ondo’o Ayekaba, Equatorial Guinea’s Minister of Health. “The results of your work reflect not only the richness of your contributions but also the collective commitment and strong desire to face cross-border health threats together. They are also an illustration of strengthened regional cooperation between national institutions, regional economic communities and technical partners in the interests of our populations,” said Mr Ayekaba, who is also a member of the steering committee of the Central African RCC.

    “I am personally committed to overseeing the implementation of the joint roadmap and to advocating vigorously with my colleagues to secure the necessary political support,” he said.

    This inaugural workshop has been hailed by the Minister of Health and Africa CDC’s partners as a model of multi-sector collaboration, mobilising the technical expertise, political priorities and resources of the various stakeholders around a common vision.

    “It marks an important step in Africa CDC’s ambition to build a more robust, integrated and inclusive continental public health system that is better prepared to deal with future health emergencies,” said Dr Bicaba.

    The representatives present in Malabo also recommended co-developing collaboration protocols between the various institutions, integrating Africa CDC’s Regional Coordinating Centre for Central Africa as an observer or technical member at decision-making and technical meetings of the RECs relating to public health, health emergency management and health security, and strengthening the capacities of Member States in health planning and coordination.

    Distributed by APO Group on behalf of Africa Centres for Disease Control and Prevention (Africa CDC).

    MIL OSI Africa

  • MIL-OSI Africa: Côte d’Ivoire: The African Development Bank’s Capital Markets Development Trust Fund (CMDTF) supports establishment of digital platform for public offerings

    Source: APO

    The Central Depository/Settlement Bank (DC/BR) has officially launched its new digital platform for public offerings (DIGIAPE), with support from the African Development Bank (www.AfDB.org).

    DIGIAPE will automate primary market subscriptions in the West African Monetary Union’s (UMOA) regional financial market, enhancing both the transparency and reliability of securities allocations while boosting competitiveness through real-time allocation of securities at the close of trading.

    The African Development Bank is providing $400,000 through the Capital Markets Development Trust Fund for technical support to support the design, installation and operationalization of the DIGIAPE platform, to build staff capacity in managing the platform, and enhance the ability of regional financial market stakeholders to use the platform.

    Ibrahim Kalil Konaté, Ivorian Minister for Digital Transition and Digitization, was present at the launch event, which was also attended by representatives of the African Development Bank, the Central Depository/Settlement Bank, the UMOA Financial Markets Authority and financial market players.

    “The African Development Bank is a key strategic partner in the development of the regional financial market – as evidenced by our having committed more than two billion euros to the financial sector in the West African Economic and Monetary Union (UEMOA) zone, through our various instruments, since 2014,” said Ahmed Attout, Director for Financial Sector Development at the African Development Bank.

    “Our intervention is a continuation of the Bank’s support for players in the West African Monetary Union regional financial market, which began in 2018,” said Akane Zoukpo Sanankoua, Manager of the Capital Markets Development Division at the African Development Bank. “Support for the establishment of the DIGIAPE platform once again demonstrates the ability of the Capital Markets Development Trust Fund to respond concretely and strategically to the needs of Africa’s changing markets,” she added.

    DIGIAPE is expected to reduce settlement times and enable real-time allocation of securities at close, creating a more attractive environment for international investors and greater flexibility for sovereign issuers.

    “Technological innovation is now a powerful lever for transforming capital markets. In a constantly changing environment, the central depository/settlement bank, like other central securities depositories, must embrace this dynamic in order to meet the growing demand for security, efficiency, transparency and inclusion,” said Birahim Diouf, Director General of the UMOA Central Depository/Settlement Bank.

    “DIGIAPE is a digital platform designed to automate and secure the entire subscription process for public offerings on the primary market. It is a concrete response to current challenges, particularly in terms of financial inclusion, the digitization of financial services and the transparency of the regional financial market,” emphasized Diouf.

    The Capital Markets Development Trust Fund was created in 2019 to contribute to the integration and competitiveness of African capital markets by supporting strategic reforms, strengthening market infrastructure, broadening investor bases and developing innovative instruments. It is supported by the Luxembourg Ministry of Finance, the Dutch Ministry of Foreign Affairs and the Swedish International Development Cooperation Agency.

    The Central Depositary/Settlement Bank is a specialized UMOA financial institution based in Abidjan, Côte d’Ivoire. It centralizes the custody of securities for its members, manages settlement/delivery operations following stock market transactions, and makes payment for securities events.

    Distributed by APO Group on behalf of African Development Bank Group (AfDB).

    Media contact:
    Romaric Ollo Hien
    Communication and External Relations Department
    African Development Bank
    media@afdb.org

    About the African Development Bank Group:
    The African Development Bank Group (AfDB) is Africa’s premier development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). On the ground in 34 African countries with an external office in Japan, the AfDB contributes to the economic development and the social progress of its 54 regional member states. For more information: www.AfDB.org  

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: Food and Agriculture Organization (FAO), Southern African Development Community (SADC) Parliamentarians join forces to advance the Right to Food and agrifood systems transformation

    Source: APO

    Amid growing food insecurity and malnutrition across Southern Africa, parliamentarians are stepping up to drive legislative solutions. From 22 to 24 July 2025, parliamentarians from across the region – are gathering  in Johannesburg, South Africa, for a high-level meeting and training organized by the SADC Parliamentary Forum (SADC PF) and the Food and Agriculture Organization of the United Nations (FAO). The aim is to enhance legislative capacity, foster collaboration, and operationalize the newly formed SADC Parliamentary Alliance on Agrifood Systems, Food Security and Nutrition.

    This initiative comes at a pivotal time, as the region contends with overlapping shocks, from climate extremes to economic pressures, that continue to disrupt agrifood systems and widen inequality. It also builds momentum in the lead-up to the Third Global Parliamentary Summit against Hunger and Malnutrition, to be hosted in 2026 at the Pan-African Parliament headquarters in South Africa.

    The event also commemorates the 20th anniversary of the Right to Food Guidelines, reaffirming the importance of national legal frameworks in securing the fundamental right to adequate food for all. In a region where undernutrition and hunger remain persistent, the meeting offers an opportunity to align parliamentary action with regional and global frameworks such as the African Union’s Agenda 2063, the Comprehensive Africa Agriculture Development Programme (CAADP), and SDG 2 – Zero Hunger.

    The Alliance is envisioned as a platform to foster cross-border cooperation, enabling parliamentarians to share good practices, advocate for sustainable food systems, and shape policy dialogue at national, regional, and global levels.

    FAO’s technical role in strengthening legal foundations

    As the lead technical agency, FAO is supporting this process by providing legal expertise, delivering targeted training, and promoting the domestication of the Pan-African Parliament Model Law on Food Security and Nutrition.

    As part of a global initiative funded by the Federal Ministry of Agriculture, Food and Regional Identity of Germany, FAO is equipping parliamentarians to legislate, monitor, and advance the right to food across diverse national contexts. Beyond the training, FAO’s support includes technical assistance to align national laws with the Model Law’s provisions—ensuring countries have the legal tools needed to address food insecurity through inclusive and rights-based approaches. This is part of FAO’s broader commitment to strengthening governance mechanisms and embedding food systems transformation within sustainable development priorities.

    Building on the establishment of the Alliance in December 2024, supported by FAO and the Spanish cooperation agency (AECID), the adoption of the Alliance’s first work plan and the establishment of its governance structures mark the beginning of a long-term process.

    Realizing the right to food requires sustained political will, robust legal frameworks, and active parliamentary engagement to protect biodiversity, support traditional food systems, and ensure that no one is left behind.

    As the countdown to the 2026 Global Parliamentary Summit begins, FAO remains committed to supporting SADC parliamentarians in translating commitments into concrete, lasting impact. The road to Zero Hunger will require solid laws, inclusive institutions, and continued partnerships rooted in the shared vision of a food-secure future for all.

    Distributed by APO Group on behalf of Food and Agriculture Organization of the United Nations (FAO): Regional Office for Africa.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI United Nations: Gaza: UN staff now fainting from hunger, exhaustion; WHO worker detained

    Source: United Nations MIL OSI

    Doctors, nurses, journalists, humanitarians, among them UNRWA staff, are hungryfainting due to hunger and exhaustion while performing their duties,” said Juliette Touma, Director of Communications with the UN agency for Palestine refugees, UNRWA. 

    Speaking from Amman, she stressed that seeking food “has become as deadly as the bombardments.”

    The development comes as the UN human rights office, OHCHR, announced on Tuesday that more than 1,000 Palestinians have now been killed by the Israeli military while trying to get food in Gaza since the so-called Gaza Humanitarian Foundation (GHF) started operating on 27 May. 

    “As of 21 July, we have recorded 1,054 people killed in Gaza while trying to get food,” said OHCHR spokesperson Thameen Al-Kheetan; “766 of them were killed in the vicinity of GHF sites and 288 near UN and other humanitarian organizations’ aid convoys.” 

    Mr. Al-Kheetan noted that the finding came from “multiple reliable sources on the ground, including medical teams, humanitarian and human rights organizations. It is still being verified in line with our strict methodology.”

    The Foundation’s hubs are supported by the US and Israeli authorities and started operating in southern Gaza on 27 May, bypassing the UN and other established NGOs. 

    Aid relief is not a job for mercenaries

    “The so-called GHF distribution scheme is a sadistic death-trap,” UNRWA’s Ms. Touma said. “Snipers open fire randomly on crowds, as if they’re given a licence to kill.” 

    Quoting a statement by UNRWA head Philippe Lazzarini, Ms. Touma called the scheme a “massive hunt of people in total impunity.”

    “This cannot be our new norm. Humanitarian assistance is not the job of mercenaries,” she added.

    The UNRWA spokesperson insisted that the UN and its humanitarian partners have the expertise, experience and available resources to provide safe, dignified and at-scale assistance. 

    “We have proven it time and again during the last ceasefire,” she said.

    Living conditions in the Strip have reached a new low as prices for basic commodities have increased by around 4,000 per cent. For Gaza’s inhabitants who have lost their homes and been displaced multiple times, they have no income and find themselves completely deprived of essentials.

    A child waits for food in Gaza.

    $200 for a bag of flour

    Ms. Touma highlighted the testimony of a colleague on the ground who had to walk for hours to buy a bag of lentils and some flour, paying almost $200 for it. 

    On Monday, the UN World Food Programme (WFP) said that a quarter of Gaza’s population faces famine-like conditions. Almost 100,000 women and children are suffering from severe acute malnutrition and need treatment as soon as possible.

    Vital everyday items such as diapers are scarce and costly, at about $3 each. Mothers have resorted to using plastic bags instead, while one father “said that he had to cut one of his last shirts to give his daughter sanitary pads,” Ms. Touma said.

    “We at UNRWA have stocks of hygiene supplies, including diapers for babies and for adults waiting outside the gates of Gaza,” Ms. Touma stressed, insisting that the agency has 6,000 trucks loaded with food, medicines and hygiene supplies waiting in Egypt and in Jordan to be allowed into the enclave.

    Urgent ceasefire call

    She reiterated the UN’s calls for “a deal that would bring a ceasefire, that would release the hostages, that would bring in a standard flow of humanitarian supplies into Gaza under the management of the United Nations, including UNRWA.”

    Humanitarian operations in the enclave are being pushed into an “ever-shrinking space”, said World Health Organization (WHO) spokesperson Tarik Jašarević.

    Briefing journalists in Geneva, he condemned three attacks on Monday on a building housing WHO staff in Deir Al-Balah in central Gaza, as well as the “mistreatment of those sheltering there and the destruction of its main warehouse.”

    “Staff and their families, including children, were exposed to grave danger and traumatized after airstrikes caused a fire and significant damage,” Mr. Jašarević said, adding that Israeli military entered the premises, “forcing women and children to evacuate on foot” towards the coastal shelter of Al Mawasi amid active conflict. 

    Screened at gunpoint

    The WHO spokesperson said that staff and family members were “handcuffed, stripped, interrogated on the spot and screened at gunpoint.” Two staff and two family members were detained and while three were later released, one WHO staff member remains in detention for reasons unknown to the organization.

    Mr. Jašarević called for the release of the detained staff member and insisted that “no one should be held without charges and without due process.”

    The latest evacuation order for the area has impacted several WHO premises and compromised its presence on the ground, “crippling efforts to sustain a collapsing health system,” Mr. Jašarević added, and “pushing survival further out of reach for more than two million people.” 

    The Israeli military operation in Deir Al-Balah on Monday also caused an explosion and fire inside WHO’s main warehouse, which is located within the evacuation zone in the central Gazan city – “part of a pattern of systematic destruction of health facilities,” the agency’s spokesperson said.

    According to Gaza’s health authorities, since the start of the war in October 2023 some 1,500 health workers have been killed in the Strip. Some 94 per cent of all health facilities have been damaged and half of Gaza’s hospitals are “not functional at all,” Mr. Jašarević said. 

    “The chance to prevent loss of lives and reverse immense damage to the health system slips further out of reach every day,” he stressed.

    Visa denials 

    Spotlighting further challenges to the humanitarian operation in Gaza, the WHO spokesperson pointed to an increase in the denial of visas by the Israeli authorities for emergency medical teams seeking to enter the Strip since the breakdown of the latest ceasefire between Israel and Hamas on 18 March. 

    He said that 58 international staff for the emergency medical teams, including surgeons and critical medical specialists, have been denied access.

    UNRWA’s Ms. Touma highlighted the fact that ever since the agency’s Commissioner-General was denied entry to Gaza in March 2024, he has not been allowed back into the Strip. He has also not received a visa from Israel to enter the occupied West Bank, including East Jerusalem, for more than a year. 

    The UNRWA spokesperson also deplored the lack of access for international media to the enclave. 

    “It certainly is time, if not long overdue, for international media to go into Gaza precisely to look into the facts and to help with reporting first-hand information on the horrors that people in Gaza are living through,” she said. 

    MIL OSI United Nations News

  • MIL-OSI: JMU experts offer back-to-school insights on AI, student wellness, and more

    Source: GlobeNewswire (MIL-OSI)

    HARRISONBURG, Va., July 22, 2025 (GLOBE NEWSWIRE) — As AI becomes increasingly embedded in college life, James Madison University is equipping students and faculty with the tools to think critically about its use. Professor Philip Frana, a leading voice on the ethical and educational implications of AI, urges the campus community to go beyond simply using AI — and start questioning it. 

    Topics Frana is available to discuss include: 

    • – Conformity risks: How AI-generated content may push students toward generic, conformist and even mediocre expression. 
    • – The value of originality: How tools that reduce originality or ingenuity have no place in higher education. “AI can aid brainstorming,” he said, “but it can’t replace an authentic student question or genuine personal insight.” 
    • – The design of dependency: How AI interfaces, like social media, are designed to be habit-forming, encouraging overreliance on automation. 
    • – The role of higher education: How universities must guide educators to use AI responsibly in the service of society and empower them to contribute directly to AI innovation on campus. 
    • – The future of education: How AI will increase the need for a university education that encourages critical thinking and fosters ethical reasoning.  

    In addition to Frana, the following experts are available to discuss students’ health and wellness, learning routines, budgeting and dating habits: 

    John Almarode, a professor in the College of Education, researches transitions, recalibrating routines and enhancing learner readiness. 

    Jeremy Akers, a professor in the College of Health and Behavioral Studies, researches nutrition, exercise and weight management. 

    Trent Hargens, a professor in the College of Health and Behavioral Studies, researches the physiological links between sleep quality, physical activity and sedentary behavior. 

    Ron Rubin, a lecturer in the College of Business, helps students understand the importance of personal financing, identifying basic budgeting strategies, how to build creditworthiness and saving for retirement. 

    Dayna Henry, a professor in the College of Health and Behavioral Studies, studies sexuality education and can discuss sexual assault prevention and sexual and relationship health. 

    Jennie Rosier, a professor in the College of Arts and Letters, researches romantic and parent-child relationships and has done several interviews recently on Gen Z dating habits. 

    To arrange an interview with these experts, please contact Chad Saylor at saylorcx@jmu.edu  or Eric Gorton at gortonej@jmu.edu 

    The MIL Network

  • MIL-OSI Africa: The Economic Community of West African States (ECOWAS) Commission experts receive training to improve coordination towards accelerated reform of digital trade

    Source: APO


    .

    ECOWAS, with the support of UN Trade and Development (UNCTAD), organized an e-trade reform tracker (eTRT) training in Lagos, Nigeria, on Monday 14th July, 2025.

    The eTRT is an innovative digital tool that will support implementing agencies in tracking progress, coordinating actions, and enhancing accountability in the implementation of e-commerce reforms.

    In his remarks at the opening ceremony of the training, Mr. Kolawole Sofola, Director of Trade at ECOWAS Commission, on behalf of Madame Massandjé TOURE-LITSE, ECOWAS Commissioner for Economic Affairs and Agriculture,  stated that this session offers a hands-on opportunity to explore how the Tracker works, how it can be used to streamline internal and inter-departmental coordination, and how it can help generate reliable data for monitoring and evaluation. This will be especially valuable as ECOWAS moves toward the operationalization of the Regional E-Commerce Committee, which will serve as the broader governance platform for the regional e-commerce agenda.

    “I encourage all participants, particularly our focal points from key implementing directorates and agencies, to engage actively, ask questions, and explore how the tool can be applied within your respective mandates. I am confident that today’s training will equip us with a shared understanding of how to work smarter, together, to deliver the ambitions of the ECOWAS E-Commerce strategy”.

    The objective of the E-Trade Reform Tracker training and workshop was to familiarize key directorates in the ECOWAS Commission with the structure and functionalities of the eTRT, promote utilization of the eTRT in the regular follow-up of the ECOWAS ECS implementation, and strengthen coordination of the implementation of the ECS.

    The training was conducted for the ECOWAS internal working group on e-commerce with the following key agencies and directorates from the ECOWAS Commission in attendance: Directorates of Trade, Free Movement of Persons and Migration, Customs Union and Taxation, Private Sector, Macroeconomic Stability and Multilateral Surveillance, Communications,  as well as the ECOWAS Regional Competition Authority, the ECOWAS Gender Development Center and the ECOWAS Youth and Sports Center who were in attendance.

    Distributed by APO Group on behalf of Economic Community of West African States (ECOWAS).

    MIL OSI Africa

  • MIL-OSI Africa: Minister of State at Ministry of Foreign Affairs Receives Phone Call from Acting Foreign Minister in Afghan Caretaker Government

    Source: Government of Qatar

    Doha, July 22 

    HE Minister of State at the Ministry of Foreign Affairs Dr. Mohammed bin Abdulaziz bin Saleh Al Khulaifi received a phone call on Tuesday from HE Acting Minister of Foreign Affairs in the Caretaker Government of Afghanistan Mawlawi Amir Khan Muttaqi.

    During the call, they discussed the latest developments in Afghanistan and ways to support the Afghan people.

    HE Acting Minister of Foreign Affairs in the Caretaker Government of Afghanistan expressed, during the call, his country’s appreciation for the State of Qatar’s efforts in facilitating the return of a second group of Afghan citizens from Germany to their country. 

    MIL OSI Africa

  • MIL-OSI Africa: Durban strengthens creative industry through strategic Mou signings

    Source: Government of South Africa

    In a move set to bolster the city’s creative economy, the eThekwini Municipality’s Economic Development Directorate has signed three Memorandums of Understanding (MOUs) with key stakeholders to strengthen Durban’s film and television sector.

    The three-year agreements were recently signed with the Film and Publications Board (FPB), the Companies and Intellectual Property Commission (CIPC), and the KwaMashu Community Advancement Projects (KCAP).

    These strategic partnerships aim to enhance skills development, promote regulatory compliance, and create economic opportunities for emerging creatives in the region.

    Chairperson of the Economic Development and Planning Committee, Thembo Ntuli, said the MOUs signify a shared commitment to sustainable industry growth, leveraging collective expertise to uplift communities and foster transformation.

    “This initiative aligns with the municipality’s vision of building an inclusive, vibrant, and economically active creative industry,” Ntuli said.

    Ntuli also highlighted the practical importance of the agreement, noting “these MOUs are more than symbolic, they are living frameworks.”

    “Through coordinated action, we will strengthen compliance, intellectual property education, enhance training, and ensure that our storytellers are equipped to compete on national and global stages,” Ntuli said.

    Guided by the District Development Model (DDM), the initiative aligns with the city’s integrated approach to planning and service delivery. It seeks to unlock opportunities for sustainable development through intergovernmental cooperation.

    The MOU with CIPC focuses on public education and outreach around intellectual property rights, while the FPB partnership promotes content classification and regulatory compliance.

    The KCAP agreement will enhance community engagement through initiatives such as film screenings, audience development, scriptwriting labs, and the KwaZulu-Natal African Film Festival.

    “These partnerships reflect our collective resolve to grow Durban’s creative economy while creating a safe, inclusive, and enabling environment. Together, we are shaping a future where the film sector contributes meaningfully to social development and economic transformation,” Director of the Economic Development Directorate, Shunnon Tulsiram said. – SAnews.gov.za
     

    MIL OSI Africa