Category: Asia Pacific

  • MIL-OSI Security: Kayenta Resident Sentenced to Seven Years in Prison for Making Hoax Calls to Elicit SWAT Responses

    Source: US FBI

    PHOENIX, Ariz. – James Thomas Andrew McCarty, 21, of New Mexico, was sentenced last week to seven years in prison after pleading guilty to charges in two separate indictments relating to hoax calls that elicited police SWAT responses. 

    With respect to the indictment originating from the District of Arizona, McCarty pleaded guilty on February 1, 2024, to making two hoax calls to high schools in Indiana and Oklahoma using the names of real students at the high schools he called. McCarty also pleaded guilty to two separate crimes of aggravated identity theft since he used the identity of an actual individual during these calls. On January 25, 2021, McCarty made repetitive hoax calls to two different high schools. In the first series of hoax calls to a high school in Indiana, McCarty called school officials representing that he was a student at the school, while using the real name of a student there, and that he was outside the school with an AR-15 rifle, a Glock handgun, and propane bottles ready to shoot at the school. In the second series of hoax calls about 20 minutes later to a high school in Oklahoma, McCarty called school officials representing that he was a student at the school, while using the real name of a student there, and that he was outside of the school with an AR-15 rifle, a Glock handgun, and propane tanks ready to shoot the propane tanks before coming into the school. McCarty also pleaded guilty to two hoax calls he made on April 16, 2021, and May 20, 2021. He used the name of the same homeowner in both calls, stating to police that he had killed his wife, would kill everyone, blow up the residence, and had four bombs planted outside of a retail location. McCarty was a resident of Kayenta and made all his calls while residing there.

    With respect to the indictment originating from the Central District of California, McCarty pleaded guilty on February 1, 2024, to conspiracy by working with others to access Ring doorbell accounts. On November 13, 2020, McCarty made an unauthorized intrusion into a victim’s Ring doorbell account in Florida, called the police in that Florida community where the victim lived, and represented himself to be the victim’s husband who had just killed her, was holding a hostage, and had rigged explosives at the residence. McCarty then livestreamed the law enforcement response and posted a message that he thought it was funny. McCarty also made multiple calls to victims in California.

    This investigation was conducted by the Federal Bureau of Investigation, Arizona and Los Angeles, California offices. Valuable assistance was provided by South Plainfield (New Jersey) Police Department, Snellville (Georgia) Police Department, Forsyth County (Georgia) Sheriff’s Office, Westfield (Indiana) Police Department, Vinita (Oklahoma) Police Department, and Parma (Ohio) Police Department. The United States Attorney’s Office, District of Arizona, Phoenix, and the United States Attorney’s Office in the Central District of California, handled the prosecution.
     

    CASE NUMBER:           CR 22-08133-PHX-SPL (Original District of Arizona Indictment)
                                          CR 24-00122-PHX-SPL (Originally Central District of CA—Rule 20)
    RELEASE NUMBER:    2024-082_McCarty

    # # #

    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

    MIL Security OSI

  • MIL-OSI Security: Ontario Man Arrested on Complaint Alleging He Exported Shipments of Firearms, Ammunition, and Other Military Items to North Korea

    Source: US FBI

    LOS ANGELES – A San Bernardino County man was arrested today on a federal criminal complaint alleging that he exported to North Korea shipments of firearms, ammunition and other military items that were concealed inside shipping containers bound from Long Beach.

    Shenghua Wen, 41, of Ontario, is charged with conspiracy to violate the International Emergency Economic Powers Act, a felony that carries a statutory maximum sentence of 20 years in federal prison.

    Wen – a Chinese national illegally residing in the United States – was arrested this morning and is expected to make his initial appearance this afternoon in United States District Court in downtown Los Angeles. His arraignment is expected to occur in the coming weeks.

    “It is essential that we protect our country from hostile foreign states that have adverse interests to our nation,” said United States Attorney Martin Estrada. “We have arrested a defendant who allegedly acted at the direction of the North Korean government by conspiring to illegally ship firearms, ammunition, and other military equipment to North Korea. I am grateful to our law enforcement partners for stopping this threat and their tireless commitment to the security of our nation.”

    “The significance of this arrest and discovery of this scheme cannot be overstated,” said FBI Los Angeles Assistant Director in Charge Akil Davis. “Not only did the investigative team prevent additional restricted items going to the North Korean regime, but they gathered valuable intelligence for the United States and our allies. I’m proud of the hard work that went into building the case against Wen by dedicated agents and our partners who specialize in cases that involve illegal exports to foreign adversaries who evade sanctions and utilize weapons and technology for nefarious purposes.”

    According to an affidavit filed on November 26 with the complaint, Wen obtained firearms, ammunition, and export-controlled technology with the intention of shipping them to North Korea – a violation of federal law and United States sanctions against that nation. Wen and his co-conspirators allegedly exported shipments of firearms and ammunition to North Korea by concealing the items inside shipping containers that were shipped from Long Beach through Hong Kong to North Korea.

    On August 14, law enforcement seized at Wen’s home two devices that he intended to send to North Korea for military use: a chemical threat identification device and a hand-held broadband receiver that detects eavesdropping devices. On September 6, law enforcement seized approximately 50,000 rounds of 9mm ammunition that Wen allegedly obtained to send to North Korea.

    A review of Wen’s iPhone revealed to law enforcement that in December 2023, Wen smuggled items from Long Beach to Hong Kong with their destination being North Korea. Messages retrieved from Wen’s cellphones revealed discussions he had earlier this year with co-conspirators about shipping military-grade equipment to North Korea. Some of these messages include photographs that Wen sent of items controlled for export under the International Traffic in Arms Regulations. From January 2024 to April 2024, Wen sent emails and text messages to a U.S.-based broker about obtaining a civilian plane engine. There also were several text messages on Wen’s iPhone concerning price negotiation for the plane and its engine.

    Wen is a Chinese national who is illegally in the United States after overstaying his student visa and is therefore prohibited from possessing any firearms or ammunition. Wen lacks the required licenses from the U.S. government to export ammunition, firearms, and the other devices that law enforcement seized at his home to North Korea.

    “The results of today’s arrest and search warrants are a testament to HSI and our partner agencies commitment to national security and protecting our sensitive technology” said Homeland Security Investigations (HSI) San Diego Special Agent in Charge Shawn Gibson. “It is a federal crime to illegally obtain and export certain US technologies by foreign countries and those who seek to circumvent the law will be thoroughly investigated.”

    “Mr. Wen’s arrest is a significant advancement in our collective efforts towards protecting our national security, safeguarding sensitive U.S. technologies and other export-controlled items, and ensuring accountability for the alleged bad actions,” said Bryan D. Denny, Special Agent in Charge for the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Western Field Office.       

    “The defendant’s alleged attempts to illicitly export firearms and military technology from the United States at the behest of the Democratic People’s Republic of Korea constitute an alarming violation of sanctions and export control laws,” said Special Agent in Charge Gregory Dunlap of the Office of Export Enforcement, Los Angeles Field Office. “OEE is committed to working with our federal partners to identify and disrupt illegal export schemes that undermine regional stability and our national security interests at home and abroad.”   

    A complaint contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty in court.

    The FBI; Homeland Security Investigations; DCIS; the Bureau of Alcohol, Tobacco, Firearms and Explosives; and the Department of Commerce Bureau of Industry and Security are investigating this matter.  

    Assistant United States Attorney Sarah E. Gerdes of the Terrorism and Export Crimes Section and Trial Attorney Ahmed Almudallal of the U.S. Department of Justice National Security Division’s Counterintelligence and Export Control Section are prosecuting this case. 

    MIL Security OSI

  • MIL-OSI Banking: Joint Statement of The Special AEM-MOFCOM Consultation

    Source: ASEAN – Association of SouthEast Asian Nations

    1. The Special AEM-Ministry of Commerce (AEM-MOFCOM) Consultation was held on 20 May 2025 via videoconference. The Consultation was co-chaired by H.E. Tengku Datuk Seri Utama Zafrul Aziz, Minister of Investment, Trade and Industry of Malaysia, and H.E. Wang Wentao, Minister of Commerce of China. The Meeting also welcomed the participation of H.E. Filipus Nino Pereira, Minister of Commerce and Industry, Democratic Republic of Timor-Leste as an observer.
     
    2. The Meeting exchanged views on regional and global economic challenges that could likely impact supply chain resiliency in the region, including the current global trade tensions. These challenges disrupt the global trade order, exacerbate trade
    tensions, and weaken confidence in the rules-based Multilateral Trading System (MTS).
     
    Download the full statement here.
    The post Joint Statement of The Special AEM-MOFCOM Consultation appeared first on ASEAN Main Portal.

    MIL OSI Global Banks

  • MIL-OSI Russia: Archaeologists from China and Uzbekistan were “prompted” to collaborate by the Sogdians who visited China in ancient times

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 23 (Xinhua) — The Fergana-Shanxi Archaeological Center and the Laboratory for the Protection and Restoration of Cultural Monuments were officially opened in Uzbekistan earlier this month. They were founded by the Archaeological Institute of North China’s Shanxi Province, the Shanxi Provincial Museum and Fergana State University.

    The parties agreed to conduct joint archaeological research in the Fergana Valley, train specialists, etc.

    The interest of experts on both sides in establishing cooperation is probably quite justified, given the fact that close contacts between the ancestors of the inhabitants of today’s Shanxi Province and Fergana Region were established in ancient times. In a sense, bilateral cooperation was prescribed more than a thousand years ago.

    From the middle of the 1st millennium BC, the Sogdians inhabited Sogdiana, a historical region between the Amu Darya and Syr Darya rivers in the territory of modern Uzbekistan and Tajikistan. As historical records and archaeological research show, they actively participated in trade on the Great Silk Road.

    Among the Sogdians who established contacts with the Celestial Empire, Yu Hong is one of the most well-studied. The discovery of his tomb in 1999 in Taiyuan, the capital of Shanxi Province, was a sensation in scientific circles.

    Archaeologists were extremely surprised when, during the excavation of a single-chamber brick tomb, a giant sarcophagus made of white marble appeared before them. The monumental coffin with elegant paintings and bas-reliefs has dimensions of 2.17 m, 2.95 m and 2.20 m and weighs more than 10 tons. In shape, it resembles a traditional Chinese wooden building with a “floating” roof.

    According to ancient Chinese rules, sarcophagi made of ordinary stone slabs were available only to members of imperial families. A sarcophagus made of high-quality snow-white marble in a burial has never been found in China before!

    Researchers soon clarified the identity of the deceased based on the epitaph. It turned out that a native of Central Asia was buried there, who bore a Chinese surname and the name Yu Hong.

    Yu Hong’s biography is legendary. He was born in 533 in Sogdiana. Starting from the age of 13, he held high positions in the Rouran Khaganate. Then he was sent on a mission to Persia, Tuyuhun and other states. As a diplomatic representative, Yu Hong visited the state of Northern Qi /550-577/, which included some of today’s northern regions of China, and for one reason or another remained in China until his death at the age of 60.

    Yu Hong held many positions in China, from the commander of the troops, the head of the Liangzhou district to the general. He was also assigned to oversee the affairs of foreign immigrants, said Ji Meijun, deputy director of the Institute for the Preservation of Cultural Heritage of Taiyuan City.

    In the 5th and 6th centuries, a large number of people from the “Western Region” visited Taiyuan and other cities in northern China. Traveling east along the Great Silk Road, they were either engaged in trade or cultural and artistic activities in the Celestial Empire. The numerous material sources they left behind formed brilliant pictures of the exchanges between the East and the West, experts believe.

    Rector of Fergana State University Bakhodirjon Shermukhammadov noted the ancient history of contacts between Central Asia and China at the opening ceremony of the Fergana-Shanxi Archaeological Center.

    The interaction between the two sides clearly demonstrates the modern significance of the Great Silk Road. Fergana State University is trying to serve as an example of Uzbek-Chinese cultural exchanges and cooperation, he added. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: South Korea and the United States have not discussed the issue of reducing the American military contingent

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    SEOUL, May 23 (Xinhua) — The Republic of Korea’s Defense Ministry said Friday that Seoul has not discussed with Washington the issue of withdrawing some U.S. troops from the Korean Peninsula.

    The ministry issued a statement in response to a US media report that Washington was considering withdrawing about 4,500 troops from the ROK.

    There are currently about 28.5 thousand American military personnel stationed in the Republic of Korea. –0–

    MIL OSI Russia News

  • White House ‘MAHA’ report calls out food, chemicals impact on children’s health

    Source: Government of India

    Source: Government of India (4)

    A commission led by U.S. Health Secretary Robert F. Kennedy Jr. on Thursday issued a report that said processed food, chemicals, stress and overprescription of medications and vaccines may be factors behind chronic illness in American children.

    The report, from the commission named after the Make America Healthy Again, or MAHA, social movement aligned with Kennedy, is focused on what he says is a national crisis of increasing rates of childhood obesity, diabetes, cancer, mental health disorders, allergies and neurodevelopmental conditions like autism.

    “MAHA is hot,” President Donald Trump said during a press event. “We will not allow our public health system to be captured by the very industries it’s supposed to oversee.”

    Kennedy said there was consensus among the commission’s members to prioritize what he called the ultra-processed food crisis and to work to improve the food American children eat.

    The report also highlighted studies linking health disorders in humans and animals to the weed killers glyphosate and atrazine, but did not call for specific regulatory changes or restrictions on pesticides used in farming. It said the chemicals should be further researched.

    It criticized the U.S. approach to vaccines in children, saying European children are recommended to receive fewer. He called for study of the impact of vaccines on childhood chronic disease and of vaccine injuries.

    Kennedy, a longtime vaccine skeptic, has for many years pushed debunked theories about the safety of vaccines contrary to scientific evidence. As head of the agency, he has overseen cuts of about 20,000 of 80,000 employees due to layoffs and departures.

    Peter Lurie, president of the Center for Science in the Public Interest, a food and health watchdog, said the report recycles longtime concerns of Kennedy, from vaccines to seed oils.

    “To the extent that they come up with good ideas, they’re going to run into the self-inflicted wound of their own decimation of the federal workforce. Many of their better ideas will not be doable,” Lurie said.

    Many of the MAHA activists that surround Kennedy were present in Washington for the release of the report, which they largely applauded as a vindication of their work.

    But, one such activist, Kelly Ryerson, who campaigns against the use of glyphosate-based pesticides, called the report “very cautious on the subject of pesticides,” adding that she’d like to see more Environmental Protection Agency action on the topic.

    Bayer BAYGn.DE, which is involved in thousands of lawsuits surrounding its glyphosate-based herbicide Roundup, said some details around pesticides in the report were not “fact based.”

    “We believe a fact and data-driven approach with robust science that follows international gold standards is necessary to support these important initiatives,” Bayer said.

    As an environmental lawyer, Kennedy was associated with three lawsuits related to Roundup, which is owned by Bayer after its acquisition of Monsanto.

    ULTRAPROCESSED FOOD

    The food industry has said that additives in packaged food have been thoroughly reviewed by regulators and help it remain shelf stable.

    The American Soybean Association was critical of the report, which they said was “drafted entirely behind closed doors” and inaccurately suggests that pesticides and soy oils contribute to negative health outcomes.

    “We’re discouraging people from consuming heart-healthy oils and driving them to instead use fats that will make them less healthy and cost them more in the process,” said ASA Director Alan Meadows, a soybean farmer.

    Marion Nestle, a professor of nutrition at New York University, told Reuters the report was “a devastating critique of what’s happened to America’s children.”

    But she said, “to deal with the root causes of the conditions detailed here, this administration will have to take on Big Food, Big Pharma, Big Agriculture, Big Chemical, and get coal-burning plants to clean up their emissions. A lot of this is counter to the MAGA agenda, and the decimation of federal agencies can’t help.”

    The report called for enhanced surveillance and safety research into drugs and childhood health outcomes and clinical studies comparing whole-food to processed-food diets in children.

    The definition of ultra-processed food is hotly debated, while the report describes it as industrially manufactured products.

    The report says that core products of so-called “Big Food”, which typically references companies such as Kraft Heinz KHC.O, Nestle NESN.S and PepsiCo PEP.O, are ultra-processed.

    Kraft Heinz manufactures Heinz Ketchup and Kraft mac & cheese, Nestle produces frozen pizzas and dinners under the Stouffer’s and Lean Cuisine brands, while PepsiCo owns Frito-Lay, a salty snacks business.

    The report also cites infant formula as an ultra-processed food that is concerning.

    FARM LOBBY PRESSURE

    Thursday’s report will be followed by policy prescriptions due in August. Trump signed an executive order in February establishing the commission whose members include Kennedy, Agriculture Secretary Brooke Rollins, other cabinet members and senior White House officials.

    Before the report’s publication, farm lobby groups had warned that criticizing specific farm practices could impede collaboration on the administration’s health agenda and put food production at risk.

    According to a source familiar with the matter, the lobby groups had strongly pressured the administration to not mention pesticides in the report.

    EPA head Lee Zeldin said on a call with reporters that farmers are key partners in enacting the MAHA agenda and that any changes to pesticide regulations would need careful consideration.

    REUTERS

  • MIL-OSI Security: Indiana Woman Pleads Guilty to Wire Fraud for Embezzling Nearly $1.2 Million From Employer

    Source: US FBI

    CHARLOTTE, N.C. – Christina Robinson, 52, of Fort Wayne, Indiana, appeared before U.S. Magistrate Judge David C. Keesler today, and pleaded guilty to wire fraud for embezzling nearly $1.2 million from her employer, announced Dena J. King, U.S. Attorney for the Western District of North Carolina.

    Robert M. DeWitt, Special Agent in Charge of the Federal Bureau of Investigation (FBI), Charlotte Division, joins U.S. Attorney King in making today’s announcement.

    According to filed plea documents and the hearing, from September 2013 to April 2023, Robinson engaged in a scheme to defraud a Charlotte-based company by abusing her position as the company’s controller to embezzle nearly $1.2 million in company funds. During the scheme, Robinson misused her position and access to the company’s bank accounts to carry out the scheme by moving the embezzled funds and withdrawing them in cash. To conceal the theft and to remain undetected, Robison made materially false and misleading accounting entries in the company’s books and records. As Robinson admitted in court today, she used some of the embezzled funds to pay for personal expenses, including more than $330,000 in purchases, over $324,000 in credit card payments, more than $80,000 in loan payments, over $40,000 in mortgage payments, and more than $35,000 in car payments.

    Robinson was released on bond following the plea hearing. At sentencing, she faces up to 20 years in prison and a $250,000 fine for the wire fraud charge. A sentencing date has not been set.

    The FBI investigated the case.

    Assistant U.S. Attorney William Bozin of the U.S. Attorney’s Office in Charlotte is prosecuting the case.

     

    MIL Security OSI

  • MIL-OSI Security: Bryan County Resident Pleads Guilty to Assault with Intent to Commit Murder

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Jason Edward Lewis, age 48, of Kenefic, Oklahoma, entered a guilty plea to one count of Assault with Intent to Commit Murder in Indian Country.

    The Superseding Indictment alleged that on or about July 10, 2024, Lewis assaulted an individual with intent to commit murder.  The crime occurred in Bryan County, within the boundaries of the Choctaw Nation Reservation, in the Eastern District of Oklahoma.

    The charges arose from an investigation by the Federal Bureau of Investigation, the Choctaw Nation Lighthorse Police, and the Bryan County Sheriff’s Office.

    The Honorable D. Edward Snow, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.  Lewis will remain in the custody of the United States Marshals Service pending sentencing.

    Assistant U.S. Attorney Rachel Geizura represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Adair County Resident Sentenced for Child Abuse

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Brian Keith Bowen Jr., age 26, of Stilwell, Oklahoma, was sentenced to 48 months in prison for one count of Child Abuse in Indian Country.

    The charges arose from an investigation by the Federal Bureau of Investigation and the Cherokee Nation Marshals Service.

    On May 22, 2024, Bowen pleaded guilty to the charge.  According to investigators, between April and May of 2023, Bowen maliciously harmed a child entrusted in his care.  Bowen’s mistreatment came to light on May 2, 2023, when medical professionals treating the child observed numerous injuries, including fading bruises, petechiae, and a spiral bone fracture consistent with child abuse.

    The crimes occurred in Adair County, within the boundaries of the Cherokee Nation Reservation, in the Eastern District of Oklahoma.

    The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the hearing.  Bowen will remain in the custody of the U.S. Marshals Service pending transportation to a designated United States Bureau of Prisons facility to serve a non-paroleable sentence of incarceration.

    Assistant U.S. Attorney Jessie K. Pippin represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Adair County Resident Pleads Guilty to Involuntary Manslaughter

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Jade Larae Duncan, age 27, of Stilwell, Oklahoma, entered a guilty plea of one count of Involuntary Manslaughter in Indian Country.

    The Indictment alleged that on December 2, 2022, Duncan unlawfully killed an individual in the commission of an unlawful act not amounting to a felony and in the commission in an unlawful manner, without due caution and circumspection, while driving under the influence of alcohol and departing the roadway into a creek bed.  The crime occurred in Adair County, within the boundaries of the Cherokee Nation Reservation, in the Eastern District of Oklahoma.

    The charge arose from an investigation by the Federal Bureau of Investigation, the Oklahoma Highway Patrol, and the Adair County Sheriff’s Department.

    The Honorable Gerald L. Jackson, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.

    Assistant U.S. Attorneys Patrick M. Flanigan, Lewis M. Reagan, and T. Cameron McEwen represented the United States.

    MIL Security OSI

  • MIL-OSI Russia: Press Briefing Transcript: Julie Kozack, Director, Communications Department, May 22, 2025

    Source: IMF – News in Russian

    May 22, 2025

    SPEAKER:  Ms. Julie Kozack, Director of the Communications Department, IMF

    MS. KOZACK: Good morning, everyone and welcome to this IMF Press Briefing.  It is wonderful to see you all today on this rainy Washington morning, especially those of you here in person and of course also those of you joining us online.  My name is Julie Kozak.  I’m the Director of Communications at the IMF.  As usual, this press briefing will be embargoed until 11:00 a.m. Eastern Time in the United States.  And as usual, I will start with a few announcements and then I’ll take your questions in person on WebEx and via the Press Center.  

    So first, our Managing Director, Kristalina Georgieva, and our First Deputy Managing Director, Gita Gopinath, are currently attending the G7 Finance Ministers and Central Bank Governors meeting taking place in Canada right now.  Second, on May 29th through 30th, the Managing Director will travel to Dubrovnik, Croatia to attend a joint IMF Croatia National Bank Conference focused on promoting growth and resilience in Central, Eastern, and Southeastern Europe.  The Managing Director will participate in the opening panel and will hold meetings with regional counterparts.  

    On June 2nd, the Managing Director will travel to Sofia, Bulgaria to attend the 30th Anniversary celebration of the National Trust Ecofund.  During her visit, she will also hold several bilateral meetings with the Bulgarian authorities.  

    Our Deputy Managing Director, Nigel Clarke, will travel to Paraguay, Brazil, and the Netherlands next month.  On June 6th, he will launch the IMF’s new regional training program for South America and Mexico, which will be hosted in Asuncion by the Central Bank of Paraguay.  From there, he will travel to Brasilia to deliver a keynote speech on June 10th during the Annual Meeting of the Caribbean Development Bank.  He will also then travel to the Netherlands on June 12th to 13th to participate in the 2025 Consultative Group to Assist the Poor Symposium and to meet with the Dutch authorities.  

    Our Deputy Managing Director, Kenji Okamura, will be in Japan from June 11th to 12th for the 10th Tokyo Fiscal Forum to discuss fiscal frameworks and GovTech in the Asia Pacific region.  

    And finally, on a kind of housekeeping or scheduling issue, the Article IV Consultation for the United States will be undertaken on a later timetable this year, with discussions to be held in November.  

    And with those rather extensive announcements, I will now open the floor to your questions.  For those connecting virtually, please turn on both your camera and microphone when speaking.  All right, let’s open up.  Daniel.

     

    QUESTIONER: Thanks for taking my question.  I just wonder if the IMF has any reaction to the passage of last night in the House of Representatives of the One Big, Beautiful bill.  And a related question, how concerned are you by the increase in yields on long-dated U.S. treasuries?  What do you think it says about the market’s view of U.S. debt going into the future and sort of any possible spillovers for IMF borrowers as well?  MS. KOZACK: On the first question, what I can say is we take note of the passing of the legislation in the House of Representatives earlier this morning.  What we will do is we will look to assess a final bill once it has passed through the Senate and also once it’s been enacted.  And, of course, we will have opportunities to share our assessment over time in the various products where we normally would convey our fulsome views.  

    On your second question, which was on the bond market.   What I can say there is that we know that the U.S. government bonds are a safe haven asset, and the U.S. dollar, of course, plays a key role as the world’s reserve currency.  The U.S. bond market plays a critical role, of course, in finance and in safe assets.  And this is underpinned by the liquidity and depth of the U.S. market and also the sound institutions in the U.S.  We don’t see any changes in those functions.  And, of course, what we can also say is that although there has been some volatility in markets, market functioning, including in the U.S. Treasury market, has so far been orderly.  

     

    QUESTIONER: My question is about Ukraine.  Two topics particularly.  So, the first one, when is the next review of the Ukraine’s EFF is going to be completed, and what amount of money would be disbursed to Kyiv?  And could you please outline the total sum that is remaining within the current program?  And the second part, it’s about debt level.  What is the IMF assessment of current Ukraine’s government debt level?  Is it stable?  Do you see any vulnerabilities and any risks for Ukraine?  Thank you.  

    MS. KOZACK: Any other questions on Ukraine?  Does anyone online want to come in on Ukraine?  Okay, I don’t see anyone.  

    What I can say on Ukraine is that just two days ago, our Staff team started policy discussions with the Ukrainian authorities on the eighth review under the eff.  So, the team is on the ground now.  The discussions are taking place in Kiev and the team will provide an update on the progress at the end of the mission.

    In terms of the potential disbursement, I’m just looking here; that’s the seventh disbursement.  We will come back to you on the size of the disbursement, but it should show in the Staff report for the Seventh Review what would be expected for the Eighth Review.  And it would also show the remaining size of the program.  But we’ll come back to you bilaterally with those exact answers.  

    And what I can then say on the debt side is at the time of the Seventh Review under the program, we assessed debt, Ukraine’s debt to be sustainable on a forward-looking basis and as with every review that the team of course, will update its assessment as part of the eighth review discussion.  We’ll have more to say on the debt as the eighth review continues.  

     

    QUESTIONER: Just one more thing on Ukraine.  Does it make sense for them to consider using the euro as a defense currency for their currency, given the shifting geopolitical sense and what we are seeing with the dollar? MS. KOZACK: So right now, under the program, Ukraine has an inflation targeting regime, and that is where what the program is focused on, our program with Ukraine. So, they have an inflation targeting regime.  They are very much focused on ensuring the stability of that monetary policy regime that Ukraine has.  And, of course, that involves a floating exchange rate.  And I don’t have anything beyond that to say on the currency market.

     

    QUESTIONER: The agreement with the IMF established a target for the Central Bank Reserve to meet by June.  According to the technical projection, does the IMF believe Argentina will meet this target?  And if it’s not met, is it possible that we will grant a waiver in the future?

    MS. KOZACK: anything else on Argentina?  

    QUESTIONER: About Argentina, what is your assessment of the progress of the program agreed with Argentina more than a month after its announcement in last April?  

     

    QUESTIONER: The government is about to announce a measure to gain access to voluntarily, of course, but to the dollars that are “under the mattress”, as we call them, undeclared funds to probably meet these targets that Roman was asking about.  I was wondering if this measure has been discussed with the IMF.  And also, you mentioned Georgieva visiting Paraguay and Brazil, if you there’s any plan to visit Argentina as well?  

    QUESTIONER: President Milei is about to announce, you know, Minister Caputo, in a few minutes that there is a measure to use similar to attacks Amnesty.  Is the IMF concerned that this could violate its regulations against illicit financial flows? 

    MS. KOZACK: So, with respect to Argentina, on April 11th, I think, as you know, our Executive Board approved a new four-year EFF arrangement for Argentina.  It was for $20 billion.  It contained an initial disbursement of $12 billion.  And that the aim of that program is to support Argentina’s transition to the next phase of its stabilization program and reforms.  

    President Milei’s administration’s policies continued to deliver impressive results.  These include the rollout of the new FX regime, which has been smooth, a decline in monthly inflation to 2.8 percent in April, another fiscal surplus in April, and reaching a cumulative fiscal surplus of 0.6 percent of GDP for the year, and efforts to continue to open up the economy.  At the same time, the economy is now expanding, real wages are recovering, and poverty continues to fall in Argentina.  

    The Fund continues to support the authorities in their efforts to create a more stable and prosperous Argentina.  Our close engagement continues, including in the context of the upcoming discussions for the First Review of the program.  This First Review will allow us to assess progress and to consider policies to build on the strong momentum and to secure lasting stability and growth in Argentina.  And in this regard, there is a shared recognition with the authorities about the importance of strengthening external buffers and securing a timely re-access to international capital markets.  

    What I can say on the question about the announcements on that — the question on the undeclared assets.  All I can say right now is that we’re following developments very closely on this, and of course, the team will be ready to provide an assessment in due course.  

    On the second part of that question, I do want to also note, and this is included in our Staff report, that the authorities have committed to strengthening financial transparency and also to aligning Argentina’s AML CFT, the Anti-Money Laundering framework, with international standards, as well as to deregulating the economy to encourage its formalization.  So, any new measures, including those that may be aimed at encouraging the use of undeclared assets, should be, of course, consistent with these important commitments.  

    And on your question about Paraguay and Brazil, I just want to clarify that it is our Deputy Managing Director, Nigel Clarke, who will be traveling to Brazil and Paraguay, not the Managing Director.  

     

    QUESTIONER: Two questions on Syria.  With the U.S. and EU announcing the lifting of sanctions recently, how does this affect any sort of timeline with providing economic assistance?  And secondly, the Managing Director has said that the Fund has to first define data.  Can you just walk through what that entails?  

    MS. KOZACK: Can you just repeat what you said?  The Managing Director has said?

     

    QUESTIONER: The need to define data.  Just sort of a similar question.  I’m just wondering, following the World Bank statement last week about, you know, Syria now being eligible to borrow from the bank, what sort of discussions the Fund has had with the Syrian authorities since the end of the Spring Meetings and, you know, any update you can give us around possible discussions around an Article IV.  

     

    QUESTIONER: About the relationship and if there’s any missed planned virtual or on the ground? 

    MS. KOZACK: Let me step back and give a little bit of an overview on Syria. So, first, you know, we’re, of course, monitoring developments in Syria very closely.  Our Staff are preparing to support the international community’s efforts to help with Syria’s economic rehabilitation as conditions allow.  We have had useful discussions with the new Economic Team who took office in late March, including during the Spring Meetings.  And, of course, you will perhaps have seen the press release regarding the roundtable that was held during the Spring Meetings.  IMF Staff have already started to work to rebuild its understanding of the Syrian economy.  We’ve been doing this through interactions with the authorities and also through coordination with other IFIs. And just to remind everyone, our last Article IV with Syria was in 2009.  So, it’s been quite some time since we have had a substantive engagement with Syria.  Syria will need significant assistance to rebuild its economic institutions.  We stand ready to provide advice and targeted and well-prioritized technical assistance in our areas of expertise. I think this goes a little bit to your question on, like, what do we mean by defining data.  I think what the Managing Director was really referring to there is since it has been such a long time since we have had a substantive engagement with Syria, the last Article IV, as I said, was in 2009.  I think there, what she’s really referring to is the need to really work with the Syrian authorities to rebuild basic economic institutions, including the ability to produce economic statistics, right, so that we — so that we and the authorities and the international community of course, can conduct the necessary economic analysis so that we can best support the reconstruction and recovery efforts.  

    With respect to the lifting of sanctions, what I can say there is that, of course, the lifting of sanctions and the lifting of sanctions are a matter between member states of the IMF.  What we can say in serious cases that the lifting of sanctions could support Syria’s efforts to overcome its economic challenges and help advance its reconstruction and economic development.  Syria, of course, is an IMF member, and as we’ve just said, you know, we are, of course, engaged closely with the Syrians to explore how, within our mandate, we can best support them.  

     

    QUESTIONER: My question is on Russia.  In what ways is the IMF monitoring Russia’s economy under the current sanctions and conflict conditions, and have regular Article IV Consultations or other surveillance activities with Russia resumed to track its economic developments?  

    MS. KOZACK: What I can say with respect to Russia is that we are, our Staff, are analyzing data and economic indicators that are reported by the Russian authorities.  We are also looking at counterparty data that is provided to us by other countries, and this is particularly true for cross-border transactions, as well as data from third-party sources. So, this data collection using official and other sources does allow us to put together a picture of the Russian economy.  

    We did provide an assessment in the 2025 April WEO, the one that we just released about a month ago.  In this WEO, we assess Russia’s growth at — we expect Russia to grow at 1.5 percent in 2025, 0.9 percent in 2026, and we expect inflation to come down to 8.2 percent in 2025 and 4.4 percent in 2026.  And I don’t have a timetable for the Article IV at this time.  

     

    QUESTIONER: I’d like to ask about Deputy Management Director Okamura’s visits to Japan.  So, my question is, what economic topics will be on the agenda during his stay?  Could you tell me a bit more in detail?  

    MS. KOZACK: Deputy Managing Director Okamura will travel to Japan, as I said, from June 11th to 12th, and he will be attending the Tokyo Fiscal Forum.  So, this will be the 10th Tokyo Fiscal Forum.  It’s an annual conference that we co-host in Japan every year and the focus is on issues of fiscal policy. In this particular one, Deputy Managing Director Okamura will be discussing fiscal frameworks. It’s very important for all countries to have sound fiscal frameworks so they can implement sound fiscal policy.  He will also be discussing GovTech not only in Japan but in the Asia Pacific region.  And of course, GovTech is very important for countries because it’s a way of modernizing and making government both provision of services in some cases but also potentially collection of revenue more effective and more efficient.  So, those will be the focus of his discussions in Tokyo.  

     

    QUESTIONER: I have a question on the recent bailout package by IMF to Pakistan.  The Indian government has expressed a lot of displeasure with Pakistan planning to use this package to build — rebuild — areas that allegedly support cross-border terrorism.  Does the IMF have any assessment of this?  Secondly, I also have another question.  Could you please provide information on the majority vote that was received in approving this bailout package for Pakistan on May 9th?  If you can disclose the information.  

    MS. KOZACK: Any other questions on Pakistan?  

     

    QUESTIONER: Just adding to that, do you have an update on the implications of the escalation of facilities in that border between Pakistan and India on both economies.  

     

    QUESTIONER: Thanks a lot.  I guess the only spin I would put on is generally what safeguards does the IMF have that its funds won’t be used for military or in support of military actions, not only there but as a general matter.  And I also, if you’re able to, there was some controversy about the termination of India’s Executive Director of the IMF, K.V. Subramanian.  Do you have any insight into–there are reports there–what it was about but what do you say it’s about?  Thanks a lot.  

    MS. KOZACK: With respect to the Indian Executive Director who had been at the Fund, all I can say on this is that the appointment of Executive Directors is a member for the — is a matter for the member country.  It’s not a matter for the Fund, and it’s completely up to the country authorities to determine who represents them at the Fund.  

    With respect to Pakistan and the conflict with India, I want to start here by first expressing our regrets and sympathies for the loss of life and for the human toll from the recent conflict.  We do hope for a peaceful resolution of the conflict.  

    Now, turning to some of the specific questions about the Board approval of Pakistan’s program, I’m going to step back a minute and provide a little bit of the chronology and timeframe.  The IMF Executive Board approved Pakistan’s EFF program in September of 2024.  And the First review at that time was planned for the first quarter of 2025.  And consistent with that timeline, on March 25th of 2025, the IMF Staff and the Pakistani authorities reached a Staff-Level Agreement on the First Review for the EFF.  That agreement, that Staff-Level Agreement, was then presented to our Executive Board, and our Executive Board completed the review on May 9th.  As a result of the completion of that review, Pakistan received the disbursement at that time.  

    What I want to emphasize here is that it is part of a standard procedure under programs that our Executive Board conducts periodic reviews of lending programs to assess their progress.  And they particularly look at whether the program is on track, whether the conditions under the program have been met, and whether any policy changes are needed to bring the program back on track.  And in the case of Pakistan, our Board found that Pakistan had indeed met all of the targets.  It had made progress on some of the reforms, and for that reason, the Board went ahead and approved the program.  

    With respect to the voting or the decision-making at our Board, we do not disclose that publicly.  In general, Fund Board decisions are taken by consensus, and in this case, there was a sufficient consensus at the Board to allow us to move forward or for the Board to decide to move forward and complete Pakistan’s review.  

    And with respect to the question on safeguards, I do want to make three points here.  The first is that IMF financing is provided to members for the purpose of resolving balance of payments problems.  

    In the case of Pakistan, and this is my second point, the EFF disbursements, all of the disbursements received under the EFF, are allocated to the reserves of the central bank.  So, those disbursements are at the central bank, and under the program, those resources are not part of budget financing.  They are not transferred to the government to support the budget. 

    And the third point is that the program provides additional safeguards through our conditionality.  And these include, for example, targets on the accumulation of international reserves.  It includes a zero target, meaning no lending from the central bank to the government.  And the program also includes substantial structural conditionality around improving fiscal management.  And these conditions are all available in the program documents if you wanted to do a deeper dive.  And, of course, any deviation from the established program conditions would impact future reviews under the Pakistan program.  

     

    QUESTIONER: I have a question on Egypt.  There is a mission in Egypt for the First Review of the EFF loan program.  So, can you please update us on the ongoing discussions, especially since the Prime Minister of Egypt announced yesterday that the program could be concluded in 2027 rather than 2026?  

    MS. KOZACK: Any other questions on Egypt?  I have a question from the Press Center on Egypt, which I will read aloud.  The question is when will the Fifth Review currently underway with the Egyptian government be concluded, and when will the Executive Board approve this review?  And how much money will Egypt receive once the review is approved?  

    So, here’s what I can share on Egypt.  First, let me start here.  So first, I just want to say that the Fund remains committed to supporting Egypt in building its economic resilience and fostering higher private sector-led growth.  Egypt has made clear progress on its macroeconomic reform program, with notable improvements in inflation and foreign exchange reserves.  For the past few weeks, IMF Staff has had productive discussions with the Egyptian authorities on economic performance and policies under the EFF.  As Egypt’s macroeconomic stabilization is taking hold, efforts must now focus on accelerating and deepening reforms that will reduce the footprint of the state in the Egyptian economy, level the playing field, and improve the business environment.  Discussions will continue between the IMF and the Egyptian authorities on the remaining policies and reforms that could support the completion of the Fifth Review.  

     

    QUESTIONER: My question is about Sri Lanka.  Sri Lanka’s program is subject to IMF Board approval.  The review is subject to IMF Board approval, but we still haven’t got any word on when that would be.  Is there any delay in this?  And is this delay attributed to the pending electricity adjustments, tariff adjustments, that the Sri Lankan government has committed to?  

    MS. KOZACK: So just stepping back for a minute.  On April 25th, IMF Staff and the Sri Lankan authorities reached Staff-Level Agreement on the Fourth Review of Sri Lanka’s program under the EFF.  And once the review is approved by our Executive Board, Sri Lanka will have access to about $344 million in financing.  Completion of the review is subject to approval by the Executive Board, and we expect that Board meeting to take place in the coming weeks.  

    The precise timing of the Board meeting is contingent on two things.  The first is implementation of prior actions, and the main prior actions are relating to restoring electricity, cost recovery pricing and ensuring proper function of the automatic electricity price adjustment mechanism.  And the second contingency is completion of the Financing Assurances Review, which will focus on confirming multilateral partners, committed financing contributions to Sri Lanka and whether adequate progress has been made in debt restructuring.  So, in a nutshell, completion of the review is subject to approval by the Executive Board.  We expect the Board meeting to take place in the coming weeks.  And it’s contingent on the two matters that I just mentioned.  

     

    QUESTIONER: Thank you for having my questions on Ecuador.  Since the IMF is still completing the second review under the EFF program for Ecuador, do you think it’s going to be time to change the program, the goals, or maybe the amount of the program?  Because Ecuador is now facing different challenges compared to 2024.  The oil prices are falling, so that is going to affect the fiscal situation for Ecuador.  And also, I would like to know if Ecuador is still looking for a new program under the RSF.  And the last one, I would like to know if, do you think that Ecuador is going to need to make some important changes this year on oil subsidies and a tax reform?  I think, as I said, Ecuador now is facing some important challenges in the fiscal situation, so do you think it’s going to be possible because of, you know, all the social protests and all that kind of stuff?  Do you think it’s going to be possible to do that in Ecuador?  

     

    QUESTIONER: Is there a request, an official request, in place to modify the program?  And if there is, of course, details of the new one, you can share.  

    MS. KOZACK: And then I have one question online from the Press Center regarding Ecuador.  Is the sovereign negotiating new targets, given their fiscal position deteriorated compared to last year?  Our understanding is that $410 million was not dispersed under the First Review.?

    So let me share what I can on Ecuador.  So, right now, representatives from the IMF, the World Bank, and the Inter-American Development Bank are in Quito this week to meet with the authorities and discuss the strengthening of financial and technical support to the country.  As part of this tripartite visit, we have a new IMF Mission Chief who is participating, and she is also using that opportunity to have courtesy meetings with the authorities and to continue discussions and advance toward a Second Review under Ecuador’s EFF.  

    What else I can add, just as background, is that the Executive Board in December approved the First Review of Ecuador’s 48-month EFF.  About $500 million was disbursed after the approval of that Frist Review.  And at that time, the Executive Board also concluded the Article IV Consultation.

    I can also say that the authorities have made excellent progress in the implementation of their economic program under the EFF.  And regarding the precise timing of the Second Review, we will provide an update on the next steps in due course and when we’re able to do so.  

     

    QUESTIONER: Just a quick question on tariffs.  I’m just wondering if the IMF has a response to the U.S.-China deal that was struck in Geneva earlier this month.  You know, if the deal holds, I appreciate it’s a 90-day pause, but if the deal holds, how would you foresee that changing the Fund’s current economic forecast for the U.S. and China and for the global economy?  Thanks.  

    MS. KOZACK: As you noted, earlier in May, China and the U.S. announced a 90-day rollback of most of the bilateral tariffs imposed since April 2nd, and they established a mechanism to discuss economic and trade relations.  The two sides reduced their tariff from peak levels, leaving in place 10 percent additional tariffs.  So, the additional tariffs before this agreement were 125 percent.  Now, the additional tariff has agreed to be 10 percent, you know, for the 90 days.  This is obviously a positive step for the world’s two largest economies.

    What I can also add is that for the U.S., you may recall, during the Spring Meetings, we talked a lot about the overall effective tariff rate for the U.S.  At that time, we assessed it at 25.5 percent.  This announcement and the reduction in tariffs will bring the U.S. effective tariff rate down to a bit over 14 percent.  

    Now, with respect to the impact, what I can say is that the reduction in tariffs and the easing of tensions does provide some upside risk to our global growth forecast.  We will be updating that global growth forecast as part of our July WEO.  And so that will give us an opportunity to provide a full assessment.  All of this said, of course, the outlook, the global outlook in general does remain one of high uncertainty.  And so that uncertainty is still with us.  

     

    QUESTIONER: I have a broad question regarding the following – at the IMF World Bank Spring Meeting, the recent one,  the Treasury Secretary Bessent called for the IMF and the World Bank to refocus on their core mission on macroeconomic stability and development.  Did the IMF start any discussion on this topic with the U.S. administration?  And my second question, do you foresee any changes to your lending programs to take into account the views of the Trump Administration regarding issues like climate change and international development?  Thank you.  

    MS. KOZACK: What I can say on this is the U.S. is our largest shareholder, and we greatly value the voice of the United States.  We have a constructive engagement with the U.S. authorities, and we very much appreciate Secretary Bessent’s reiteration of the United States’ commitment to the Fund and to our role.  The IMF has a clearly defined mandate to support economic and financial stability globally.  Our Management Team and our entire Staff are focused exactly on this mandate, helping our 191 members tackle their economic challenges and their balance of payments risks.  

    What I can also add is that at the most recent Spring Meetings, the ones we just had in April, our membership identified two areas where they’ve asked the IMF to deepen our work.  And the first is on external imbalances, and the second is on our monitoring of the financial sector.  So they’re looking for us to really deepen our work in these two areas.  

    As far as taking that work forward, we will continue working with our Executive Board on these areas, as well as to carry out some important policy reviews.  And I think the Managing Director referred to these during the Spring Meetings.  The first is the Comprehensive Surveillance Review, which will set out our surveillance priorities for the next five years.  And the second is the review of program design and conditionality.  And that will carefully consider how our lending can best help countries address low growth challenges and durably resolve their balance of payments weaknesses.  

    I have a slight update for you on Ukraine, which says — so the eighth — so if we look at the documents that were published at the time of the Seventh Review program, the one that was approved by the Executive Board a little while ago, based on that, the Eighth Review disbursement would be about $520 million.  And, the discussions of the Eighth Review are ongoing, and any disbursement, as always, is subject to approval by our Executive Board. 

    And with that, I will bring this press briefing to a close.  So first, let me thank you all for your participation today.  As a reminder, the briefing is embargoed until 11:00 a.m. Eastern Time in the United States.  As always, a transcript will be made available later on IMF.org.  In case of any clarifications or additional queries, please do not hesitate to reach out to my colleagues at media@imf.org.  This concludes our press briefing, and I wish everyone a wonderful day.  I look forward to seeing you next time.  Thanks very much.

     

      

    *  *  *  *  *

     

    IMF Communications Department
    MEDIA RELATIONS

    PRESS OFFICER: Meera Louis

    Phone: +1 202 623-7100Email: MEDIA@IMF.org

    https://www.imf.org/en/News/Articles/2025/05/22/tr-05222025-com-regular-press-briefing-may-22-2025

    MIL OSI

    MIL OSI Russia News

  • MIL-OSI Canada: Alberta-Hokkaido: 45 years in the making

    Source: Government of Canada regional news (2)

    MIL OSI Canada News

  • MIL-OSI Canada: G7 Finance Ministers and Central Bank Governors’ Communiqué

    Source: Government of Canada News

    Statement

    Banff, May 20-22, 2025

    1. We, the G7 Finance Ministers and Central Bank Governors, met on May 20-22, 2025 in Banff, Canada together with the Heads of the International Monetary Fund (IMF), World Bank Group (WBG), Organisation for Economic Cooperation and Development (OECD), and Financial Stability Board (FSB). We were also joined by Ukrainian Finance Minister Sergii Marchenko and the President of the Financial Action Task Force (FATF) for parts of the meeting.
    2. We began by reiterating our shared commitment to the G7. After 50 years of working together, transcending national differences and promoting global prosperity, the value of the G7 is clear. We held a productive and frank exchange of views on the current global economic and financial situation, the risks and opportunities common to our countries, and ways to address them. This joint statement reflects the outcome of the discussion between G7 Finance Ministers and Central Bank Governors during the meeting.  

    Global Economy

    1. In the face of multiple complex global challenges, we are committed to pursuing our shared policy objectives. We agree that the G7 can leverage our strong economic relationships to advance our common goals. International organizations signaled at our last meeting that trade and economic policy uncertainty was high and weighing on global growth. We acknowledge that economic policy uncertainty has declined from its peak, and we will work together to achieve further progress. We also shared our concerns over unsustainable global macro imbalances.
    2. In this respect, we also underscore the need to address excessive imbalances and strengthen macro fundamentals, given potential global spillovers. We call on the IMF to continue to enhance its analysis of imbalances in both its bilateral and multilateral surveillance. We continue to engage with each other and with international partners to advance international cooperation and deliver prosperity.
    3. Strong and sustainable economic growth is the cornerstone of economic prosperity. We are committed to working together to achieve a balanced and growth-oriented macroeconomic policy mix that supports our economic security and resilience and ensures that all of our citizens can benefit from that growth. We are committed to maintaining well-functioning financial markets. We recognize that elevated uncertainty can have implications for the economy and for financial stability. We will continue to monitor and consult closely on these matters. Our central banks remain strongly committed to ensuring price stability, consistent with their respective mandates. We reaffirm our May 2017 exchange rate commitments.

    Economic Resilience and Security

    1. We recognize the need for a common understanding of how non-market policies and practices (NMPPs) aggravate imbalances, contribute to overcapacity, and impact the economic security of other countries. Building on our previous commitments and as guided by Leaders, we will contribute, as appropriate, to the monitoring of NMPPs, continuing to assess the distortions they cause in markets and their global spillovers. We agree on the importance of a level playing field and taking a broadly coordinated approach to address the harm caused by those who do not abide by the same rules and lack transparency.
    2. We call on international organizations to address data gaps and deepen our collective understanding of NMPPs and their domestic and global implications. We agree that joint analysis of market concentration and international supply chain resilience would be useful areas of future work. This analysis will inform our respective policy approaches, which will in part be shaped by our underlying industrial and consumer structures. Where appropriate and relevant, we will engage partners beyond the G7.
    3. We recognize a significant increase in international low-value shipments being sent to our economies in a decentralized manner, and the potential for this to overwhelm and take advantage of customs controls and duty and tax collection infrastructure. Collectively, we recognize the potential for illicit drug trafficking, the importation of counterfeit goods, the misclassification of merchandise, revenue leakage, inequity for our retailers, and significant environmental waste. We commit to exploring ways that our low-value importation systems could address these risks.

    Support for Ukraine

    1. We condemn Russia’s continued brutal war against Ukraine and commend the immense resilience from the Ukrainian people and economy. Ukraine has suffered significant destruction. The G7 remains committed to unwavering support for Ukraine in defending its territorial integrity and right to exist, and its freedom, sovereignty and independence toward a just and durable peace.
    2. We welcome ongoing efforts to achieve a ceasefire. If such a ceasefire is not agreed, we will continue to explore all possible options, including options to maximize pressure such as further ramping up sanctions. We reaffirm that, consistent with our respective legal systems, Russia’s sovereign assets in our jurisdictions will remain immobilized until Russia ends its aggression and pays for the damage it has caused to Ukraine.
    3. We agree that private sector mobilization will be important in the recovery and reconstruction of Ukraine, with costs estimated by the WBG at US$524 billion over the next decade. We collectively commit to help build investor confidence through bilateral and multilateral initiatives. To this end, in addition to the ongoing support through the MIGA SURE (Support for Ukraine’s Reconstruction and Economy) trust fund, we will work, including through the Ukraine Donor Platform, with the Government of Ukraine, international financial institutions (IFIs), and the insurance industry towards removing the blanket ban imposed on Ukraine as soon as possible. We will continue to coordinate support to promote the early recovery and reconstruction of Ukraine, including at the Ukraine Recovery Conference, which will take place in Rome on July 10-11, 2025. Further, we agree to work together with Ukraine to ensure that no countries or entities, or entities from those countries that financed or supplied the Russian war machine will be eligible to profit from Ukraine’s reconstruction.

    Bolstering Long-term Growth and Productivity

    1. We agree on the importance of pursuing public policies that spur innovation, raise productivity and promote greater labour force participation. In an environment of high public debt and increasing fiscal pressures, we also agree that raising long-term growth potential is essential to manage risks to fiscal sustainability and increase wages and living standards.
    2. We discussed and shared experiences on how best to pursue growth-enhancing policies in a fiscally prudent manner. We agree that structural reforms can help set the foundations for strong and sustainable economic growth. We recognize that specific growth policies need to be adapted to each country’s needs and circumstances. We agree that maintaining a stable and predictable macroeconomic environment is important for strong growth and productive long-term investment.

    Artificial Intelligence

    1. We deepened our understanding of prospects for AI to raise productivity growth, and of the policies needed to realize the benefits. We appreciate the framework provided by the OECD to better quantify and monitor AI-driven productivity gains. We recognized the benefits of AI for the financial sector and the need to monitor and assess potential risks to financial stability as AI adoption further increases.

    Financial Sector Issues

    1. We are committed to a strong, resilient and stable financial sector. We reiterate that a continued focus on financial stability and regulatory issues remains vital to ensure the effective functioning of the financial system. We noted our support for the important work of the FSB and Standard Setting Bodies. We focused on non-bank financial intermediaries, which play an increasingly important role in financing the real economy. Their activities can contribute to the efficiency of financial markets but can also pose risks to the global financial system. We discussed sources of potential risk, including those from liquidity mismatch, leverage and interconnectedness. We agree on the need to assess non-bank data availability, use and quality and to share knowledge and approaches to monitoring and assessing potential risks.
    2. Enhancing cross-border payments can have widespread benefits for citizens and economies worldwide. We remain committed to delivering cheaper, faster, more transparent and more accessible cross-border payments while maintaining their safety, resilience, and financial integrity. This includes supporting the implementation of the G20 Roadmap as well as appropriate future actions as necessary to meet these goals.
    3. Cyber risks threaten to disrupt global financial systems and the institutions that support them. To address the evolving cyber threat landscape, we will continue to take action to further strengthen our shared response capabilities and protocols in the event of a significant cyber incident. We look forward to the G7 Cyber Expert Group’s assessment of the risks and opportunities that AI presents for cybersecurity.
    4. The potential effects of quantum technologies on the global financial landscape are becoming increasingly visible. Our central banks will explore how we can identify, categorize and mitigate potential risks to data security and financial stability and promote economic resilience.

    Financial Crime Call to Action

    1. We remain steadfast in our commitment to tackling financial crime, including money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction (AML/CFT/CPF). We endorse a “Financial Crime Call to Action” to spur further progress and collective efforts of the Financial Action Task Force (FATF) and its Global Network. By bringing together over 200 jurisdictions around the world, the FATF is the ultimate international standard setter, and we welcome its leadership in combatting financial crime since its creation by the G7 in 1989.
    2. Through strengthening our AML/CFT/CPF frameworks and enhanced international cooperation we will endeavor to stay abreast of emerging risks, understand the role of technology and deepen the responsible exchange of information to make it harder for criminals to access the financial system and evade detection.
    3. We recognize financial crime acts as a barrier to growth, development and stability, and support efforts to strengthen frameworks in lower capacity countries. We encourage the international community to join us in this Call to Action and strengthen our collective response to financial crime.

    Support for Developing Countries

    1. We reaffirm our commitment to the ongoing implementation of the World Bank-led Resilient and Inclusive Supply-Chain Enhancement (RISE) Partnership and recognize its progress toward better integrating low- and middle-income countries in the global supply chain of clean energy products, especially in Africa. We welcome the adoption of a country roadmap in Zambia. We encourage the World Bank to further advance this initiative, and we look forward to the launch of the first local and regional information platforms in Africa. We support the expansion of RISE’s activities to Latin America and the Caribbean, and a better integration of all segments of the critical mineral supply chain. We call on Multilateral Development Banks (MDBs) to strengthen collaboration on critical mineral supply chains amongst themselves and with other key stakeholders. We also highlighted linkages to G20 initiatives facilitating private sector development, such as the G20 Compact with Africa.
    2. We recognize that global crises, including health crises and natural disasters, pose significant challenges for all economies, with particularly severe impacts on vulnerable states, including small ones. We reaffirm the importance of strengthening support for these countries by facilitating domestic resource mobilization as well as the use and uptake of crisis preparedness and response tools, including Climate Resilient Debt Clauses and insurance, to help ease fiscal pressures. We encourage the IMF and MDBs to strengthen their focus on crisis prevention in order to reduce the incidence of crises materializing.
    3. We call on the international community to make efforts to support vulnerable countries facing debt challenges. We look forward to the G20 work on improving the implementation of the Common Framework for debt treatments in a predictable, timely, orderly, and coordinated manner. We also agree on the importance of advancing debt transparency to support sound economic governance and financial stability. We call on the international community to make efforts to support vulnerable countries whose debt is sustainable but face near-term liquidity challenges. We recognize the need for continued efforts with all partners, public and private, to enhance the availability and quality of debt data, including through the Data Sharing Exercise with the World Bank.
    4. We reaffirm our commitment to achieving more effective and impactful MDBs through reforms aiming to ensure that they work effectively as a system to address the most pressing global challenges, deliver on their core mandate, and use their resources as efficiently as possible, including by implementing the recommendations from the G20 Capital Adequacy Framework Review. We urge MDBs to continue to step up their efforts to mobilize private capital and enhance domestic resource mobilization in emerging markets and developing countries. We emphasize the importance of implementing quality-based procurement policies and procedures that promote efficiency, competition from the private sector, and transparency.

    G7 Financial Crime Call to Action

    The G7 Finance Ministers and Central Bank Governors remain steadfast in our commitment to tackling financial crime, including money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction (AML/CFT/CPF).

    In 1989, the G7 created the Financial Action Task Force (FATF) to “prevent the utilization of the banking system and financial institutions for the purpose of money laundering” and was soon joined by many other countries and jurisdictions which shared the same concerns and volunteered for a global effort against financial crime. Since its establishment, the FATF’s mandate and standards have expanded to include the combatting of financing of terrorism and the financing of proliferation of weapons of mass destruction. The transnational nature of money laundering, malicious nature of its predicate crimes, and integrated nature of our economies necessitate a collective approach to combatting illicit finance. 2025 marks the 35-year anniversary of the FATF’s “40 Recommendations”, which were developed collectively by FATF members and are now being implemented in more than 200 jurisdictions worldwide thanks to the joint efforts of the FATF Global Network.

    The Intersection of Crime, Security, and Economic Prosperity

    Organized criminals, including cartels, are exploiting gaps in global AML safeguards to launder the profits of their criminal activities such as drug trafficking (including fentanyl and synthetic opioids), fraud, cybercrimes, and human smuggling that generate billions in illicit revenue annually. These crimes are not only having a devastating impact on our communities, but they are also impacting national security and economic integrity as profits are re-invested into vast criminal networks that seek to undermine the rule of law and destabilize our governments and economies.

    Financial crime is also harming global economic growth. The International Monetary Fund has found that illicit finance reduces productivity, widens inequality, inhibits legitimate investment and hinders an effective allocation of resources. The World Bank has found that financial crimes are a barrier to development sparking political instability, deterring private capital, undermining good governance and the rule of law, and generally eroding trust in governments and institutions. Illicit finance also robs treasuries of badly needed tax revenue at a time when so many economies around the world are facing historically high debt levels.

    The World Bank sees tackling illicit finance in low-capacity countries as vital to their development priorities and requiring sustained engagement. Strengthening AML/CFT/CPF capacity in developing and low-capacity countries would improve financial inclusion and further deprive international organized crime groups of opportunities to launder their illicit proceeds or finance terrorism.

    In this context, technically sound and effective AML/CFT/CPF frameworks contribute to safer communities, our collective security, and to stronger economies in the G7 and around the globe.  

    The Way Forward

    Under the Canadian G7 Presidency, Finance Ministers and Central Bank Governors have taken stock of the fight we launched in 1989 and identified areas for further action. Today, we endorse the present Financial Crime Call to Action to strengthen global security, protect financial sector integrity, and foster economic growth and economic development.

    Strengthening our Frameworks

    • We re-commit to the founding principles of the FATF and will continue to actively support the organization.
      • The FATF is the ultimate AML/CFT/CPF standard setter that catalyzes improvements in members’ AML/CFT/CPF regimes. It is essential to maintain the FATF’s role at the centre of the global fight against illicit finance.
      • We commit to ensuring that the FATF remains a technical body that produces in-depth and impartial peer reviews and research that inform our ongoing understanding of risk.
    • We commit to improving the effectiveness of our respective AML/CFT/CPF regimes. The G7 must lead by example.
      • G7 financial systems remain the most interconnected in the world and continue to represent attractive targets for bad actors seeking to launder ill-gotten gains. The G7 will continue to improve our effectiveness in preventing the proceeds of crime from entering our financial sectors, detecting and disrupting money laundering threats, sanctioning criminals and depriving them of their illegitimate proceeds in a manner consistent with our domestic legal frameworks.
      • Shell companies are enablers for criminals to hide proceeds of crime and engage in illicit activities, such as large-scale tax and sanctions evasion. Ensuring that competent authorities, particularly law enforcement, have sufficient resources and tools to investigate and prosecute money laundering, terrorist financing, and proliferation financing involving shell companies is critical to fighting financial crime.
      • The procurement of dual use and military technology through circumvention of sanctions violates United Nations Security Council Resolutions and undermines global security. We commit to enhancing implementation of our targeted financial sanctions and ensuring they are the most effective in the world.

    Enhancing International Cooperation

    • We will stay abreast of emerging risks tied to money laundering, terrorist financing and proliferation financing through research and the development of joint typologies and strategic intelligence.
      • We express our serious concerns that virtual asset thefts and scams, including by the Democratic People’s Republic of Korea, have reached unprecedented levels. These threats, as well as the methods used by criminals to launder their proceeds, must be better understood and addressed. This is necessary to raise awareness, enhance prevention, and mitigate money laundering as well as being critical to promoting responsible innovation in virtual assets and protecting virtual asset users in our jurisdictions. We will further research and exchange information such as typology work on emerging risks related to virtual assets, including from the perspectives of cybersecurity and AML/CFT/CPF, and take necessary measures.
      • We recognize that illicit actors will continue to take advantage of jurisdictional differences in approaches to countering sanctions evasion and the financing of proliferation. Therefore, we commit to work together to maintain an up-to-date and common understanding of relevant threats, vulnerabilities, and typologies to prevent and combat complex proliferation financing and sanctions evasion schemes.
    • We must break down silos and deepen the responsible exchange of information internationally to make it harder for criminals to access the financial system and evade detection.
      • Bad actors are exploiting silos within, and across, AML/CFT/CPF regimes to conceal their actions. In response, we will improve risk-based and secure information sharing internationally between our national competent authorities, and domestically amongst the private sector and between public and private sector partners, consistent with our domestic legal frameworks. Facilitating this type of information sharing supports G7 efforts to mitigate the negative impacts of fraud on our businesses and citizens and to combat illicit activities by transnational organized crime groups, including cartels.
      • Many of our financial institutions operate across G7 markets. We will encourage deeper cooperation between our regulators who supervise on a group-wide basis. We commit to ensuring that our AML/CFT/CPF supervision is risk-based, effective and focused on stopping financial crime. We will also ensure that sanctions for non-compliance are proportionate, dissuasive and effective.

    Addressing Financial Crime as a Barrier to Growth and Stability

    • We will support efforts to strengthen AML/CFT/CPF frameworks in lower capacity countries to foster growth and economic development.
      • This can be achieved through many channels, including bilateral and multilateral assistance and collaboration. This work will ensure the G7 together with other FATF members keep pace with evolving regional risks, and support asset recovery to further deprive criminals of illicit proceeds and reduce opportunities for money laundering.
      • The FATF and its Global Network of nine FATF-Style Regional Bodies (FSRBs), which bring together more than 200 jurisdictions and 20 observer international organizations, are at the heart of the global fight against financial crime. We reiterate our commitment to supporting the FSRBs in overseeing the consistent and effective implementation of the FATF standards worldwide, including in the next round of mutual evaluations.
    • We commit to supporting the effective implementation of AML/CFT/CPF measures that are risk-based and proportionate.
      • We recognize that a risk-based approach can promote economic development and financial inclusion by encouraging assessments of risk, identifying lower and higher risk scenarios, and implementing simplified AML/CFT/CPF measures in certain scenarios proportionate to the relevant risks. 
      • By implementing the revised FATF standards, we will facilitate legitimate funds continuing to move through the formal financial sector, promoting economic development and financial inclusion while mitigating unintended consequences.
    • We commit to exploring the role of technology in AML/CFT/CPF implementation.
      • We encourage adoption of new technologies that can more effectively detect, report and interdict illicit finance. This includes partnering with the private sector to understand how emerging technologies (including artificial intelligence) can be used to improve the efficiency and effectiveness of AML/CFT/CPF regimes. This should be consistent with our respective domestic legal frameworks and risk-based, while ensuring data protection and human rights.
      • We continue to support the FATF’s initiatives to accelerate global implementation of its standards on virtual assets and virtual asset service providers (VASPs) as well as its work on emerging risks, including those that arise from misuse of stablecoins and peer-to-peer transactions, offshore VASPs, and decentralized finance (DeFi) arrangements.
      • We are contributing to the FATF’s ongoing work to strengthen its Standards on Payment Transparency to adapt to changes in payment business models and messaging standards and to foster payment systems that are more transparent, inclusive, accessible, safe and secure, while enabling faster and cheaper transactions, including remittances. Consistent with this work, we also support the G20 Roadmap for Enhancing Cross-border Payments.

    Lastly, we commit to furthering this work under the French G7 Presidency in 2026, in coordination with all FATF members, and to report on the actions taken to implement the commitments in this Call to Action.

    We encourage all countries to join us in this Call to Action. The international community can, and must, strengthen our collective response to financial crime and its impact on communities, security, and prosperity.

    MIL OSI Canada News

  • MIL-OSI New Zealand: Supercars for the South Island

    Source: NZ Music Month takes to the streets

    A second round of the hugely successful Supercars events will be held in Christchurch from next year with support from the Government’s Major Events Fund. 
    “For more than 20 years Supercars Championship events have played an important role showcasing our beautiful country to an international audience and I’m thrilled the South Island will now be part of this from next year,” Tourism and Hospitality Minister Louise Upston says. 
    “The Government is investing $5.9 million from the Major Events Fund to support Supercars events in both Taupō and Christchurch for the next three years. 
    “This means international – and domestic – visitors can attend back-to-back rounds across consecutive weekends in Taupō and Christchurch, allowing them to extend their stay and enjoy more of what New Zealand has to offer. 
    “It was fantastic to be part of the estimated 50,000 strong crowd at the recent ITM Supercars440 event in Taupō. The place was buzzing with people in town to enjoy one of the most popular Trans-Tasman motorsport events.
    “We know the 2024 event generated significant economic and tourism benefits for the Taupō region and New Zealand with more than 3,300 international visitors attending and spending more than $5.2 million while here. Not to mention the invaluable exposure in key tourism markets with a total broadcast reach of 246 million, including 3.9 million in Australia. 
    “I’m pleased that with this investment New Zealand’s strong relationship with Supercars will continue in Taupo and extend to include Christchurch, with all the benefits that brings.” 
    Supercars Ltd has selected Ruapuna Motorsport Park, Christchurch as the host venue for the South Island round.

    MIL OSI New Zealand News

  • MIL-OSI USA: Murkowski Highlights Opportunities, Challenges with Interior Budget Request

    US Senate News:

    Source: United States Senator for Alaska Lisa Murkowski
    05.22.25
    Washington, DC – Yesterday, U.S. Senator Lisa Murkowski (R-AK), Chair of the Senate Appropriations Subcommittee on Interior, Environment, and Related Agencies, hosted the Secretary of the Interior in subcommittee to discuss the Department’s budget request. The Senator reinforced her appreciation for the administration’s approach to resource development in Alaska, while also addressing staffing concerns, public land sales, and other avenues of potential for the department.
    Watch the Senator’s opening statement here.
    Read the Senator’s full opening statement below.
    FULL TRANSCRIPT
    Senator Murkowski: Good to have you here to discuss the President’s Fiscal Year 2026 Budget Request for the Department of the Interior. I’m pleased to have the opportunity today to talk about the important work that the Department does, including its leading role in supporting America’s energy agenda, empowering Indian country and Tribal nations, providing recreational opportunities to tens of millions of Americans, and generating billions of dollars in economic output.
    It’s been a real pleasure, I have appreciated the meetings that we’ve had, the conversations that we’ve had by phone, and it’s been great to meet the various Assistant Secretary nominees from the Department. I’ve enjoyed our conversations there. I’m impressed by their understanding of the issues that they focus on, and their commitment to public service.
    You’re building out quite the team. It was great to be able to talk to Kate MacGregor. She has a little bit of history with the Department, and comes with a lot of knowledge and understanding, certainly on Alaska–related issues, so we were glad to get her confirmed and to work as well as some of the other nominees. As the Chairman of the Indian Affairs Committee, we’re anxious to have a nominee for the [Assistant Secretary for Indian Affairs] as well.
    So, I want to thank you, I want to thank President Trump for recognizing Alaska’s amazing natural resource potential. This was very significant in the day-one executive order: everything from the Ambler Road to the NPR-A, to non-wilderness Coastal Plain, Alaska
    LNG. There’s been very swift, very early, and decisive action in this space. It’s welcome both here in Washington, DC, and certainly in my state. So, I’m looking forward to working with you to further facilitate the development of Alaska’s resources.
    I know you are looking forward to going to Alaska in just a couple weeks. Hopefully, it’s going to be a great trip, lots of good information, good feedback, and good weather. I’m hopeful that Denali will be out in all of its majesty and splendor and you’ll be reminded why Alaskans prefer the Koyukon-Athabascan name, “Denali,” meaning ‘the Great One.’
    The President and you have set out an ambitious agenda, particularly with respect to the focus on energy and economic development. I’m very supportive of this endeavor, and know that I want to be your partner in achieving so many of the goals.
    Beyond resource development, the Department of the Interior can be an economic force for good in many different ways. One of the most important economic drivers that we see up in Alaska, aside from the resource end of things, within the Department is the National Parks System. The National Parks in the home states of the members on this subcommittee generate a collective $7.4 billion of economic output annually. That’s more than the gross domestic product of 40 different countries. But it’s not just the economic output that makes parks so important, it’s the experiences of traveling to parks, seeing the wildlife, having an adventure that creates a lifetime of memories. And, we’ve had discussions about some of your early years and the significance of that.
    Back home in Alaska, we’ve already had about 150,000 people come through on cruise ships this year. That might not surprise other people, but this is early for us. We estimate a total of 1.65 million visitors for the tourism season – that’s about double the population of our state. So, when we see a skinny budget that proposes to cut $1.2 billion or 35% from the Park Service, it’s hard to square it with the claims that DOI is focused on fostering the American economy, again recognizing that our economy is more than just our natural resource development.
    Another area of concern that I will address in my questions within the National Park Service budget proposal is the concept of turning over management of National Parks to the states. I’m trying to figure out exactly how this would work, and I’m kind of thinking it’s like me putting my kids in charge of the upkeep for the house that I own. In some instances, it might make good sense, but as a wholesale best practice I worry about how that might impact the parks or our people. So, should this concept be included in the full budget request, I’d hope that we have a really thorough conversation with you to better understand the justification for the proposal.
    I am concerned about what the skinny budget proposes for the BIA and the BIE. Cutting nearly $1 billion from Indian Affairs would hurt the federal government’s ability to meet its trust responsibility to Native people. In some of our conversations, I’ve shared some of the areas where I think the Department has failed Indian Country, and this is in areas like probate, where we have an extraordinary backlog, public safety and justice, missing and murdered indigenous people, as well as the education of Native American children.
    While I appreciate that the skinny budget alleges that proposed cuts would enable Tribes to focus on law enforcement, I’m not sure how reducing BIA law enforcement funding by $107 million is treating the program as a core priority of Tribes. I know, because I hear Tribes have been requesting more support for this program to address a serious lack of policing, so I worry that cuts of this magnitude can’t be made up for by directing Tribes to apply for grants at DOJ as the skinny budget suggests.
    I want to end my opening comments this morning by talking about what I consider to be, and I know that you put equal priority to, and that’s the men and women of the Department. The people who actually make things happen.
    We’ve talked about a lot of good ideas for using new systems, IT systems, artificial intelligence, how we can make the Department more efficient. These are good goals, worthy goals, and I hope to see that detailed more in the budget. But I think we know when we’re talking about management of our public lands, if you don’t have the necessary staff, whether out in the field or in the headquarters, all the investments that we want to make become less efficient.
    When I think about the Executive Order as it relates specifically to Alaska, we’ve got some good things that we want to do up north when it comes to resource development, but scientific and ecological assessments that are provided by USGS are relied upon by not just federal land management agencies, but by the industry as well. USGS science helps avoid polar bear dens, identify permafrost, map caribou migration patterns. So, when we see cuts to USGS, but also BLM, BOEM, BSSE, and OSMRE, it causes me to wonder, are we going to be able to accomplish what we’re all seeking to accomplish together?
    I think it’s important also that people have expertise and knowledge about the places that they serve. I had this conversation with folks in the Forest Service. You just can’t take somebody who maybe comes from Indianapolis, a good Forest Service person, but you put them out at the Mendenhall Glacier Visitors Center where their job is bear management and they don’t have a clue about bear management.
    We want to make sure that we’re making good and smart decisions. I know you’re probably going to get a lot of questions today about staffing cuts, and how that is going to impact the operations of the Department not just here in Washington, but around the country. I do wish that the Acting Assistant Secretary for Policy, Management, and Budget, Mr. Hassan, [was] here today to answer some of these questions because he seems to be in charge of making a lot of the decisions about the staffing and the [reorganization]. I’m hoping that he is going to be in a position to be more responsive to my staff about some of the questions that we have raised. But ultimately, and you know, you’ve been a governor you know the buck stops with you. He can be responsible for certain things, but ultimately it is you that is accountable.
    So, getting the answers to questions about the reorganizations, the impacts of RIFs, how the Department will operate National Parks, protect reserves, and implement the President’s energy agenda. Getting this channel of communication going back and forth in a good and a constructive way, I think is going to be important. But, my bottom line to you this morning is [that] I’m I pleased with your nomination, I’m excited that you are there at the Department.
    I’m really excited about the shift that we’re seeing in Alaska where the Department has really gone from being a problem to being a partner in so many different areas. So, [I’m] looking forward to what we’re going to be able to do together.

    MIL OSI USA News

  • MIL-OSI USA: Representative Peters Votes NO on GOP Tax Plan

    Source: United States House of Representatives – Congressman Scott Peters (52nd District of California)

    Washington, D.C. – Today, Representative Scott Peters (CA-50) voted against the Republican plan to cut healthcare for millions of vulnerable patients under Medicaid and the Affordable Care Act to pay for tax cuts for wealthy individuals and corporations that don’t need them. The Republican plan would kick 13.7 million people off of their healthcare, according to an analysis by the independent Congressional Budget Office. And the non-partisan Committee for a Responsible Federal Budget has found that the bill could add $37 trillion to the national debt over the next 30 years. After the House voted 215-214 to advance the legislation, Rep. Peters released the following statement:  

    “Not only is the Republican tax plan fiscally irresponsible, it is also unnecessarily cruel. Our country borrows $2 trillion every year just to keep the lights on. That number will only grow and add to our colossal debt under this tax plan. But Republicans aren’t trying to reduce the debt, they are kicking people off their healthcare to lower taxes for the highest earners. If we allowed marginal taxes for people making more than $609,000 to go from 37 to 39.6 percent, where it was in 2017, we could generate up to $402 billion in revenue over 10 years. Those people would pay a bit more in taxes, and we could avoid kicking millions of people off their healthcare. 

    “Irresponsible borrowing like this is why Moody’s, for the first time ever, downgraded our credit rating, why the stock market is falling, why the bond markets are going haywire, and why consumers are worried they won’t be able to keep up with rising prices. It is time to have an honest and tough bipartisan conversation about how we reduce the debt. While today’s vote was disappointing, I will continue to fight this debt-financed plan as it moves through the Senate.” 

    Read about Rep. Peters’ opposition to the tax plan in the Energy and Commerce Committee here.  

    Read about Rep. Peters’ opposition to the tax plan in the Budget Committee here.  

    CA-50 Medicaid Facts: 

    • 156,100 people in the district rely on Medicaid for health coverage—that’s 20 percent of all district residents. 
      • 34,700 children in the district are covered by Medicaid. 
      • 17,700 seniors in the district are covered by Medicaid. 
      • 64,900 adults in the district have Medicaid coverage through Medicaid expansion—that includes pregnant women who are able to access prenatal care sooner because of Medicaid expansion, parents, caretakers, veterans, people with substance use disorder and mental health treatment needs, and people with chronic conditions and disabilities. 
    • At least five hospitals in the district had negative operating margins in 2022. These hospitals would be especially hard-hit by cuts to Medicaid. For example: 
      • Scripps Mercy Hospital had a negative 25.3 percent operating margin—and nearly 22 percent of its revenue came from Medicaid. 
      • Sharp Coronado Hospital had a negative 3.5 percent operating margin—and over 36 percent of its revenue came from Medicaid. 
      • University of California San Diego Medical Center had a negative 2.4 percent operating margin—and nearly 19 percent of its revenue came from Medicaid. 
    • There are 54 health center delivery sites in the district that serve 529,944 patients. 
    • Those health centers and patients rely on Medicaid—statewide, 69 percent of health center patients rely on Medicaid for coverage. 
    • Health centers will not be able to stay open and provide the same care that they do today, with more uninsured and underinsured patients. They are already operating on thin margins—in 2023, nationally, nearly half of health centers had negative operating margins. 
    • Medicaid cuts put health centers at risk, including: 
      • Family Health Centers of San Diego 
      • Neighborhood Healthcare 
      • North County Health Project 
      • San Diego American Indian Health Centers 
      • St. Vincent De Paul Village 

    Representative Peters is the co-author of the Fiscal Commission Act, legislation to create a bicameral and open-door commission to tackle our nation’s long-term debt, help us avoid automatic and across-the-board cuts to Social Security and Medicare, and secure a more prosperous future for our children. 

    ###

    MIL OSI USA News

  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News

  • MIL-OSI: Copley Acquisition Corp Announces the Separate Trading of its Class A Ordinary Shares and Warrants, Commencing on or about June 2, 2025

    Source: GlobeNewswire (MIL-OSI)

    HONG KONG, May 22, 2025 (GLOBE NEWSWIRE) — Copley Acquisition Corp (NYSE: COPLU) (the “Company”) announced that holders of the units sold in the Company’s initial public offering of 17,250,000 units, which includes 2,250,000 units issued pursuant to the exercise by the underwriters of their overallotment option, completed on May 2, 2025 (the “Offering”) may elect to separately trade the Class A ordinary shares and warrants included in the units commencing on or about June 2, 2025. Any units not separated will continue to trade on The New York Stock Exchange under the symbol “COPLU”, and each of the Class A ordinary shares and warrants will separately trade on The New York Stock Exchange under the symbols “COPL” and “COPLW,” respectively. No fractional warrants will be issued upon separation of the units and only whole warrants will trade. Holders of units will need to have their brokers contact Continental Stock Transfer & Trust Company, the Company’s transfer agent, in order to separate the units into Class A ordinary shares and warrants.

    The Company is a blank check company incorporated as an exempted company under the laws of the Cayman Islands, which will seek to effect a merger, share exchange, asset acquisition, share purchase, reorganization or similar business combination with one or more businesses or entities.

    A registration statement relating to the securities was declared effective on April 30, 2025, in accordance with Section 8(a) of the Securities Act of 1933, as amended. This press release shall not constitute an offer to sell or the solicitation of an offer to buy, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation, or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

    Cautionary Note Concerning Forward-Looking Statements

    This press release contains statements that constitute “forward-looking statements,” including with respect to the Company’s search for an initial business combination. Forward-looking statements are subject to numerous conditions, many of which are beyond the control of the Company, including those set forth in the Risk Factors section of the Company’s registration statement for the initial public offering filed with the SEC. Copies are available on the SEC’s website, www.sec.gov. The Company undertakes no obligation to update these statements for revisions or changes after the date of this release, except as required by law.

    Contact

    Copley Acquisition Corp
    Suite 4005-4006, 40/F, One Exchange Square
    8 Connaught Place, Central, Hong Kong

    Francis Ng
    Co-Chief Executive Officer
    Email: francis.ng@copleyacquisition.com
    Phone: +852 2861 3335

    The MIL Network

  • MIL-OSI: Preferred Bank Announces Stock Buyback

    Source: GlobeNewswire (MIL-OSI)

    LOS ANGELES, May 22, 2025 (GLOBE NEWSWIRE) — Preferred Bank (NASDAQ: PFBC), one of the largest independent commercial banks in California, today reported that the shareholders have approved a new $125 million stock repurchase plan. Also, on May 8, 2025, the Bank completed its prior stock repurchase plan. This was the final portion of the Bank’s $150 million repurchase authorized by shareholders in 2023. The final tranche of repurchase activity saw the Bank repurchase 818,059 shares for total consideration of $65.7 million over the first and second quarters of 2025. For the entire $150 million repurchase, the Bank repurchased 2,146,252 shares at an average price of $70.13 per share.

    For the new $125 million repurchase, the Bank will be required to gain regulatory approval due to the Bank’s corporate structure of having no holding company. It is expected that these approvals should be obtained in relatively short order.

    Chairman and CEO Li Yu stated, “As organic growth has slowed, the Bank’s capital ratios will continue to climb due to our high level of profitability. In this setting, buying back our common stock is a great use of the Bank’s excess capital and an indirect way of returning capital to our shareholders.”

    About Preferred Bank

    Preferred Bank is one of the larger independent commercial banks headquartered in California. The Bank is chartered by the State of California, and its deposits are insured by the Federal Deposit Insurance Corporation, or FDIC, to the maximum extent permitted by law. The Bank conducts its banking business from its main office in Los Angeles, California, and through twelve full-service branch banking offices in the California cities of Alhambra, Century City, City of Industry, Torrance, Arcadia, Irvine (2 branches), Diamond Bar, Pico Rivera, Tarzana and San Francisco (2 branches) and two branches in New York (Flushing and Manhattan) and one branch in the Houston suburb of Sugar Land, Texas. Additionally, the Bank operates a Loan Production Office in Sunnyvale, California. Preferred Bank offers a broad range of deposit and loan products and services to both commercial and consumer customers. The Bank provides personalized deposit services as well as real estate finance, commercial loans and trade finance to small and mid-sized businesses, entrepreneurs, real estate developers, professionals and high net worth individuals. Although originally founded as a Chinese-American Bank, Preferred Bank now derives most of its customers from the diversified mainstream market but does continue to benefit from the significant migration to California of ethnic Chinese from China and other areas of East Asia.

    AT THE COMPANY:
    Edward J. Czajka         
    Executive Vice President
    Chief Financial Officer
    (213) 891-1188
      AT FINANCIAL PROFILES:
    Jeffrey Haas
    General Information
    (310) 622-8240
    PFBC@finprofiles.com
     

    The MIL Network

  • MIL-OSI Economics: Press Briefing Transcript: Julie Kozack, Director, Communications Department, May 22, 2025

    Source: International Monetary Fund

    May 22, 2025

    SPEAKER:  Ms. Julie Kozack, Director of the Communications Department, IMF

    MS. KOZACK: Good morning, everyone and welcome to this IMF Press Briefing.  It is wonderful to see you all today on this rainy Washington morning, especially those of you here in person and of course also those of you joining us online.  My name is Julie Kozak.  I’m the Director of Communications at the IMF.  As usual, this press briefing will be embargoed until 11:00 a.m. Eastern Time in the United States.  And as usual, I will start with a few announcements and then I’ll take your questions in person on WebEx and via the Press Center.  

    So first, our Managing Director, Kristalina Georgieva, and our First Deputy Managing Director, Gita Gopinath, are currently attending the G7 Finance Ministers and Central Bank Governors meeting taking place in Canada right now.  Second, on May 29th through 30th, the Managing Director will travel to Dubrovnik, Croatia to attend a joint IMF Croatia National Bank Conference focused on promoting growth and resilience in Central, Eastern, and Southeastern Europe.  The Managing Director will participate in the opening panel and will hold meetings with regional counterparts.  

    On June 2nd, the Managing Director will travel to Sofia, Bulgaria to attend the 30th Anniversary celebration of the National Trust Ecofund.  During her visit, she will also hold several bilateral meetings with the Bulgarian authorities.  

    Our Deputy Managing Director, Nigel Clarke, will travel to Paraguay, Brazil, and the Netherlands next month.  On June 6th, he will launch the IMF’s new regional training program for South America and Mexico, which will be hosted in Asuncion by the Central Bank of Paraguay.  From there, he will travel to Brasilia to deliver a keynote speech on June 10th during the Annual Meeting of the Caribbean Development Bank.  He will also then travel to the Netherlands on June 12th to 13th to participate in the 2025 Consultative Group to Assist the Poor Symposium and to meet with the Dutch authorities.  

    Our Deputy Managing Director, Kenji Okamura, will be in Japan from June 11th to 12th for the 10th Tokyo Fiscal Forum to discuss fiscal frameworks and GovTech in the Asia Pacific region.  

    And finally, on a kind of housekeeping or scheduling issue, the Article IV Consultation for the United States will be undertaken on a later timetable this year, with discussions to be held in November.  

    And with those rather extensive announcements, I will now open the floor to your questions.  For those connecting virtually, please turn on both your camera and microphone when speaking.  All right, let’s open up.  Daniel.

     

    QUESTIONER: Thanks for taking my question.  I just wonder if the IMF has any reaction to the passage of last night in the House of Representatives of the One Big, Beautiful bill.  And a related question, how concerned are you by the increase in yields on long-dated U.S. treasuries?  What do you think it says about the market’s view of U.S. debt going into the future and sort of any possible spillovers for IMF borrowers as well?  MS. KOZACK: On the first question, what I can say is we take note of the passing of the legislation in the House of Representatives earlier this morning.  What we will do is we will look to assess a final bill once it has passed through the Senate and also once it’s been enacted.  And, of course, we will have opportunities to share our assessment over time in the various products where we normally would convey our fulsome views.  

    On your second question, which was on the bond market.   What I can say there is that we know that the U.S. government bonds are a safe haven asset, and the U.S. dollar, of course, plays a key role as the world’s reserve currency.  The U.S. bond market plays a critical role, of course, in finance and in safe assets.  And this is underpinned by the liquidity and depth of the U.S. market and also the sound institutions in the U.S.  We don’t see any changes in those functions.  And, of course, what we can also say is that although there has been some volatility in markets, market functioning, including in the U.S. Treasury market, has so far been orderly.  

     

    QUESTIONER: My question is about Ukraine.  Two topics particularly.  So, the first one, when is the next review of the Ukraine’s EFF is going to be completed, and what amount of money would be disbursed to Kyiv?  And could you please outline the total sum that is remaining within the current program?  And the second part, it’s about debt level.  What is the IMF assessment of current Ukraine’s government debt level?  Is it stable?  Do you see any vulnerabilities and any risks for Ukraine?  Thank you.  

    MS. KOZACK: Any other questions on Ukraine?  Does anyone online want to come in on Ukraine?  Okay, I don’t see anyone.  

    What I can say on Ukraine is that just two days ago, our Staff team started policy discussions with the Ukrainian authorities on the eighth review under the eff.  So, the team is on the ground now.  The discussions are taking place in Kiev and the team will provide an update on the progress at the end of the mission.

    In terms of the potential disbursement, I’m just looking here; that’s the seventh disbursement.  We will come back to you on the size of the disbursement, but it should show in the Staff report for the Seventh Review what would be expected for the Eighth Review.  And it would also show the remaining size of the program.  But we’ll come back to you bilaterally with those exact answers.  

    And what I can then say on the debt side is at the time of the Seventh Review under the program, we assessed debt, Ukraine’s debt to be sustainable on a forward-looking basis and as with every review that the team of course, will update its assessment as part of the eighth review discussion.  We’ll have more to say on the debt as the eighth review continues.  

     

    QUESTIONER: Just one more thing on Ukraine.  Does it make sense for them to consider using the euro as a defense currency for their currency, given the shifting geopolitical sense and what we are seeing with the dollar? MS. KOZACK: So right now, under the program, Ukraine has an inflation targeting regime, and that is where what the program is focused on, our program with Ukraine. So, they have an inflation targeting regime.  They are very much focused on ensuring the stability of that monetary policy regime that Ukraine has.  And, of course, that involves a floating exchange rate.  And I don’t have anything beyond that to say on the currency market.

     

    QUESTIONER: The agreement with the IMF established a target for the Central Bank Reserve to meet by June.  According to the technical projection, does the IMF believe Argentina will meet this target?  And if it’s not met, is it possible that we will grant a waiver in the future?

    MS. KOZACK: anything else on Argentina?  

    QUESTIONER: About Argentina, what is your assessment of the progress of the program agreed with Argentina more than a month after its announcement in last April?  

     

    QUESTIONER: The government is about to announce a measure to gain access to voluntarily, of course, but to the dollars that are “under the mattress”, as we call them, undeclared funds to probably meet these targets that Roman was asking about.  I was wondering if this measure has been discussed with the IMF.  And also, you mentioned Georgieva visiting Paraguay and Brazil, if you there’s any plan to visit Argentina as well?  

    QUESTIONER: President Milei is about to announce, you know, Minister Caputo, in a few minutes that there is a measure to use similar to attacks Amnesty.  Is the IMF concerned that this could violate its regulations against illicit financial flows? 

    MS. KOZACK: So, with respect to Argentina, on April 11th, I think, as you know, our Executive Board approved a new four-year EFF arrangement for Argentina.  It was for $20 billion.  It contained an initial disbursement of $12 billion.  And that the aim of that program is to support Argentina’s transition to the next phase of its stabilization program and reforms.  

    President Milei’s administration’s policies continued to deliver impressive results.  These include the rollout of the new FX regime, which has been smooth, a decline in monthly inflation to 2.8 percent in April, another fiscal surplus in April, and reaching a cumulative fiscal surplus of 0.6 percent of GDP for the year, and efforts to continue to open up the economy.  At the same time, the economy is now expanding, real wages are recovering, and poverty continues to fall in Argentina.  

    The Fund continues to support the authorities in their efforts to create a more stable and prosperous Argentina.  Our close engagement continues, including in the context of the upcoming discussions for the First Review of the program.  This First Review will allow us to assess progress and to consider policies to build on the strong momentum and to secure lasting stability and growth in Argentina.  And in this regard, there is a shared recognition with the authorities about the importance of strengthening external buffers and securing a timely re-access to international capital markets.  

    What I can say on the question about the announcements on that — the question on the undeclared assets.  All I can say right now is that we’re following developments very closely on this, and of course, the team will be ready to provide an assessment in due course.  

    On the second part of that question, I do want to also note, and this is included in our Staff report, that the authorities have committed to strengthening financial transparency and also to aligning Argentina’s AML CFT, the Anti-Money Laundering framework, with international standards, as well as to deregulating the economy to encourage its formalization.  So, any new measures, including those that may be aimed at encouraging the use of undeclared assets, should be, of course, consistent with these important commitments.  

    And on your question about Paraguay and Brazil, I just want to clarify that it is our Deputy Managing Director, Nigel Clarke, who will be traveling to Brazil and Paraguay, not the Managing Director.  

     

    QUESTIONER: Two questions on Syria.  With the U.S. and EU announcing the lifting of sanctions recently, how does this affect any sort of timeline with providing economic assistance?  And secondly, the Managing Director has said that the Fund has to first define data.  Can you just walk through what that entails?  

    MS. KOZACK: Can you just repeat what you said?  The Managing Director has said?

     

    QUESTIONER: The need to define data.  Just sort of a similar question.  I’m just wondering, following the World Bank statement last week about, you know, Syria now being eligible to borrow from the bank, what sort of discussions the Fund has had with the Syrian authorities since the end of the Spring Meetings and, you know, any update you can give us around possible discussions around an Article IV.  

     

    QUESTIONER: About the relationship and if there’s any missed planned virtual or on the ground? 

    MS. KOZACK: Let me step back and give a little bit of an overview on Syria. So, first, you know, we’re, of course, monitoring developments in Syria very closely.  Our Staff are preparing to support the international community’s efforts to help with Syria’s economic rehabilitation as conditions allow.  We have had useful discussions with the new Economic Team who took office in late March, including during the Spring Meetings.  And, of course, you will perhaps have seen the press release regarding the roundtable that was held during the Spring Meetings.  IMF Staff have already started to work to rebuild its understanding of the Syrian economy.  We’ve been doing this through interactions with the authorities and also through coordination with other IFIs. And just to remind everyone, our last Article IV with Syria was in 2009.  So, it’s been quite some time since we have had a substantive engagement with Syria.  Syria will need significant assistance to rebuild its economic institutions.  We stand ready to provide advice and targeted and well-prioritized technical assistance in our areas of expertise. I think this goes a little bit to your question on, like, what do we mean by defining data.  I think what the Managing Director was really referring to there is since it has been such a long time since we have had a substantive engagement with Syria, the last Article IV, as I said, was in 2009.  I think there, what she’s really referring to is the need to really work with the Syrian authorities to rebuild basic economic institutions, including the ability to produce economic statistics, right, so that we — so that we and the authorities and the international community of course, can conduct the necessary economic analysis so that we can best support the reconstruction and recovery efforts.  

    With respect to the lifting of sanctions, what I can say there is that, of course, the lifting of sanctions and the lifting of sanctions are a matter between member states of the IMF.  What we can say in serious cases that the lifting of sanctions could support Syria’s efforts to overcome its economic challenges and help advance its reconstruction and economic development.  Syria, of course, is an IMF member, and as we’ve just said, you know, we are, of course, engaged closely with the Syrians to explore how, within our mandate, we can best support them.  

     

    QUESTIONER: My question is on Russia.  In what ways is the IMF monitoring Russia’s economy under the current sanctions and conflict conditions, and have regular Article IV Consultations or other surveillance activities with Russia resumed to track its economic developments?  

    MS. KOZACK: What I can say with respect to Russia is that we are, our Staff, are analyzing data and economic indicators that are reported by the Russian authorities.  We are also looking at counterparty data that is provided to us by other countries, and this is particularly true for cross-border transactions, as well as data from third-party sources. So, this data collection using official and other sources does allow us to put together a picture of the Russian economy.  

    We did provide an assessment in the 2025 April WEO, the one that we just released about a month ago.  In this WEO, we assess Russia’s growth at — we expect Russia to grow at 1.5 percent in 2025, 0.9 percent in 2026, and we expect inflation to come down to 8.2 percent in 2025 and 4.4 percent in 2026.  And I don’t have a timetable for the Article IV at this time.  

     

    QUESTIONER: I’d like to ask about Deputy Management Director Okamura’s visits to Japan.  So, my question is, what economic topics will be on the agenda during his stay?  Could you tell me a bit more in detail?  

    MS. KOZACK: Deputy Managing Director Okamura will travel to Japan, as I said, from June 11th to 12th, and he will be attending the Tokyo Fiscal Forum.  So, this will be the 10th Tokyo Fiscal Forum.  It’s an annual conference that we co-host in Japan every year and the focus is on issues of fiscal policy. In this particular one, Deputy Managing Director Okamura will be discussing fiscal frameworks. It’s very important for all countries to have sound fiscal frameworks so they can implement sound fiscal policy.  He will also be discussing GovTech not only in Japan but in the Asia Pacific region.  And of course, GovTech is very important for countries because it’s a way of modernizing and making government both provision of services in some cases but also potentially collection of revenue more effective and more efficient.  So, those will be the focus of his discussions in Tokyo.  

     

    QUESTIONER: I have a question on the recent bailout package by IMF to Pakistan.  The Indian government has expressed a lot of displeasure with Pakistan planning to use this package to build — rebuild — areas that allegedly support cross-border terrorism.  Does the IMF have any assessment of this?  Secondly, I also have another question.  Could you please provide information on the majority vote that was received in approving this bailout package for Pakistan on May 9th?  If you can disclose the information.  

    MS. KOZACK: Any other questions on Pakistan?  

     

    QUESTIONER: Just adding to that, do you have an update on the implications of the escalation of facilities in that border between Pakistan and India on both economies.  

     

    QUESTIONER: Thanks a lot.  I guess the only spin I would put on is generally what safeguards does the IMF have that its funds won’t be used for military or in support of military actions, not only there but as a general matter.  And I also, if you’re able to, there was some controversy about the termination of India’s Executive Director of the IMF, K.V. Subramanian.  Do you have any insight into–there are reports there–what it was about but what do you say it’s about?  Thanks a lot.  

    MS. KOZACK: With respect to the Indian Executive Director who had been at the Fund, all I can say on this is that the appointment of Executive Directors is a member for the — is a matter for the member country.  It’s not a matter for the Fund, and it’s completely up to the country authorities to determine who represents them at the Fund.  

    With respect to Pakistan and the conflict with India, I want to start here by first expressing our regrets and sympathies for the loss of life and for the human toll from the recent conflict.  We do hope for a peaceful resolution of the conflict.  

    Now, turning to some of the specific questions about the Board approval of Pakistan’s program, I’m going to step back a minute and provide a little bit of the chronology and timeframe.  The IMF Executive Board approved Pakistan’s EFF program in September of 2024.  And the First review at that time was planned for the first quarter of 2025.  And consistent with that timeline, on March 25th of 2025, the IMF Staff and the Pakistani authorities reached a Staff-Level Agreement on the First Review for the EFF.  That agreement, that Staff-Level Agreement, was then presented to our Executive Board, and our Executive Board completed the review on May 9th.  As a result of the completion of that review, Pakistan received the disbursement at that time.  

    What I want to emphasize here is that it is part of a standard procedure under programs that our Executive Board conducts periodic reviews of lending programs to assess their progress.  And they particularly look at whether the program is on track, whether the conditions under the program have been met, and whether any policy changes are needed to bring the program back on track.  And in the case of Pakistan, our Board found that Pakistan had indeed met all of the targets.  It had made progress on some of the reforms, and for that reason, the Board went ahead and approved the program.  

    With respect to the voting or the decision-making at our Board, we do not disclose that publicly.  In general, Fund Board decisions are taken by consensus, and in this case, there was a sufficient consensus at the Board to allow us to move forward or for the Board to decide to move forward and complete Pakistan’s review.  

    And with respect to the question on safeguards, I do want to make three points here.  The first is that IMF financing is provided to members for the purpose of resolving balance of payments problems.  

    In the case of Pakistan, and this is my second point, the EFF disbursements, all of the disbursements received under the EFF, are allocated to the reserves of the central bank.  So, those disbursements are at the central bank, and under the program, those resources are not part of budget financing.  They are not transferred to the government to support the budget. 

    And the third point is that the program provides additional safeguards through our conditionality.  And these include, for example, targets on the accumulation of international reserves.  It includes a zero target, meaning no lending from the central bank to the government.  And the program also includes substantial structural conditionality around improving fiscal management.  And these conditions are all available in the program documents if you wanted to do a deeper dive.  And, of course, any deviation from the established program conditions would impact future reviews under the Pakistan program.  

     

    QUESTIONER: I have a question on Egypt.  There is a mission in Egypt for the First Review of the EFF loan program.  So, can you please update us on the ongoing discussions, especially since the Prime Minister of Egypt announced yesterday that the program could be concluded in 2027 rather than 2026?  

    MS. KOZACK: Any other questions on Egypt?  I have a question from the Press Center on Egypt, which I will read aloud.  The question is when will the Fifth Review currently underway with the Egyptian government be concluded, and when will the Executive Board approve this review?  And how much money will Egypt receive once the review is approved?  

    So, here’s what I can share on Egypt.  First, let me start here.  So first, I just want to say that the Fund remains committed to supporting Egypt in building its economic resilience and fostering higher private sector-led growth.  Egypt has made clear progress on its macroeconomic reform program, with notable improvements in inflation and foreign exchange reserves.  For the past few weeks, IMF Staff has had productive discussions with the Egyptian authorities on economic performance and policies under the EFF.  As Egypt’s macroeconomic stabilization is taking hold, efforts must now focus on accelerating and deepening reforms that will reduce the footprint of the state in the Egyptian economy, level the playing field, and improve the business environment.  Discussions will continue between the IMF and the Egyptian authorities on the remaining policies and reforms that could support the completion of the Fifth Review.  

     

    QUESTIONER: My question is about Sri Lanka.  Sri Lanka’s program is subject to IMF Board approval.  The review is subject to IMF Board approval, but we still haven’t got any word on when that would be.  Is there any delay in this?  And is this delay attributed to the pending electricity adjustments, tariff adjustments, that the Sri Lankan government has committed to?  

    MS. KOZACK: So just stepping back for a minute.  On April 25th, IMF Staff and the Sri Lankan authorities reached Staff-Level Agreement on the Fourth Review of Sri Lanka’s program under the EFF.  And once the review is approved by our Executive Board, Sri Lanka will have access to about $344 million in financing.  Completion of the review is subject to approval by the Executive Board, and we expect that Board meeting to take place in the coming weeks.  

    The precise timing of the Board meeting is contingent on two things.  The first is implementation of prior actions, and the main prior actions are relating to restoring electricity, cost recovery pricing and ensuring proper function of the automatic electricity price adjustment mechanism.  And the second contingency is completion of the Financing Assurances Review, which will focus on confirming multilateral partners, committed financing contributions to Sri Lanka and whether adequate progress has been made in debt restructuring.  So, in a nutshell, completion of the review is subject to approval by the Executive Board.  We expect the Board meeting to take place in the coming weeks.  And it’s contingent on the two matters that I just mentioned.  

     

    QUESTIONER: Thank you for having my questions on Ecuador.  Since the IMF is still completing the second review under the EFF program for Ecuador, do you think it’s going to be time to change the program, the goals, or maybe the amount of the program?  Because Ecuador is now facing different challenges compared to 2024.  The oil prices are falling, so that is going to affect the fiscal situation for Ecuador.  And also, I would like to know if Ecuador is still looking for a new program under the RSF.  And the last one, I would like to know if, do you think that Ecuador is going to need to make some important changes this year on oil subsidies and a tax reform?  I think, as I said, Ecuador now is facing some important challenges in the fiscal situation, so do you think it’s going to be possible because of, you know, all the social protests and all that kind of stuff?  Do you think it’s going to be possible to do that in Ecuador?  

     

    QUESTIONER: Is there a request, an official request, in place to modify the program?  And if there is, of course, details of the new one, you can share.  

    MS. KOZACK: And then I have one question online from the Press Center regarding Ecuador.  Is the sovereign negotiating new targets, given their fiscal position deteriorated compared to last year?  Our understanding is that $410 million was not dispersed under the First Review.?

    So let me share what I can on Ecuador.  So, right now, representatives from the IMF, the World Bank, and the Inter-American Development Bank are in Quito this week to meet with the authorities and discuss the strengthening of financial and technical support to the country.  As part of this tripartite visit, we have a new IMF Mission Chief who is participating, and she is also using that opportunity to have courtesy meetings with the authorities and to continue discussions and advance toward a Second Review under Ecuador’s EFF.  

    What else I can add, just as background, is that the Executive Board in December approved the First Review of Ecuador’s 48-month EFF.  About $500 million was disbursed after the approval of that Frist Review.  And at that time, the Executive Board also concluded the Article IV Consultation.

    I can also say that the authorities have made excellent progress in the implementation of their economic program under the EFF.  And regarding the precise timing of the Second Review, we will provide an update on the next steps in due course and when we’re able to do so.  

     

    QUESTIONER: Just a quick question on tariffs.  I’m just wondering if the IMF has a response to the U.S.-China deal that was struck in Geneva earlier this month.  You know, if the deal holds, I appreciate it’s a 90-day pause, but if the deal holds, how would you foresee that changing the Fund’s current economic forecast for the U.S. and China and for the global economy?  Thanks.  

    MS. KOZACK: As you noted, earlier in May, China and the U.S. announced a 90-day rollback of most of the bilateral tariffs imposed since April 2nd, and they established a mechanism to discuss economic and trade relations.  The two sides reduced their tariff from peak levels, leaving in place 10 percent additional tariffs.  So, the additional tariffs before this agreement were 125 percent.  Now, the additional tariff has agreed to be 10 percent, you know, for the 90 days.  This is obviously a positive step for the world’s two largest economies.

    What I can also add is that for the U.S., you may recall, during the Spring Meetings, we talked a lot about the overall effective tariff rate for the U.S.  At that time, we assessed it at 25.5 percent.  This announcement and the reduction in tariffs will bring the U.S. effective tariff rate down to a bit over 14 percent.  

    Now, with respect to the impact, what I can say is that the reduction in tariffs and the easing of tensions does provide some upside risk to our global growth forecast.  We will be updating that global growth forecast as part of our July WEO.  And so that will give us an opportunity to provide a full assessment.  All of this said, of course, the outlook, the global outlook in general does remain one of high uncertainty.  And so that uncertainty is still with us.  

     

    QUESTIONER: I have a broad question regarding the following – at the IMF World Bank Spring Meeting, the recent one,  the Treasury Secretary Bessent called for the IMF and the World Bank to refocus on their core mission on macroeconomic stability and development.  Did the IMF start any discussion on this topic with the U.S. administration?  And my second question, do you foresee any changes to your lending programs to take into account the views of the Trump Administration regarding issues like climate change and international development?  Thank you.  

    MS. KOZACK: What I can say on this is the U.S. is our largest shareholder, and we greatly value the voice of the United States.  We have a constructive engagement with the U.S. authorities, and we very much appreciate Secretary Bessent’s reiteration of the United States’ commitment to the Fund and to our role.  The IMF has a clearly defined mandate to support economic and financial stability globally.  Our Management Team and our entire Staff are focused exactly on this mandate, helping our 191 members tackle their economic challenges and their balance of payments risks.  

    What I can also add is that at the most recent Spring Meetings, the ones we just had in April, our membership identified two areas where they’ve asked the IMF to deepen our work.  And the first is on external imbalances, and the second is on our monitoring of the financial sector.  So they’re looking for us to really deepen our work in these two areas.  

    As far as taking that work forward, we will continue working with our Executive Board on these areas, as well as to carry out some important policy reviews.  And I think the Managing Director referred to these during the Spring Meetings.  The first is the Comprehensive Surveillance Review, which will set out our surveillance priorities for the next five years.  And the second is the review of program design and conditionality.  And that will carefully consider how our lending can best help countries address low growth challenges and durably resolve their balance of payments weaknesses.  

    I have a slight update for you on Ukraine, which says — so the eighth — so if we look at the documents that were published at the time of the Seventh Review program, the one that was approved by the Executive Board a little while ago, based on that, the Eighth Review disbursement would be about $520 million.  And, the discussions of the Eighth Review are ongoing, and any disbursement, as always, is subject to approval by our Executive Board. 

    And with that, I will bring this press briefing to a close.  So first, let me thank you all for your participation today.  As a reminder, the briefing is embargoed until 11:00 a.m. Eastern Time in the United States.  As always, a transcript will be made available later on IMF.org.  In case of any clarifications or additional queries, please do not hesitate to reach out to my colleagues at media@imf.org.  This concludes our press briefing, and I wish everyone a wonderful day.  I look forward to seeing you next time.  Thanks very much.

     

      

    *  *  *  *  *

     

    IMF Communications Department
    MEDIA RELATIONS

    PRESS OFFICER: Meera Louis

    Phone: +1 202 623-7100Email: MEDIA@IMF.org

    MIL OSI Economics

  • MIL-OSI USA: ICE leads joint operation in southern Indiana

    Source: US Immigration and Customs Enforcement

    INDIANAPOLIS — A coordinated, multi-agency law enforcement operation conducted April 29 to May 1, resulted in the arrest of 23 aliens in the Evansville and Bloomington areas, as part of an ongoing initiative to combat criminal activity and enhance public safety. The successful three-day operation was conducted by a coalition of federal partners, including U.S. Immigration and Customs Enforcement (ICE), the Federal Bureau of Investigation (FBI), the Drug Enforcement Administration (DEA), the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), the U.S. Marshals Service (USMS), and the U.S. Attorney’s Office (USAO).

    Of the 23 aliens taken into custody, 18 had prior criminal arrests or convictions, including:

    • 10 aliens with one or more Operating While Intoxicated (OWI) offenses
    • 10 aliens involved in crimes that resulted in injury to others
    • 3 aliens connected to drug possession and trafficking

    Additionally, four aliens were arrested on federal warrants, including one subject previously convicted of cocaine trafficking:

    • Martin Cortez-Lopez, 36, who was arrested as he left court in Bloomington, Indiana.
      • Criminal History: 2007 disorderly intoxication and resisting law enforcement with violence; 2010 possession of cocaine and failure to appear for resisting officer with violence; 2024 possession of cocaine x2 and operating while intoxicated/endangerment.
      • Previously removed 2011.  
    • Amin Reynosa-Diaz, 29, arrested in Evansville, Indiana. Reynosa-Diaz was located at a construction site and taken into custody.
      • Criminal History: 2020 driving while intoxicated; 2024 domestic violence.
      • Previously removed 2019.
    • Jaime Ortiz-Guzman, 46, arrested in Bloomington, Indiana.
      • Criminal History: 1999 federal arrest, fraud, imposter, false documents; 2006 battery; 2008 operating while intoxicated and operating a motor vehicle without ever receiving a license; 2024 operating while intoxicated and driving without a license.
      • Previously removed felon.
    • Jonathan Regules-Hernandez, 44, arrested in Bloomington, Indiana, after a short foot pursuit.
      • Criminal History: 2000 larceny and possession of stolen goods; 2004 maintaining a vehicle/dwelling/place with controlled substances and trafficking in cocaine; 2005 breaking and entering with the intent to commit felony and larceny after breaking and entering; 2025 operating a motor vehicle without ever receiving a license.
      • Previously removed felon.

    This operation underscores the effectiveness of interagency collaboration in addressing public safety threats. By combining investigative resources, intelligence sharing, and enforcement capabilities, federal agencies are better equipped to identify, locate, and apprehend aliens who pose risks to the community or have violated federal laws, including immigration statutes.

    “ICE officers are integral in keeping communities across our country safe from those who would commit violent, criminal acts,” said ERO Chicago’s Assistant Field Office Director Douglas Thompson. “Thanks to our federal law enforcement partnerships, criminal aliens with no lawful basis to remain in the U.S. will be held accountable to the immigration laws of our nation.”

    Members of the public can report crimes and suspicious activity by dialing 866-DHS-2-ICE (866-347-2423) or completing the online tip form.

    Learn more about ICE’s mission to increase public safety in your community on X at @EROChicago.

    MIL OSI USA News

  • MIL-OSI Security: Washington man arraigned on drug charges

    Source: Office of United States Attorneys

    GREAT FALLS – A Seattle man accused of distributing drugs on the Fort Belknap Indian Reservation appeared yesterday for arraignment, U.S. Attorney Kurt Alme said.

    The defendant, Jesse James Cochran, 31, pleaded not guilty to an indictment charging him with one count of conspiracy to possess with the intent to distribute controlled substances and one count of possession with the intent to distribute controlled substances. If convicted of the most serious crime charged in the indictment, Cochran faces a mandatory minimum term of imprisonment of 5 years, a maximum term of 40 years, a $5,000,000 fine, and at least four years of supervised release.

    U.S. Magistrate Judge John Johnston presided. Cochran was released pending further proceedings.

    Count one of the indictment alleges that on or about October 2022, and June 2024, in and near the Fort Belknap Indian Reservation, the Cochran knowingly and unlawfully conspired with his co-defendant to possess with the intent to distribute 40 grams or more of methamphetamine. Count two alleges that on or about October 2022, and June 2024, in and near Fort Belknap Indian Reservation, Cochran knowingly and unlawfully possessed with the intent to distribute 40 grams or ore of fentanyl and aided and abetted the same.

    Assistant U.S. Attorney Amanda Myers is prosecuting the case. The Tri-Agency Task Force conducted the investigation.

    The charging documents are merely accusations and defendants are presumed innocent until proven guilty beyond a reasonable doubt.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    PACER case reference. 24-92.

    The progress of cases may be monitored through the U.S. District Court Calendar and the PACER system. To establish a PACER account, which provides electronic access to review documents filed in a case, please visit http://www.pacer.gov/register.html. To access the District Court’s calendar, please visit https://ecf.mtd.uscourts.gov/cgi-bin/PublicCalendar.pl.

    XXX

    MIL Security OSI

  • MIL-OSI: Everbright Digital Holdings Limited Announces Closing of Partial Exercise of Over-Allotment Option

    Source: GlobeNewswire (MIL-OSI)

    HONG KONG, May 22, 2025 (GLOBE NEWSWIRE) — Everbright Digital Holdings Limited (the “Company” or “Everbright”) (Nasdaq: EDHL), an integrated marketing solutions provider headquartered in Hong Kong, today announced that it has issued an additional 160,000 ordinary shares (the “Ordinary Shares”) at a price of US$4.00 per share for gross proceeds of approximately $640,000, before deducting underwriter discounts and other related expenses, pursuant to the partial exercise of the underwriter’s over-allotment option in connection with the Company’s previously announced initial public offering (the “Offering”). The option closing date was May 22, 2025. The ordinary shares began trading on the Nasdaq Capital Market on April 17, 2025, under the ticker symbol “EDHL”.

    The Company expects to use the net proceeds from the Offering and the exercise of the over-allotment option for (i) marketing and business expansion; (ii) continued research and development of the Company’s core technologies; (iii) business development overseas; (iv) talent acquisition and training; and (v) for working capital.

    The Offering was conducted on a firm commitment basis. Dominari Securities LLC acted as the lead underwriter and Revere Securities LLC acted as co-underwriter for the Offering. Pacific Century Securities, LLC acted as an advisor to the Company. Ortoli Rosenstadt LLP acted as U.S. counsel to the Company, and Hunter Taubman Fischer & Li LLC acted as U.S. securities counsel to the underwriters.

    A registration statement on Form F-1 relating to the Offering was filed with the U.S. Securities and Exchange Commission (the “SEC”) (File Number: 333-285191) and was declared effective by the SEC on March 31, 2025. The Offering was made only by means of a prospectus, forming a part of the registration statement. Copies of the final prospectus relating to the Offering may be obtained from Dominari Securities LLC by email at info@dominarisecurities.com, by standard mail to Dominari Securities LLC, 725 Fifth Avenue, 23rd Floor, New York, NY 10022, or by calling (212) 393-4500. In addition, copies of the final prospectus relating to the Offering may be obtained via the SEC’s website at www.sec.gov.

    This press release does not constitute an offer to sell, or the solicitation of an offer to buy any of the Company’s securities, nor shall there be any offer, solicitation or sale of any of the Company’s securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of such state or jurisdiction.

    About Everbright Digital Holding Limited

    Everbright Digital Holding Limited is an integrated marketing solutions provider headquartered in Hong Kong. The Company conducts all operations in Hong Kong through its operating subsidiary, Hong Kong United Metaverse Limited. The Company is an integrated marketing solutions provider in Hong Kong that is deeply involved in the metaverse and related technologies, providing one-stop digital marketing services to support businesses through every stage of their development, including metaverse stimulation, virtual reality (VR) and augmented reality (AR) design and creation, creative event planning and management, IP character creation and social media marketing.

    For more information, please visit the Company’s website: https://umeta.hk/.

    Forward-Looking Statements

    Certain statements in this announcement are forward-looking statements. These forward-looking statements involve known and unknown risks and uncertainties and are based on the Company’s current expectations and projections about future events that the Company believes may affect its financial condition, results of operations, business strategy and financial needs. Investors can find many (but not all) of these statements by the use of words such as “approximates,” “believes,” “hopes,” “expects,” “anticipates,” “estimates,” “projects,” “intends,” “plans,” “will,” “would,” “should,” “could,” “may” or other similar expressions in this prospectus. The Company undertakes no obligation to update or revise publicly any forward-looking statements to reflect subsequent occurring events or circumstances, or changes in its expectations, except as may be required by law. Although the Company believes that the expectations expressed in these forward-looking statements are reasonable, it cannot assure you that such expectations will turn out to be correct, and the Company cautions investors that actual results may differ materially from the anticipated results and encourages investors to review other factors that may affect its future results in the Company’s registration statement and other filings with the SEC.

    For investor and media inquiries, please contact:

    Everbright Digital Holding Limited
    Leung Chun Yip, CEO
    Email: michael@umeta.hk

    The MIL Network

  • MIL-OSI USA: Rep. Allen Leads Georgia Colleagues in Effort to Expand Access to India’s Market for U.S. Pecan Producers

    Source: United States House of Representatives – Congressman Rick Allen (R-GA-12)

    Today, Congressman Rick W. Allen (GA-12) led a bipartisan, bicameral group of his colleagues from Georgia in sending a letter to United States Department of Agriculture (USDA) Secretary Brooke Rollins seeking a swift solution in expanding access to India’s market for U.S. pecan producers.

    Joining Congressman Allen in sending the letter are Representatives Sanford Bishop (GA-02), Buddy Carter (GA-01), Lucy McBath (GA-06), Austin Scott (GA-08), Rich McCormick (GA-07), and David Scott (GA-13), as well as Senators Raphael Warnock (D-GA) and Jon Ossoff (D-GA).

    In the letter, the Members write: “As you may know, India is a significant foreign market for U.S. pecans. In 2022, the United States exported more than $1.3 million of pecans to India, and USDA’s Foreign Agricultural Service projects that pecan exports to India could now reach up to $5 million annually. This is a result of successful efforts in advocating for India to cut its tariff on U.S. pecan exports by 70 percent, which opened a market of more than one billion consumers to premium U.S.-grown pecans.

    The Members continue: “While U.S. pecan exporters are now successfully exporting shelled pecans to India, the product purchasers in India have requested the U.S. to export in-shell pecans, which enables the pecans to travel in a more shelf-stable state and allows buyers to finish processing upon arrival in India. However, shipments of U.S. in-shell pecans cannot be completed due to the lack of appropriate plant quarantine code (PQ code) for import into India.

    The Members conclude: “In 2024, the U.S. pecan industry submitted documents to USDA’s Animal and Plant Health Inspection Service (APHIS) to begin the process of obtaining a PQ code, and we write to request assistance from USDA in expediting the process…”

    To read the full letter to Secretary Rollins, click here.

    MIL OSI USA News

  • MIL-OSI: Athene Holding Ltd. Declares Second Quarter 2025 Preferred Stock Dividends

    Source: GlobeNewswire (MIL-OSI)

    WEST DES MOINES, Iowa, May 22, 2025 (GLOBE NEWSWIRE) — Athene Holding Ltd. (“Athene”) announced that it has declared the following preferred stock dividends on its non-cumulative preferred stock (represented by depositary shares, each representing a 1/1,000th interest in a share of preferred stock), payable on June 30, 2025 to holders of record as of June 15, 2025.

    • Quarterly dividend of $396.875 per share on the company’s 6.35% Fixed-to-Floating Rate Perpetual Non-Cumulative Preferred Stock, Series A (the “Series A Preferred Stock”); holders of depositary shares will receive $0.396875 per depositary share.
    • Quarterly dividend of $351.5625 per share on the company’s 5.625% Fixed-Rate Perpetual Non-Cumulative Preferred Stock, Series B (the “Series B Preferred Stock”); holders of depositary shares will receive $0.3515625 per depositary share.
    • Quarterly dividend of $398.4375 per share on the company’s 6.375% Fixed-Rate Reset Perpetual Non-Cumulative Preferred Stock, Series C (the “Series C Preferred Stock”); holders of depositary shares will receive $0.3984375 per depositary share.
    • Quarterly dividend of $304.6875 per share on the company’s 4.875% Fixed-Rate Perpetual Non-Cumulative Preferred Stock, Series D (the “Series D Preferred Stock”); holders of depositary shares will receive $0.3046875 per depositary share.
    • Quarterly dividend of $484.375 per share on the company’s 7.750% Fixed-Rate Reset Perpetual Non-Cumulative Preferred Stock, Series E (the “Series E Preferred Stock”); holders of depositary shares will receive $0.484375 per depositary share.

    Depositary shares for the Series A Preferred Stock are listed on the New York Stock Exchange (“NYSE”) under the ticker symbol “ATHPrA,” depositary shares for the Series B Preferred Stock are listed on the NYSE under the ticker symbol “ATHPrB,” depositary shares for the Series C Preferred Stock are listed on the NYSE under the ticker symbol “ATHPrC,” depositary shares for the Series D Preferred Stock are listed on the NYSE under the ticker symbol “ATHPrD,” and depositary shares for the Series E Preferred Stock are listed on the NYSE under the ticker symbol “ATHPrE.”

    About Athene
    Athene is a leading retirement services company with over $380 billion of total assets as of March 31, 2025, and operations in the United States, Bermuda, Canada, and Japan. Athene is focused on providing financial security to individuals by offering an attractive suite of retirement income and savings products and also serves as a solutions provider to corporations. For more information, please visit www.athene.com.

    Contact:

    Jeanne Hess
    VP, External Relations
    +1 646 768 7319
    jeanne.hess@athene.com

    The MIL Network

  • MIL-OSI: ESET participates in operation to disrupt the infrastructure of Danabot infostealer

    Source: GlobeNewswire (MIL-OSI)

    • ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure.
    • While primarily developed as an infostealer, Danabot also has been used to distribute additional malware, including ransomware.
    • Danabot’s authors promote their toolset through underground forums and offer various rental options to potential affiliates.
    • This ESET Research analysis covers the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates.
    • Poland, Italy, Spain and Turkey are historically one of the most targeted countries by Danabot.

    PRAGUE and BRATISLAVA, Czech Republic, May 22, 2025 (GLOBE NEWSWIRE) — ESET has participated in a major infrastructure disruption of the notorious infostealer, Danabot, by the US Department of Justice, the FBI, and US Department of Defense’s Defense Criminal Investigative Service. U.S. agencies were working closely with Germany’s Bundeskriminalamt, the Netherlands’ National Police, and the Australian Federal Police. ESET took part in the effort alongside Amazon, CrowdStrike, Flashpoint, Google, Intel471, PayPal, Proofpoint, Team Cymru and Zscaler. ESET Research, which has been tracking Danabot since 2018, contributed assistance that included providing technical analysis of the malware and its backend infrastructure, as well as identifying Danabot’s C&C servers. During that period, ESET analyzed various Danabot campaigns all over the world, with Poland, Italy, Spain and Turkey historically being one of the most targeted countries. The joint takedown effort also led to the identification of individuals responsible for Danabot development, sales, administration, and more.

    “Since Danabot has been largely disrupted, we are using this opportunity to share our insights into the workings of this malware-as-a-service operation, covering the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates. Apart from exfiltrating sensitive data, we have observed that Danabot is also used to deliver further malware, which can include ransomware, to an already compromised system,” says ESET researcher Tomáš Procházka, who investigated Danabot.

    The authors of Danabot operate as a single group, offering their tool for rental to potential affiliates, who subsequently employ it for their malicious purposes by establishing and managing their own botnets. Danabot’s authors have developed a vast variety of features to assist customers with their malevolent motives. The most prominent features offered by Danabot include: the ability to steal various data from browsers, mail clients, FTP clients, and other popular software; keylogging and screen recording; real-time remote control of the victims’ systems; file grabbing; support for Zeus-like webinjects and form grabbing; and arbitrary payload upload and execution. Besides utilizing its stealing capabilities, ESET Research has observed a variety of payloads being distributed via Danabot over the years. Furthermore, ESET has encountered instances of Danabot being used to download ransomware onto already compromised systems.

    In addition to typical cybercrime, Danabot has also been used in less conventional activities such as utilizing compromised machines for launching DDoS attacks… for example, a DDoS attack against Ukraine’s Ministry of Defense soon after the Russian invasion of Ukraine.

    Throughout its existence, according to ESET monitoring, Danabot has been a tool of choice for many cybercriminals and each of them has used different means of distribution. Danabot’s developers even partnered with the authors of several malware cryptors and loaders, and offered special pricing for a distribution bundle to their customers, helping them with the process. Recently, out of all distribution mechanisms ESET observed, the misuse of Google Ads to display seemingly relevant, but actually malicious, websites among the sponsored links in Google search results stands out as one of the most prominent methods to lure victims into downloading Danabot. The most popular ploy is packing the malware with legitimate software and offering such a package through bogus software sites or websites falsely promising users to help them find unclaimed funds. The latest addition to these social engineering techniques are deceptive websites offering solutions for fabricated computer issues, whose only purpose is to lure victims into execution of a malicious command secretly inserted into the user’s clipboard.

    The typical toolset provided by Danabot’s authors to their affiliates includes an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communications between the bots and the actual C&C server. Affiliates can choose from various options to generate new Danabot builds, and it’s their responsibility to distribute these builds through their own campaigns.

    “It remains to be seen whether Danabot can recover from the takedown. The blow will, however, surely be felt, since law enforcement managed to unmask several individuals involved in the malware’s operations,” concludes Procházka.

    For technical overview of Danabot and insight into its operation, check out ESET Research blogpost: “Danabot: Analyzing a fallen empire” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

    Worldwide Danabot detections as seen in ESET telemetry since 2018

    About ESET

    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/2306cbf1-1ef7-4040-8c12-ca8be3cc6689

    The MIL Network

  • MIL-Evening Report: From peasant fodder to posh fare: how snails and oysters became luxury foods

    Source: The Conversation (Au and NZ) – By Garritt C. Van Dyk, Senior Lecturer in History, University of Waikato

    An Oyster cellar in Leith John Burnet, 1819; National Galleries of Scotland, Photo: Antonia Reeve

    Oysters and escargot are recognised as luxury foods around the world – but they were once valued by the lower classes as cheap sources of protein.

    Less adventurous eaters today see snails as a garden pest, and are quick to point out that freshly shucked oysters are not only raw but also alive when they are eaten.

    How did these unusual ingredients become items of conspicuous consumption?

    From garden snail to gastronomy

    Eating what many consider to be a slimy nuisance seems almost counter-intuitive, but consuming land snails has an ancient history, dating to the Palaeolithic period, some 30,000 years ago in eastern Spain.

    Ancient Romans also dined on snails, and spread their eating habits across their empire into Europe.

    Lower and middle class Romans ate snails from their gardens, while elite consumers ate specially farmed snails, fed spices, honey and milk.

    An Ancient Roman mosaic dating to the 4th century AD depicting a basket of snails, Basilica di Santa Maria Assunta, Aquileia, Italy.
    Carole Raddato/Wikimedia Commons, CC BY-SA

    Pliny the Elder (AD 24–79) described how snails were raised in ponds and given wine to fatten them up.

    The first French recipe for snails appears in 1390, in Le Ménagier de Paris (The Good Wife’s Guide), but not in other cookbooks from the period.

    In 1530, a French treatise on frogs, snails, turtles and artichokes considered all these foods bizarre, but surprisingly popular. Some of the appeal had to do with avoiding meat on “lean” days. Snails were classified as fish by the Catholic Church, and could even be eaten during Lent.

    For the next 200 years, snails only appeared in Parisian cookbooks with an apology for including such a disgusting ingredient. This reflected the taste of upper-class urbanites, but snails were still eaten in the eastern provinces.

    Schneckenweib, or Snail Seller, illustrated by Johann Christian Brand in Vienna, after 1798.
    Wien Museum

    An 1811 cookbook from Metz, in the Alsace region in northeastern France, describes raising snails like the Romans, and a special platter, l’escargotière, for serving them. The trend did not travel to Paris until after 1814.

    French diplomat Charles-Maurice de Talleyrand-Périgord (1754–1838) hosted a dinner for Russian Tsar Alexander I, after he marched into Paris following the allied forces’ defeat of Napoleon in 1814.

    The chef catering the meal was the father of French cuisine Marie-Antoine Carême, a native of Burgundy, spiritual home of the now famous escargots de Bourgogne.

    Carême served the Tsar what would become a classic recipe, prepared with garlic, parsley and butter. Allegedly, the Tsar raved about the “new” dish, and snails became wildly popular. A recipe for Burgundy snails first appeared in a French culinary dictionary published in 1825.

    It is ironic that it took the approval of a foreign emperor, who had just conquered Napoleon, to restore luxury status to escargot, a food that became a symbol of French cuisine.

    Snails remain popular today in France, with consumption peaking during the Christmas holidays, but May 24 is National Escargot Day in France.

    Oysters: the original fast food

    Oysters are another ancient food, as seen in fossils dating to the Triassic Era, 200 million years ago. Evidence of fossilised oysters are found on every major land mass, and there is evidence of Indigenous oyster fisheries in North America and Australia that dates to the Holocene period, about 12,000 years ago.

    There are references in classical Greek texts to what are probably oysters, by authors like Aristotle and Homer. Oyster shells found at Troy confirm they were a favoured food. Traditionally served as a first course at banquets in Ancient Greece, they were often cooked, sometimes with exotic spices.

    Music-cover sheet for ‘Bonne-Bouche’ by Emile Waldteufel, 1847-1897.
    © The Trustees of the British Museum, CC BY-NC-SA

    Pliny the Elder refers to oysters as a Roman delicacy. He recorded methods of the pioneer of Roman oyster farming, Sergius Orata, who brought the best specimens from across the Empire to sell to elite customers.

    Medieval coastal dwellers gathered oysters at low tide, while wealthy inland consumers would have paid a premium for shellfish, a perishable luxury, transported to their castles.

    French nobles in 1390 preferred cooked oysters, roasted over coals or poached in broths, perhaps as a measure to prevent food poisoning. As late as the 17th century, authors cautioned:

    But if they be eaten raw, they require good wine […] to aid digestion.

    Oyster Seller, Jacob Gole, 1688–1724.
    Rijksmuseum

    By the 18th century, small oysters were a popular pub snack, and larger ones were added as meat to the stew pot. That century, it is believed as many as 100,000 oysters were eaten each day in Edinburgh and the shells from the tavern in the basement filled in gaps in the brickwork at Gladstone’s Land in Edinburgh’s Royal Mile.

    Scottish oyster farms in the Firth of Forth, an inlet of the North Sea, produced 30 million oysters in 1790, but continual over-harvesting took its toll.

    By 1883 only 6,000 oysters were landed, and the population was declared extinct in 1957.

    As wild oyster stocks dwindled, large oyster farms developed in cities like New York in the 19th century. Initially successful, they were polluted, and infected by typhoid from sewage. An outbreak in 1924 killed 150 people, the deadliest food poisoning in United States history.

    Costumes of Naples: Oyster Sellers, c. 1906–10.
    Rijksmuseum

    Far from the overabundance of oysters we once had, over-fishing, pollution, and invasive species all threaten oyster populations worldwide today. Due to this scarcity of wild oysters and the resources required to safely farm environmentally sustainable oysters, they are now a premium product.

    Next on the menu

    Scarcity made oysters a luxury, and a Tsar’s approval elevated snails to gourmet status. Could insects become the next status food?

    Ancient Romans ate beetles and grasshoppers, and cultures around the world consume insects, but not (yet) as luxury products.

    Maybe the right influencer can make honey-roasted locust the next species to jump from paddock to plate.

    Garritt C. Van Dyk has received funding from the Getty Research Institute.

    ref. From peasant fodder to posh fare: how snails and oysters became luxury foods – https://theconversation.com/from-peasant-fodder-to-posh-fare-how-snails-and-oysters-became-luxury-foods-254299

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: There is a growing number of ‘super-sized’ schools. Does the number of students matter?

    Source: The Conversation (Au and NZ) – By Emma Rowe, Associate Professor in Education, Deakin University

    LBeddoe/Shutterstock

    Earlier this week, The Sydney Morning Herald reported one of Sydney’s top public high schools had more than 2,000 students for the first time, thanks to the booming population in the area.

    This follows similar reports of other “super-sized” schools in Victoria, Western Australia and Queensland.

    Parents may be wondering if a school’s size will impact their child’s opportunities or experience. What does the research say?

    A controversial subject

    Policy-makers have been concerned about school sizes for decades. This largely relates to declining enrolments in some areas and growing demand in others. For example, in Victoria during the Kennett government in the 1990s, some schools were merged into “super schools”.

    Super schools are attractive to policy-makers due to their ability to pool resources. However, anecdotally, parents have tended to oppose mergers on the basis that big schools detract from the community feel and personal relationships.

    There is no national data on average school size, although you can check individual school sizes on the MySchool website.

    Education authorities consider a school to be “small” if it has fewer than 300 students for primary school and fewer than 700 for high school.

    What does the research say?

    Australian-based research tends to support larger schools, on the basis they provide more curriculum choices. In a 2014 study published in the Journal of Education Policy, the authors wrote:

    large schools have more resources and are therefore better placed to offer a large range of curriculum, often including both academic and vocational subjects.

    A 2023 study similarly argued:

    smaller schools are generally less able to offer a wide range and diversity of curricular offerings compared to larger schools.

    Small schools can be beneficial

    But other education advocates argue small schools better facilitate participatory democratic environments for young people, improve discipline and sense of community.

    A 2009 review of 57 studies (the majority from the United States) published after 1990 recommended high schools do not have more than 1,000 students.

    The review said smaller schools can offer a community-like feel for students and are more likely to have smaller class sizes. A smaller school may be particularly advantageous for neurodiverse students if there are lower levels of noise and movement.

    A US-based study from 1991 found schools with less than 400 students lead to better student participation, attendance and satisfaction with school:

    The two primary arguments for large schools, cost savings and curriculum enhancement, pale in comparison with the positive schooling outcomes […] achieved by small schools.

    Smaller schools can offer a stronger sense of community.
    Dean Drobot/ Shutterstock

    But context matters

    In 2000, the Gates Foundation had a “big idea” to break up large high schools and turn them into “small learning communities” of 400 or fewer students.

    The foundation believed the initiative would lift graduation rates and student achievement, especially among minority students, because of the close relationships between students and teachers.

    But by 2008, the foundation conceded it had not worked – there had been no “dramatic improvements” in the number of students who leave high school adequately prepared for further study.

    But it’s not really about size

    So the research offers a mixed picture – this strongly suggests the size of a school on its own is not the most important factor.

    We also need to look at factors such as class size. Research shows smaller class sizes and lower teacher to student ratios are beneficial for student outcomes.

    Smaller class sizes and lower teacher to student ratios can lead to more one-on-one attention, improved relationships and lower noise levels in a classroom.

    Some studies have categorised “small classes” as between 13-17 students and larger classes as between 22-25 students.

    Teaching quality may also be improved with a smaller class size, as the teacher has more time to tailor their instruction to individual students.

    Importantly, the size of a school overall does not necessarily determine class sizes. A large school or a small school can still have large class sizes, and still struggle for quality one-on-one time.

    Similarly, a large school can still offer a strong sense of community and positive relationships between teachers and peers, depending on the way the school is organised (for example, a “school-within-a-school” or specific learning group within the school).

    If a small school is not well-resourced or does not have enough teachers, it may struggle to provide a positive, happy learning environment.

    The point is the school size on its own is not necessarily a positive or negative. What matters is what else is going on inside that school and whether it has the funding and resources to offer smaller class sizes, specialised teachers and access to a wide variety of subjects.

    Emma Rowe receives funding from the Australian Research Council.

    ref. There is a growing number of ‘super-sized’ schools. Does the number of students matter? – https://theconversation.com/there-is-a-growing-number-of-super-sized-schools-does-the-number-of-students-matter-257012

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Australian roads are getting deadlier – pedestrians and males are among those at greater risk

    Source: The Conversation (Au and NZ) – By Milad Haghani, Associate Professor & Principal Fellow in Urban Risk & Resilience, The University of Melbourne

    At least ten people died in fatal crashes earlier this month in a single 48-hour period on Victorian roads. It was the latest tragic demonstration of the mounting road trauma in Australia.

    In the decade up to 2020, the national road toll was gradually declining, albeit with some fluctuations. But the trend has since reversed, with fatalities rising steadily year after year.

    According to the latest official data, 1,296 people died on Australian roads in the year to April. 108 lives were lost last month alone, almost 15% more than the average for April over the previous five years.

    While our population has increased by about 6% over this five-year period, our road deaths have gone up by 18.5%.

    Road fatalities rarely follow evenly distributed averages. They sometimes spike, as they have in Victoria. And while we must never lose sight of the fact that these are people, and not just data, there is value in interrogating clusters when they occur.

    Victoria breakdown

    In the 12 months to May 20 this year, 118 lives were lost on Victorian roads, up 8.3% on the previous year and well above the five-year average of 100 annual deaths.

    The sharpest increases by transport mode have been among pedestrians (up 24%), one of the most vulnerable road-user groups. And a new threat has emerged with the first publicly reported case in Australia of a pedestrian dying after being struck by an electric bike.

    At least one pattern stands out from the recent cluster: five of the eight crashes occurred outside metropolitan Melbourne. This reflects the longstanding reality that fatal collisions remain disproportionately common in regional and remote areas. Over the 12 months, country road deaths have risen by 11%, compared to a 2% increase in metropolitan Melbourne.

    A large share of road deaths continue to occur in the country.
    Inge Blessas/Shutterstock

    Another striking detail is the gender distribution. Male deaths are up 22% on the previous period and now comprise nearly 80% of all fatalities. In contrast, female deaths have declined by 33%.

    Another trend that stands out is the rising toll among older road users. In the last 12 months, 40 people aged 60 and over have died on Victorian roads – a 25% increase on the previous period.

    4 National trends

    The national road fatality data tells us some of these trends are not exclusive to Victoria. They reflect what is happening across the country.

    1. Vulnerable road users: Nationally, pedestrians and motorcyclists have experienced sustained increases in lives lost for at least four years in a row. The share of pedestrians in total road deaths has risen from 11% in 2021 to 14% in the latest period. Despite the growing number, motorcyclist fatalities have remained relatively stable at about 20% of all deaths.

    2. Gender disparity: Men continue to be disproportionately represented in the national road toll, accounting for approximately 75% of all road deaths in Australia.

    3. Older age groups: In the 12 months to April 2025, deaths among individuals aged 75 and over increased by nearly 19% to 185.

    4. Regional and remote areas: in the 12 months to April 2024, there were roughly 818 deaths on country roads, compared to 400 in metropolitan areas.

    What do the trends tell us?

    There are several key points in the data.

    First, the persistent over-representation of men in fatalities remains a defining feature of the road toll. This gender imbalance is not specific to Australia.

    But put simply, we still know very little about what’s driving this pattern. Known behavioural and physiological sex-based differences don’t fully explain the scale of the disparity.

    The rise in fatalities among older Australians does not appear to be particularly abnormal when tracked with demographic changes. From 2020 to 2024, the number of Australians aged 75 and over increased by nearly 31%. In comparison, fatalities in this age group rose by around 25% over the same period. This suggests that the relative risk for older Australians has not necessarily increased.

    As for rural and regional areas, approximately two-thirds of road deaths occur in these areas, while only one-third of Australians reside there. Despite years of acknowledgment, this urban–rural divide in road safety remains wide and unresolved.

    SUVs a menace?

    While vehicles have become safer for their occupants, they have become more dangerous for other road users, especially pedestrians.

    One contributing factor could be the fast growing dominance of SUVs and light trucks in Australia.

    A recent international review that pooled the findings of 24 studies found SUVs were associated with significantly higher fatality rates in crashes involving vulnerable road users, compared to smaller cars. The effect was particularly pronounced for children.

    Heavier vehicles, such as SUVs, pose a higher road risk to pedestrians.
    King Ropes Access/Shutterstock

    The dangers are not limited to pedestrians. In two-vehicle collisions, increasing the striking vehicle’s weight by around 450 kilograms raises the probability of a fatality in the other vehicle by 40–50%.

    New targets

    Australian governments have adopted a Vision Zero goal of no road deaths or serious injuries by 2050.

    The complete elimination of fatalities should remain our moral benchmark. But the current data suggests intermediate targets are urgently needed.

    A more achievable near-term priority may be to first reverse the rising national toll by focusing on where the greatest preventable harms persist: vulnerable road users, especially pedestrians, males and non-urban roads.

    Milad Haghani receives funding from The Australian Government.

    Iman Taheri Sarteshnizi does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Australian roads are getting deadlier – pedestrians and males are among those at greater risk – https://theconversation.com/australian-roads-are-getting-deadlier-pedestrians-and-males-are-among-those-at-greater-risk-256994

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI USA: May 22nd, 2025 Heinrich Joins Colleagues in Call to Protect ENERGY STAR

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.), Ranking Member of the Senate Energy and Natural Resources Committee, this week joined his colleagues in urging the Trump Administration to immediately reverse course on its plan to illegally and unilaterally terminate the ENERGY STAR program. In the letter, Heinrich highlighted the cost-saving benefits of the program, which would save the average American household $450 on utility bills each year simply by choosing ENERGY STAR certified products.

    Since 1992, ENERGY STAR has reduced energy costs for American families and businesses by $500 billion, including $42 billion worth of savings in 2020 alone. For every federal dollar spent on ENERGY STAR, Americans have seen $350 in savings.

    “For over three decades, the ENERGY STAR program has lowered Americans’ energy bills by informing consumers about energy efficient products. The program has enjoyed bipartisan support since its creation under authority of Section 103 of the Clean Air Act, most recently receiving $35.7 million in fiscal year 2025 appropriations,” wrote the senators. “Reporting has indicated, however, that the Environmental Protection Agency (EPA) plans to eliminate ENERGY STAR without Congressional approval. Not only is the program protected under federal statute and thus illegal for the Administration to terminate unilaterally, but this decision also lacks basic economic sense. We write to urge you to immediately reverse course.”

    The senators continued: “ENERGY STAR is the epitome of an effective public-private partnership. As the program’s administrators, EPA and the Department of Energy set qualifying energy efficiency standards for products. EPA also protects the integrity of the ENERGY STAR brand, ensuring it remains well-known, trusted, and indicative of a quality product. Appliance manufacturers then voluntarily display the ENERGY STAR label, notifying consumers that a product will reduce their energy consumption and lower utility bills. The program strengthens consumer choice by sharing critical product information.”

    “Eliminating the ENERGY STAR program will not only raise energy costs for American families and businesses, but also inflict far-reaching economic harms, threatening industry jobs and the reliability of the grid at a time of growing demand. We again urge you to immediately reconsider eliminating this popular and effective Congressionally authorized program,” the senators concluded.

    Administered by the EPA and Department of Energy, ENERGY STAR is a voluntary, market-based program that has saved consumers billions of dollars annually. The ENERGY STAR program has cumulatively reduced four billion metric tons of harmful emissions and currently supports more than 790,000 American jobs manufacturing and installing ENERGY STAR products.

    ENERGY STAR is strongly supported by a wide array of manufacturers, homebuilders, housing organizations, building owners, small businesses, and other organizations. In April, the U.S. Real Estate Industry sent a letter to the Trump Administration expressing its strong support for the ENERGY STAR program. Additionally, the U.S. Green Buildings Council partnered with the Alliance to Save Energy in leading over 1,000 organizations in urging the Trump Administration to protect the program and maintain full funding and staffing levels.

    The letter was authored by U.S. Senators Peter Welch (D-Vt.) and Jeanne Shaheen (D-N.H.). In addition to Heinrich, it was signed by U.S. Senators Bernie Sanders (I-Vt.), John Fetterman (D-Pa.), Mazie Hirono (D-Hawaii), Angus King (I-Maine), Chris Coons (D-Del.), Ed Markey (D-Mass.), Sheldon Whitehouse (D-R.I.), Chris Van Hollen (D-Md.), Dick Durbin (D-Ill.), Tammy Baldwin (D-Wis.), Jeff Merkley (D-Ore.), Amy Klobuchar (D-Minn.), Brian Schatz (D-Hawaii), Lisa Blunt Rochester (D-Del.), Tina Smith (D-Minn.), Ron Wyden (D-Ore.), Richard Blumenthal (D-Conn.), Michael Bennet (D-Colo.), and Cory Booker (D-N.J.).

    Read and download the full letter here.

    MIL OSI USA News