Category: Asia Pacific

  • MIL-OSI: Best Betting Apps in Texas – BetWhale Picked As the Top TX Sportsbook Mobile App

    Source: GlobeNewswire (MIL-OSI)

    New York City, May 21, 2025 (GLOBE NEWSWIRE) —

    In Texas, sports aren’t just entertainment—they’re a way of life. Texans wear their team loyalties like badges of honor, proudly supporting everything from Friday night high school football under stadium lights to major league events packed with screaming fans. 

    JOIN THE BEST BETTING APP IN TEXAS: BETWHALE

    Although Texas has historically maintained strict regulations on gambling, passionate sports fans have turned to online betting apps to add even more excitement to the games they love. Betting apps in Texas have opened a thrilling new dimension for sports enthusiasts eager to test their predictions and expertise while potentially earning some extra cash.

    What Makes BetWhale the Best Betting App in Texas

    When evaluating betting apps in Texas, BetWhale clearly stands out. Several features contribute to its unmatched popularity among Texans:

    Generous Bonuses

    BetWhale offers a highly competitive welcome bonus, rewarding new users with a 125% bonus up to $1,250 on their first deposit. Regular promotions and loyalty programs further enhance the user experience, providing consistent value to bettors.

    Comprehensive Sports Coverage

    The app provides extensive coverage of major sports such as NFL, NBA, MLB, NHL, and collegiate sports. Additionally, BetWhale includes niche markets like MMA, esports, international soccer leagues, and even entertainment and political betting, catering to a diverse betting audience.

    Seamless User Experience

    BetWhale’s intuitive platform ensures easy navigation across all devices. Quick-loading pages, clearly displayed odds, and streamlined bet placements create a hassle-free experience for both new and experienced bettors.

    Live Betting and Streaming

    One of BetWhale’s standout features is its live betting platform. Real-time odds adjustments, comprehensive live betting markets, and streaming of selected sports events significantly heighten the excitement and engagement of betting in real-time.

    Security and Reliability

    The app employs advanced encryption technology and secure payment gateways, ensuring user data and transactions are safe. Quick, reliable transactions paired with responsive customer support further solidify its appeal.

    TAKE THE 125% BONUS AT BETWHALE

    Why Texans Love to Bet on Sports

    Texans don’t just casually follow sports; they live and breathe them. Their deep cultural and community ties to teams—from high school through professional leagues—make sports betting a natural extension of their sports fandom. Betting apps in Texas capitalize on this passion by offering a wide variety of betting options tailored to local interests, ensuring Texans can engage fully with the excitement of each sporting event.

    This passion translates into significant betting engagement throughout the year, peaking around major events, championships, and rivalry games. The sheer variety of sports and teams ensures that there is always action available on Texas betting apps, providing continuous excitement and opportunities to win.

    How to Join Texas Betting Apps

    Joining betting apps in Texas, such as BetWhale, is simple and hassle-free. Here’s a step-by-step guide to ensure a smooth registration and betting process:

    1. Choose a Reputable Betting App

    Your first step should always involve selecting a secure and trusted betting app that accepts Texas residents. BetWhale is highly recommended due to its robust security, diverse betting markets, user-friendly interface, and reliable customer service.

    2. Complete the Registration Form

    Once you’ve chosen the right app, click the “Join” or “Register” button prominently featured on the homepage. A registration form will appear, requiring you to fill in essential personal details accurately. It’s essential to double-check your information for accuracy to avoid potential verification issues later.

    3. Account Verification Process

    After registering your account, betting apps like BetWhale will require verification to ensure compliance with regulatory standards and to protect your account from unauthorized access. 

    Typically, this involves providing a clear image or scan of your government-issued ID, such as a driver’s license, passport, or state ID and supplying a recent utility bill, bank statement, or official document showing your current residential address clearly and accurately.

    4. Deposit Funds into Your Betting Account

    Once your account is verified, the next step is depositing funds to place bets. Betting apps in Texas, including BetWhale, typically offer various convenient and secure payment methods such as credit/debit cards, e-wallets, and prepaid cards. 

    Select your preferred payment method, enter the amount you wish to deposit, and follow the instructions provided. Deposits are usually processed instantly, allowing you to start betting immediately.

    5. Placing Bets on Your Favorite Sports

    With funds securely in your account, you’re now ready to start placing bets. Navigate through the intuitive user interface provided by BetWhale or your chosen app to explore various sports and markets available.

    Most Popular Sports Texans Bet On

    Texans have a deeply ingrained passion for sports, and this passion translates directly into enthusiastic betting activity. Betting apps in Texas see robust action, especially around sports that resonate deeply with local pride. Here’s an expanded breakdown of the most popular sports Texans love betting on:

    Football: King of Texas Sports

    In Texas, football isn’t just a sport—it’s a cultural phenomenon. Whether it’s the thrilling atmosphere of Friday Night Lights at local high school stadiums or the grandeur of Sunday afternoons with NFL action, Texans are deeply invested in football. The betting activity surrounding football peaks dramatically during the season.

    NFL Football

    Dallas Cowboys: Known affectionately as “America’s Team,” the Cowboys boast one of the largest fanbases in the United States. Texans bet extensively on Cowboys games, especially rivalry matchups against NFC East opponents such as the Philadelphia Eagles, New York Giants, and Washington Commanders.

    Houston Texans: Despite their comparatively younger history, the Texans have quickly developed a dedicated following, with bettors consistently wagering on their games, particularly intra-division clashes in the AFC South against rivals like the Indianapolis Colts and Tennessee Titans.

    College Football

    Texas Longhorns (University of Texas at Austin): With an iconic burnt orange and white color scheme and the famous “Hook ’em Horns” chant, the Longhorns command statewide loyalty. High-profile games against rivals such as Oklahoma in the Red River Showdown or matchups against Texas Tech and Baylor see intense betting activity.

    Texas A&M Aggies: Aggie pride runs deep in College Station. Betting on Aggies games, especially against SEC powerhouses like Alabama and LSU, captures significant attention throughout the season.

    Football consistently remains the top choice among betting apps in Texas, with considerable excitement and betting volume accompanying major events such as the NFL playoffs, College Football Playoff, and bowl games.

    Basketball: Texas’ Second Love

    Basketball, both professional and collegiate, also attracts extensive betting attention across Texas. Enthusiasm peaks during playoff seasons and March Madness, drawing large numbers of sports bettors to the apps.

    NBA Basketball

    Houston Rockets: With a history of championship success in the ’90s, Rockets games remain popular betting events, especially during playoff contention years.

    Dallas Mavericks: Led historically by stars such as Dirk Nowitzki and now Luka Dončić, the Mavericks have a robust following that fuels betting activity throughout the season, spiking significantly during playoff runs.

    San Antonio Spurs: Known for their consistent excellence and championship pedigree under legendary coach Gregg Popovich, the Spurs have maintained a loyal betting fanbase that actively engages during critical playoff matchups.

    College Basketball

    Texans don’t limit their basketball enthusiasm to the professional ranks. March Madness, the NCAA basketball tournament, sees heightened interest, especially when local teams participate:

    Baylor Bears: Recent successes, including their 2021 national championship win, have elevated Baylor’s profile and significantly increased betting engagement during tournament seasons.

    Texas Tech Red Raiders: A recent powerhouse in college basketball, their strong showings in tournaments have translated directly into heightened betting interest across Texas betting apps.

    Baseball: Texas’ Summer Tradition

    Baseball remains a cherished tradition throughout Texas, particularly during the warm months, and Texans enthusiastically wager on their beloved MLB teams.

    Houston Astros: The Astros’ recent World Series victories and consistent playoff appearances have propelled them into a national spotlight. Their postseason games, especially matchups against rivals such as the New York Yankees, consistently draw high betting volumes.

    Texas Rangers: Playing out of Arlington, the Rangers maintain a passionate fan base. During strong competitive seasons or playoffs, Rangers games generate considerable betting interest statewide.

    Major League Baseball betting peaks dramatically in Texas during postseason play, as the excitement surrounding the playoffs and World Series leads to increased betting activity.

    Factors to Consider When Choosing Texas Betting Apps

    Selecting the right betting app in Texas involves more than just picking the first platform that appears attractive. It’s essential to examine specific aspects that can significantly impact your betting experience. Here’s a detailed exploration of key factors you should consider:

    Licensing and Security

    The cornerstone of a reliable betting app is its adherence to strict licensing and robust security protocols. Choosing a betting app that operates under credible licensing authorities ensures you’re dealing with a trustworthy provider that complies with international gambling standards.

    Betting Markets and Odds

    Another critical factor when choosing betting apps in Texas is the breadth and depth of available betting markets, along with the competitiveness of odds provided.

    Ideal apps provide comprehensive coverage across a wide variety of sports including major leagues (NFL, NBA, MLB), collegiate sports, international soccer, horse racing, and niche markets like esports and MMA. Extensive market coverage allows you to explore different betting opportunities and diversify your wagering.

    Betting odds directly impact your potential winnings. Choosing apps that consistently offer attractive, competitive odds can significantly increase your potential returns. It’s beneficial to compare odds across various platforms to determine which app frequently provides the best value, particularly in popular markets like football or basketball.

    User-Friendly Interface

    A well-designed, user-friendly interface can markedly improve your betting experience, making it easier and more enjoyable to engage with sports betting regularly.

    Apps that feature intuitive navigation allow users to quickly locate their favorite sports, markets, and betting options without confusion. Clear, organized menus and fast-loading pages are key aspects of superior app design.

    Payment Options

    The availability and reliability of multiple payment methods significantly influence the convenience and practicality of any betting app in Texas. A good betting app should provide a wide range of secure payment methods. 

    Commonly used options include:

    • Credit/Debit Cards: Visa, MasterCard, and American Express are standard for quick and straightforward deposits.
    • E-Wallets: Payment systems like PayPal, Skrill, Neteller, and ecoPayz offer speedy, secure, and discreet transactions.
    • Prepaid Cards: Options such as Paysafecard allow deposits without the necessity of linking directly to a personal bank account or credit card.
    • Bank Transfers: Direct bank transfers offer a secure option for larger transactions, albeit with slightly longer processing times compared to other methods.

    Customer Service

    High-quality customer support can dramatically influence your betting experience, especially when resolving technical issues or answering account-related questions promptly.

    Efficient, responsive customer service is essential for addressing queries or issues swiftly. Top-tier betting apps in Texas usually offer customer support that is quick to respond, typically within minutes via live chat and within a few hours via email.

    A reputable betting app should provide multiple customer support channels, including live chat, email, phone support, and FAQ pages.

    Place Bets at the Top Texas Betting Apps

    When choosing betting apps in Texas, considering these factors in detail ensures you select a reliable, user-friendly, and enjoyable betting platform. Evaluating licensing and security, betting markets and odds, app usability, payment methods, and customer support quality will collectively guide you toward an app that enhances your sports betting experience.

    Making the right choice not only offers security and convenience but also greatly enhances the enjoyment and potential profitability of sports betting activities in Texas.

    Editorial Note

    This article is provided solely for informational and entertainment purposes. Nothing within should be interpreted as legal, financial, or professional advice. Readers should carry out their own research before participating in any gambling activities or signing up with any online casinos mentioned. 

    Gambling Caution

    Online gambling comes with financial risks and may lead to addictive behavior or monetary loss. We urge all readers to gamble responsibly. If you or someone you know is struggling with gambling, professional help is available. The National Council on Problem Gambling (NCPG) can be contacted at 1-800-522-4700 or visited online at www.ncpgambling.org.

    21+ only. It is up to each individual to verify whether online gambling is permitted under their local, state, or federal laws. Neither the publisher, the authors, nor any syndication partners condone or support unlawful gambling. Participation in online gambling is done at the reader’s own discretion and risk.

    Affiliate Transparency

    This article may include affiliate links. If you click on a link and make a purchase or register, a commission may be earned, at no extra cost to you.

    Syndication and Liability Disclaimer

    Any third-party publishers, media platforms, or syndication partners that republish this content do so understanding that it is meant for informational purposes only. These entities are not responsible for the legality, accuracy, or interpretation of the material.

    BetWhale
    https://betwhale.ag
    support@betwhale.ag
    1150 Gemini St, Houston, TX 77058

    Attachment

    The MIL Network

  • MIL-OSI: Best Horse Racing Betting Sites in Australia – Donbet Picked as the Top AU Racebook

    Source: GlobeNewswire (MIL-OSI)

    New York City, May 21, 2025 (GLOBE NEWSWIRE) —

    Horse racing is more than just a pastime in Australia—it’s practically a national obsession. From the Melbourne Cup to the raw excitement of local meets, Australians love the thrill of the track. 

    Betting on horse racing has become an integral part of this beloved sport, with numerous horse racing betting sites Australia bettors can join vying for attention from punters. But with so many options, how do you choose the best?

    JOIN THE BEST HORSE RACEBOOK IN AU: DONBET

    Why Donbet Is the Best Horse Racing Betting Site in Australia

    When you’re placing bets online, reliability and ease of use are paramount. Donbet not only meets these criteria but exceeds them. Donbet’s platform is crafted specifically with Aussie punters in mind, combining user-friendly design, excellent odds, comprehensive race coverage, and robust security features.

    One of Donbet’s standout features is its exceptional user interface. Easy navigation ensures bettors can quickly find odds and place wagers without unnecessary complications. Additionally, Donbet consistently provides competitive odds on all major and minor races, ensuring maximum value for every wager.

    The platform also offers extensive coverage of Australian and international races. Whether you’re betting on prestigious races like the Melbourne Cup or smaller local meets, Donbet ensures you never miss a beat.

    What to Consider When Choosing Horse Racing Sportbooks in Australia

    User Experience and Interface

    A seamless betting experience is crucial. Choose platforms like Donbet, known for their intuitive navigation, quick loading times, and responsive customer support.

    Betting Markets and Odds

    The best horse racing betting sites Australia has ever seen should offer a wide variety of betting markets, from straightforward win/place/show bets to more exotic wagers. Competitive odds significantly enhance potential returns.

    Security and Licensing

    Always prioritize betting sites that are licensed and regulated by Australian gaming authorities. Secure platforms utilize advanced encryption to protect your personal and financial details.

    Promotions and Bonuses

    Look for sites offering generous sign-up bonuses, free bets, cashback offers, and loyalty programs. Donbet excels by regularly updating promotions tailored to horse racing enthusiasts.

    Payment Methods and Speed of Withdrawals

    Efficient payment processing is vital. Ensure your chosen betting site supports popular Aussie-friendly payment methods like credit cards, bank transfers, and e-wallets.

    Mobile Compatibility

    With betting increasingly moving online, top sites must offer mobile-optimized platforms or dedicated betting apps to allow seamless betting on-the-go.

    How to Join Horse Racing Sportsbooks in Australia

    Joining horse racing betting sites like Donbet in Australia is straightforward and quick. Here’s a detailed breakdown of the steps to help you easily get started:

    Step 1: Visit the Website

    Navigate to Donbet’s official site using your desktop or mobile browser. You’ll easily spot the “Join” or “Register” button, usually prominently displayed at the top right corner of the homepage.

    Step 2: Complete the Registration Form

    Click the button and enter your personal details accurately. These typically include your full name, date of birth, residential address, email, and contact phone number. It’s crucial to provide accurate information to ensure smooth verification and secure account management.

    Step 3: Verify Your Identity

    Australian betting regulations mandate identity verification for security purposes. You’ll be prompted to upload documents like your passport, driver’s license, or national ID card. Occasionally, additional proof of address might be required, such as a recent utility bill or bank statement.

    Step 4: Make Your First Deposit

    Once your account is verified, deposit funds using your preferred method. Donbet supports various popular payment options, including credit cards, bank transfers, and e-wallets. Deposits are typically processed swiftly, allowing immediate betting access.

    Step 5: Place Your Bets

    With your account funded, explore Donbet’s extensive race listings. You can choose from numerous betting markets, including win/place/show, quinellas, trifectas, and more exotic options. Select your races, choose your bets, confirm your wagers, and you’re all set!

    TAKE THE 600 AUD BONUS

    Most Popular Racetracks You Can Bet On In Australia

    Australia boasts some of the most prestigious and exhilarating racetracks worldwide, each with its distinctive charm and betting opportunities:

    • Flemington Racecourse, Victoria: Located in Melbourne, Flemington is internationally renowned, especially for hosting the Melbourne Cup—Australia’s most famous horse race. The Melbourne Cup Carnival attracts thousands of spectators and bettors every November, making it a highlight of the global racing calendar.
    • Randwick Racecourse, New South Wales: Situated in Sydney, Randwick is the home of The Championships, a celebrated event featuring races such as the Queen Elizabeth Stakes and the Doncaster Mile. Its modern facilities and historic charm make it a favourite amongst punters.
    • Caulfield Racecourse, Victoria: Known for the prestigious Caulfield Cup, this Melbourne-based venue provides a critical testing ground for horses aiming for Melbourne Cup glory. Its engaging track layout ensures dynamic racing, offering bettors thrilling and strategic betting opportunities.
    • Moonee Valley Racecourse, Victoria: Located in Melbourne, Moonee Valley is famed for hosting the Cox Plate, known as Australia’s weight-for-age championship. Its compact and tight-turn course creates intense, exciting races ideal for experienced punters looking for challenging odds.
    • Eagle Farm Racecourse, Queensland: Brisbane’s leading racetrack, Eagle Farm, regularly hosts high-profile events like the Stradbroke Handicap and Queensland Derby. With a long straight track, it rewards strategic betting and offers great opportunities for punters looking to capitalize on form and distance specialists.
    • Ascot Racecourse, Western Australia: Ascot, located in Perth, combines lively atmosphere and competitive racing. It hosts major events like the Perth Cup and the Railway Stakes, attracting crowds and bettors keen on the vibrant social scene and competitive odds.

    What Makes Donbet Ideal for Aussie Bettors

    Donbet’s superiority comes down to several unique features tailored explicitly for Australian punters:

    • Local Expertise: Donbet is staffed with industry experts who understand the nuances of Australian horse racing.
    • Comprehensive Coverage: Whether it’s major metropolitan races or regional meets, Donbet offers extensive markets to suit every preference.
    • Enhanced Odds and Promotions: Regularly updated special offers and boosted odds provide more value to bettors, making Donbet particularly attractive for seasoned and new punters alike.
    • Reliable Customer Support: Accessible 24/7 customer service via live chat, email, and phone ensures you always have assistance when needed.
    • Robust Security Protocols: Licensed by reputable gaming authorities and employing cutting-edge encryption technologies, Donbet ensures your betting experience is secure.

    5 Essential Tips for Betting on Horse Racing

    1. Research Thoroughly

    Extensive research is crucial to successful betting. Study each horse’s recent form, historical performance on specific tracks, jockey and trainer stats, and the horse’s preferred distance. Look at past race videos and consider expert opinions to build a detailed understanding of potential outcomes.

    2. Understand and Identify Betting Value

    Understanding betting odds is essential. Recognize how bookmakers set odds and spot value bets—horses that have higher odds than their realistic winning probability. Developing a knack for identifying these bets can significantly enhance your long-term profitability.

    3. Practice Bankroll Management

    Responsible bankroll management protects your finances and improves your betting strategy. Set clear betting limits and stick to them. Allocate specific amounts per bet and avoid impulsive decisions like chasing losses. Disciplined betting will lead to more consistent and enjoyable betting experiences.

    4. Diversify Your Betting Strategy

    Don’t rely only on straightforward win bets. Explore various betting markets such as place bets, each-way bets, quinellas, trifectas, and exactas. Diversification helps balance risk and reward, potentially increasing overall returns and keeping betting engaging.

    5. Monitor Track and Weather Conditions

    Conditions greatly influence race outcomes. Horses can perform differently depending on weather (dry, wet, muddy tracks). Check accurate weather forecasts and track reports on race day. Understanding how these factors affect each horse can provide crucial betting insights and improve your decision-making.

    Final Thoughts on Horse Racing Betting Sites in Australia

    Horse racing is woven into Australia’s cultural fabric, and betting enhances the excitement of each event. Choosing the right betting site makes all the difference in your horse racing betting sites Australia experience. Donbet rises above the competition, perfectly aligning with what Australian bettors value most—reliability, extensive market coverage, superior odds, security, and outstanding customer support.

    Whether you’re a seasoned punter or just starting, Donbet and horse racing betting sites in Australia offer an exhilarating, user-friendly, and safe betting experience. Enjoy the thrills and excitement of Australian horse racing with confidence and ease at Donbet—Australia’s premier destination for horse racing betting.

    Editorial Note

    This article is provided solely for informational and entertainment purposes. Nothing within should be interpreted as legal, financial, or professional advice. Readers should carry out their own research before participating in any gambling activities or signing up with any online casinos mentioned. 

    Gambling Caution

    Online gambling comes with financial risks and may lead to addictive behavior or monetary loss. We urge all readers to gamble responsibly. If you or someone you know is struggling with gambling, professional help is available. In Australia, you can dial 1800 858 858.

    18+ only. It is up to each individual to verify whether online gambling is permitted under their local, state, or federal laws. Neither the publisher, the authors, nor any syndication partners condone or support unlawful gambling. Participation in online gambling is done at the reader’s own discretion and risk.

    Affiliate Transparency

    This article may include affiliate links. If you click on a link and make a purchase or register, a commission may be earned, at no extra cost to you.

    Syndication and Liability Disclaimer

    Any third-party publishers, media platforms, or syndication partners that republish this content do so understanding that it is meant for informational purposes only. These entities are not responsible for the legality, accuracy, or interpretation of the material.

    DonBet
    https://donbet.com
    support@donbet.com
    1150 Gemini St, Houston, TX 77058

    Attachment

    The MIL Network

  • Special prayers, local joy as PM Modi set to visit Karni Mata temple

    Source: Government of India

    Source: Government of India (4)

    As Prime Minister Narendra Modi prepares to virtually inaugurate 103 redeveloped railway stations under the Amrit Bharat Station Scheme on May 22, excitement is equally palpable in Rajasthan’s Bikaner, where he is scheduled to visit the historic Karni Mata Temple the same day.

    This marks PM Modi’s first visit to the temple since the launch of Operation Sindoor, a significant moment that underlines his strong connection to Rajasthan’s cultural and spiritual heritage. His visit is being seen not just as a gesture of reverence but also as part of a broader outreach that blends development in a modernised style with tradition.

    Locals are elated at the Prime Minister’s planned visit. “It is a matter of honour that PM Modi is coming here. This visit will be a big gift for Bikaner,” said Jagdish Singh, a resident of the city, speaking with visible pride.

    The sentiment was echoed by Gajender Singh, a temple priest, who said: “The Prime Minister’s special attention to Rajasthan is evident, and we are hopeful of more development in the region.” He added that the people of Bikaner see this visit as a blessing and a recognition of the region’s spiritual significance.

    Sens Karan, another priest at the Karni Mata temple, shared details of the temple preparations, noting that special rituals and prayers have been planned in honour of the Prime Minister’s arrival. Security has been heightened, and local authorities are working closely with temple officials to ensure a smooth and respectful experience.

    The Karni Mata Temple, revered for its rich spiritual legacy, is expected to be a key highlight of the Prime Minister’s day. As he balances infrastructure development with cultural reverence, May 22 is shaping up to be a symbolic day, celebrating progress, tradition, and national pride. (IANS)

  • MIL-OSI China: Former Vice President Chen attends inauguration of Pope Leo XIV

    Source: Republic of Taiwan – Ministry of Foreign Affairs

    May 18, 2025  

    No. 161  

    Former Vice President Chen Chien-jen, serving as special envoy of President Lai Ching-te, together with his wife and Deputy Minister of Foreign Affairs François Chihchung Wu, attended the inauguration of Pope Leo XIV on the morning of May 18. In an audience with the pontiff following the ceremony, Mr. Chen conveyed greetings from President Lai and the sincere congratulations of the government, people, and Catholic community of Taiwan.

     

    Upon arriving for the ceremony in St. Peter’s Square, Mr. Chen was received by a ceremonial officer for the Holy See. The inauguration, a grand and solemn occasion, took around two hours. According to statistics released by the Holy See, more than 150 delegations attended. Before the ceremony commenced, Mr. Chen exchanged greetings with Paraguayan Chamber of Deputies Speaker Raúl Latorre; Guatemalan Special Envoy and Ambassador to the Holy See Alfredo Vásquez Rivera; other officials from diplomatic allies; and delegates from the United States, Japan, Europe, and numerous other friendly countries. He also extended felicitations to and shared cordial interactions with several high-ranking members of the Vatican clergy, including Secretary of State Cardinal Pietro Parolin and Secretary of the Dicastery for Interreligious Dialogue Monsignor Indunil Janakaratne Kodithuwakku Kankanamalage. 

     

    After the inauguration, Pope Leo received the heads of national delegations. Mr. Chen presented the pontiff with a congratulatory letter from President Lai, a commemorative set of postage stamps depicting four of Taiwan’s Catholic churches—St. Joseph’s Church in Jinlun Village, Taitung County; the Holy Family Catholic Church in Taipei City; the Basilica of the Immaculate Conception in Wanjin Village, Pingtung County; and the Holy Rosary Cathedral Basilica in Kaohsiung City—and a collection of postcards on Holy See artifacts jointly produced by Taiwan and the Apostolic Nunciature in Taiwan, highlighting the close connection between the Catholic Church in Taiwan and the Holy See. Mr. Chen also presented Pope Leo with a photo taken in 2020, when the pontiff was serving as bishop of the Chiclayo Diocese in Peru. The picture showed him accepting antipandemic supplies donated by Taiwan. The materials, delivered in cartons labeled “Taiwan Box,” were donated to Cáritas Chiclayo and other Peruvian healthcare and charitable organizations by the Pingtung County Government and Dr. Lai Hsien-yung of Hualien County’s Mennonite Christian Hospital. The government and people of Taiwan provided proactive assistance to the international community throughout the COVID-19 pandemic, fulfilling their international responsibilities and demonstrating that Taiwan could help and that Taiwan was helping.

     

    When Mr. Chen arrived at the airport in Rome on May 17, he met with Eswatini Prime Minister Russell Dlamini, who had also made the trip to attend the papal inauguration. Mr. Chen also attended a mass and prayer service for peace led by Bishop John Lee Keh-mien, President of the Chinese Regional Bishops’ Conference of Taiwan, at St. Benedict’s Monastery. On May 18, Mr. Chen had dinner with 16 prominent members of the Catholic clergy and several key officials and ambassadors of diplomatic allies, including Special Delegate of the Holy See to the Sovereign Military Order of Malta Cardinal Silvano Tomasi and Haitian Special Envoy and former Minister of Foreign Affairs Alrich Nicolas. 

     

    Since establishing diplomatic ties 83 years ago, Taiwan and the Holy See have enjoyed a profound diplomatic alliance and shared the core values of religious freedom, human rights, peace, and benevolence. The two sides will build on their existing friendship and solid foundation of cooperation in humanitarian assistance and other domains to further deepen bilateral relations and together make even greater contributions to the world. (E)

    MIL OSI China News

  • MIL-OSI China: MOFA sincerely appreciates international support for Taiwan’s bid to participate in WHO and WHA

    Source: Republic of Taiwan – Ministry of Foreign Affairs

    May 19, 2025  

    No. 163  

    The 78th World Health Assembly (WHA) is opening in Geneva on May 19. Following proactive efforts by the Ministry of Foreign Affairs (MOFA) and related overseas missions, Taiwan’s bid to participate in the WHA has received staunch and concrete support from the Group of Seven (G7), the executive and legislative branches of government of more than 50 countries, the European Union, the European Parliament, and representative offices of like-minded nations in Taiwan. MOFA expresses sincere appreciation for this support.

     

    Eleven of Taiwan’s diplomatic allies, as members of the World Health Organization (WHO), submitted a proposal to the WHO Secretariat to invite Taiwan to participate in the WHA as an observer, requesting that the proposal be included as a supplementary item on this year’s WHA agenda. Saint Lucia Prime Minister Philip J. Pierre personally wrote a letter urging WHO Director-General Tedros Adhanom Ghebreyesus to invite Taiwan to attend the WHA. The parliaments of Guatemala, Palau, and Saint Christopher and Nevis adopted resolutions backing Taiwan.

     

    The magnitude of support for Taiwan from like-minded countries has continued to grow. The current US administration has publicly endorsed Taiwan’s international participation more than 10 times. This includes a joint statement issued at the US-Japan leaders’ summit by President Donald Trump and Prime Minister Shigeru Ishiba in February, which for the first time contained text advocating Taiwan’s meaningful involvement in international organizations. US Secretary of State Marco Rubio reaffirmed firm US support for Taiwan’s international participation during his congressional confirmation hearing as well as in interviews and joint statements issued at two meetings with the foreign ministers of Japan and the Republic of Korea. The United States twice spoke up for Taiwan at the WHO Executive Board session held in February. In April, it publicly refuted China’s misuse of United Nations General Assembly (UNGA) Resolution 2758 at the UN Security Council for the first time, reiterating that the resolution did not preclude Taiwan’s participation in the UN system or other multilateral fora. In terms of US congressional support, the House of Representatives passed the Taiwan International Solidarity Act without opposition on May 5. The act urged the US government to resist China’s efforts to suppress Taiwan through mischaracterization of UNGA Resolution 2758. In addition, nine US state legislatures approved resolutions backing Taiwan’s involvement in international organizations.

     

    Furthermore, in a joint statement issued following a meeting in March, the G7 foreign ministers reaffirmed support for Taiwan’s meaningful participation in international organizations. On May 15, the European Union expressed a similar stance and recognized the extraordinary contributions Taiwan can make through its digital healthcare capabilities. In February, the European Parliament overwhelmingly adopted a resolution on the implementation of the EU Common Foreign and Security Policy, which backed Taiwan’s meaningful participation in relevant world bodies. 

    High-ranking European officials who publicly spoke up for Taiwan included Italian Deputy Prime Minister and Minister of Foreign Affairs Antonio Tajani, Irish Deputy Prime Minister and Minister for Foreign Affairs and Trade Simon Harris, Australian Minister for Foreign Affairs Penny Wong, Swedish Minister for Foreign Affairs Maria Malmer Stenergard, and Swedish Minister for Social Affairs and Public Health Jakob Forssmed. A total of 534 members of the European Parliament and 29 national parliaments across Europe cosigned a letter of the Formosa Club reaffirming support for Taiwan. The World Medical Association and other professional groups endorsed Taiwan’s participation in WHO and the WHA as they had done in the past.

     

    MOFA thanks the representative offices in Taiwan of the United Kingdom, France, Australia, Canada, the Czech Republic, Germany, Japan, and Lithuania for issuing a joint statement for the fifth year prior to the WHA affirming the immense benefits that Taiwan could bring to WHA discussions. The statement also emphasized that there was no legitimate reason for Taiwan’s exclusion from the WHA and that Taiwan’s absence would undermine the spirit of inclusive global public health cooperation and safety that WHO’s founding documents called for.

     

    MOFA points out that these positive developments fully demonstrate that China’s unreasonable obstruction of Taiwan’s participation in WHO has gained little traction or support among nations worldwide. MOFA reiterates that UNGA Resolution 2758 and WHA Resolution 25.1 make no mention of Taiwan, have nothing to do with Taiwan, and therefore cannot be cited as a legal basis for precluding Taiwan from participating in WHO or other international organizations or multilateral mechanisms or fora. MOFA asks that the WHO Secretariat listen closely to member countries, stop further condoning political manipulation by China, and instead work to realize WHO’s goals of “Leaving No One Behind” and “One World for Health” so as to fulfill its responsibility to maintain and improve the health and well-being of all people. MOFA also asks that Taiwan be allowed full and unobstructed participation in all WHO meetings, mechanisms, and activities, including the WHA. (E)

    MIL OSI China News

  • MIL-OSI Security: DHS Sets the Record Straight on Media Frenzy over Deportation Flights for Worst of the Worst Including Murderers, Rapists, and Pedophiles

    Source: US Department of Homeland Security

    President Trump and Secretary Noem are working every day to get vicious criminals out of our country while activist judges are fighting to bring them back onto American soil

    WASHINGTON – The Department of Homeland Security today hosted a press conference to set the record straight and to address the media’s misleading reporting on migrant flights to South Sudan. DHS conducted a deportation flight from Texas to remove some of the most barbaric, violent individuals illegally in the United States.  Now a federal judge in Massachusetts is trying to force the United States to bring these criminals back. 

    “We are removing these convicted criminals from American soil so they can never hurt another American victim. It is absurd that an activist judge is trying to force the United States to bring back these uniquely barbaric monsters who present a clear and present threat to the safety of the American people,” said Assistant Secretary Tricia McLaughlin. “We have given the media the names of these monsters. I implore the media to stop doing the bidding of these criminals and to tell the stories of innocent Americans who have been victimized.”

    Below are the individuals ICE removed from American communities.

    Enrique ARIAS-Hierro, a Cuban national, was arrested by ICE on May 2, 2025. His criminal history includes convictions for homicide, armed robbery, false impersonation of official, kidnapping, robbery strong arm.

    On April 30, 2025, ICE arrested Cuban national, Jose Manuel RODRIGUEZ-QUINONES. He has been convicted of attempted first-degree murder with a weapon, battery and larceny, canine possession and trafficking.

    Thongxay NILAKOUT, a citizen of Laos, was arrested by ICE on January 26, 2025. NILAKOUT is Convicted of first-degree murder and robbery; sentenced to life confinement.

    On May 12, 2025, ICE arrested Mexican national, Jesus MUNOZ-Gutierrez. He is Convicted of second-degree murder; sentenced to life confinement.

    Dian Peter DOMACH, a citizen of South Sudan, was arrested by ICE on May 8, 2024. DOMACH is convicted of robbery and possession of a firearm, of possession of burglar’s tools and possession of defaced firearm and driving under the influence.

    Kyaw MYA, a citizen of Burma was arrested by ICE on February 18, 2025. MYA is convicted of Lascivious Acts with a Child-Victim less than 12 years of age; sentenced to 10 years confinement, paroled after 4 years.

    Nyo MYINT, a citizen of Burma was arrested by ICE on February 19, 2025. MYINT is convicted of first-degree sexual assault involving a victim mentally and physically incapable of resisting; sentenced to 12 years confinement. MYINT is also charged with aggravated assault-nonfamily strongarm.

    On May 3, 2025, ICE arrested Tuan Thanh PHAN, a Vietnamese national. PHAN is Convicted of first-degree murder and second-degree assault; sentenced to 22 years confinement.

    ###

    MIL Security OSI

  • MIL-OSI USA: North Carolinians and Organizations Awarded Governor’s Medallion Award for Volunteer Service

    Source: US State of North Carolina

    Headline: North Carolinians and Organizations Awarded Governor’s Medallion Award for Volunteer Service

    North Carolinians and Organizations Awarded Governor’s Medallion Award for Volunteer Service
    lsaito

    Raleigh, NC

    Earlier this month, 20 people and two organizations representing 21 counties received the State of North Carolina’s highest award for volunteer service: the Governor’s Medallion Award. The award is presented annually by the N.C. Commission on Volunteerism & Community Service, or VolunteerNC.

    “I am proud to honor these public-spirited volunteers who have each made a profound impact on their communities,” said Governor Josh Stein. “I am grateful for their dedication and hard work – may their leadership inspire more North Carolinians to follow their example.”

    Medallion recipients received their awards in a ceremony at the North Carolina State Capitol, where they were joined by Lieutenant Governor Rachel Hunt, VolunteerNC Chair Dr. Joe Blosser, VolunteerNC Executive Director Briles Johnson, and Volunteerism Coordinator Kenneth McLellan.

    “We were excited to honor these extraordinary volunteers from across North Carolina who work selflessly and tirelessly to make our state a better place,” said Briles Johnson, Executive Director of VolunteerNC. “Medallion award recipients serve their communities in so many ways: combating food insecurity, assisting the elderly, mentoring youth, disaster relief and more.”

    The recipients of the 2025 Governor’s Medallion for Volunteer Service are:

    • Gerry Tygielski of Ashe County, Habitat for Humanity
    • Darlene Sanders of Catawba County, Exodus Home
    • Sera Cuni of Chatham County, Feed-Well Fridges
    • Gregory Carr of Duplin County, Greenevers Volunteer Fire Department
    • Brad Freeman of Durham County, PetPals NC
    • Thao Sommerville of Forsyth County, work to preserve Vietnamese culture
    • Patricia Adams of Franklin County, Sowing Seeds
    • Erna Bright of Gates County, Gates County Broadband Task Force
    • JaQuavion Stainback of Granville County, Shepard Youth Ranch
    • Gary Grant of Halifax County, agricultural sustainability and rural empowerment
    • Howard Bakken of Henderson County, Chikaming Goat Herd at the Carol Sandburg Home NHS
    • Adrianna Noel Goodwin of Hyde County, Ocracoke School
    • Mike Davidson of Iredell County, American Legion, American Legion Boy Scouts, Beulah Baptist Church, and Iredell Christian Ministry
    • American Red Cross NC Screening Team of Jones County, Red Cross
    • Janice Scions of Lee County, Enrichment Center of Lee County
    • Joy Harklerode of McDowell County, Mercy Fund Animal Rescue
    • Dr. Elesia Glover of Mecklenburg County, Posh Pack Inc.
    • Julie McClintock of Orange County, Bolin Creek
    • DH Conley High School ROTC of Pitt County, Senior Games
    • Maxton McDowell of Randolph County, community organizations and social services
    • Becky and Chip Craig of Wayne County, Kiwanis Miniature Train Project

    The 2026 Governor’s Volunteer Service Award nomination form will be available this fall. Nominations are submitted to the County Award Coordinator in each county. Please visit volunteernc.org for more information. 

    May 21, 2025

    MIL OSI USA News

  • MIL-OSI Economics: RBI Bulletin – May 2025

    Source: Reserve Bank of India

    Today, the Reserve Bank released the May 2025 issue of its monthly Bulletin. The Bulletin includes two speeches, four articles and current statistics.

    The four articles are: I. State of the Economy; II. Economic Activity and Banknotes: New Approaches; III. Digital Footprints: Decoding India’s Inbound Tourism through Internet Searches; and IV. Impact of Weather Anomalies on Vegetable Prices in India.

    I. State of the Economy

    Persistent trade frictions, heightened policy uncertainty, and weak consumer sentiment continue to create headwinds for global growth. Amidst these challenges, the Indian economy exhibited resilience. Various high frequency indicators of industrial and services sectors sustained their momentum in April. A bumper rabi harvest and higher acreage for summer crops, coupled with favourable southwest monsoon forecasts for 2025, augur well for the agriculture sector. Headline CPI inflation fell for the sixth consecutive month to its lowest since July 2019, primarily driven by the sustained easing in food prices. Domestic financial market sentiments, which remained on edge in April, witnessed a turnaround since the third week of May.

    II. Economic Activity and Banknotes: New Approaches

    by Gautham Udupa, Pradip Bhuyan, Dileep Kumar Verma and Nirupama Kulkarni

    This article investigates the impact of economic activity on banknotes in circulation, with a particular focus on the role of the formal sector. Leveraging high-frequency monthly nightlights data as a proxy for total economic activity and tax collection data as a measure of formal economic activity, the analysis isolates the effect of formalisation on Notes in Circulation (NiC), controlling for aggregate economic output.

    Highlights:

    • The growth rate in NiC (in value terms) during 2014 – 2024 was significantly lower as compared to that in the previous two decades.

    • The growth in NiC was noticeably higher than that in GDP during 1994 – 2004; the gap, however, has significantly reduced in the next two decades.

    • There exists positive relationship between nightlights and taxes and also between nightlights and GDP.

    • The article finds strong evidence that formal economic activity reduces the use of banknotes.

    III. Digital Footprints: Decoding India’s Inbound Tourism through Internet Searches

    By Lokesh and A R Jayaraman

    This article explores Destination Insights with Google (DIG), a non-traditional high-frequency data source, to track inbound tourism in India. DIG monitors global tourism trends through travel-related searches. The study examines the linkage between foreign tourist arrivals (FTA) and Google searches made for travel to India from the rest of the world.

    Highlights:

    • There is a strong association between FTA and travel-related search volume index.

    • The index captures directional changes in FTA reasonably well.

    • The index Granger causes FTA implying its ability to serve as a leading indicator to predict FTA.

    IV. Impact of Weather Anomalies on Vegetable Prices in India

    By Nishant Singh and Love Kumar Shandilya

    Vegetable prices exhibit high volatility and play a major role in driving India’s food and headline inflation. The volatility in vegetable prices is often exacerbated by supply-side disturbances, predominantly driven by weather shocks warranting regular monitoring of evolving weather conditions. This study investigates how weather anomalies, particularly in rainfall and temperature, affect vegetable prices in India.

    Highlights:

    • After controlling for seasonality in vegetables prices as well as movements in market arrivals and reservoir levels, empirical estimates suggest that weather anomalies add to price pressures in vegetables with temperature anomalies having a more immediate impact.

    • Moreover, the impact of temperature anomalies has increased in recent periods, highlighting the need for faster adoption of temperature-resistant crop varieties to support the objective of price stability.

    The views expressed in the Bulletin articles are of the authors and do not represent the views of the Reserve Bank of India.

    (Puneet Pancholy)  
    Chief General Manager

    Press Release: 2025-2026/384

    MIL OSI Economics

  • MIL-OSI USA: Ranking Member Kaptur Remarks at Fiscal Year 2026 Army Corps of Engineers and the Bureau of Reclamation Budget Hearing

    Source: United States House of Representatives – Congresswoman Marcy Kaptur (OH-09)

    Full Hearing Recording Available Here

    Washington, DC — Congresswoman Marcy Kaptur (OH-09), Ranking Member of the Energy and Water Development and Related Agencies Subcommittee, delivered the following remarks at the subcommittee’s fiscal year 2026 budget hearing for the Army Corps of Engineers (Civil Works) and the Bureau of Reclamation:

    Thank you, Mr. Chairman. Good morning, everyone. Thank you for joining us. You build America, and we respect that. I welcome this opportunity to examine recent actions for the budget requests for the Corps of Engineers and the Bureau of Reclamation.

    Thank you to our witnesses for devoting your lives to the nation and for joining us today. Your agencies play a critical role in developing the resources of our land while mindful of our obligations to future generations. Your vital work strengthens our economy, sustains life on Earth, and ensures public safety against the now constant onslaught of both increasing natural and human-caused disasters across our country, which is growing in population, headed to half a billion people. For example, the Corps played a vital role in clearing the waterways after the Key Bridge collapse in Baltimore. Thank you so much. And you are currently carrying out wildfire debris removal in Los Angeles County. Thank you for your exemplary service to our country. You hold us together, and all those who serve in the Corps and the Bureau.

    The proposed cuts to the US Army Corps of Engineers and the Bureau of Reclamation are not just misguided — they are dangerous. Slashing their budgets and eroding their workforce endangers people’s lives and public safety, undermines economic growth, and weakens our national — the national welfare of the country — in the face of climate change.

    Let’s start with the Corps of Engineers. Your work is not just about dams and levees. It’s about protecting lives and building America’s public infrastructure to manage flood control systems that safeguard our communities from the devastating effects of extreme weather. And we saw that this past week, with the terrible tornadoes from St. Louis and all surrounding states.

    Along the shores of Lake Erie — the largest freshwater system in the world — we know what’s at stake. Erosion, rising lake levels, the problems with algal blooms, and increasingly violent storms threaten homes, businesses, and public assets. We cannot build a safe and a habitable environment for our growing population on shrinking budgets and shrinking staff.

    In the Great Lakes region, modernization of projects like the Soo Locks are a prime example of long overdue investments that will turbocharge our economy. One hundred percent of America’s domestic iron ore passes through the Soo Locks. Think about how important that makes this strategic infrastructure.

    Steel is a $500 Billion industry, it supports 123 thousand middle-class jobs, and I’m a strong advocate for reshoring the US steel industry and growing those numbers, but we have to modernize the shipping lanes and the waterways, and our ports, for today and the future. This project will ensure our heartlands’ maritime, industrial, agricultural, and commercial products are safe and efficiently moved.

    Think about our region, it is the shortest distance by way of the Atlantic Ocean to the ports of northern Europe and beyond. Canada, the Great Lakes, and St. Lawrence Seaway hasten global trade, and President Eisenhower understood its place within our continental enterprise and global defense. So must we, as we witness the dawn of the new arctic age.

    Similarly, the Brandon Road project, aims at arresting the potential enormous economic and environmental damage that can be unleashed by the invasion of the Asian carp. They could exterminate local and regional aquatic fish and species, and that would be devastating to our Great Lakes’ $7 Billion fishery and its $16 Billion recreational boating industry. These are astounding numbers.

    The Corps of Engineers has a return on investment of over 200 to 1 in terms of economic benefits for every dollar invested. Ports, locks, and inland waterways maintained by the Corps are vital arteries for our very large nation and its commerce. In the Great Lakes region alone, these investments ensure that goods — from American steel to Ohio soybeans — can reach domestic and global markets. And cuts to this work would cause costly delays, limit our competitiveness, and harm local economies.

    Now, to the Bureau of Reclamation. Though it serves primarily the Western United States, its importance cannot be overstated. The Bureau manages water supply for over 31 million Americans in the dry, and I guess I would say, coming from my part of the country drier, Western states, irrigates 10 million acres of farmland, and generates hydropower for millions of homes.

    In this time of unprecedented drought and water stress, we must bolster — not diminish — Reclamation’s capacity to invest in sustainable water systems and innovative conservation technologies. Presidents Theodore Roosevelt and Herbert Hoover understood what development west of the Mississippi River would require. So must we.

    Let’s be clear: disinvestment in the Corps and Bureau now will lead to higher costs down the road. Deferred maintenance becomes disaster recovery. Preventable failures become national emergencies.

    I urge my colleagues on both sides of the aisle — this is not the time to retreat. It is time to lead. We must provide these agencies with the resources they need to protect our growing population, strengthen our economy, and safeguard our environment for generations to come.

    Finally, I truly condemn the extreme politicization of critical Army Corps’ construction funding decisions, as we saw in last week’s work plan. It is yet another reminder that Congress must reclaim its authority over funding decisions by passing full-year appropriations bills.

    Thank you, Mr. Chairman, and Members and our guests. I yield back.

    # # #

    MIL OSI USA News

  • MIL-OSI USA: Jayapal, Sanders, Colleagues Introduce Bill to Make Public Colleges and Universities Tuition Free

    Source: United States House of Representatives – Congresswoman Pramila Jayapal (7th District of Washington)

    WASHINGTON, DC – As President Trump and congressional Republicans are working overtime to make college unaffordable and unattainable for millions of working-class families in order to provide tax breaks to billionaires, Rep. Pramila Jayapal (D-Wash.) and Sen. Bernie Sanders (I-Vt.), Ranking Member of the Senate Committee on Health, Education, Labor, and Pensions (HELP), today introduced legislation to make public colleges and universities tuition free for 95% of students. The College for All Act would be the most transformative investment in higher education in 60 years and would substantially improve the lives of millions of students throughout the United States.

    “Congress can and must ensure that working families never have to take out crushing loans to purse an education,” said Jayapal. “The College for All Act will free students from a lifetime of debt, invest in working people, and transform higher education across America by making a degree more accessible to poor and working families across this country. This is more important now than ever as Trump continues to attack education in this country through attempts to strip funding from universities and to dismantle the Department of Education.”

    “In a highly competitive global economy where technology is changing the very nature of work and the jobs we perform, we need the best educated workforce in the world,” said Sanders. “Our nation used to lead the world in the percentage of adults with a college degree. Today, we are in 11th place behind countries like Japan, South Korea, Canada, the United Kingdom and Switzerland. That is not a prescription for a strong American economy of the future. It is a prescription for failure. Instead of increasing the cost of college in order to give more tax breaks to billionaires, we have a better idea. We are going to make public colleges and universities tuition free so that working class students can succeed and are not burdened with a lifetime of debt.”

    Making public colleges and universities tuition free is not a radical idea. In 1944, as World War II was coming to an end, the U.S. government made free higher education available to all those who served in the armed forces. That act not only improved the financial well-being of the Greatest Generation, but it also laid the groundwork for the greatest expansion of the American middle class in U.S history. Moreover, over 50 years ago, many of our most prestigious public colleges and universities were also tuition free or virtually tuition free.

    Since this legislation was first introduced ten years ago, several colleges and universities in America have provided free tuition for working class and middle class students including every state college in New Mexico, the State University of New York, the University of Texas, the University of Wisconsin, and Arkansas State University.

    Other wealthy countries like France, Germany, Denmark, Sweden, Norway and Finland have made their public colleges and universities tuition free or virtually tuition free because they understand the value of investing in their young people.

    The College for All Act would guarantee tuition-free community college for all students and allow students from single households earning up to $150,000 a year, and married households earning up to $300,000 a year, to attend college without fear of being saddled with student loan debt.

    The College for All Act would also:

    • Double the maximum Pell Grant award for students enrolled at public and private non-profit colleges;
    • Establish a $10 billion grant program to improve student outcomes and address equity gaps at underfunded public colleges and universities;
    • Triple federal TRIO program funding;
    • Double GEAR UP funding; and
    • Double mandatory funding for Historically Black Colleges and Universities, Tribal Colleges and Universities (HBCUs), and other Minority-Serving Institutions (MSIs).

    Read the bill text here.

    Read a summary of the bill here.

    Issues: Arts & Education

    MIL OSI USA News

  • MIL-OSI United Kingdom: Council AGM highlights a year of progress

    Source: City of Derby

    City Councillors met today for the Annual General Meeting, which sees the Council make appointments to its various committees and regulatory boards, and to outside organisations and charities.

    Reflecting on the past twelve months, Councillor Nadine Peatfield, Leader of Derby City Council, celebrated a year of strong progress and delivery for Derby. A year in which the administration has worked to make improvements for the people of Derby and create a modern, ambitious and welcoming city.

    Cllr Peatfield also thanked the various Council departments that have supported the administration over the past twelve months, and marked this and previous administrations’ efforts on the Derby Market Hall, which will open on Saturday 24 May.

    The annual Mayor Making Ceremony also took place during the day, with Councillor Ajit Atwal elected Mayor of Derby for 2025/26.

    Cllr Atwal, a Liberal Democrat Councillor, has served the Littleover ward since 2010 and held the position of Deputy Mayor to Cllr Ged Potter in 2024/25.

    Councillor Philip Ingall was elected as the city’s Deputy Mayor for the next year. Cllr Ingall is one of the Independent Councillors for Chellaston and Shelton Lock.

    Emily Feenan, Director of Corporate Governance, as well as Derby City Council’s Monitoring Officer, said:

    I’d like to express my congratulations to Councillors Atwal and Ingall on these new appointments. While these mayoral roles are ceremonial, they hold significant historical value and play a big role in our city. The Mayor and Deputy actively represent Derby at various events, support with fundraising, and boost Derby’s profile. I wish both councillors all the best.

    I also want to express my thanks to Councillor Ged Potter for all of his hard work during his term of office.”

    Rounding off the appointments, India Johal was sworn in as the city’s new Youth Mayor and Maryam Riaz as Deputy. Both were elected in a record-breaking election that saw over 12,000 young people cast their vote in February this year.

    The Youth Mayor and Deputy Youth Mayor help to raise awareness of the positive contribution young people make to our city and ensure their voices are heard.

    Information on the role of the Youth Mayor is available on our website.

    Recordings of both meetings are now available to watch on the Council’s YouTube Channel

    Details of Councillor appointments to Committees and Boards will be updated on the democracy portal once confirmed.

    MIL OSI United Kingdom

  • MIL-OSI Asia-Pac: Foreign, health ministers call on WHO to facilitate Taiwan’s participation

    Source: Republic of China Taiwan

    May 16, 2025  No. 157  

    During a joint press conference on May 16, Minister of Foreign Affairs Lin Chia-lung and Minister of Health and Welfare Chiu Tai-yuan called on the World Health Organization (WHO) to facilitate Taiwan’s participation. They said that Taiwan would demonstrate self-confidence and work with the world while showcasing the professionalism of Taiwan’s medical diplomacy team.
     
    The 78th World Health Assembly (WHA) is set to open in Geneva on May 19. Minister Lin and Minister Chiu held a joint press conference at the Ministry of Foreign Affairs (MOFA) on the morning of May 16, at which they underscored Taiwan’s willingness to contribute to better global health. The two ministers said that the WHO should not brook political interference but rather should promptly invite Taiwan to participate as an observer in the WHA as well as WHO technical meetings and thus realize WHO’s goal of “One World for Health.” 
     
    Making a special appearance at the press conference was the Puzangalan Children’s Choir of Pingtung County, which performed “Ualjaiyui,” a traditional song of blessing of the Paiwan indigenous community. The song speaks of good fortune and of passing on traditions. Taiwan shares such sentiments for its WHA Action Team headed to Geneva as well as to the world at large. Minister Lin pointed out that the choir would also be traveling to Geneva to show that Taiwan was not just a land of technology but also home to cultural soft power. 
     
    Minister Lin shared that this year’s WHA slogan is “One World for Health” and that the government was calling on WHO to “Chip in with Taiwan” so that no nation or people would be left behind, allowing Taiwan to work with other nations toward a healthier world. Adding that health and disease knew no borders, he said that in addressing COVID-19 Taiwan showed great resilience and was able to assist other nations. Excluding Taiwan from the WHA and WHO therefore represented a loss for the international community.
     
    Minister Lin further commented that Taiwan’s national health insurance program has enrolled 99 percent of residents and that no matter where people lived, they had access to Taiwan’s quality medical services and social security net, an accomplishment praised worldwide. Acknowledging WHO’s Global Action Plan for Health of Indigenous Peoples, the minister said that Taiwan was ready to share its experience providing quality medical care to indigenous people. 
     
    In the AI era, Minister Lin stated, utilizing digital technology could improve access to medical care. Reflecting this, MOFA would for the first time hold a forum on smart medicine in Geneva, at which both Acer Medical and Quanta Computer would share their experience in order to promote a Taiwan model of smart medicine. Taiwan, he said, would continue to show how it could help and underscore its role as a global leader in semiconductors and related technology. 
     
    Minister Lin said that to realize President Lai Ching-te’s vision of a healthy Taiwan, MOFA had implemented the Diplomatic Allies Prosperity Project and eight flagship projects, which included the smart medicine and healthcare industries. He said thats MOFA had worked with the Ministry of Health and Welfare (MOHW) to establish a Taiwan medical diplomacy team as well as a medical consultation team that included professionals from medical firms and organizations. Through the “One Country, One Center” project, medical cooperation would be strengthened with New Southbound Policy partner countries. Such efforts would also bring Taiwan’s healthcare industry—comprising its biotech, pharmaceutical, and information technology sectors—to the world. 
     
    Minister Lin thanked the nation’s diplomatic allies for making proposals in favor of Taiwan’s participation, as well as like-minded countries for taking such concrete steps as sending letters and conducting joint demarches in support of Taiwan. Such actions underscored the strength of international support for Taiwan. However, China’s distortion of UN General Assembly Resolution 2758 and its pressure on the WHO Secretariat meant that Taiwan had yet to be invited to attend the WHA.
     
    Minister Lin stressed that Taiwan had established a government firmly rooted in popular support by conducting many democratic elections. As such, only the popularly elected government of Taiwan could represent the people of Taiwan at the United Nations, WHO, and other multilateral organizations. Many nations’ executive and legislative branches had publicly stated that UNGA Resolution 2758 did not preclude Taiwan’s participation in international organizations such as WHO. He then expressed hope that more nations would work together in support of Taiwan’s participation in WHO and oppose China’s international efforts at lawfare and cognitive warfare. 
     
    In addition, Minister Lin said that this year’s WHA slogan was “One World for Health” and that a Pandemic Agreement would be signed during the meeting. Taiwan had, he said, already shown the humanitarian spirit of “Taiwan can help” during COVID-19 and proved itself a valuable resource to WHO. However, Taiwan’s absence left a gap in the global public health and disease prevention network, said Minister Lin, who called on the WHO Secretariat to not brook political interference, to maintain professionalism and neutrality, and to facilitate Taiwan’s membership in the global public health and disease prevention network so as to create greater welfare for the world.
     
    In closing, Minister Lin said that Taiwan’s WHA Action Team would conduct publicity efforts in Geneva starting from May 16 and that MOFA and the MOHW would work together with self-confidence and engage the world. Moreover, the ministries would be proactive in making Taiwan’s voice heard and ensure that Taiwan responded to “One World for Health” and appealed to others to “Chip in with Taiwan” by making greater contributions to global public health. (E)

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Former Vice President Chen attends inauguration of Pope Leo XIV

    Source: Republic of China Taiwan

    May 18, 2025  
    No. 161  

    Former Vice President Chen Chien-jen, serving as special envoy of President Lai Ching-te, together with his wife and Deputy Minister of Foreign Affairs François Chihchung Wu, attended the inauguration of Pope Leo XIV on the morning of May 18. In an audience with the pontiff following the ceremony, Mr. Chen conveyed greetings from President Lai and the sincere congratulations of the government, people, and Catholic community of Taiwan.
     
    Upon arriving for the ceremony in St. Peter’s Square, Mr. Chen was received by a ceremonial officer for the Holy See. The inauguration, a grand and solemn occasion, took around two hours. According to statistics released by the Holy See, more than 150 delegations attended. Before the ceremony commenced, Mr. Chen exchanged greetings with Paraguayan Chamber of Deputies Speaker Raúl Latorre; Guatemalan Special Envoy and Ambassador to the Holy See Alfredo Vásquez Rivera; other officials from diplomatic allies; and delegates from the United States, Japan, Europe, and numerous other friendly countries. He also extended felicitations to and shared cordial interactions with several high-ranking members of the Vatican clergy, including Secretary of State Cardinal Pietro Parolin and Secretary of the Dicastery for Interreligious Dialogue Monsignor Indunil Janakaratne Kodithuwakku Kankanamalage. 
     
    After the inauguration, Pope Leo received the heads of national delegations. Mr. Chen presented the pontiff with a congratulatory letter from President Lai, a commemorative set of postage stamps depicting four of Taiwan’s Catholic churches—St. Joseph’s Church in Jinlun Village, Taitung County; the Holy Family Catholic Church in Taipei City; the Basilica of the Immaculate Conception in Wanjin Village, Pingtung County; and the Holy Rosary Cathedral Basilica in Kaohsiung City—and a collection of postcards on Holy See artifacts jointly produced by Taiwan and the Apostolic Nunciature in Taiwan, highlighting the close connection between the Catholic Church in Taiwan and the Holy See. Mr. Chen also presented Pope Leo with a photo taken in 2020, when the pontiff was serving as bishop of the Chiclayo Diocese in Peru. The picture showed him accepting antipandemic supplies donated by Taiwan. The materials, delivered in cartons labeled “Taiwan Box,” were donated to Cáritas Chiclayo and other Peruvian healthcare and charitable organizations by the Pingtung County Government and Dr. Lai Hsien-yung of Hualien County’s Mennonite Christian Hospital. The government and people of Taiwan provided proactive assistance to the international community throughout the COVID-19 pandemic, fulfilling their international responsibilities and demonstrating that Taiwan could help and that Taiwan was helping.
     
    When Mr. Chen arrived at the airport in Rome on May 17, he met with Eswatini Prime Minister Russell Dlamini, who had also made the trip to attend the papal inauguration. Mr. Chen also attended a mass and prayer service for peace led by Bishop John Lee Keh-mien, President of the Chinese Regional Bishops’ Conference of Taiwan, at St. Benedict’s Monastery. On May 18, Mr. Chen had dinner with 16 prominent members of the Catholic clergy and several key officials and ambassadors of diplomatic allies, including Special Delegate of the Holy See to the Sovereign Military Order of Malta Cardinal Silvano Tomasi and Haitian Special Envoy and former Minister of Foreign Affairs Alrich Nicolas. 
     
    Since establishing diplomatic ties 83 years ago, Taiwan and the Holy See have enjoyed a profound diplomatic alliance and shared the core values of religious freedom, human rights, peace, and benevolence. The two sides will build on their existing friendship and solid foundation of cooperation in humanitarian assistance and other domains to further deepen bilateral relations and together make even greater contributions to the world. (E)

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: MOFA sincerely appreciates international support for Taiwan’s bid to participate in WHO and WHA

    Source: Republic of China Taiwan

    May 19, 2025  
    No. 163  

    The 78th World Health Assembly (WHA) is opening in Geneva on May 19. Following proactive efforts by the Ministry of Foreign Affairs (MOFA) and related overseas missions, Taiwan’s bid to participate in the WHA has received staunch and concrete support from the Group of Seven (G7), the executive and legislative branches of government of more than 50 countries, the European Union, the European Parliament, and representative offices of like-minded nations in Taiwan. MOFA expresses sincere appreciation for this support.
     
    Eleven of Taiwan’s diplomatic allies, as members of the World Health Organization (WHO), submitted a proposal to the WHO Secretariat to invite Taiwan to participate in the WHA as an observer, requesting that the proposal be included as a supplementary item on this year’s WHA agenda. Saint Lucia Prime Minister Philip J. Pierre personally wrote a letter urging WHO Director-General Tedros Adhanom Ghebreyesus to invite Taiwan to attend the WHA. The parliaments of Guatemala, Palau, and Saint Christopher and Nevis adopted resolutions backing Taiwan.
     
    The magnitude of support for Taiwan from like-minded countries has continued to grow. The current US administration has publicly endorsed Taiwan’s international participation more than 10 times. This includes a joint statement issued at the US-Japan leaders’ summit by President Donald Trump and Prime Minister Shigeru Ishiba in February, which for the first time contained text advocating Taiwan’s meaningful involvement in international organizations. US Secretary of State Marco Rubio reaffirmed firm US support for Taiwan’s international participation during his congressional confirmation hearing as well as in interviews and joint statements issued at two meetings with the foreign ministers of Japan and the Republic of Korea. The United States twice spoke up for Taiwan at the WHO Executive Board session held in February. In April, it publicly refuted China’s misuse of United Nations General Assembly (UNGA) Resolution 2758 at the UN Security Council for the first time, reiterating that the resolution did not preclude Taiwan’s participation in the UN system or other multilateral fora. In terms of US congressional support, the House of Representatives passed the Taiwan International Solidarity Act without opposition on May 5. The act urged the US government to resist China’s efforts to suppress Taiwan through mischaracterization of UNGA Resolution 2758. In addition, nine US state legislatures approved resolutions backing Taiwan’s involvement in international organizations.
     
    Furthermore, in a joint statement issued following a meeting in March, the G7 foreign ministers reaffirmed support for Taiwan’s meaningful participation in international organizations. On May 15, the European Union expressed a similar stance and recognized the extraordinary contributions Taiwan can make through its digital healthcare capabilities. In February, the European Parliament overwhelmingly adopted a resolution on the implementation of the EU Common Foreign and Security Policy, which backed Taiwan’s meaningful participation in relevant world bodies. 
    High-ranking European officials who publicly spoke up for Taiwan included Italian Deputy Prime Minister and Minister of Foreign Affairs Antonio Tajani, Irish Deputy Prime Minister and Minister for Foreign Affairs and Trade Simon Harris, Australian Minister for Foreign Affairs Penny Wong, Swedish Minister for Foreign Affairs Maria Malmer Stenergard, and Swedish Minister for Social Affairs and Public Health Jakob Forssmed. A total of 534 members of the European Parliament and 29 national parliaments across Europe cosigned a letter of the Formosa Club reaffirming support for Taiwan. The World Medical Association and other professional groups endorsed Taiwan’s participation in WHO and the WHA as they had done in the past.
     
    MOFA thanks the representative offices in Taiwan of the United Kingdom, France, Australia, Canada, the Czech Republic, Germany, Japan, and Lithuania for issuing a joint statement for the fifth year prior to the WHA affirming the immense benefits that Taiwan could bring to WHA discussions. The statement also emphasized that there was no legitimate reason for Taiwan’s exclusion from the WHA and that Taiwan’s absence would undermine the spirit of inclusive global public health cooperation and safety that WHO’s founding documents called for.
     
    MOFA points out that these positive developments fully demonstrate that China’s unreasonable obstruction of Taiwan’s participation in WHO has gained little traction or support among nations worldwide. MOFA reiterates that UNGA Resolution 2758 and WHA Resolution 25.1 make no mention of Taiwan, have nothing to do with Taiwan, and therefore cannot be cited as a legal basis for precluding Taiwan from participating in WHO or other international organizations or multilateral mechanisms or fora. MOFA asks that the WHO Secretariat listen closely to member countries, stop further condoning political manipulation by China, and instead work to realize WHO’s goals of “Leaving No One Behind” and “One World for Health” so as to fulfill its responsibility to maintain and improve the health and well-being of all people. MOFA also asks that Taiwan be allowed full and unobstructed participation in all WHO meetings, mechanisms, and activities, including the WHA. (E)

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Foreign Minister Lin hosts welcome luncheon to mark state visit by Palauan President Whipps

    Source: Republic of China Taiwan

    May 20, 2025  
    No. 167  

    Minister of Foreign Affairs Lin Chia-lung hosted a luncheon on May 20 to mark a state visit by President Surangel Whipps, Jr. of the Republic of Palau. During the luncheon, Minister Lin conveyed a warm welcome on behalf of the government of Taiwan and thanked Palau for its staunch support for Taiwan’s international participation. He said he expected Taiwan and Palau to continue their close cooperation and together promote sustainable development across a range of areas in both nations.
     
    In his remarks, Minister Lin explained that since taking office, he had launched a strategy of integrated diplomacy to serve as Taiwan’s primary focus for foreign affairs, adding that its three pillars of values-based diplomacy, alliance diplomacy, and economic and trade diplomacy were advancing the promotion of the Diplomatic Allies Prosperity Project in Palau. He also noted that, in addition to personally leading an industrial delegation to Palau in January, several business delegations had visited Palau on information-gathering missions, and that in March President Whipps had appointed Taiwanese business leader Stan Shih to serve as a senior economic advisor to Palau. Minister Lin said that these activities had laid a successful foundation for using public-private partnerships as a cooperative model through which to promote the Diplomatic Allies Prosperity Project.
     
    In his remarks, President Whipps thanked the government of Taiwan and Minister Lin for their gracious reception. Observing that he had already made several trips to Taiwan, President Whipps said that visiting once again felt just like experiencing the warmth of home. Likening the 26-year ties between Taiwan and Palau to a marriage, he said that the nations’ sincere friendship was based on such shared values as freedom and democracy, a common Austronesian culture, and mutual support and prosperity.
     
    President Whipps also reiterated his heartfelt gratitude for Taiwan’s assistance toward national development in Palau, adding that Taiwan’s status as one of the world’s leading producers of semiconductors and other technologies was a reflection of its successful education system and outstanding industrial development. Remarking that President Lai Ching-te’s visit to Palau in December 2024 had established a robust foundation for a new era of Taiwan-Palau collaboration, he said he hoped the two nations would continue to use public-private partnerships to engage in close cooperation on sustainable tourism, green energy, smart medicine and healthcare, education and training, and food security, together creating a vision of economic prosperity for both countries.
     
    Among others attendees at today’s luncheon were Cheng Shih-chung, Director-General of the Ministry of Education’s Sports Administration; Professor Wang Ying-chou, Vice President for Academic Affairs at Fu Jen Catholic University; Liao Song-yie, Chairman of COTA Commercial Bank; and Liu Qing-ling, Chairperson of Chuan Cheng Hat Co., Ltd. Amid a warm and cordial environment, guests and the members of the Palauan delegation engaged in in-depth exchanges regarding various aspects of Taiwan-Palau cooperation. (E)

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Buildings Department expresses grave concern regarding ICAC’s arrest action at a construction site at Anderson Road

    Source: Hong Kong Government special administrative region

    ​The Buildings Department (BD) expressed grave concern today (May 21) regarding the arrests made by the Independent Commission Against Corruption (ICAC) at a construction site at Anderson Road on suspicion of offering and accepting advantages. The BD emphasised that illegal or non-compliant behaviours would not be tolerated. The BD has been actively co-operating with the ICAC’s investigation, including providing information and assisting in evidence collection and enforcement action. As the investigation is still on-going, the BD will not comment on the details of the case.

    The main contractor involved is a registered general building contractor (RGBC) under the Buildings Ordinance (BO). Apart from assisting in the ICAC’s investigation, the BD is also conducting an investigation on the quality of works at the subject site under the BO. The BD received a report in August last year alleging that the steel reinforcements of some structural elements in the superstructure works of six blocks of residential buildings being carried out at the site had not been installed in accordance with the standards under the BO. The BD took the matter very seriously and deployed its staff to the site for inspection four times in September last year. It was found that the number of steel reinforcements installed at some beams was less than that required in the approved plans. The BD thus served an order under section 23 of the BO ordering the cessation of works for the entire site in October last year. The BD subsequently deployed its staff to carry out site inspections on many occasions, conducted interviews and collected project information from the project registered structural engineer (RSE) and registered contractor (RC), including requiring open-up of concrete at various locations of the superstructure works of the six buildings to determine whether the quantity, distribution, position, and size of the steel reinforcements complied with the plans, as well as testing the strength of the concrete.

    MIL OSI Asia Pacific News

  • MIL-OSI: Insurtech Insights USA 2025 Returns with the Industry’s Most Influential Gathering of Innovators and Executives

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, May 21, 2025 (GLOBE NEWSWIRE) — Insurtech Insights USA 2025, the largest and most influential gathering of insurance decision-makers in North America, returns to the Javits Center in New York City on June 4–5, 2025. This year’s edition will host more than 6,000 attendees and 400+ speakers over two days of high-impact programming, strategic networking, and transformative industry dialogue.

    A powerful roster of global insurance and insurtech leaders is confirmed to attend, including senior executives from Munich Re, AXA, Sun Life, MetLife, Solera, Owl.co, Federato, Clearspeed, LexisNexis Risk Solutions, Majesco, AgentSync, and many more. This world-class conference will serve as a launchpad for bold ideas, cross-sector collaboration, and the technological reinvention of the insurance industry.

    At Insurtech Insights, we believe in building bridges between tradition and transformation,” said Kristoffer Lundberg, CEO of Insurtech Insights. “In 2025, we’re proud to host the world’s most forward-thinking insurers and innovators as they tackle the industry’s most urgent challenges. From leveraging GenAI and automation, to reimagining underwriting, claims, and customer engagement. This is more than a conference, it’s the heartbeat of the insurance revolution.”

    Insurtech Insights USA 2025 will feature curated keynote presentations, interactive panels, fireside chats, and startup showcases, exploring the innovations shaping the insurance industry’s future. Topics will include:

    • Generative AI in operations and claims
    • Climate risk modeling and sustainability
    • Embedded insurance and customer experience
    • Data ethics and regulatory evolution
    • Technology-driven strategies for growth and efficiency etc

    With more than 97% of past attendees recommending the event, Insurtech Insights has become a trusted space for industry professionals looking to challenge conventional thinking, identify emerging opportunities, and build the next generation of insurance solutions. Attendees leave equipped with both strategic vision and tactical insights, making it a must-attend for innovation leaders across all insurance lines—life, health, property & casualty, commercial, and specialty.

    This year’s event also places a spotlight on global collaboration and inclusivity, bringing together voices from across the Americas, Europe, and Asia to address shared challenges such as digital transformation, talent acquisition, climate adaptation, and regulatory modernization. As the industry faces unprecedented disruption, Insurtech Insights USA 2025 is the definitive platform to navigate what’s next.

    For more information and to secure your pass, visit the website here.

    About Insurtech Insights USA

    Insurtech Insights USA is the leading global conference for the insurtech industry, bringing together experts, innovators, and thought leaders to discuss the latest trends, challenges, and opportunities shaping the future of insurance. With a focus on innovation, collaboration, and disruption, Insurtech Insights USA provides a platform for networking, learning, and driving meaningful change in the insurance sector.

    For media queries and other information, please contact:

    Girish Jaggi
    Senior Account Manager
    The MicDrop Agency
    girish@themicdropagency.com
    +1 (289) 623 3627

    The MIL Network

  • MIL-OSI: FCCI Insurance Group Honored with Duck Creek Standard of Excellence Customer Award at Formation ’25

    Source: GlobeNewswire (MIL-OSI)

    BOSTON, May 21, 2025 (GLOBE NEWSWIRE) — Duck Creek Technologies, the global intelligent solutions provider defining the future of property and casualty (P&C) and general insurance, has named FCCI Insurance Group (FCCI) a recipient of its 2025 Standard of Excellence Customer Award winner at Formation ’25, its flagship customer conference held this week in Orlando, Florida.

    The Duck Creek Standard of Excellence Customer Award recognizes customers who have achieved the highest level of excellence through their implementation of Duck Creek solutions to transform their business and shape the future of insurance.

    FCCI was recognized for its successful launch of Excess & Surplus (E&S) offerings using a suite of Duck Creek’s solutions, including Policy, OnDemand, Data Insights/Clarity, Distribution Management, and Digital Engagement Producer.

    FCCI is a commercial property and casualty insurance company that serves mid-sized businesses across various industries, including agribusiness, construction, healthcare, hospitality, retail, and manufacturing. Their product offerings include workers’ compensation, property, and general liability insurance.

    Originally founded in 1959 in Sarasota, Florida, FCCI has grown into a super-regional provider, delivering standard lines commercial insurance services in 19 states, with Surety and Specialty operating in an expanded state footprint. The company emphasizes its network of more than 550 contracted agencies and more than 3,800 independent agents.

    FCCI’s recent expansion into E&S lines focused on enhancing digital capabilities, streamlining operations, and speed to market for new offerings.

    By implementing Duck Creek’s Policy Administration System and Active Delivery model, FCCI achieved straight-through processing, automated intake, and seamless integration. Regulatory compliance was strengthened while a modern self-service portal provided agents with real-time capabilities.

    “Our goal was to reimagine how we serve the commercial insurance market, particularly within E&S lines, and Duck Creek helped us do just that,” said Dave Patel, EVP & Chief Information Officer at FCCI Insurance Group. “This award is a testament to the innovation, collaboration, and determination of everyone involved in bringing this vision to life.”

    Despite the complexities of E&S markets and a tight implementation timeline, FCCI collaborated closely with Duck Creek, Cognizant, and other partners to design, test, and deploy a future-ready solution and ensure quality delivery of production environments.

    Following a successful implementation, the launch of FCCI Specialty exceeded initial projections for both premium and policy count, resulting in excitement and positive feedback from FCCI’s trusted agency partners.

    “From enhanced agent experiences to agile regulatory adaptation, FCCI’s story is a powerful example of what’s possible through technology, teamwork, and forward-thinking leadership,” said Chris McCloskey, Chief Operating Officer of Duck Creek Technologies. “Their success reflects not only the power of our platform, but also the dedication of their team and partners in transforming complex business requirements into real, measurable outcomes.”

    About Duck Creek Technologies 
    Duck Creek Technologies is the global intelligent solutions provider defining the future of the property and casualty (P&C) and general insurance industry. We are the platform upon which modern insurance systems are built, enabling the industry to capitalize on the power of the cloud to run agile, intelligent, and evergreen operations. Authenticity, purpose, and transparency are core to Duck Creek, and we believe insurance should be there for individuals and businesses when, where, and how they need it most. Our market-leading solutions are available on a standalone basis or as a full suite, and all are available via Duck Creek OnDemand. Visit www.duckcreek.com to learn more. Follow Duck Creek on our social channels for the latest information – LinkedIn and X.

    Media Contacts:
    Marianne Dempsey/Tara Stred
    duckcreek@threeringsinc.com

    About FCCI Insurance Group – Founded in 1959 in Sarasota, Florida, FCCI Insurance Group provides commercial property and casualty insurance, risk control services, and surety bonds. FCCI writes business exclusively through more than 3,800 independent agents in 20 states, plus Washington, D.C. Coverages include auto, crime, cyber liability, equipment, excess & surplus, property, general liability, inland marine, umbrella, and workers’ compensation. Contract and commercial surety bonds are written in 45 states.

    FCCI insures over 12,000 policyholders across various industries, including agribusiness, construction, manufacturing, medical and professional, restaurants and hospitality, retail, service and repair, and wholesale and distribution. FCCI has $3.3 billion in assets, $1.2 billion in direct written premium, and is rated A (Excellent) by A.M. Best Company. FCCI has regional and branch offices in Florida, Georgia, Indiana, Mississippi, Texas, and Virginia.

    The MIL Network

  • MIL-OSI USA: NEWS: Sanders, Jayapal, Colleagues Introduce Bill to Make Public Colleges and Universities Tuition Free

    US Senate News:

    Source: United States Senator for Vermont – Bernie Sanders
    WASHINGTON, May 21 – As President Trump and congressional Republicans are working overtime to make college unaffordable and unattainable for millions of working-class families in order to provide tax breaks to billionaires, Sen. Bernie Sanders (I-Vt.), Ranking Member of the Senate Committee on Health, Education, Labor, and Pensions (HELP), Rep. Pramila Jayapal (D-Wash.), and nine Senate colleagues, today introduced legislation to make public colleges and universities tuition free for 95% of students. The College for All Act would be the most transformative investment in higher education in 60 years and would substantially improve the lives of millions of students throughout the United States.
    Joining Sanders as cosponsors are Sens. Richard Blumenthal (D-Conn.), Alex Padilla (D-Calif.), Chris Murphy (D-Conn.), Peter Welch (D-Vt.), Elizabeth Warren (D-Mass.), Ed Markey (D-Mass.), Chris Van Hollen (D-Md.), Jeff Merkley (D-Ore.) and Cory Booker (D-N.J.).
    “In a highly competitive global economy where technology is changing the very nature of work and the jobs we perform, we need the best educated workforce in the world,” said Sanders. “Our nation used to lead the world in the percentage of adults with a college degree. Today, we are in 11th place behind countries like Japan, South Korea, Canada, the United Kingdom and Switzerland. That is not a prescription for a strong American economy of the future. It is a prescription for failure. Instead of increasing the cost of college in order to give more tax breaks to billionaires, we have a better idea. We are going to make public colleges and universities tuition free so that working class students can succeed and are not burdened with a lifetime of debt.”
    “Congress can and must ensure that working families never have to take out crushing loans to purse an education,” said Jayapal. “The College for All Act will free students from a lifetime of debt, invest in working people, and transform higher education across America by making a degree more accessible to poor and working families across this country. This is more important now than ever as Trump continues to attack education in this country through attempts to strip funding from universities and to dismantle the Department of Education.”
    Making public colleges and universities tuition free is not a radical idea. In 1944, as World War II was coming to an end, the U.S. government made free higher education available to all those who served in the armed forces. That act not only improved the financial well-being of the Greatest Generation, but it also laid the groundwork for the greatest expansion of the American middle class in U.S history. Moreover, over 50 years ago, many of our most prestigious public colleges and universities were also tuition free or virtually tuition free.
    Since this legislation was first introduced ten years ago, several colleges and universities in America have provided free tuition for working class and middle class students including every state college in New Mexico, the State University of New York, the University of Texas, the University of Wisconsin, and Arkansas State University.
    Other wealthy countries like France, Germany, Denmark, Sweden, Norway and Finland have made their public colleges and universities tuition free or virtually tuition free because they understand the value of investing in their young people.
    The College for All Act would guarantee tuition-free community college for all students and allow students from single households earning up to $150,000 a year, and married households earning up to $300,000 a year, to attend college without fear of being saddled with student loan debt.
    The College for All Act would also:
    Double the maximum Pell Grant award for students enrolled at public and private non-profit colleges;
    Establish a $10 billion grant program to improve student outcomes and address equity gaps at underfunded public colleges and universities;
    Triple federal TRIO program funding;
    Double GEAR UP funding; and
    Double mandatory funding for Historically Black Colleges and Universities, Tribal Colleges and Universities (HBCUs), and other Minority-Serving Institutions (MSIs).
    Read the bill text here.
    Read a summary of the bill here.

    MIL OSI USA News

  • MIL-OSI Africa: Afreximbank reports strong performance for Q1 2025 in line with expectations

    Source: Africa Press Organisation – English (2) – Report:

    Afreximbank reports strong performance for Q1 2025 in line with expectations The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period CAIRO, Egypt, May 21, 2025/APO Group/ — African Export-Import Bank (“Afreximbank” or the “Group”) (www.Afreximbank.com) has released the consolidated financial statements of the Bank and its subsidiaries for the three months ended 31 March 2025. Financial Highlights Afreximbank Group delivered satisfactory financial performance for the first quarter of 2025, meeting expectations with solid profitability, strengthened liquidity and a resilient capital base. This performance provides a springboard for the Bank to continue playing its pivotal role of advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development in the months and years ahead. Net interest income grew by 4.53% to US$411.2 million compared to prior year, driven by growth in interest earning assets, complemented by effective management of borrowing costs, helping the Bank to cushion the marginal decline in total interest income due to softening benchmark rates. Fee income from Guarantees and Letters of Credit saw robust growth of 47% and 36% respectively, partially offsetting lower advisory fees to contribute to total unfunded income of US$26.9 million for Q1-2025. While this represented a 7.41% decrease from US$29.0 million in Q1 2024, the strong performance in Off-balance sheet assets is in line with the Bank’s strategy to grow unfunded business. The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period. The Group’s total assets and contingent liabilities increased by 6.4%, reaching US$42.7 billion as of 31 March 2025, up from US$40.1 billion at FY’2024. On-balance sheet assets grew by 4.85% to US$37.0 billion, driven primarily by a 58% surge in cash balances to US$7.4 billion, while Off-balance sheet assets i.e. letters of credit and guarantee volumes increased by a 19% to reach US$5.7 billion at the end of Q1-2025. Net loans and advances closed Q1-2025 at US$27.8 billion, down from the FY2024 closing position reflecting early repayments from certain customers on account of improved foreign currency balances position of some sovereign borrowers. Importantly, the Loan Asset Quality remained strong, with the Non-Performing Loans (NPL) ratio at 2.44%, a modest increase from 2.33% at FY’2024 – well below the Bank’s strategic NPL ceiling of 4%. Driven by inflationary pressures and growing personnel costs, operating expenses rose by 23% to reach US$75.4 million by 31 March 2025. Despite this, Afreximbank Group maintained a healthy Cost-to-Income Ratio of 16%, below its strategic range of 17-30%. Afreximbank’s liquidity profile strengthened considerably, with liquid assets now comprising 20% of total assets, up from 13% at the close of FY’2024. This higher liquidity position was as a result of successful fund-raising, coupled with loan repayments received during the quarter. Shareholders’ funds increased by 3.4%, reaching US$7.5 billion, driven by strong internally generated capital of US$215.4 million in addition to new equity investments under the second General Capital Increase (GCI II) programme. Operating Highlights In line with the Afreximbank strategic objective of driving Industrialisation and export development, the Bank and the Government of Kenya ratified a number of initiatives designed to support the development Industrial Parks (IPs) and Special Economic Zones (SEZs) in Kenya under the US$3 billion Kenya country programme. These projects which include Dongo Kundu Industrial Park in Mombasa and Naivasha SEZ II in Mai Mahiu, are key components of Kenya’s Vision 2030 plan to boost export manufacturing and industrialisation. Afreximbank’s support for these initiatives will specifically enhance infrastructure development, attract investment, and strategically position Kenya as a key hub for African and global commerce. The rollout of the Pan-African Payments and Settlement System (PAPSS) continues to gain momentum with KCB Group in Kenya and Bank of Kigali in Rwanda launching the platform, becoming the first banks in their respective countries to offer seamless, instant, and affordable cross-border payments in local currencies across Africa. Aligned with its mandate to promote Global Africa following the recognition of the African Diaspora as the 6th region of Africa, the Bank further cemented its expansion and presence in the Caribbean with the historic groundbreaking ceremony to kick off the construction of the first ever Afreximbank African Trade Centre (AATC) outside of Africa in Bridgetown, Barbados. AATC Barbados will also host its regional office. The Barbados AATC is an authentic icon of trade embodying the ambition, resilience, and influence of leading commercial cities in Africa and the Caribbean that serve as dynamic focal points for commerce, fostering regional and global trade connections, and is expected to enhance intra-and extra-African trade, with a focus on countries of the Global South. Mr. Denys Denya, Afreximbank’s Senior Executive Vice President, commented: “Our QI 2025 results, which were in line with expectations, reflected a strong and resilient financial performance, notwithstanding continued macroeconomic challenges. With solid profitability growth, a strengthened liquidity position, and a well-capitalised balance sheet, the Group is firmly positioned to continue playing a pivotal role in advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development.” Highlights of the results for the Group are shown below:

    Income statement Financial Metrics

    Q1-2025

    Q1-2024

    Gross Income (US$ million)

    784.9

    753.8

    Operating Income (US$ million)

    474.2

    423.5

    Net Income (US$ million)

    215.4

    178.7

    Return on average assets (ROAA)

                2.38%

    2.19%

    Return on average equity (ROAE)

    12%

    12%

    Cost-to-income ratio

    16%

    15%

    Balance sheet financial metrics

    Q1-2025

    FY-2024

    Total Assets (US$ billion)

    37.0

    35.3

    Total Liabilities (US$ billion)

    29.5

    28.1

    Shareholders’ Funds (US$ billion)

    7.5

    7.2

    Net asset value per share (US$)

    71,671

    69,695

    Non-performing loans ratio (NPL)

    2.44%

    2.33%

    Cash/Total assets

    20%

    13%

    Capital Adequacy ratio (Basel II)

    26%

    24%

    Distributed by APO Group on behalf of Afreximbank. Media Contact: Vincent Musumba Communications and Events Manager (Media Relations) Email: press@afreximbank.com Follow us on: X: https://apo-opa.co/43pfUK5  Facebook: https://apo-opa.co/43uKQbW  LinkedIn: https://apo-opa.co/4jhrbSL  Instagram: https://apo-opa.co/43DKyk2 About Afreximbank: African Export-Import Bank (Afreximbank) is a Pan-African multilateral financial institution mandated to finance and promote intra- and extra-African trade. For over 30 years, the Bank has been deploying innovative structures to deliver financing solutions that support the transformation of the structure of Africa’s trade, accelerating industrialisation and intra-regional trade, thereby boosting economic expansion in Africa. A stalwart supporter of the African Continental Free Trade Agreement (AfCFTA), Afreximbank has launched a Pan-African Payment and Settlement System (PAPSS) that was adopted by the African Union (AU) as the payment and settlement platform to underpin the implementation of the AfCFTA. Working with the AfCFTA Secretariat and the AU, the Bank has set up a US$10 billion Adjustment Fund to support countries effectively participating in the AfCFTA. At the end of December 2024, Afreximbank’s total assets and contingencies stood at over US$40.1 billion, and its shareholder funds amounted to US$7.2 billion. Afreximbank has investment grade ratings assigned by GCR (international scale) (A), Moody’s (Baa1), China Chengxin International Credit Rating Co., Ltd (CCXI) (AAA), Japan Credit Rating Agency (JCR) (A-) and Fitch (BBB). Afreximbank has evolved into a group entity comprising the Bank, its equity impact fund subsidiary called the Fund for Export Development Africa (FEDA), and its insurance management subsidiary, AfrexInsure (together, “the Group”). The Bank is headquartered in Cairo, Egypt. For more information, visit: www.Afreximbank.com Forward-Looking Statements: The Bank makes written and/or oral forward-looking statements, as shown in this presentation and in other communications, from time to time. Likewise, officers of the Bank may make forward-looking statements either in writing or during verbal conversations with investors, analysts, the media, and other key members of the investment community. Statements regarding the Bank’s strategies, objectives, priorities, and anticipated financial performance for the year, constitute forward-looking statements. They are often described with words like “should”, “would”, “may”, “could”, “expect”, “anticipate”, “estimate”, “project”, “intend”, and “believe”. By their very nature, these statements require the Bank to make assumptions that are subject to risks and uncertainties, especially uncertainties related to the financial, economic, regulatory, and social environment within which the Bank operates. Some of these risks are beyond the control of the Bank and may make actual results that are obtained to vary materially from the expectations inferred from the forward-looking statements. Risk factors that could cause such differences include regulatory pronouncements, credit, market (including equity, commodity, foreign exchange, and interest rate), liquidity, operational, reputational, insurance, strategic, legal, environmental, and other known and unknown risks. As a result, when making decisions with respect to the Bank, we recommend that readers apply further assessment and should not unduly rely on the Bank’s forward-looking statements. Any forward-looking statement contained in this presentation represents the views of management only as of the date hereof and they are presented for the purpose of assisting the Bank’s investors and analysts to understand the Bank’s financial position, strategies, objectives, priorities, anticipated financial performance in relation to the current period, and, as such, may not be appropriate for other purposes. The Bank does not undertake to update any forward-looking statement, whether written or verbal, that may be made from time to time, by it or on its behalf, except as required under applicable relevant regulatory provisions or requirements.

    Text copied to clipboard.

    MIL OSI Africa

  • MIL-OSI Russia: “We attach great importance to the development of sales in the Chinese market” — Director of the Baltika-Khabarovsk branch R. Degtyarev

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Khabarovsk, May 21 /Xinhua/ — “We attach great importance to developing sales in the Chinese market; since 2011, the bulk of Baltika deliveries to China have been carried out from the plant in Khabarovsk. During this time, exports from Khabarovsk Krai to China have increased 15-fold,” said Roman Degtyarev, director of the Baltika-Khabarovsk branch (a branch of the Russian brewing company Baltika in Khabarovsk), in his speech at the session “Agroexport: How to Sell in China,” held on May 19 as part of the Russian-Chinese Forum.

    R. Degtyarev told the forum participants about the company’s successful experience in entering the Chinese market. “We have been long-standing partners with China: regular export of Baltika has been carried out here since 2001, and during this time, deliveries have increased dozens of times.”

    According to him, in order to expand Baltika’s presence in the Chinese market and certify the quality of its products, the company underwent voluntary certification “Made in Russia”. A network of representative offices was deployed in the country and abroad, including in the Chinese cities of Beijing and Harbin. Taking into account the preferences of Chinese consumers, in 2024 the company released the Baltika Bolshoy Medved brand specifically for the Chinese market.

    The Baltika-Khabarovsk enterprise, launched in April 2003, is the largest producer of beer and soft drinks in the Khabarovsk Territory. The annual capacity of the plant currently amounts to 230 million liters. The bulk of deliveries to the countries of the Asia-Pacific region comes from China.

    On May 19, a two-day Russian-Chinese forum dedicated to cooperation between the two countries opened in Khabarovsk. More than 3,000 applications were received from representatives of business, government bodies, and creative industries of Russia and China to participate in the forum. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: Chinese, ASEAN ministers call for expanded bilateral trade and economic cooperation

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 21 (Xinhua) — The ministers of economy and trade of China and the Association of Southeast Asian Nations (ASEAN) have called for deepening bilateral economic and trade cooperation to counter negative uncertainties. The call was made at a special meeting of China-ASEAN ministers of economy and trade held via video link on Tuesday.

    As Chinese Commerce Minister Wang Wentao noted during the meeting, China is willing to work with ASEAN to maintain the stable and smooth operation of global industrial and supply chains, make greater contributions to promoting the development and rise of both sides, and safeguarding international fairness and justice.

    Wang Wentao recalled that recently some economies have been abusing so-called “mirror duties” and engaging in economic bullying, which has seriously undermined the international trade system and introduced a high degree of uncertainty into the global economy. Such practices do not comply with economic rules and violate market principles, the head of the Ministry of Commerce of the People’s Republic of China stated.

    During the meeting, the ministers called for collective action to defend the multilateral trading system and free trade, as well as for the effective use of the World Trade Organization mechanisms to establish constructive contacts, find joint solutions and address concerns in global trade.

    ASEAN Secretary-General Kao Kim Horn said all parties should cooperate with a forward-looking approach, firmly uphold openness and inclusiveness, and continuously promote regional economic integration.

    He expressed hope that ASEAN and China can deepen their partnership, achieve high-quality common development, promote cooperation in areas such as smart manufacturing, and strengthen connectivity and green transformation.

    Following the meeting, a joint statement was issued reaffirming China and ASEAN’s position on economic exchanges and challenges to the global economy.

    China and 10 ASEAN countries have completed negotiations to upgrade the China-ASEAN Free Trade Area to version 3.0, the Ministry of Commerce said on Wednesday. –0–

    MIL OSI Russia News

  • MIL-OSI USA: Attorney General James and 38 Attorneys General Urge Congress to Preserve Access to Health Care for 9/11 Responders and Survivors

    Source: US State of New York

    EW YORK – New York Attorney General Letitia James today led a coalition of 38 other attorneys general in urging Congress to take immediate action to address the impending funding crisis threatening the World Trade Center Health Program (WTCHP), a lifeline for more than 135,000 first responders, survivors, and families impacted by the September 11, 2001 terrorist attacks. In a letter to congressional leadership, Attorney General James and the coalition called for urgent legislative action to ensure the long-term financial stability of the WTCHP, which is projected to face a devastating funding shortfall as early as next year.

    “For nearly 15 years, the WTC Health Program has provided life-saving care to the men and women who rushed toward danger to protect others in the wake of 9/11,” said Attorney General James. “Now, they face a new crisis – the possibility of being denied the medical care they so desperately need and deserve. We owe it to these heroes to keep our promise to them. Congress must honor their sacrifice and act now to prevent catastrophic cuts to this bipartisan, life-saving program, ensuring that these first responders and survivors continue to receive the care they need.”

    Established by Congress under the James Zadroga 9/11 Health and Compensation Act of 2010, WTCHP provides free medical care, monitoring, and treatment to more than 135,000 Americans living with 9/11-related health conditions. Patients served by WTCHP include survivors, first responders, and people who lived or worked near the World Trade Center in lower Manhattan, near the Pentagon, or near the Shanksville, Pennsylvania crash site, as well as those who participated in rescue, recovery, and cleanup efforts. Authorized by Congress through 2090, WTCHP provides care through clinics in the New York metropolitan area and a nationwide provider network that spans all 50 states.

    In the letter, Attorney General James and the coalition write that WTCHP has been an essential resource for fifteen years for Americans exposed to toxic dust and debris following the collapse of the Twin Towers. The attorneys general note that patients include firefighters, law enforcement officers, EMTs, construction workers, volunteers, and community members who were present in the aftermath – many of whom are now suffering from chronic respiratory illnesses, cancers, mental health conditions, and other serious illnesses directly linked to their exposure.

    The attorneys general argue that despite being reauthorized in 2015 and 2019 with overwhelming bipartisan support, the program now faces a severe funding shortfall that could result in the denial of care to thousands of current and future enrollees. The program is authorized to run until 2090, but the attorneys general contend that the far-off date is essentially meaningless if the program is not funded during that period.

    In the letter, Attorney General James and the coalition argue that WTCHP’s funding gap is driven by increasing demand for specialized care, as more survivors and first responders are diagnosed with 9/11-related illnesses each year. They note that approximately 400,000 people were exposed to the toxic air around Ground Zero, and though only a third of that group are currently enrolled in the program, many first responders and survivors are still getting sick at an alarming rate.

    The attorneys general contend that increased demand for services and treatment means that current funding levels are simply not enough for this country to keep its commitment to 9/11 heroes. Without additional funding, waitlists could grow, medical providers may be forced to cut back services, and the program could be unable to accept new enrollees – many of whom are only now receiving diagnoses for conditions directly linked to their exposure.

    Attorney General James and the coalition are calling on Congress to act swiftly and decisively to ensure WTCHP has the full funding it needs. The attorneys general strongly urge Congress to enact legislation that will both address the WTCHP funding shortfall and provide the financial stability necessary for the program to serve current and future enrollees.

    Joining Attorney General James in sending this letter are the attorneys general of California, Colorado, Connecticut, Delaware, Hawaii, Illinois, Iowa, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Nevada, New Hampshire, New Jersey, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming, American Samoa, the District of Columbia, the Northern Mariana Islands, and the U.S. Virgin Islands. 

    This is the latest action Attorney General James has taken in her effort to protect the critical World Trade Center Health Program. On May 8, Attorney General James hosted a Community Impact hearing and spoke with Tom Hart, a 9/11 responder, President of the Citizens for The Extension of the James Zadroga Act, and a leader in protecting and extending benefits to 9/11 survivors and their families. On May 5, Attorney General James led a lawsuit to stop the dismantling of the U.S. Department of Health and Human Services, including WTCHP which is facing catastrophic cuts to staff and operating capacity. On April 2, Attorney General James successfully pressured the administration into reinstating the WTCHP director after he was unjustly terminated, throwing the entire program into jeopardy and in February, following reports of significant staff cuts at federal health programs including WTCHP, Attorney General James and others immediately expressed outrage, after which the administration moved to temporarily reverse the staffing cuts.

    MIL OSI USA News

  • MIL-OSI Security: Silver Spring Man Pleads Guilty to “Sextortion” of More Than 100 Minors Located Throughout the United States and Abroad

    Source: Office of United States Attorneys

    Greenbelt, Maryland – Chase William Mulligan, 28, of Silver Spring, Maryland, pled guilty to two counts of producing child sexual abuse material in federal court. The charges are in connection with a scheme in which he met young girls through social media and internet chat rooms and eventually “sextorted” them.

    Specifically, through the scheme, Mulligan coerced at least 108 girls — ranging from ages 5-17 — to send him sexually explicit photographs and videos of themselves. When the girls told him they no longer wanted to send him sexually graphic images, Mulligan threatened to post the images online or come to their house.

    Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the guilty plea with Special Agent in Charge William J. DelBagno of the Federal Bureau of Investigation (FBI) – Baltimore Field Office.

    “Mulligan used manipulation, fear, and intimidation to exploit over 100 young victims. Now we must ensure that we send a clear message to Mulligan, and others, that those who abuse the most vulnerable members of our communities will pay a steep price,” Hayes said. “We’re committed to working with our law-enforcement partners to relentlessly pursue, prosecute, and bring to justice those who engage in these deplorable acts.”

    “Chase Mulligan is a depraved and dangerous predator. He used social media to target, viciously threaten, and horribly abuse more than 100 minor victims – one as young as five years old,” DelBagno said. “His abhorrent behavior is not diminished by the fact he was thousands of miles away and never met his victims, rather, it’s the opposite. Despite his distance, he presents a serious threat to any child he can access through the internet. The FBI works diligently every day to find and arrest predators like Mulligan so they can no longer prey on innocent children.”

    As detailed in the plea agreement, between at least 2019 and December 2023, Mulligan used numerous Snapchat, Discord, Roblox, Skype, Omegle, and Instagram accounts to target young girls. He convinced minors living in the United States, Canada, Denmark, Spain, Philippines, Australia, and United Kingdom to produce and send him sexually explicit images.

    Mulligan also directed minors to expose their genital areas and engage in sexual conduct. Additionally, Mulligan coerced multiple girls to urinate on camera, insert objects into their genitalia, and participate in sexual acts with dogs.

    After some victims informed Mulligan that they no longer wished to send him sexually explicit images, he threatened to publicly post the images or come to their homes. Mulligan wanted the victims to send more images depicting increasingly graphic sexual conduct.

    As part of his plea agreement, Mulligan must register as a sex offender in places where he resides, is an employee, and is a student, under the Sex Offender Registration and Notification Act.

    Mulligan is facing a mandatory minimum of 15 years and a statutory maximum of 60 years in federal prison.  U.S. District Judge Theodore C. Chuang scheduled sentencing for Wednesday, August 27, at 2:30 p.m.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by the United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims.  For more information about Project Safe Childhood, visit www.justice.gov/psc. Click the “Resources” tab on the left side of the page to learn about Internet safety education.

    U.S. Attorney Hayes commended the FBI for its work in the investigation. Ms. Hayes also thanked Assistant U.S. Attorneys Megan S. McKoy and Elizabeth Wright who are prosecuting the case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, please visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Mission Woman Sentenced to Federal Prison for Larceny and Failure to Appear

    Source: Office of United States Attorneys

    PIERRE – United States Attorney Alison J. Ramsdell announced today that U.S. District Judge Eric C. Schulte has sentenced a Mission, South Dakota woman convicted of Larceny and Failure to Appear. The sentencing took place on May 19, 2025.

    Kylie Leader Charge, age 19, was sentenced to eight months in federal prison, followed by three years of supervised release. Leader Charge was further ordered to pay a $200 special assessment to the Federal Crime Victims Fund and $1,000 in restitution.

    Leader Charge was indicted by a federal grand jury in February 2024. She pleaded guilty on February 20, 2025.

    The conviction for Larceny stemmed from an incident that occurred in November of 2023, within the Rosebud Sioux Indian Reservation, when Leader Charge and a co-defendant stole a vehicle near Mission, drove it in a reckless manner, and caused damage to the vehicle.

    Following her Indictment, Leader Charge was released on bond. On March 21, 2024, Leader Charge failed to appear for a bail review hearing as required by her bond conditions. She was subsequently indicted for Failure to Appear.

    These matters were prosecuted by the U.S. Attorney’s Office because the Major Crimes Act, a federal statute, mandates that certain violent crimes alleged to have occurred in Indian Country be prosecuted in Federal court as opposed to State court.

    These cases were investigated by the Rosebud Sioux Tribe Law Enforcement Services and the United States Marshals Service. Assistant U.S. Attorney Meghan N. Dilges prosecuted the cases.

    Leader Charge was immediately remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI Global: Why was St-Pierre-Miquelon targeted by both Donald Trump and a French politician?

    Source: The Conversation – Canada – By Paco Milhiet, Visiting fellow au sein de la Rajaratnam School of International Studies ( NTU-Singapour), chercheur associé à l’Institut catholique de Paris, Institut catholique de Paris (ICP)

    St-Pierre-Miquelon is a small French archipelago off the coast of Newfoundland in the northwestern Atlantic Ocean.

    A map of St-Pierre-Miquelon and its exclusive economic zone.
    (Eric Gaba)

    The territory is just 244 square kilometres with a population of only 5,800. Nonetheless, it’s recently been in the global spotlight due to its inclusion in a wave of tariffs imposed by the United States — and because of a controversial remark from a French presidential hopeful suggesting undocumented migrants should be deported there.

    These recent events provide an opportunity to examine the complex historical and geopolitical entanglements surrounding St-Pierre-Miquelon and involving France, Canada and the United States.

    Last French territory in the region

    Visited by Indigenous Peoples for nearly 5,000 years, St-Pierre-Miquelon became known to European sailors in the late 15th century and was officially claimed for France by Jacques Cartier in 1536.

    The archipelago soon emerged as a strategic base for French fishermen engaged in cod fishing and whaling. Over the ensuing centuries, the islands were fiercely contested by France and Great Britain, changing hands multiple times before being definitively restored to French control in 1816.

    In the 20th century, the archipelago was at the heart of recurring fishing disputes between Canada and France.

    These peaked in 1988 with events that included the seizure of fishing vessels, the recall of ambassadors and violations of existing agreements. Despite historic treaty-based rights, France’s access to fishing grounds declined after Canada’s 1992 cod moratorium and an arbitration ruling that gave St-Pierre-Miquelon an exclusive economic zone of just 38 kilometres around the archipelago, except for a 16-kilometre swath extending 320 kilometres south.

    Both these events had major economic repercussions for St-Pierre-Miquelon.

    Hefty tariff

    Today, the territory’s economy is small — less than 0.001 per cent of France’s GDP — and it depends heavily on public funds and external provisions, particularly from neighbouring Canada.

    Nevertheless, the territory was initially included among the targets of the so-called Liberation Day tariffs announced U.S. President Donald Trump in April. It was singled out with a hefty 50 per cent import duty, temporarily making it one of the most heavily taxed territories in the world, matched only by the landlocked African country of Lesotho.

    Although Trump reversed course and reduced the tariff to 10 per cent a few days later, the original decision was perplexing given the archipelago’s minimal economic weight and its peripheral geopolitical position. Why was this St-Pierre-Michelon targeted so brutally by the Trump administration?

    Halibut geopolitics

    St-Pierre-Miquelon and the U.S. had a balanced trade relationship from 2010 to 2025, until a sharp discrepancy appeared in July 2024. The U.S. imported US$3.4 million worth of goods from the islands, exporting only $100,000 over the entire year.

    This resulted in a reported trade imbalance of 3,300 per cent for the year 2024, which the U.S. government appears to have interpreted as evidence of a 99 per cent tariff imposed by the territory, applying the same flawed algorithm on other countries.

    Why was there such a discrepancy in July 2024?

    According to several reports, this statistical anomaly is actually the result of a long-standing dispute between France and Canada over fishing quotas in the waters surrounding St-Pierre-Miquelon.

    Traditionally, the territory mainly exports seafood products to France and Canada, and almost none to the U.S.

    But in June 2024, a French vessel offloaded several tons of halibut — an expensive fish in high culinary demand — in Saint-Pierre.

    While the catch was made in international waters and was technically legal, it occurred amid ongoing tensions between France and Canada over halibut stocks and the sustainability of the species in the area.

    Because of these tensions, the catch was redirected to the U.S. market and sold for the aforementioned US$3.4 million, an outcome that ultimately triggered the tariffs imposed by the Trump administration.

    France and Canada reached an agreement on halibut later in 2024. But their “halibut war” was just the latest example of recurring disputes between the two countries over fishing quotas in the waters off the Grand Banks of Newfoundland, one of the world’s richest fishing grounds.

    The heavy tariffs imposed by the U.S. on St-Pierre-Miquelon, even though they were swiftly reversed, wer therefore an indirect consequence of the long-standing tensions between France and Canada.

    A new Alcatraz?

    Within days of St-Pierre-Miquelon recovering from the tariff shock, it was once again thrust into the spotlight.

    This time, Laurent Wauquiez, a moderate right-wing presidential contender in France, suggested migrants under deportation orders known as obligations de quitter le territoire français — or OQTF — should be given two options: either be detained in St-Pierre-Miquelon or return to their countries of origin.

    It’s not the first time politicians have proposed deporting prisoners to French overseas territories.

    The suggestion is aligned with France’s historical use of these territories as sites for penal colonies, most notably in Cayenne in French Guyana and New Caledonia in the South Pacific.

    Wauquiez’s remarks were widely condemned as contemptuous and colonial in tone, including by members of the government.

    In response, local authorities in St-Pierre-Miquelon tried to capitalize on the controversy by launching a humorous media campaign that reappropriated the OQTF acronym.

    Social media ads from St-Pierre-Miquelon officials on the deportation proposal by Laurent Wauquiez.
    (Compiled by Paco Milhiet)

    Their goal was to shift the narrative and highlight the archipelago’s appeal: low unemployment, strong public safety, outstanding natural landscapes and a peaceful, family-friendly quality of life — and, hopefully, free from hefty American tariffs.

    Paco Milhiet does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Why was St-Pierre-Miquelon targeted by both Donald Trump and a French politician? – https://theconversation.com/why-was-st-pierre-miquelon-targeted-by-both-donald-trump-and-a-french-politician-256662

    MIL OSI – Global Reports

  • MIL-OSI Russia: HSE students win gold medals at international mathematical Olympiad in Ashgabat

    Translation. Region: Russian Federal

    Source: State University Higher School of Economics – State University Higher School of Economics –

    In Ashgabat (Turkmenistan) was held V Open Mathematical Olympiad for Students OMOUS-2025 (Open Mathematical Olympiad for University Students), which brought together teams from Turkmenistan, Uzbekistan, Indonesia, Iran, Romania, Poland, the United Arab Emirates, Russia and India. In total, about 500 students joined the event.

    Four undergraduate students from HSE took part in the competition.Applied Mathematics and Computer ScienceFaculty of Computer Science (FKN) Vasily Silvestrov, Bogdan Butyrin, Daniil Soulnov and Anastasia Salimova, as well as the team coach, expert Center for Student Olympiads Igor Vorontsov.

    The Olympiad consisted of two rounds: individual and team. The individual round lasted four hours, the participants were asked to solve six problems. In this competition, the students of the Faculty of Computer Science showed excellent results, winning gold medals.

    The team round of the Olympiad took place the next day and lasted two hours, during which ten problems had to be solved. Here, the FKN team took second place, scoring 69 points out of 100.

    Vasily Silvestrov

    — Preparing for the problems of previous years, we understood that the Olympiad is not easy, but we have a good chance of winning gold medals. For me, this was the first international Olympiad, which added reasons to be nervous. We got a lot of points on the appeal. We prepared for it for two nights: we wrote alternative solutions and prepared criteria for them. Overall, it was an unforgettable experience: interesting culture, a beautiful city, delicious food. I would like to thank the organizers of the Olympiad for choosing and preparing the problems. We hope that next year, our university teams will also achieve excellent results.

    Text: Maria Vorontsova

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Africa: Government programmes do empower inmates – Minister Groenewald

    Source: South Africa News Agency

    Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.

    “Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said. 

    The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.

    The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes. 

    These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society.
    The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria. 

    This as the international community also celebrated the 10th anniversary of the rules. 

    The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected. 

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.

    In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration. 

    “In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.

    He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025. 

    The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”

    The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.

    “Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained. 

    He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.

    “We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.” 

    He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI: No KYC, 100x Leverage, Big Bonuses, Simple Interface — Why Beginners Love BexBack

    Source: GlobeNewswire (MIL-OSI)

    SINGAPORE, May 21, 2025 (GLOBE NEWSWIRE) — Bitcoin has officially shattered the long-anticipated $100,000 barrier, marking a historic milestone for the crypto market. As shown in the latest TradingView chart, BTC continues to push higher, riding the upper edge of the Bollinger Bands with no signs of slowing down.

    While the bull run creates exciting opportunities, traders are now facing a critical question: Which platform is best positioned to help them capitalize on this volatility?

    Introducing BexBack — A Streamlined Futures Trading Platform Built for This Moment

    In a sea of exchanges that are often overloaded, overcomplicated, or overregulated, BexBack stands out with its fast, frictionless, and fully non-KYC approach to crypto derivatives trading.

    Whether you’re a seasoned leverage trader or just getting started, BexBack delivers a powerful yet simple experience, offering:

    • No KYC Required — Trade anonymously with just an email
    • 100% Deposit Bonus + $100 Trading Bonus — Double your capital and get a head start
    • Up to 100x Leverage — Maximize your position in times of volatility
    • Free Demo Account — Practice with 10 BTC and 1,000,000 USDT risk-free
    • 50+ Perpetual Contracts — Including BTC, ETH, XRP, ADA, SOL and more
    • Zero Spread, No Slippage — What you see is what you get

    Security and Speed in One Package

    BexBack isn’t just fast — it’s secure. With cold wallet fund storage, multi-signature withdrawal approvals, and real-time risk monitoring, the platform ensures your assets and trades are well protected.

    Global Access, Real Freedom

    BexBack proudly serves a global user base. With no mandatory KYC, even traders from regions with limited access to traditional exchanges can participate freely and instantly.

    About BexBack?

    BexBack is a leading cryptocurrency derivatives platform offering up to 100x leverage on futures contracts for BTC, ETH, ADA, SOL, XRP, and over 50 other digital assets. Headquartered in Singapore, the platform also operates offices in Hong Kong, Japan, the United States, the United Kingdom, and Argentina. Like many top-tier exchanges, BexBack holds a U.S. MSB (Money Services Business) license and is trusted by more than 500,000 traders worldwide. The platform accepts users from the United States, Canada, and Europe, with zero deposit fees and 24/7 multilingual customer support, delivering a secure, efficient, and user-friendly trading experience.

    As Bitcoin Enters Price Discovery, Don’t Get Left Behind

    Markets like this don’t come around often. Whether you’re aiming to ride short-term price swings or position for long-term growth, BexBack provides the tools, leverage, and freedom you need to trade your way.

    Create your account, claim your bonuses, and trade with confidence — all on BexBack.

    Website: www.bexback.com

    Contact: business@bexback.com

    Contact:
    Amanda
    business@bexback.com

    Disclaimer: This content is provided by BexBack The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.
    Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/b8f30a8d-29e8-4fb0-80dd-03331565d74c

    https://www.globenewswire.com/NewsRoom/AttachmentNg/6ee01a23-4395-4b2a-abc6-6b0bf1e42222

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7050b1ab-3ad2-439a-8061-df433b50576b

    https://www.globenewswire.com/NewsRoom/AttachmentNg/d5f5e1fb-7fa6-4b9d-9ef5-46780f2a0f40

    https://www.globenewswire.com/NewsRoom/AttachmentNg/9e8b7e7d-1a2a-429a-831b-69b996334ec4

    The MIL Network