Category: Australia

  • MIL-Evening Report: Humanising AI could lead us to dehumanise ourselves

    Source: The Conversation (Au and NZ) – By Raffaele F Ciriello, Senior Lecturer in Business Information Systems, University of Sydney

    Shutterstock

    Irish writer John Connolly once said:

    The nature of humanity, its essence, is to feel another’s pain as one’s own, and to act to take that pain away.

    For most of our history, we believed empathy was a uniquely human trait – a special ability that set us apart from machines and other animals. But this belief is now being challenged.

    As AI becomes a bigger part of our lives, entering even our most intimate spheres, we’re faced with a philosophical conundrum: could attributing human qualities to AI diminish our own human essence? Our research suggests it can.

    Digitising companionship

    In recent years, AI “companion” apps such as Replika have attracted millions of users. Replika allows users to create custom digital partners to engage in intimate conversations. Members who pay for Replika Pro can even turn their AI into a “romantic partner”.

    Physical AI companions aren’t far behind. Companies such as JoyLoveDolls are selling interactive sex robots with customisable features including breast size, ethnicity, movement and AI responses such as moaning and flirting.

    While this is currently a niche market, history suggests today’s digital trends will become tomorrow’s global norms. With about one in four adults experiencing loneliness, the demand for AI companions will grow.

    The dangers of humanising AI

    Humans have long attributed human traits to non-human entities – a tendency known as anthropomorphism. It’s no surprise we’re doing this with AI tools such as ChatGPT, which appear to “think” and “feel”. But why is humanising AI a problem?

    For one thing, it allows AI companies to exploit our tendency to form attachments with human-like entities. Replika is marketed as “the AI companion who cares”. However, to avoid legal issues, the company elsewhere points out Replika isn’t sentient and merely learns through millions of user interactions.

    Some AI companies overtly claim their AI assistants have empathy and can even anticipate human needs. Such claims are misleading and can take advantage of people seeking companionship. Users may become deeply emotionally invested if they believe their AI companion truly understands them.

    This raises serious ethical concerns. A user will hesitate to delete (that is, to “abandon” or “kill”) their AI companion once they’ve ascribed some kind of sentience to it.

    But what happens when said companion unexpectedly disappears, such as if the user can no longer afford it, or if the company that runs it shuts down? While the companion may not be real, the feelings attached to it are.

    Empathy – more than a programmable output

    By reducing empathy to a programmable output, do we risk diminishing its true essence? To answer this, let’s first think about what empathy really is.

    Empathy involves responding to other people with understanding and concern. It’s when you share your friend’s sorrow as they tell you about their heartache, or when you feel joy radiating from someone you care about. It’s a profound experience – rich and beyond simple forms of measurement.

    A fundamental difference between humans and AI is that humans genuinely feel emotions, while AI can only simulate them. This touches on the hard problem of consciousness, which questions how subjective human experiences arise from physical processes in the brain.

    Science has yet to solve the hard problem of consciousness.
    Shutterstock

    While AI can simulate understanding, any “empathy” it purports to have is a result of programming that mimics empathetic language patterns. Unfortunately, AI providers have a financial incentive to trick users into growing attached to their seemingly empathetic products.

    The dehumanAIsation hypothesis

    Our “dehumanAIsation hypothesis” highlights the ethical concerns that come with trying to reduce humans to some basic functions that can be replicated by a machine. The more we humanise AI, the more we risk dehumanising ourselves.

    For instance, depending on AI for emotional labour could make us less tolerant of the imperfections of real relationships. This could weaken our social bonds and even lead to emotional deskilling. Future generations may become less empathetic – losing their grasp on essential human qualities as emotional skills continue to be commodified and automated.

    Also, as AI companions become more common, people may use them to replace real human relationships. This would likely increase loneliness and alienation – the very issues these systems claim to help with.

    AI companies’ collection and analysis of emotional data also poses significant risks, as these data could be used to manipulate users and maximise profit. This would further erode our privacy and autonomy, taking surveillance capitalism to the next level.

    Holding providers accountable

    Regulators need to do more to hold AI providers accountable. AI companies should be honest about what their AI can and can’t do, especially when they risk exploiting users’ emotional vulnerabilities.

    Exaggerated claims of “genuine empathy” should be made illegal. Companies making such claims should be fined – and repeat offenders shut down.

    Data privacy policies should also be clear, fair and without hidden terms that allow companies to exploit user-generated content.

    We must preserve the unique qualities that define the human experience. While AI can enhance certain aspects of life, it can’t – and shouldn’t – replace genuine human connection.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Humanising AI could lead us to dehumanise ourselves – https://theconversation.com/humanising-ai-could-lead-us-to-dehumanise-ourselves-240803

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Australia: 225-2024: Australian Fumigation Accreditation Scheme: treatment provider suspended – Ceylon Pest Control Co. (Pvt.) Ltd (AEI: LK0010MB)

    Source: Australia Government Statements – Agriculture

    21 October 2024

    Who does this notice affect?

    Stakeholders in the import and shipping industries—including vessel masters, freight forwarders, offshore treatment providers, Biosecurity Industry Participants, importers, customs brokers, principal agents and master consolidators.

    What has changed?

    Following identification of critical non-compliance, we have suspended Ceylon Pest Control Co. (Pvt.) Ltd (AEI: LK0010MB) from the…

    MIL OSI News

  • MIL-OSI Australia: Average speed camera trial to investigate safety dividend

    Source: New South Wales Government 2

    Headline: Average speed camera trial to investigate safety dividend

    Published: 21 October 2024

    Released by: Minister for Regional Transport and Roads, Minister for Roads


    Previously, average speed cameras have only been used in NSW to monitor the speed of heavy vehicles. Road safety benefits will be evaluated when a trial of average speed cameras for light vehicles is conducted from next year.

    Legislation that passed NSW Parliament has enabled their use for all vehicles, bringing the state into line with all other Australian mainland states and the ACT where the technology is an integral part of their speed enforcement programs.

    The NSW Government will now trial the lifesaving benefits of average speed cameras as part of efforts to combat the rising road toll which today stands at 271 – two more than at the same date in 2023.

    The average speed camera trial will build on road safety initiatives introduced by the Minns Labor Government, including:

    • Seatbelt enforcement by the existing mobile phone camera detection network
    • Removing a loophole to force all motorists driving on a foreign licence to convert to a NSW licence within six months
    • The demerit return trial that rewarded more than 1.2 million drivers for maintaining a demerit-offence-free driving record during the initial 12-month period up to 16 January 2024
    • Doubling roadside enforcement sites used for mobile speed cameras, with the addition of 2,700 new locations where a camera can be deployed. Enforcement hours will remain the same
    • Hosting the state’s first Road Safety Forum of international and local experts
    • Signed National Road Safety Data Agreement with the Commonwealth

    Speeding is the biggest killer on NSW roads, contributing to 41 per cent of all fatalities over the past decade.

    Regional NSW is home to a third of the population but is where two-thirds of all road deaths happen.

    Two trials will be conducted on limited stretches of highway in regional NSW to assess whether these measures reduce speeding at these locations, improving safety and preventing injuries and fatalities. The trial areas are:

    • Pacific Highway between Kew and Lake Innes (Port Macquarie) – 15kms between cameras
    • Hume Highway between Coolac and Gundagai – 16kms between cameras

    There were a combined total of six fatalities and 33 serious injuries between 2018 and 2022 at these locations.

    Road safety experts have backed the use of average speed cameras and the NRMA will be part of the assessment process to ensure drivers have a voice in the review of the trial. 

    Transport for NSW will now work on the technical elements and deliver a communications campaign to inform motorists about the trial to begin mid-2025.

    Trials are proposed to begin with a 60-day period in which speeding drivers will receive a warning letter rather than a fine before normal enforcement, including fines and demerit points, begin.

    Minister for Roads John Graham said:

    “This is the right time to investigate whether lives can be saved by the use of average speed cameras for all vehicles, not only trucks.

    “This technology has been found to be effective in other states and in the UK, Norway, Italy and the Netherlands.

    “It is our responsibility to properly evaluate whether they are effective in preventing another family and another friendship circle from being devastated – which is the sad result every time someone dies on NSW roads.

    “Before trials begin next year, the NSW Government will conduct a comprehensive awareness campaign so the public is aware of average speed cameras and a 60-day warning letter period will give motorists time to adjust to their use in these limited locations.”

    Minister for Regional Transport and Roads Jenny Aitchison said:

    “In 2023, over two thirds of the deaths on our roads were in regional NSW. Our goal is to assess how effective the cameras can be in changing speeding habits and reducing needless deaths.

    “The NSW Government will continue to inform all drivers but particularly the regional communities around these trial sites about how it will work.

    “Unfortunately, on Tuesday night we saw Nationals in the Legislative Council cynically voting against the average speed camera trial, putting politics above the safety of the people they purport to represent.

    “There have been a few times in this Parliament that the Leader of the Nationals has torched the Coalition agreement allegedly on a matter of principle – but saving lives on our roads in the bush? The Nationals are clearly confused about what is important.”

    MIL OSI News

  • MIL-OSI Australia: ​​DTA pilots new AI assurance framework​

    Source: Australia Digital Transformation Agency

    The DTA is exploring artificial intelligence (AI) assurance mechanisms for Australian Government agencies consistent with the National framework for the assurance of AI in government. Our approach to AI assurance prioritises human oversight and the rights, wellbeing, and interests of people and communities. 

    MIL OSI News

  • MIL-OSI Australia: Three arrested at Kilburn

    Source: South Australia Police

    Police recovered a stolen car and seized firearms during an investigation at Kilburn last night.

    About 7.30pm on Sunday 20 October, police located a stolen Holden Commodore station wagon in the car park of a Kilburn licensed premises.

    The alleged occupants of the stolen car were identified by police nearby.

    A 31-year-old Manningham man and a 25-year-old Paralowie woman were arrested and charged with illegal use of a motor vehicle.

    The stolen car was towed away for forensic examination.

    Following these arrests, Western District Police and Serious and Organised Crime Branch detectives searched addresses linked to the arrested people.

    At a Kilburn property, three firearms, firearm parts and ammunition were found.  Some of the firearms are suspected to have been stolen and inquiries are continuing.

    A 39-year-old Kilburn man was arrested and charged with serious firearm offences.

    The arrested men will appear in the Adelaide Magistrates Court today, Monday 21 October.

    The woman was bailed to appear in the Adelaide Magistrates Court on 3 December.

    Anyone with information about illegal or stolen firearms in our community is urged to contact Crime Stoppers on 1800 333 000 or online at http://www.crimestopperssa.com.au

    CO2400042199
    CO2400042169, CO2400042345

    MIL OSI News

  • MIL-OSI Australia: Appointments – Members, Companies Auditors Disciplinary Board

    Source: Australian Treasurer

    The Albanese Government has today appointed Mr Michael Bray, Ms Julie Williams and Mr Matthew Green as part‑time accounting members of the Companies Auditors Disciplinary Board (CADB) for a three‑year period.

    The CADB is an independent disciplinary body established by Part 11 of the Australian Securities and Investments Commission Act 2001 (ASIC Act).

    CADB receives and reviews applications made to it by the Australian Securities and Investments Commission and the Australian Prudential Regulation Authority in respect of registered company auditors under the Corporations Act 2001.

    Mr Bray specialises in financial statement audits in specialist industries with complex accounting and auditing issues. He has extensive experience in a number current and previous roles including as a Professor of Practice at Deakin University, a Director at the Australian Business Reporting Leaders Forum and a Special Adviser to the Chief Connectivity and Integrated Reporting Officer of the International Financial Reporting Standards Foundation.

    Ms Williams has many years experience as a registered liquidator and is well‑versed in the financial regulatory framework, including the Corporations legislation. Her experience includes membership of the board of the Institute of Public Accountants where she chaired the IPA’s disciplinary committee and served as President between 2020 and 2023.

    Mr Green is a partner at Forvis Mazars and a registered company auditor. He has a breadth of experience that includes providing audit and assurance services specialising in corporate reporting, accounting and auditing requirements, corporate law and governance, risk assessment and corporate transactions and valuations.

    The Government has also reappointed Ms Adeline Hiew as a part‑time business member and Mr Tony Brain and Ms Ann‑Maree Robertson as part‑time accounting members of the CADB.

    These appointments will continue the high level of skills and experience available to the CADB, to help ensure that the key sectors of our economy are effectively regulated.

    MIL OSI News

  • MIL-OSI Australia: Call for information – Traffic offences and vehicle fire – Alice Springs

    Source: Northern Territory Police and Fire Services

    Northern Territory Police Fire and Emergency Services are calling for information after a traffic incident involving a vehicle fire occurred in Alice Springs early Saturday morning.

    Around 2:25am, Joint Emergency Services Communications Centre received reports of a vehicle fire at the Stuart Highway and Wills Terrace intersection.

    CCTV footage reviewed by police showed a silver Holden Commodore travelling outbound on Willis Terrace when it approached the Stuart Highway intersection and a red Holden Commodore contacted the rear of the vehicle, causing the silver Holden to lose control and crash.

    A group of people exited the crashed vehicle and fled the scene on foot.

    The occupants in the red holden commodore then approached the crashed vehicle and began causing further damage before they also fled the scene on foot.

    A short time later, the silver Holden Commodore became engulfed in flames.

    Police and Fire and Rescue Services attended the scene, and the vehicle fire was extinguished.

    A 21-year-old male later approached the officers in attendance and informed them he was the owner and driver of the red commodore.

    He has since been transported to Alice Springs Hospital for treatment and blood testing.

    Police urge anyone with information about the incident to make contact on 131 444 and quote reference NTP2400105383.

    Anonymous reports can be made via Crime Stoppers on 1800 333 000 or through https://crimestoppersnt.com.au/.

    MIL OSI News

  • MIL-OSI Australia: The CFA volunteers who love marrying people

    Source: Victoria Country Fire Authority

    The COVID-19 lockdowns led to an exciting and fulfilling change of direction for CFA volunteers and married couple Greg Thorpe and Anne Tammesild.

    Instead of sitting idle, they both completed a Certificate IV in celebrancy, and now get a lot of joy from marrying people – especially fellow CFA volunteers.

    “I retired during the COVID-19 pandemic after being an air traffic controller for 43 years,” Greg said. “Anne saw me getting bored and suggested I find something new to do. I said I wouldn’t mind being a marriage celebrant, and Anne replied that she’d like to do that too.”

    Greg and Anne both completed their certificate IV in about nine months, but because of COVID-19 they weren’t able to get their new business off the ground the way they had hoped.

    Greg and Anne, who live in Hampton, are members of District 8 Headquarters Brigade where they are learning new skills to work in an Incident Control Centre. Before moving to Hampton, Greg had been a firefighter with St Andrews Fire Brigade since 2008, and the impact of the 2009 fires on Greg and those around him prompted him to become a peer in CFA’s Peer Support Program.

    “At St Andrews I got really interested in firefighting and learned a range of skills. Then after 2009 I also wanted to help fellow volunteers, so I trained to be a peer supporter,” Greg said. 

    Greg and Anne love marrying people, and are happy to conduct weddings in addition to having daytime jobs.

    “We aim to do 15 weddings a year in between my part-time job as the manager of emergency management and business continuity across 51 magistrates’ courts, and Anne’s full-time teaching role.”

    Anne became a CFA member about a year ago after many years as a Life Saving Victoria volunteer where she was a district assessor and trainer. She now wants to contribute to the operation of CFA Incident Control Centres.

    Greg and Anne approach a wedding as a team. Although only one celebrant can legally marry a couple, they both attend the wedding.

    “We do it together because we enjoy it so much,” Greg said. “If Anne conducts the ceremony, I’ll be the roadie and set everything up. It brings us a lot of joy. After the wedding, we walk away with a big smile. We’re not in it to make much money but to marry people and make them happy.

    “I see how much work CFA members devote to supporting their communities and we like to give back by marrying them for a reasonable fee. We’re not worried about travelling a long distance to marry CFA people – we just turn the occasion into a weekend away.”

    One happy occasion was when Greg married CFA employee Jacinta McMahon and her partner Tim late last year in their backyard with about 30 guests. Their beloved dog Bundy was the ring bearer.

    Greg and Anne discuss each wedding together and writing the couple’s love story is a joint effort.

    “Having two celebrants who know all the documents and the members of the bridal party means that either of us can conduct the ceremony. If I was sick, Anne could take the ceremony and vice versa. Fortunately, that hasn’t been a problem,” Greg said.

    Submitted by News and Media

    MIL OSI News

  • MIL-OSI Australia: Serious crash at Kapunda

    Source: South Australia Police

    Police and emergency services are at the scene of a serious crash at Kapunda.

    Just after 2.30pm on Monday 21 October, Police responded to a two car crash on the Thiele Highway.

    South bound traffic out of the Kapunda township is closed and northbound traffic is being diverted down East Terrace.

    Please avoid the area.

    MIL OSI News

  • MIL-Evening Report: Australia’s fertility rate has reached a record low. What might that mean for the economy?

    Source: The Conversation (Au and NZ) – By Jonathan Boymal, Associate Professor of Economics, RMIT University

    BaLL LunLa/Shutterstock

    Australia’s fertility rate has fallen to a new record low of 1.5 babies per woman. That’s well below the “replacement rate” of 2.1 needed to sustain a country’s population.

    On face value, it might not seem like a big deal. But we can’t afford to ignore this issue. The health of an economy is deeply intertwined with the size and structure of its population.

    Australians simply aren’t having as many babies as they used to, raising some serious questions about how we can maintain our country’s workforce, sustain economic growth and fund important services.

    So what’s going on with fertility rates here and around the world, and what might it mean for the future of our economy? What can we do about it?

    Are lower birth rates always a problem?

    Falling fertility rates can actually have some short-term benefits. Having fewer dependent young people in an economy can increase workforce participation, as well as boost savings and wealth.

    Smaller populations can also benefit from increased investment per person in education and health.

    But the picture gets more complex in the long term, and less rosy. An ageing population can strain pensions, health care and social services. This can hinder economic growth, unless it’s offset by increased productivity.

    Other scholars have warned that a falling population could stifle innovation, with fewer young people meaning fewer breakthrough ideas.

    Students sitting at a school assembly
    In the short term, lower birth rates can mean more is able to be spent per-person on services like education.
    Jandrie Lombard/Shutterstock

    A global phenomenon

    The trend towards women having fewer children is not unique to Australia. The global fertility rate has dropped over the past couple of decades, from 2.7 babies per woman in 2000 to 2.4 in 2023.

    However, the distribution is not evenly spread. In 2021, 29% of the world’s babies were born in sub-Saharan Africa. This is projected to rise to 54% by 2100.

    There’s also a regional-urban divide. Childbearing is often delayed in urban areas and late fertility is more common in cities.

    In Australia, we see higher fertility rates in inner and outer regional areas than in metro areas. This could be because of more affordable housing and a better work-life balance.

    But it raises questions about whether people are moving out of cities to start families, or if something intrinsic about living in the regions promotes higher birth rates.

    Fewer workers, more pressure on services

    Changes to the makeup of a population can be just as important as changes to its size. With fewer babies being born and increased life expectancy, the proportion of older Australians who have left the workforce will keep rising.

    One way of tracking this is with a metric called the old-age dependency ratio – the number of people aged 65 and over per 100 working-age individuals.

    In Australia, this ratio is currently about 27%. But according to the latest Intergenerational Report, it’s expected to rise to 38% by 2063.

    An ageing population means greater demand for medical services and aged care. As the working-age population shrinks, the tax base that funds these services will also decline.

    Aged care worker holding the hand of an aged care resident.
    An ageing population can mean more pressure on tax-payer funded services like healthcare.
    Chinnapong/Shutterstock

    Unless this is offset by technological advances or policy innovations, it can mean higher taxes, longer working lives, or the government providing fewer public services in general.

    What about housing?

    It’s tempting to think a falling birth rate might be good news for Australia’s stubborn housing crisis.

    The issues are linked – rising real estate prices have made it difficult for many young people to afford homes, with a significant number of people in their 20s still living with their parents.

    This can mean delaying starting a family and reducing the number of children they have.

    At the same time, if fertility rates stay low, demand for large family homes may decrease, impacting one of Australia’s most significant economic sectors and sources of household wealth.




    Read more:
    No savings? No plans? No Great Australian Dream. How housing is reshaping young people’s lives


    Can governments turn the tide?

    Governments worldwide, including Australia, have long experimented with policies that encourage families to have more children. Examples include paid parental leave, childcare subsidies and financial incentives, such as Australia’s “baby bonus”.

    Many of these efforts have had only limited success. One reason is the rising average age at which women have their first child. In many developed countries, including Australia, the average age for first-time mothers has surpassed 30.

    As women delay childbirth, they become less likely to have multiple children, further contributing to declining birth rates. Encouraging women to start a family earlier could be one policy lever, but it must be balanced with women’s growing workforce participation and career goals.

    Research has previously highlighted the factors influencing fertility decisions, including levels of paternal involvement and workplace flexibility. Countries that offer part-time work or maternity leave without career penalties have seen a stabilisation or slight increases in fertility rates.

    Mother with small baby working from homeoffice, typing on laptop
    Any solutions to falling fertility rates must balance other important factors such as women’s increased workforce participation.
    Halfpoint/Shutterstock

    The way forward

    Historically, one of the ways Australia has countered its low birth rate is through immigration. Bringing in a lot of people – especially skilled people of working age – can help offset the effects of a low fertility rate.

    However, relying on immigration alone is not a long-term solution. The global fertility slump means that the pool of young, educated workers from other countries is shrinking, too. This makes it harder for Australia to attract the talent it needs to sustain economic growth.

    Australia’s record-low fertility rate presents both challenges and opportunities. On one hand, the shrinking number of young people will place a strain on public services, innovation and the labour market.

    On the other hand, advances in technology, particularly in artificial intelligence and robotics, may help ease the challenges of an ageing population.

    That’s the optimistic scenario. AI and other tech-driven productivity gains could reduce the need for large workforces. And robotics could assist in aged care, lessening the impact of this demographic shift.

    The Conversation

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Australia’s fertility rate has reached a record low. What might that mean for the economy? – https://theconversation.com/australias-fertility-rate-has-reached-a-record-low-what-might-that-mean-for-the-economy-241577

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Australia: General anti-avoidance rules and PSI

    Source: Australian Department of Revenue

    Overview of general anti-avoidance rules

    This information is relevant to you if both of the following apply:

    • you receive personal services income (PSI) as a sole trader or through your company, partnership or trust
    • the PSI rules don’t apply to your income because you are carrying on a personal services business (PSB).

    The PSI rules were introduced to prevent the diverting, alienating or splitting of income with other individuals or entities in an attempt to pay less tax.

    The general anti-avoidance rules (GAAR) may still apply if you are a PSB and the PSI rules don’t apply. For the GAAR to apply to your arrangement, there must be a sole or dominant purpose to obtain a tax benefit.

    When the GAAR may apply

    The GAAR may apply where there are factors indicating that the dominant purpose of the arrangement is to obtain a tax benefit by diverting, alienating or splitting your PSI or retaining profits in your lower-taxed company, partnership or trust (being an interposed entity).

    In deciding whether the PSB has engaged in income splitting to gain a tax benefit, the following considerations may be relevant:

    • Whether the salary or wages paid to you is commensurate with
      • the skills you exercised or services you provided, and
      • the income received by the PSB for your services.
    • Remuneration commensurate to the value of your services will generally be the gross amount received by the PSB for your services, less allowable deductions (other than deductions associated with non PSI income of the PSB or income splitting).
    • Whether the PSB distributes income to associates and does not distribute income to you, the individual who provided the actual services.
    • Whether the salary or wages paid to associates by the sole trader or PSB is not commensurate with
      • the skills exercised and services provided by the associate, and
      • the income received by the sole trader or PSB is for services performed by the individual (which is different to income being generated by assets of an interposed entity).

    Examples include if you:

    • use a company, partnership, or trust to retain profits from your PSI
    • divert, alienate or split your PSI with an associate – which reduces your overall income tax liability, or
    • create an entitlement to deductions which would not be available to an individual providing the same services as an employee.

    Example: when the GAAR may apply

    Jason provides services as a computer analyst through his trust, JB Trust. Jason’s wife and children are also beneficiaries of JB Trust. The contract price for Jason’s services is $120,000.

    Through the income year, Jason is paid a salary of $50,000 by JB Trust to perform his services. JB Trust also incurs $25,000 of deductions. The balance of $45,000 is distributed to Jason’s wife and children, who are in the lowest marginal tax rate.

    The JB Trust self-assesses as a PSB due to passing the results test. The PSI rules don’t apply to the income. The GAAR may apply to the arrangement JB Trust has in place, as Jason may be obtaining a tax benefit by splitting the income with his associates.

    If the GAAR applied, then the tax benefits would be cancelled. This is done by making a determination, and relevant amounts would be deemed to be included in Jason’s assessable income.

    End of example

    The GAAR Panel advises on the application of the GAAR to particular arrangements.

    Draft Practical Compliance Guideline (PCG 2024/D2)

    A draft Practical Compliance Guideline (PCG 2024/D2) is currently being finalised. The draft Guideline outlines the types of alienation arrangements that we consider to be of ‘low’ or ‘higher’ risk of the general anti-avoidance provisions of income tax law (Part IVA) applying and the likelihood of us reviewing those arrangements.

    For more information, visit PCG 2024/D2 Personal services businesses and Part IVA of the Income Tax Assessment Act 1936.

    MIL OSI News

  • MIL-OSI Asia-Pac: “M” Mark status awarded to Prudential Hong Kong Tennis Open

    Source: Hong Kong Government special administrative region

    “M” Mark status awarded to Prudential Hong Kong Tennis Open
    “M” Mark status awarded to Prudential Hong Kong Tennis Open
    *********************************************************************

    The following is issued on behalf of the Major Sports Events Committee:      The Major Sports Events Committee (MSEC) has awarded “M” Mark status to Prudential Hong Kong Tennis Open, which will be held at the Victoria Park Tennis Court from October 26 to November 3.      The Chairman of the MSEC, Mr Wilfred Ng, said today (October 21), “We are very pleased to award the ‘M’ Mark status to the Prudential Hong Kong Tennis Open. This international event attracts numerous world-class players to compete in Hong Kong each year. It is a grand occasion for the tennis community and provides them with exciting matches and unforgettable experiences. It also serves as a good opportunity to promote tourism and the economy in Hong Kong, enhancing the city’s established professional status in the international sports arena.”      The “M” Mark System aims to encourage and help local “national sports associations” and private or non-government organisations to organise more major international sports events and nurture them into sustainable undertakings. Sports events meeting the assessment criteria will be granted “M” Mark status by the MSEC. Funding support will also be provided to some events.      For details of “M” Mark events, please visit http://www.mevents.org.hk.

     
    Ends/Monday, October 21, 2024Issued at HKT 14:00

    NNNN

    MIL OSI Asia Pacific News

  • MIL-OSI Australia: (WIP) Government support for security of payment reform in Victoria

    Source: Allens Insights

    Moving towards a streamlined and uniform payment regime for the Victorian construction sector 5 min read

    The Victorian Parliament has expressed its support for many significant reforms to the Building and Construction Industry Security of Payment Act 2002 (Vic) (SOPA).

    On 17 October 2024, the Victorian Government tabled a report containing its response to the Parliamentary Inquiry into the state of payments in the Victorian construction industry (Report). The Report demonstrates broad government support for many of the Inquiry’s key recommendations.

    In this Insight, we consider some of the key reforms that are likely to soon become law.

    Background and context

    In March 2023, the Victorian Legislative Assembly launched an inquiry into the state of payments in the Victorian construction industry.

    A key focus of the Inquiry was the operation of the SOPA. The SOPA provides contractors and subcontractors in the construction industry with a statutory cause of action through which they can claim payment in a timely and efficient manner.

    In January 2024, we published an Insight examining the reforms proposed by the Parliamentary Inquiry. With the Victorian Government having expressed support for many of these reforms, it is clear that significant changes are on the horizon. These proposed reforms point to an intention to streamline the Victorian SOPA regime and align it with other states, while maintaining the ability for contractors and subcontractors to receive timely payment for work.

    Proposed reforms

    Of the 28 recommendations considered in the Report, the following 8 warrant particular attention, given Government support for their reform and their potential impact on participants in the construction industry.

    The government plans to introduce amendments to the SOPA that will repeal sections 10-10B of the Act, which prevent ‘excluded amounts’ from being taken into account when calculating progress payment entitlements. ‘Excluded amounts’ include many types of claims that commonly arise on construction projects, including damages relating to latent conditions, damages for breach of contract, time-related costs and changes in regulatory requirements. Victoria’s excluded amount provisions are inconsistent with SOP legislation in every other Australian jurisdiction. This regime has had several consequences that have undermined achievement of the SOPA’s key objectives, with such shortcomings including:

    • increasing cost and complexity of adjudication proceedings;
    • reducing the overall amount of money that can be recovered through the SOPA’s adjudication process;
    • excluding retention monies from consideration in adjudications; and
    • jeopardising the recovery of any adjudicated amount as a debt where the adjudication includes any excluded amount.

    Like the ‘excluded amount’ regime, the reference date provisions of SOPA are unique to Victoria. The calculation of reference dates can often be difficult and require legal advice to correctly identify them. These provisions can also facilitate unfair and unethical practices by which some builders and head contractors can prevent payment claims from being made by strategically invoking termination clauses prior to a reference date. By removing the concept of reference dates from Victoria’s SOPA, the government aims to bring the regime in line with NSW.

    Noting that the construction industry traditionally shuts down over the Christmas period, the SOP legislation in other states contains a blackout period during which time stops running. Currently, Victoria is the only jurisdiction not to exclude an extended Christmas shutdown period from the definition of ‘business days’. The government has now indicated its full support for an extended blackout period from 22 December-10 January, which should ensure that those who work with SOP claims can have a much-needed break over the holiday period.

    Construction contracts often include time-bar provisions that operate to bar a contractor from receiving a payment entitlement on the basis that a notice claiming the payment was not submitted within the timeframe or in the form specified by the contract. The government has indicated its support for a new provision (modelled on s16 of the WA SOP legislation) which allows for an adjudicator or other decision-maker to declare that a time-bar provision is unfair if compliance with it is onerous or not reasonably possible. This is justified on the basis that giving a decision-maker the power to determine, on a case-by-case basis, whether a notice-based time bar is unreasonable is preferable to trying to legislate any blanket prohibition. However, if a time-bar provision is declared ‘unfair’, that declaration will only affect the particular entitlement under the contract that is subject to the proceedings, but will not be binding on the same time-bar provision in another contract, or even on the same contract concerning another entitlement.

    The government has indicated support for amending the SOPA to enact regulations that expressly prohibit other contractual clauses and so render them of no effect. In enacting these reforms, the government aims to ensure its regulations can keep pace with evolving contractual practices in the construction industry.

    Due to the unequal bargaining power between parties up and down the contractual chain, lengthy payment terms are often imposed on subcontractors. To address this concern, the government has indicated its support to amend s12 of the SOPA to provide that payment under a construction contract becomes due and payable:

    • on the date set by the terms of the contract, subject to the payment term not exceeding 25 business days after the payment claim has been made; or
    • if the contract makes no express provision, 10 business days after the claim is made.

    Adopting provisions from Western Australia’s recently rewritten SOP framework, the Victorian Government is supporting amendments to SOPA that will allow service in relation to payment claims to be made electronically, such as via email.

    Without deciding on a model, the government has indicated in-principle support for processes that safeguard progress payments and retention monies from being wrongly withheld or misapplied by those higher up the contracting chain. While a range of trust models were considered, including those adopted by QLD, NSW and WA, and the Murray model (a cascading deemed statutory trust) which is yet to be adopted by an Australian jurisdiction, it ultimately decided further examination was necessary before it could decide on an appropriate trust model. However, it committed to undertaking further work towards the implementation of a trust model, and that it would need to engage in further consultation with relevant stakeholders before any specific amendments were made.

    Next steps

    The government is yet to publish a timeline for introducing legislation to give effect to these reforms. However, given the strong support for many of the reforms proposed by the Parliamentary Inquiry, we expect to see appropriate legislation enacting these reforms in the short to medium term.

    If you would like to discuss the issues raised in this Insight, please contact us below.

    MIL OSI News

  • MIL-Evening Report: With reports of students abusing peers in primary schools, how can parents help keep their kids safe?

    Source: The Conversation (Au and NZ) – By Daryl Higgins, Professor & Director, Institute of Child Protection Studies, Australian Catholic University

    An ABC report on Monday revealed a concerning rise in peer-on-peer sexual abuse within Australian primary schools.

    Data on Victorian schools shows hundreds of such incidents were reported in 2022 and 2023, with many involving children under the age of ten.

    The Australian Child Maltreatment Study also showed rates of sexual abuse inflicted by peers has been increasing. Overall, 18.2% of participants aged 16 to 24 reported being sexually abused by a peer during their childhood, compared to 12.1% of those aged 45 years and over.

    Parents may be wondering how they can protect their children at school.

    One of the most effective tools parents have is open, regular and age-appropriate conversations with their kids.




    Read more:
    There are reports some students are making sexual moaning noises at school. Here’s how parents and teachers can respond


    Talk about boundaries and consent early

    What should you be talking about?

    It is crucial for parents to talk with their children about boundaries and consent from an early age. For younger children, this can be as simple as teaching them their body belongs to them and no one else has the right to touch them without permission. Asking if its OK for a hug, and respecting when children say “no” is a great start.

    When discussing consent, it is important to highlight consent is not just about saying “no”, but also recognising and respecting others’ boundaries.

    Peer relationships and trusted adults play a crucial role in a child’s life. Helping children identify adults they can trust if they need to talk about something is also very important. Peers are often the first to hear of concerns or are often the recipients of disclosures, so fostering healthy friendships and teaching children to report to trusted adults is crucial.

    Addressing peer pressure and secrecy

    Children may feel pressured by peers or may be told to keep certain behaviours secret.

    It is essential for parents to emphasise no matter who asks them to keep a secret, they should always share concerns or things they are unsure about with a trusted adult.

    Parents can reinforce the message that if someone tells them not to tell, it is a “red flag”.

    Children can often feel unsure or scared of whether what has happened is wrong. This is why encouraging openness and creating a nonjudgmental space for children to share is important.

    Discussing online safety

    Research shows exposure to harmful material, like pornography, is a contributing factor to inappropriate sexual behaviour among peers.

    Being aware of your child’s internet use and educating them on how to keep themselves safe online is crucial.

    What else can parents do?

    While conversations with your children are vital, parents can also take practical steps to ensure their child’s safety at school. These include:

    • familiarising yourself with school policies: understand the school’s procedures for reporting bullying, harassment and sexual abuse. Parents should ask about how teachers manage supervision during breaks or other occasions where children may be less well unsupervised

    • advocating for comprehensive sex education at your school: when parents are involved in sex education it leads to better outcomes for children. Check what your school covers in the curriculum. Ask about what supports are available to parents, and how you can be involved

    • getting involved in your child’s social world: knowing who your child’s friends are and staying connected with teachers can offer insight into troubling dynamics. Create opportunities for your child to talk about their friendships and school experiences regularly. And as they start navigating the digital world, it’s even more important to know who they are engaging with

    • teach assertiveness and confidence: find ways to empower your child to speak up for themselves when they are unsure, or something feels wrong. Don’t leave this up to a class teacher to deal with in respectful relationship education. At home, you can encourage assertiveness in expressing their preferences and boundaries. You can also model how to stand up to peer pressure. Children can learn and be encouraged to say simple phrases such as, “stop, I don’t like it” or “no, I don’t want to”.

    If there is a problem

    If you do come across an issue or problem, try and work with your school. Despite your distress, try not to be adversarial – rather pitch your conversation to the teacher or principal as “How can I help us work through this together?”

    Parental involvement in education, can reduce the risk of child sexual abuse. If parents and schools can work together, they are more likely to be effective in keeping children safe.

    Prevention requires vigilance, communication and support from both parents and schools. Parents play a crucial role in shaping their child’s understanding of what’s OK, what’s harmful, as well as boundaries, safety and consent.

    By having ongoing conversations, staying informed, and working with schools, parents are the first step to creating safety for children – and supporting them if something goes wrong.

    Daryl Higgins receives funding from the Australian Research Council, the National Health and Medical Research Council and a range of government departments, agencies, and service providers, including Bravehearts. He was a Chief Investigator on the Australian Child Maltreatment Study.

    Gabrielle works with the Australian Child Maltreatment Study (ACMS) team as part of her PhD Candidature. She has also previously worked for Bravehearts in various roles, including for the Turning Corners program, which provides support to young people who have displayed harmful sexual behaviours.

    ref. With reports of students abusing peers in primary schools, how can parents help keep their kids safe? – https://theconversation.com/with-reports-of-students-abusing-peers-in-primary-schools-how-can-parents-help-keep-their-kids-safe-241786

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Draft guidelines for ‘forever chemicals’ have been released. Here’s what it means for drinking water safety in Australia

    Source: The Conversation (Au and NZ) – By Ian Musgrave, Senior lecturer in Pharmacology, University of Adelaide

    Alexander_Safonov/Shutterstock

    The Australian National Health and Medical research Council (NHMRC) has today released draft guidelines for acceptable levels of per- and polyfluoroalkyl substances, or PFAS, in drinking water.

    PFAS chemicals are also known as “forever chemicals”, because they don’t break down easily and can persist in the environment, including drinking water supplies.

    The new guidelines – which are not mandatory but will inform state and territory policy – are expected to be finalised in April 2025. They propose a reduction in the maximum levels previously considered safe for four key PFAS chemicals: PFOS, PFOA, PFHxS and PFBS.

    Continually scrutinising and updating our PFAS regulations is important to ensure Australians’ safety. However, these updated guidelines are unlikely to have a significant impact on Australia’s drinking water. The majority of potable water supplies in Australia either have no detectable PFAS, or have levels already below the new limits.

    What are PFAS chemicals?

    PFAS are highly fat-soluble compounds that are very slow to break down. They are basically long chains of carbon atoms studded with fluorine molecules.

    PFAS chemicals are inert, water-repellent and heat-resistant. These properties make them ideal for industrial usage and they have been used in firefighting foams and fire-retardant material. They have also been used in common household items such as nonstick pans and stain-resistant fabrics.

    PFAS chemicals are very slow to break down.
    Gorodenkoff/Shutterstock

    Unfortunately, their useful industrial stability means they persist in the environment and can accumulate in the human body. It can take five years for half an ingested dose of PFAS to be removed.

    Given PFAS chemicals have the potential to mimic the body’s own fats, there has been concern they could harm our health if sufficient amounts accumulated in the body.

    What sorts of health effects are they linked to?

    The buildup of a chemical that’s hard to remove from our bodies is always of concern. Despite this, the potential health risks appear to be low. In 2018 the Australian Expert Health Panel for PFAS looked in detail at the evidence.

    One of the largest concerns was PFAS chemicals’ ability to increase levels of cholesterol in the blood, potentially increasing heart disease risk. However, studies of people who have been chronically exposed to significant levels of PFOA have not shown statistically significant increases in heart disease.

    In 2018, the report from Australia’s expert health panel stated:

    Evidence to date does not establish whether PFAS at exposure levels seen in Australia might increase risks of cardiovascular disease… Established risk factors … are likely to be of a much greater magnitude than those potentially caused by PFAS.

    Cancer has also been a concern. However the expert panel found no consistent evidence that PFAS chemicals are associated with cancer. One study even found exposure to PFOA decreased the incidence of bowel cancer.

    However, the impact of PFAS on human health is continuously reviewed as new evidence comes to light.

    Why has Australia revised its drinking water guidelines?

    Australia began to phase out PFAS chemicals in the early 2000s. Since then, the levels of PFAS detected in the Australian population have steadily dropped.

    Now that industrial use is being phased out, the main way we are exposed to PFAS is through things like persistent environmental contamination. While drinking water is not a major source of PFAS, water can be contaminated from environmental sources, for example, if contaminated dust or ground water makes its way into reservoirs.

    Most drinking water levels in Australia either have no detectable PFAS or are already below the new levels.
    Juergen_Wallstabe/Shutterstock

    The Australian Drinking Water Guidelines provide limits for how much PFAS is allowed to be in our drinking water.

    The NHMRC periodically reviews the health evidence around PFAS used to develop these guidelines, which were last updated in 2018. The latest review looks at additional evidence available since then.

    A few developments were of particular interest in this review: studies about the influence of PFAS on thyroid function. Altering thyroid function can be problematic because thyroid hormones regulate our metabolism, growth and development.

    The International Agency for Cancer Research’s (IARC) recent ruling on PFAS and cancer also needed to be investigated. The IARC has classified PFOS – one of the four key chemicals Australia is regulating – as “possibly carcinogenic to humans”. However the IARC noted there was “inadequate” evidence PFOS directly causes any type of cancer in people.

    This agency can rule on the probability that a chemical can cause cancer under any possible exposure, no matter how extreme. But it doesn’t evaluate the risk of cancer from ordinary exposure.

    This means the NHMRC needed to reevaluate the evidence that the levels present in drinking water would constitute a risk.

    What are the new PFAS limits?

    The NHRMC considered evidence about PFAS exposure in animal studies, and by looking at human epidemiology.

    In studies involving animals, the NHMRC review paid particular attention to what concentration of PFAS exposure had no effect on their health. This threshold is used to determine limits for humans, by adding a safety buffer usually a hundred times lower than the level that was safe for animals.

    The limits are set are carefully considering the evidence about impact on human health, as well as evaluating how much PFAS exposure is likely from sources beyond drinking water, such as food and inhaled dust.

    The proposed limits are:

    Note: PFOS and PFHxS are now regulated separately.
    NHMRC

    These guidelines are unlikely to have a significant impact on health. As the NHMRC report shows, majority of potable water supplies in Australia have no detectable PFAS, or levels are already below these new limits.

    For example, drinking water sampling for WaterNSW found PFOS levels were between 1.2ng/L and undectable. Similar results were found for PFHxS (between 1.4 and 0.1ng/L) and PFOA (basically undetectable).

    While the concentration of PFAS in bores near contamination sites are higher, these are typically not used as sources of drinking water.

    The Australian guidelines differ from some international guidelines. The draft guidelines note that different jurisdictions place different weighting on animal and human evidence, and this will affect these regulatory levels.

    The draft guidelines are now open to public consultation, with submissions closing on November 22 2024. Final guidelines are expected to be released in April 2025.

    Ian Musgrave has received funding from the National Health and Medical Research Council to study adverse reactions to herbal medicines and has previously been funded by the Australian Research Council to study potential natural product treatments for Alzheimer’s disease. He has collaborated with SA Water on studies of cyanobacterial toxins and their implication for drinking water quality.

    ref. Draft guidelines for ‘forever chemicals’ have been released. Here’s what it means for drinking water safety in Australia – https://theconversation.com/draft-guidelines-for-forever-chemicals-have-been-released-heres-what-it-means-for-drinking-water-safety-in-australia-241773

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Australia: Update: Serious crash at Kapunda

    Source: South Australia Police

    Three people are being treated in hospital following a serious crash at Kapunda this afternoon.

    Just after 2.30pm on Monday 21 October, Police responded to a two-car crash on Thiele Highway.

    The driver of a Honda SUV, a 54-year-old local woman, was taken to hospital where she is being treated for serious injuries.  The passenger, a 56-year-old woman from Kapunda, was flown to hospital where she is being treated for serious injuries.

    The driver of a Toyota Kluger, a 38-year-old local woman, and single occupant of the car suffered minor injuries and was taken to hospital.

    Both cars were towed from the scene and police are investigating the incident.

    The highway was closed for a few hours but has since reopened.

    MIL OSI News

  • MIL-OSI Global: A new ‘race science’ network is linked to a history of eugenics that never fully left academia

    Source: The Conversation – UK – By Lars Cornelissen, Academic Editor, Radboud University

    Antonio Marca/Shutterstock

    The Guardian and anti-fascist group Hope Not Hate have revealed the existence of a new network of far-right intellectuals and activists in an undercover investigation. Called the Human Diversity Foundation (HDF), this group advocates scientific racism and eugenics. Although it presents itself as having a scientific purpose, some of its figureheads have political ambitions in Germany and elsewhere.

    Research shows these kinds of groups are nothing new and are linked to eugenics groups that have been active since the second world war. Defending the scientific legitimacy of eugenics, these organisations worked to keep a discredited intellectual tradition alive.

    Although it has been debunked by decades of research evidence, eugenics once enjoyed a reputation as a credible science since it emerged in the late 19th century.

    First coined by Francis Galton, a prominent Victorian statistician and evolutionary theorist, the term eugenics refers to the study of what Galton considered favourable and unfavourable genetic patterns within the population. Galton believed that the principles of evolutionary theory could be applied to the human species and used to intervene in its genetic fitness.

    Galton and other early eugenicists advocated policies that would ensure that groups they believed held “desirable” traits, such as high intelligence, creative ability, or productivity, could reproduce in greater numbers than groups with less favourable genetics. Some even believed that “undesirable” groups should be prevented from reproducing, through forced sterilisation or abortion.

    Ruling elites used eugenics to justify brutal treatment of disabled people, ethnic minorities, colonial populations, and LGBTQ+ people.

    In the 1930s these ideas came to form the bedrock of Nazi race doctrine. Eugenics was a key component of Nazism and shaped both formal fascist ideology and how the Nazi regime treated its victims.

    Before the second world war, many researchers regarded eugenics as a legitimate science. But in the aftermath of the war came a shift in attitudes, and scientists and society came to view eugenics as scientifically false and morally objectionable.

    Instead of disappearing from academia, however, eugenics merely retreated into the
    margins. Racial research became the focus of a handful of groups intent on keeping
    the eugenics tradition alive.

    Though they operated on the fringes of academia, these groups received financial support from private donors. The most prominent of these donors was the Pioneer Fund, a charity established in 1937 to support race science and white supremacy in the US and elsewhere.

    These groups were close-knit. United by a shared sense of exclusion from the
    academic mainstream, the people involved were prolific writers and together
    generated a large body of work. They inflated their own citation counts by frequently referencing each other’s work and, in this way, established the impression of scientific rigour.

    Pseudoscientific journals

    Seeking to salvage the reputation of eugenics as a legitimate science, these groups
    tended to cluster around journals and periodicals.

    Chief among these was Mankind Quarterly, established in 1961 by a group called the International Association for the Advancement of Ethnology and Eugenics (IAAEE). Some decades later ownership of the journal was transferred to the Ulster Institute for Social Research, a eugenicist think tank founded and directed by Richard Lynn. Lynn is widely considered the intellectual figurehead of 21st-century eugenics.

    The Mankind Quarterly quickly became known as a bastion of scientific racism. It published work by notorious pseudoscientists, neo-fascists, and such controversial political figures as former British MP Enoch Powell, remembered for appealing to racial hatred in his speeches.

    Other similar journals emerged in the following decades. In France, Nouvelle École (“New School”) was established in 1967 by a white nationalist group. In Germany, Neue Anthropologie (“New Anthropology”) was first published in 1973.

    These publications were part of the same networks. Their editors received funding from the same sources, including the Pioneer Fund, they published translations of each other’s articles, and their editorial boards overlapped.

    Eugenics today

    Reported to have developed out of the Pioneer Fund and to have taken ownership of Mankind Quarterly, the HDF is the successor to earlier groups like the IAAEE and the Ulster Institute.

    Today, the eugenics movement is experiencing a period of uncertainty following the
    death of Richard Lynn in July 2023. When he died, Lynn was the director of the Pioneer Fund and the editor-in-chief of Mankind Quarterly. Organisations like HDF, led by people who have worked closely with Lynn, are trying to fill that void.

    Whether the HDF will survive public scrutiny remains to be seen. But the broader networks from which it emerged are arguably stronger than at any previous moment in post-war history, facilitated by the rise of the far right and online extremism. All of which means it has never been more important to remember the tradition’s history.

    Lars Cornelissen does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. A new ‘race science’ network is linked to a history of eugenics that never fully left academia – https://theconversation.com/a-new-race-science-network-is-linked-to-a-history-of-eugenics-that-never-fully-left-academia-241646

    MIL OSI – Global Reports

  • MIL-OSI Global: Horrifying black sows and ghostly apparitions: how the magic and mystery of Wales come alive in winter

    Source: The Conversation – UK – By Mari Ellis Dunning, Associate Lecturer at the School of Languages and Literature and PhD Candidate, Aberystwyth University

    Would you dare let the Mari Lwyd in to your home? Bob Pool/Shutterstock

    For centuries, midway between the autumn equinox and winter solstice, the Welsh people have celebrated Calan Gaeaf on November 1. Nos Galan Gaeaf or “the evening before the first day of winter”, falls a day before, which the western world now recognises as Halloween.

    A time of year filled with monsters and ghouls, here are five spooky winter customs and beliefs unique to Wales and its people.

    1. Hwch Ddu Gwta

    On Nos Galan Gaeaf, the horrifying hwch ddu gwta, or “tailess black sow”, would make its annual appearance. Usually a man draped in cloth or animal hide rising from dwindling fire embers, the hwch ddu would chase the village children home.

    As the fire died and the children anticipated the materialisation of the black sow, they would often chant a spooky verse, like: “Adref, adref am y cynta’, Hwch Ddu Gwta a gipio’r ola,” (“Home, home, at once, the tailess black sow shall snatch the last one.”)

    Juliette Wood, scholar of Celtic folklore, says the macabre ritual has its roots in beliefs about the souls of the dead, people and animals. But on a practical level, it was probably just an effective way of getting children to bed and teaching them about the dangers of straying from the group.

    2. Fortune telling

    Fortune telling would have been rife at this time of year. Questions over who was next to be married, and who may meet an untimely death, were particularly popular. Women looking for love may have wandered around the bounds of a church, chanting “here is the sheath, where is the knife”, hoping to hear the name of the person they would marry as a response.

    In some parts of the country, stwmp naw rhyw, a mash made of nine different root vegetables with milk, butter, salt and pepper, would have a wedding ring placed at the centre. Whoever found the ring in their serving would be the next to be married.




    Read more:
    Why so few witches were executed in Wales in the middle ages


    Though these particular practices were performed at Calan Gaeaf, the widespread belief in fortune telling certainly wasn’t unique to this time of year, nor Wales, of course.

    But Wales does have a long history of reliance on wise-women and soothsayers. Many Welsh people even regularly turned to the church for charms and curses.

    3. Y Ladi Wen and other apparitions

    Regarded as a seasonal boundary, Nos Galan Gaeaf was considered the most ominous of the three spirit nights. The others were Nos Galan Mai, which heralds the beginning of summer, and Noswyl Ifan, known also as the summer solstice.

    As Nos Galan Gaeaf was a time to say goodbye to the recently deceased, the spirits were said to roam freely. Ghosts of the dead were believed to be seen at midnight on every stile, for example. And it makes sense that ghosts were to be found atop stiles. The fact that unbaptised children used to be buried at boundary fences suggests that these lines were liminal places and therefore the favourite perches of ghosts and apparitions.

    Perhaps the most well known of these ghosts was Y Ladi Wen (the White Lady). Y Ladi Wen was an apparition who could be found haunting locations where violent deaths had occurred. She was also said to warn children about their bad behaviour.

    4. Mari Lwyd

    The Mari Lwyd is traditionally a Christmas and New Year wassailing folk custom popular in south Wales. It dates back to the 18th century and involves a horse’s skull placed on a pole, draped in ribbons.

    A person hiding beneath a white sheet would carry the pole and snap the horse’s jaw open and shut. A procession led by Mari would go from house to house, where the group would sing verses asking to be let inside, prompting the hosts to improvise a rebuttal in verse.

    The Mari Lwyd’s weird and somewhat terrifying appearance has led to her appearing earlier in the season, and adopted in different parts of Wales and as far afield as the US and Australia.

    5. Gwrachod Powys

    Perhaps the most sinister and spooky custom is one that could be found in Powys, mid-Wales.

    Men would wander around in gangs wearing sheep skin, old ragged clothes and masks, drinking heavily and demanding gifts. They were called “gwrachod” (meaning hags or witches), probably in allusion to the Celtic belief that fiends, witches and faeries carried out their harmful and destructive tasks at night.




    Read more:
    Nos Galan Gaeaf: the traditional Welsh celebration being eclipsed by modern Halloween


    In the north, the name “gwrachod” was also used to describe men and women who went about their neighbours’ houses dressed in each other’s clothes and wearing masks.

    During this Christmas tradition, which could be seen as a combination of the Mari Lwyd and the gwrachod, members of the party would dance, cheer and perform “antic diversions” in exchange for good cheer, ale, apples and nuts.

    As October draws to a close and we creep towards the darkest days of midwinter, keep your wits about you. You might just end up face to face with a horrifying sow covered in fire ash, or confronted by a ghostly lady draped in white.

    Mari Ellis Dunning does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Horrifying black sows and ghostly apparitions: how the magic and mystery of Wales come alive in winter – https://theconversation.com/horrifying-black-sows-and-ghostly-apparitions-how-the-magic-and-mystery-of-wales-come-alive-in-winter-238725

    MIL OSI – Global Reports

  • MIL-OSI USA: Kamlager-Dove Joins Democratic Efforts to Put a Spotlight on Project 2025 with New Documentary Style Video Series

    Source: United States House of Representatives – Congresswoman Sydney Kamlager California (37th District)

    New Documentary Video Series Details Project 2025’s Threat to Reproductive Freedom, Workers’ Rights, Environmental Protections, Public Education, and American Democracy

    WASHINGTON, D.C. – Congresswoman Kamlager-Dove (CA-37) joined Congressman Dan Goldman (NY-10) for a five-part video documentary series detailing Project 2025’s threat to democracy, reproductive freedom, workers’ rights, environmental regulation, and public education. The series will feature interviews with Representatives Kamlager-Dove, Goldman, and 11 of their House Democratic colleagues from across the country, as well as American Federation of Teachers President Randi Weingarten, Planned Parenthood Vice President Karen Stone, NY League of Conservation Voters President Julie Tighe, and Accountable.US President Caroline Ciccone. As Vice Ranking Member of the House Natural Resources Committee, Congresswoman Kamlager-Dove will highlight the devastating impacts Project 2025 would have on the environment.

    Watch the Trailer for the Series Here

    “Project 2025 poses a grave threat, not just to our democracy but to our planet, too,” said Congresswoman Kamlager-Dove. “This hostile takeover of the federal government would depose dedicated public servants and install Trump loyalists and climate denialists at the EPA, enabling Republicans to slash environmental protections at the behest of Big Oil. But Project 2025 doesn’t stop at encouraging the world’s worst polluters—this agenda also seeks to discontinue air quality, clean energy, and decarbonization programs by overturning the Inflation Reduction Act, harming the health of our communities and the environment, eliminating clean energy jobs, and exacerbating the climate crisis. With Project 2025, Republicans have shown that they will continue to put polluters over people—this plan must be stopped.”

    As an increasing share of Americans consume their news from non-traditional sources on Instagram, YouTube, and other social media sites, Congressman Goldman’s series marks an effort by Democrats to reach audiences where they are in a diversified media landscape. Across various social media platforms, the first two videos of the series have received over 400,000 views, signaling the potential of this new format to reach large numbers of Americans.

    “Project 2025’s shocking plan to gut checks and balances, restrict abortion access, decimate public education, pollute our air and water, and endanger American workers for the sole benefit of Republican authoritarian extremists is utterly reprehensible and incredibly dangerous,” Congressman Dan Goldman said. “This document is a detailed guide for how a second Trump administration will dismantle our democracy, and it is critical that the American people understand exactly how Trump intends to do it. I am proud to be joined by so many of my colleagues and policy leaders to expose this radical plan to reshape American society as we know it.”

    Congressional Equality Caucus Co-Chair Becca Balint said, “Project 2025 is a far-right plan by Trump allies to impose Christian nationalist values onto every American. It goes completely against our American values to promote a strong, resilient democracy; in fact this plan aims to erode our democratic institutions by gutting checks and balances and seizing power for the presidency. Project 2025 is nothing short of an anti-freedom and anti-equality agenda: it further attacks reproductive rights and disproportionately harms communities of color and our LGBTQI+ community. Project 2025 would increase gun violence rather than protect our communities. And its plan to abolish the Department of Education would hurt millions of families whose kids go to public schools, teachers who are already underpaid, and students. It’s dangerous and we must take it extremely seriously. I’m proud to be a part of this series to help Americans understand the threat it poses to our values and democratic norms.”

    Pre-K and Child Care Caucus Co-Chair Suzanne Bonamici said, “Project 2025 is a blueprint for MAGA extremists to undermine government and destroy programs and policies that support working families. It’s the product of people who held top positions in the previous administration and special interest groups that hold significant influence over the GOP’s agenda. I’m working with my colleagues to counter this extremist plan and to educate Americans about its potentially devastating effects.”

    Pro-Choice Caucus Task Force Chair Judy Chu said, “Trump and his allies’ Project 2025 is a 900 page comprehensive plan for MAGA Republicans to grab power for themselves, enrich their allies, and shatter our already fragile democracy. Project 2025 touches on every agency in the federal government and is January 6th extremism crafted into a governing ideology: fire tens of thousands of civil servants to replace them with partisan loyalists, abolish checks and balances, chip away at church-state separation, and impose a far-right agenda that rips away our freedoms and takes money out of pockets. It’s so critical for House Democrats to work together to shine a light on as many details of this plan as possible so we can equip ourselves and the American people with the information we need to fight back and make certain we put systems into place to protect us from these extreme policies.”

    Freshman Leadership Representative Jasmine Crockett said, “Let me make it plain: Project 2025 is the GOP’s attack plan against the American constitution. It doesn’t just undermine the progress made in this country for women, people of color, and LGBTQIA folks over the past century; it undermines the very principles of self-government that our country was founded on. If our Founding Fathers were to read Project 2025, they would have thought it was sent over by King George himself. It’s a blueprint for authoritarianism, a blueprint for monarchy, and a blueprint for a right-wing dictatorship in America that will end our democratic experiment for good. If the majority of Americans were to read and understand this plan – a plan authored by hundreds of members of former President Trump’s administration – they would reject it as un-American and dangerous. Thank you to Congressman Goldman for bringing us together to break down Project 2025 from every angle – no matter how engaged you are, you can still learn something from this series.”

    Homeland Security Subcommittee on Counterterrorism, Intelligence and Law Enforcement Ranking Member Seth Magaziner said, “Donald Trump’s Project 2025 will hand a future Trump administration nearly unlimited power to ban abortion, take away healthcare for people with preexisting conditions, and rip away the freedoms that Americans have fought hard for. Trump’s Project 2025 is dangerous, cruel, and out-of-touch with the needs of the American people. We will not let Trump and Congressional Republicans take us back.”

    House Bipartisan Task Force for Combating Antisemitism Co-Chair Kathy Manning said, “Project 2025 is simply a more detailed blueprint of Donald Trump’s extreme MAGA agenda that promises to roll back Americans’ basic rights and freedoms. Because of Donald Trump and the three extreme MAGA Justices he appointed to the Supreme Court to overturn Roe. v. Wade, one in three women of reproductive age lives in a state with a Trump abortion ban. Now, his extreme Project 2025 plans will attack reproductive freedoms even further by targeting abortion pills and contraception coverage, and threatening IVF treatments. Project 2025 would also ban the mailing of abortion medications, equipment, or materials, effectively creating a nationwide, backdoor abortion ban — without the approval of Congress.”

    Labor Caucus Co-Founder Donald Norcross said, “Project 2025 is a 920-page manifesto designed to tell every American how to live their life. If enacted into law, Project 2025 would destroy the 250-year-old system of checks and balances that make up our democracy and completely dismantle almost every labor standard that protects workers. As a union electrician and co-chair of the Labor Caucus, it pains me to see a document that would strip away worker protections and fair labor practices that working families have been fighting for decades. I’m proud to join Rep. Goldman in this video series to help explain the threat Project 2025 poses to American values, ideals, and freedoms.”

    Subcommittee on the Weaponization of the Federal Government Ranking Member Stacey Plaskett said, “Project 2025 is the playbook for Donald Trump’s second term, which will ensure that the few have power over the many and that the rule of law as we know it, is gone. It is a plan to ensure that the federal government no longer acts as a check on the greed and desire for absolute power that Trump and his cohort of friends share. In every way, Project 2025 will make Americans less safe and less free. Republicans know that these ideas are not popular with the people of America and that’s why they hide from the facts, obfuscate the truth and distract the public’s attention with wild claims to vilify minorities and keep us divided. It is imperative that we all do our part to ensure that Donald Trump is not allowed to enforce the clear and present danger that the Project 2025 master plan represents to American democracy.”

    American Federation of Teachers President Randi Weingarten said, Project 2025 is about institutionalizing Trumpism. It’s about going after educational opportunity, economic opportunity and equal opportunity. It’s about going after the legitimacy of elections. This is the stuff of demagogues and dictators, not democracies. This is not the promise of America. We can and must do better than this—for the sake of our families and the future of our republic.”

    Accountable.US President Caroline Ciccone said, “Project 2025 isn’t about serving the people; it’s about ensuring that political loyalty becomes the guiding rule. They want to replace our government’s independent watchdogs with partisan loyalists, dismantling checks and balances to consolidate power in the executive branch. With a captured Supreme Court and a weaponized Department of Justice, the next conservative administration would have all the tools they needed to drive America closer and closer to their idealized far-right dystopia, at the cost of our personal freedoms.”

    A third of all U.S adults say they regularly get their news from Facebook or YouTube, and nearly 20% report preferring to receive their news from social media. As more Americans turn to non-traditional platforms such as social media, YouTube, and online searches to stay informed Congressman Goldman is focused on ensuring that important information reaches all Americans in this rapidly transforming media landscape.

    In addition to Representatives Kamlager-Dove and Goldman, the following members of Congress are featured in the series: Congressional Equality Caucus Co-Chair Becca Balint (VT-AL), Pre-K and Child Care Caucus Co-Chair Suzanne Bonamici (OR-01), Pro-Choice Caucus Task Force Chair Judy Chu (CA-28), Freshman Leadership Representative Jasmine Crockett (TX-30), Democratic Women’s Caucus Chair Lois Frankel (FL-22), Dads Caucus Founder and Chair Jimmy Gomez (CA-34), Homeland Security Subcommittee on Counterterrorism, Intelligence and Law Enforcement Ranking Member Seth Magaziner (RI-02), House Bipartisan Task Force for Combating Antisemitism Co-Chair Kathy Manning (NC-06), Labor Caucus Co-Founder Donald Norcross (NJ-01), Subcommittee on the Weaponization of the Federal Government Ranking Member Stacey Plaskett (VI-AL), and Sustainable Energy and Environment Coalition Co-Chair Paul Tonko (NY-20).

    Project 2025 is a comprehensive plan for the next conservative president to swiftly enact the most anti-democratic and archconservative agenda in the history of this country. It lays the groundwork for Donald Trump to seize power, gut checks and balances, and enact a radical agenda. It touches on every department and agency within the federal government.

    The Heritage Foundation, a right-wing think tank funded by shady dark money interests, has been plotting Project 2025, an unprecedented scheme to help the next conservative president quickly enact the most radical agenda in the history of the country. The plan is laying the groundwork for a new president to seize power and enact broad changes that are deeply unpopular with the American people. This includes vastly expanding the ability of the president to purge civil servants who are not sufficiently loyal to this extreme right-wing agenda.

    • Within the first 180 days of taking office, the plan calls for attacks on reproductive rights, the rule of law, and the expansion of the cruel and inhumane immigration policies from the Trump administration. Project 2025 is a comprehensive plan that would touch every department of the federal government and fundamentally reshape the lives of the American people. The Project’s four-pronged strategy that includes:
      • A laundry list of extreme policies to be enacted across the federal government;
      • A blueprint for how to use existing authorityor expand the power of the presidencyto implement right-wing policy proposals;
      • A database of right-wing ideologues who wholeheartedly endorse this power grab and far-right policies;
      • Training for staff so they can more efficiently enact this extreme agenda.

    While Project 2025 is being run out of the Heritage Foundation, its advisors include former Trump White House aides like Stephen Miller, and more than half the groups supporting the effort have received $21.5 million in funding from Leonard Leo’s dark money network.

    Congresswoman Kamlager-Dove is a member of the Stop Project 2025 Task Force.

     

    ###

    MIL OSI USA News

  • MIL-OSI USA: Kamlager-Dove, Kim, Coons, and Tillis to Introduce Bicameral Legislation to Promote Protection of International Digital Freedom

    Source: United States House of Representatives – Congresswoman Sydney Kamlager California (37th District)

    WASHINGTON, D.C. – Today, Congresswomen Sydney Kamlager-Dove (CA-37) and Young Kim (CA-40), alongside Senators Chris Coons (DE) and Thom Tillis (NC), announced plans to introduce the bicameral Advancing Digital Freedom Act of 2024, which would equip the U.S. State Department with the authorities to elevate digital freedom as a cornerstone of U.S. foreign policy and support its critical role in advancing democratic governance around the world.

    “Digital technology has both benefits and drawbacks when it comes to advancing democracy,” said Congresswoman Kamlager-Dove. “It can enable citizens to access information, share ideas, and organize while simultaneously allowing for authoritarian regimes to spread propaganda, enhance surveillance, and stifle free speech. We must ensure that digital technologies are used to strengthen democracy, not dismantle it. It is crucial for the United States to develop a comprehensive strategy to safeguard digital freedom worldwide and work with partners to implement this plan. Promoting human rights and democracy at home and abroad must remain a bipartisan issue, and I am proud to advance these priorities with a bipartisan, bicameral group of congressional colleagues.”

    “The Unholy Alliance, including the People’s Republic of China, Russia, Iran, and North Korea, relies on abusive surveillance technologies to restrict access to information and the outside world and to maintain their grip on power,” said Congresswoman Young Kim, Chair of the House Foreign Affairs Subcommittee on the Indo-Pacific. “To remain a global human rights leader, the United States cannot stand idly by as these authoritarian regimes use digital technologies and platforms to suppress innocent civilians, religious minorities, and political dissenters. I am proud to join Representative Kamlager-Dove and Senators Coons and Tillis to lead this bipartisan, bicameral effort to protect the right to international digital freedom. I’ll keep fighting to ensure the United States promotes global human rights and protects freedom-loving people around the world.”

    “As a global leader of human rights, the United States must deter authoritarian and illiberal states that are using advanced technologies to threaten human rights alongside our own national security,” said Senator Coons. “Protecting digital freedom abroad is a cornerstone of American foreign policy for the modern age, and that is why we must cooperate with like-minded countries to develop and deploy emerging technology in a manner that respects democracy and rule of law. As Co-Chair of the Senate Human Rights Caucus, I’m confident that this bill will help protect digital freedoms and counter global misinformation and disinformation in partnership with our allies.”

    “With increasing cyber threats and attacks on the horizon than ever before, working with our allies to counter them is all the more important,” said Senator Tillis. “Protecting and promoting digital freedom across the globe must be a priority, which is why I look forward to introducing this bipartisan legislation to ensure the Department of State continues to prioritize this as a cornerstone of U.S. foreign policy.”

    The right to freedom of expression has become a fault line between pro-democracy groups and authoritarian governments. Digital platforms, including social media, have been crucial tools for movements such as the Mahsa Amini protests in Iran or the Umbrella Movement in Hong Kong. However, autocratic governments have attempted to stifle these efforts by cracking down on digital freedom. Russia and China deploy digital tools to identify and silence dissidents, Iran routinely blocks access to thousands of websites conveying political content, and North Korea and Venezuela coordinate disinformation campaigns to undermine citizens’ access to credible information. To address such threats to digital freedom, the Advancing Digital Freedom Act would strengthen the United States’ role in leading efforts to ensure technology is used to uphold human rights, democratic values, and the rule of law.

    Specifically, the bill would:

    • Elevate digital freedom as a foremost foreign policy priority of the United States;
    • Empower the Coordinator for Digital Freedom in the State Department’s Bureau of Cyberspace and Digital Policy to lead global efforts to protect digital freedom, counter disinformation and misinformation, and advance democratic governance in the digital space;
    • Encourage the State Department to engage with foreign governments, nongovernmental organizations, and other actors to coordinate efforts to defend digital freedom against digital authoritarianism; and
    • Require the Bureau of Cyberspace and Digital Policy to submit an annual report to the Senate Foreign Relations Committee and the House Foreign Affairs Committee on the state of global digital freedom, including analysis of emerging and concerning trends impacting digital freedom.                                                                                                              

    The text of the bill is available here.

    ###

    MIL OSI USA News

  • MIL-OSI USA: Kamlager-Dove, Salazar Introduce Legislation to Simplify Visa Processing

    Source: United States House of Representatives – Congresswoman Sydney Kamlager California (37th District)

    WASHINGTON, D.C. – Today, Congresswoman Sydney Kamlager-Dove (CA-37) introduced H.R. 9545, the Visa Processing Improvement and Paperwork Reduction Act alongside Representative María Elvira Salazar (FL-27).

    Currently, our visa application and processing systems are outdated, duplicative, and waste crucial resources. This legislation will save the State Department countless hours of labor and thousands of dollars in postage and paper by keeping federal communications about visa applications online. It will also reduce requirements on families to mail physical copies of documents that have already been submitted online.

    The Visa Processing Improvement and Paperwork Reduction Act streamlines the visa processing system by eliminating the requirement to mail all signed communications from the applicant and from the Agency that are already sent electronically.

    “Excessive visa wait times have long plagued our broken immigration system, causing unnecessary heartache for many applicants,” said Congresswoman Kamlager-Dove. “Digitizing more aspects of the visa application process will eliminate redundant paperwork, speeding up visa processing times and reducing burdens on applicants. Simple reforms like this legislation can have outsized impacts on the immigration process. I am proud to partner with Representative Salazar to advance commonsense solutions in our immigration system.”

    “We have an opportunity to both improve government efficiency and reduce the burden on individuals navigating our complex immigration system,” said Representative Salazar. “The Visa Processing Improvement and Paperwork Reduction Act will save the State Department tons of time and money so they can process visa applications quicker and easier.”

    Previously, Reps. Kamlager-Dove and Salazar collaborated on the GRATEFUL Act, which was signed into law in 2023. This policy provided visas for locally employed U.S. embassy staff to immigrate to the U.S. after a career of service to the United States. These staff are critical to our diplomacy abroad, and securing this reform allows us to continue retaining and rewarding the best and brightest that serve the United States and advance our interests abroad.

    To read the full text of the bill, click here. To read a short summary of the legislation, click here.

    ###

    MIL OSI USA News

  • MIL-OSI Banking: Grandoreiro, the global trojan with grandiose ambitions

    Source: Securelist – Kaspersky

    Headline: Grandoreiro, the global trojan with grandiose ambitions

    Grandoreiro is a well-known Brazilian banking trojan — part of the Tetrade umbrella — that enables threat actors to perform fraudulent banking operations by using the victim’s computer to bypass the security measures of banking institutions. It’s been active since at least 2016 and is now one of the most widespread banking trojans globally.

    INTERPOL and law enforcement agencies across the globe are fighting against Grandoreiro, and Kaspersky is cooperating with them, sharing TTPs and IoCs. However, despite the disruption of some local operators of this trojan in 2021 and 2024, and the arrest of gang members in Spain, Brazil, and Argentina, they’re still active. We now know for sure that only part of this gang was arrested: the remaining operators behind Grandoreiro continue attacking users all over the world, further developing new malware and establishing new infrastructure.

    Every year we observe new Grandoreiro campaigns targeting financial entities, using new tricks in samples with low detection rates by security solutions. The group has evolved over the years, expanding the number of targets in every new campaign we tracked. In 2023, the banking trojan targeted 900 banks in 40 countries — in 2024, the newest versions of the trojan targeted 1,700 banks and 276 crypto wallets in 45 countries and territories, located on all continents of the world. Asia and Africa have finally joined the list of its targets, making it a truly global financial threat. In Spain alone, Grandoreiro has been responsible for fraudulent activities amounting to 3.5 million euros in profits, according to conservative estimates — several failed attempts could have yielded beyond 110 million euros for the criminal organization.

    In this article, we will detail how Grandoreiro operates, its evolution over time, and the new tricks adopted by the malware, such as the usage of 3 DGAs (domain generation algorithm) in its C2 communications, the adoption of ciphertext stealing encryption (CTS), and mouse behavior tracking, aiming to bypass anti-fraud solutions. This evolution culminates with the appearance of lighter, local versions, now focused on Mexico, positioning the group as a challenge for the financial sector, law enforcement agencies and security solutions worldwide.

    Grandoreiro: One malware, many operators, fragmented versions

    Grandoreiro is a banking trojan of Brazilian origin that has been active since at least 2016. Grandoreiro is written in the Delphi programming language, and there are many versions, indicating that different operators are involved in developing the malware.

    Since 2016, we have seen the threat actors behind Grandoreiro operations regularly improving their techniques to stay unmonitored and active for a longer time. In 2020, Grandoreiro started to expand its attacks in Latin America and later in Europe with great success, focusing its efforts on evading detection using modular installers.

    Grandoreiro generally operates as Malware-as-a-Service, although it’s slightly different from other banking trojan families. You won’t find an announcement on underground forums selling the Grandoreiro package — it seems that access to the source-code or builders of the trojan is very limited, only for trusted partners.

    After the arrests of some operators, Grandoreiro split its codebase into lighter versions, with fewer targets. These fragmented versions of the trojan are a reaction to the recent law enforcement operations. This discovery is supported by the existence of two distinct codebases in simultaneous campaigns: newer samples featuring updated code, and older samples which rely on the legacy codebase, now targeting only users in Mexico — customers of around 30 banks.

    2022 and 2023 campaigns

    Grandoreiro campaigns commonly start with a phishing email written in the target country language. For example, the emails distributed in most of Latin America are in Spanish. However, we also saw the use of Google Ads (malvertising) in some Grandoreiro campaigns to drive users to download the initial stage of infection.

    Phishing emails use different lures to make the victim interact with the message and download the malware. Some messages refer to a pending phone bill, others mimic a tax notification, and son. In early 2022 campaigns, the malicious email included an attached PDF. As soon as the PDF is opened, the victim is prompted with a blurred image except for a part containing “Visualizar Documento” (“View Document” in Spanish). When the victim clicks the button, they are redirected to a malicious web page which prompts them to download a ZIP file. Since May 2022, Grandoreiro campaigns include a malicious link inside the email body that redirects the victim to a website that then downloads a malicious ZIP archive on the victim’s machine. These ZIP archives commonly contain two files: a legitimate file and a Grandoreiro loader, which is responsible for downloading, extracting and executing the final Grandoreiro payload.

    The Grandoreiro loader is delivered in the form of a Windows Installer (MSI) file that extracts a dynamic link library (DLL) file and executes a function embedded in the DLL. The function will do nothing if the system language is English, but otherwise the final payload is downloaded. Most likely, this means that the analyzed versions didn’t target English-speaking countries. There have also been other cases where a VBS file is used instead of the DLL to execute the final payload.

    Grandoreiro recent infection flow

    As for the malware itself, in August 2022 campaigns, the final payload was an incredibly big 414 MB portable executable file disguised with a PNG extension (which is later renamed to EXE dynamically by the loader). It masked itself as an ASUS driver using the ASUS icon and was signed with an “ASUSTEK DRIVER ASSISTANTE” digital certificate.

    In 2023 campaigns, Grandoreiro used samples with rather low detection rates. Initially, we identified three samples related to these campaigns, compiled in June 2023. All of them were portable executables, 390 MB big, with the original name “ATISSDDRIVER.EXE” and internal name “ATIECLXX.EXE”. The main purpose of these samples is to monitor the victims’ visits to financial institution websites and steal their credentials. The malware also allows threat actors to remotely control the victim machines and perform fraudulent transactions within them.

    In the campaign involving the discussed samples, the malware tries to impersonate an AMD External Data SSD driver and is signed with an “Advice informations” digital certificate in order to appear legitimate and evade detection.

    Implant impersonating AMD driver

    Digital certificate used by Grandoreiro malware

    In both cases, the malware is an executable that registers itself to be launched with Windows. However, it is worth noting that in the majority of Grandoreiro attacks, a DLL sideloading technique is employed, using legitimate binaries that are digitally signed to run the malware.

    The considerable size of the executables can be explained by the fact that Grandoreiro utilizes a binary padding technique to inflate the size of the malicious files as a way to evade sandboxes. To achieve this, the attackers add multiple BMP images to the resource section of the binary. In the example below, the sample included several big images. The sizes of the highlighted images are around 83.1 MB, 78.8 MB, 75.7 and 37.6 MB. However, there are more of them in the binary, and together all the images add ~376 MB to the file.

    Binary padding used by Grandoreiro

    In both 2022 and 2023 campaigns, Grandoreiro used a well-known XOR-based string encryption algorithm that is shared with other Brazilian malware families. The difference is the encryption key. For Grandoreiro, some magic values were the following:

    Date Encryption key
    March 2022 F5454DNBVXCCEFD3EFMNBVDCMNXCEVXD3CMBKJHGFM
    March 2022 XD3CMBKJCEFD3EFMF5454NBVDNBVXCCMNXCEVDHGFM
    August 2022 BVCKLMBNUIOJKDOSOKOMOI5M4OKYMKLFODIO
    June 2023 B00X02039AVBJICXNBJOIKCVXMKOMASUJIERNJIQWNLKFMDOPVXCMUIJBNOXCKMVIOKXCJ
    UIHNSDIUJNRHUQWEBGYTVasuydhosgkjopdf

    The various checks and validations aimed at avoiding detection and complicating malware analysis were also changed in the 2022 and 2023 versions. In contrast with the older Grandoreiro campaigns, we found that some of the tasks that were previously executed by the final payload are now implemented in the first stage loader. These tasks include security checks, anti-debugging techniques, and more. This represents a significant change from previous campaigns.

    One of these tasks is the use of the geolocation service http://ip-api.com/json to gather the target’s IP address location data. In a campaign reported in May 2023 by Trustwave, this task is performed by a JScript code embedded in an MSI installer before the delivery of the final payload.

    There are numerous other checks that have been transferred into the loader, although some of them are still present in the banking trojan itself. Grandoreiro gathers host information such as operating system version, hostname, display monitor information, keyboard layout, current time and date, time zone, default language and mouse type. Then the malware retrieves the computer name and compares it against the following strings that correspond to known sandboxes:

    • WIN-VUA6POUV5UP;
    • Win-StephyPC3;
    • difusor;
    • DESTOP2457;
    • JOHN-PC.

    Computer name validation

    It also collects the username and verifies if it matches with the “John” or “WORK” strings. If any of these validations match, the malware stops its execution.

    Grandoreiro includes detection of tools commonly used by security analysts, such as regmon.exe, procmon.exe, Wireshark, and so on. The process list varies across the malware versions, and it was significantly expanded in 2024, so we’ll share the full list later in this post. The malware takes a snapshot of currently executing processes in the system using the CreateToolhelp32Snapshot() Windows API and goes through the process list using Process32FirstW() and Process32NextW(). If any of the analysis tools exists in the system, the malware execution is terminated.

    Grandoreiro also checks the directory in which it is being executed. If the execution paths are D:programming or D:script, it terminates itself.

    Another anti-debugging technique implemented in the trojan involves checking for the presence of a virtual environment by reading data from the I/O Port “0x5658h” (VX) and looking for the VMWare magic number 0x564D5868. The malware also uses the IsDebuggerPresent() function to determine whether the current process is being executed in the context of a debugger.

    Last but not least, Grandoreiro searches for anti-malware solutions such as AVAST, Bitdefender, Nod32, Kaspersky, McAfee, Windows Defender, Sophos, Virus Free, Adaware, Symantec, Tencent, Avira, ActiveScan and CrowdStrike. It also looks for banking security software, such as Topaz OFD and Trusteer.

    In terms of the core functionality, some Grandoreiro samples check whether the following programs are installed:

    • CHROME.EXE;
    • MSEDGE.EXE;
    • FIREFOX.EXE;
    • IEXPLORE.EXE;
    • OUTLOOK.EXE;
    • OPERA.EXE;
    • BRAVE.EXE;
    • CHROMIUM.EXE;
    • AVASTBROWSER.EXE;
    • VeraCrypt;
    • Nortonvpn;
    • Adobe;
    • OneDrive;
    • Dropbox.

    If any of these is present on the system, the malware stores their names to further monitor user activity in them.

    Grandoreiro also checks for crypto wallets installed on the infected machine. The malware includes a clipboard replacer for crypto wallets, monitoring the user’s clipboard activity and replacing the clipboard data with the threat actor keys.

    Clipboard replacer

    2024 campaigns

    During a certain period of time in February 2024, a few days after the announcement of the arrest of some of the gang’s operators in Brazil, we observed a significant increase in emails detected by spam traps. There was a notable prevalence of Grandoreiro-themed messages masquerading as Mexican CFDI communications. Mexican CFDI, short for “Comprobante Fiscal Digital por Internet” is an electronic invoicing system administered by the Mexican Tax Authority (SAT — Servicio de Administración Tributaria). It facilitates the creation, transmission, and storage of digital tax documents, mandatory for businesses in Mexico to record transactions for tax purposes.

    In our investigation, we have acquired 48 samples associated not only with this instance but also with various other campaigns.

    Notably, this new campaign added a new sandbox detection mechanism, namely a CAPTCHA before the execution of the main payload, as a way to avoid the automatic analysis used by some companies:

    Grandoreiro anti-sandbox CAPTCHA

    It is worth noting that in the 2024 Grandoreiro campaigns, the new sandbox evasion code has been implemented in the downloader. Although the main sample still has anti-sandbox functionality too, if a sandbox is detected, it is simply not downloaded. Besides that, the new version also added detection of many tools to its arsenal, aiming to avoid analysis. Here is whole list of analysis tools detected by the newest versions:

    regmon.exe hopper.exe nessusd.exe OmniPeek.exe
    procmon.exe jd-gui.exe PacketSled.exe netmon.exe
    filemon.exe canvas.exe prtg.exe colasoft.exe
    Wireshark.exe pebrowsepro.exe cain.exe netwitness.exe
    ProcessHacker.exe gdb.exe NetworkAnalyzerPro.exe netscanpro.exe
    PCHunter64.exe scylla.exe OmniPeek.exe packetanalyzer.exe
    PCHunter32.exe volatility.exe netmon.exe packettotal.exe
    JoeTrace.exe cffexplorer.exe colasoft.exe tshark.exe
    ollydbg.exe angr.exe netwitness.exe windump.exe
    ida.exe pestudio.exe netscanpro.exe PRTG Probe.exe
    x64dbg.exe die.exe packetanalyzer.exe NetFlowAnalyzer.exe
    cheatengine.exe ethereal.exe packettotal.exe SWJobEngineWorker2x64.exe
    ollyice.exe Capsa.exe tshark.exe NetPerfMonService.exe
    fiddler.exe tcpdump.exe windump.exe SolarWinds.DataProcessor.exe
    devenv.exe NetworkMiner.exe PRTG Probe.exe ettercap.exe
    radare2.exe smartsniff.exe NetFlowAnalyzer.exe apimonitor.exe
    ghidra.exe snort.exe SWJobEngineWorker2x64.exe apimonitor-x64.exe
    frida.exe pcap.exe NetPerfMonService.exe apimonitor-x32.exe
    binaryninja.exe SolarWinds.NetPerfMon.exe SolarWinds.DataProcessor.exe x32dbg.exe
    cutter.exe nmap.exe ettercap.exe x64dbg.exe
    scylla.exe apimonitor.exe PCHunter64.exe x96dbg.exe
    volatility.exe apimonitor-x64.exe PCHunter32.exe fakenet.exe
    cffexplorer.exe apimonitor-x32.exe JoeTrace.exe hexworkshop.exe
    angr.exe x32dbg.exe ollydbg.exe Dbgview.exe
    pestudio.exe x64dbg.exe ida.exe sysexp.exe
    die.exe x96dbg.exe x64dbg.exe vmtoolsd.exe
    ethereal.exe fakenet.exe cheatengine.exe dotPeek.exe
    Capsa.exe hexworkshop.exe ollyice.exe procexp64.exe
    tcpdump.exe Dbgview.exe fiddler.exe procexp64a.exe
    NetworkMiner.exe sysexp.exe devenv.exe procexp.exe
    smartsniff.exe vmtoolsd.exe radare2.exe cheatengine.exe
    snort.exe dotPeek.exe ghidra.exe ollyice.exe
    pcap.exe procexp64.exe frida.exe pebrowsepro.exe
    cain.exe procexp64a.exe binaryninja.exe gdb.exe
    nmap.exe procexp.exe cutter.exe Wireshark.exe
    nessusd.exe regmon.exe hopper.exe ProcessHacker.exe
    PacketSled.exe procmon.exe jd-gui.exe SolarWinds.NetPerfMon.exe
    prtg.exe filemon.exe canvas.exe NetworkAnalyzerPro.exe

    These are some RAT features that we found in this version:

    • Auto-update feature allows newer versions of the malware to be deployed to the victim’s machine;
    • Sandbox/AV detection, still present in the main module, which includes more tools than previous versions;
    • Keylogger feature;
    • Ability to select country for listing victims;
    • Banking security solutions detection;
    • Checking geolocation information to ensure it runs in the target country;
    • Monitoring Outlook emails for specific keywords;
    • Ability to use Outlook to send spam emails.

    In terms of static analysis protection, in 2024 versions, Grandoreiro has implemented enhanced encryption measures. Departing from its previous reliance on commonly shared encryption algorithms found in other malware, Grandoreiro has now adopted a multi-layered encryption approach. The decryption process in the newer versions is the following. Initially, the string undergoes deobfuscation through a simple replacement algorithm. Following this, Grandoreiro employs the encryption algorithm based on XOR and conditional subtraction typically utilized by Brazilian malware; however, it differs from them by incorporating a lengthy, 140759-byte string instead of smaller magic strings we saw in 2022 and 2023 samples. Subsequently, the decrypted string undergoes base64 decoding before being subjected to decryption via the AES-256 algorithm. Notably, the AES key and IV are encrypted within Grandoreiro’s code. Upon completion of all these steps, the decrypted string is successfully recovered.

    Grandoreiro AES key and IV

    In newer samples, Grandoreiro upgraded yet again the encryption algorithm using AES with CTS, or Ciphertext Stealing, a specialized encryption mode used when the plaintext is not a multiple of the block size, which in this case is the 128-bit (16-byte) block size used by AES. Unlike more common padding schemes, such as PKCS#7, where the final block is padded with extra bytes to ensure it fits a full block, CTS operates without padding. Instead, it manipulates the final partial block of data by encrypting the last full block and XORing its output with the partial block. This allows encryption of any arbitrary-length input without adding extra padding bytes, preserving the original size of the data.

    ECB Encryption Steps for CTS

    In the case of Grandoreiro, the malware’s encryption routine does not add standard padding to incomplete blocks of data. Their main goal is to complicate analysis: it takes time to figure out that CTS was used, and then more time to implement decryption in this mode, which makes the extraction and obfuscation of strings more complicated. This marks the first time this particular method has been observed in a malware sample.

    As the threat actors continue to evolve their techniques, changing the encryption in every iteration of the malware, the use of CTS in malware may signal a shift toward more advanced encryption practices.

    Local versions: old meets new

    In a recent campaign, our analysis has revealed the existence of an older variant of the malware that utilizes legacy encryption keys, outdated algorithms, and a simplified structure, but which runs in parallel to the campaign using the new code. This variant targets fewer banks — about 30 financial institutions, mainly from Mexico. This analysis clearly indicates that another developer, likely with access to older source code, is conducting new campaigns using the legacy version of the malware.

    How they steal your money

    Operators behind Grandoreiro are equipped with a wide variety of remote commands, including an option to lock the user screen and present a custom image (overlay) to ask the victim for extra information. These are usually OTPs (one-time passwords), transaction passwords or tokens received by SMS, sent by financial institutions.

    A new tactic that we have discovered in the most recent versions found in July 2024 and later suggests that the malware is capturing user input patterns, particularly mouse movements, to bypass machine learning-based security systems. Two specific strings found in the malware — “GRAVAR_POR_5S_VELOCIDADE_MOUSE_CLIENTE_MEDIA” (“Record for 5 seconds the client’s average mouse speed”) and “Medição iniciada, aguarde 5 segundos!” (“Measurement started, please wait 5 seconds!”) — indicate that Grandoreiro is monitoring and recording the user’s mouse activity over a short period. This behavior appears to be an attempt to mimic legitimate user interactions in order to evade detection by anti-fraud systems and security solutions that rely on behavioral analytics. Modern cybersecurity tools, especially those powered by machine learning algorithms, analyze user’s behavior to distinguish between human users and bots or automated malware scripts. By capturing and possibly replaying these natural mouse movement patterns, Grandoreiro could trick these systems into identifying the activity as legitimate, thus bypassing certain security controls.

    This discovery highlights the continuous evolution of malware like Grandoreiro, where attackers are increasingly incorporating tactics designed to counter modern security solutions that rely on behavioral biometrics and machine learning.

    To perform the cash-out in the victim’s account, Grandoreiro operators’ options are to transfer money to the account of local money mules, using transfer apps, buy cryptocurrency or gift cards, or even going to an ATM. Usually, they search for money mules in Telegram channels, paying $200 to $500 USD per day:

    Grandoreiro operator looking for money mules

    Infrastructure

    The newest Grandoreiro version uses 3 Domain Generation Algorithms (DGAs), generating valid domains for command and control (C2) communications. The algorithm uses the current daytime to select strings of predefined lists and concatenates them with a magic key to create the final domain.

    By dynamically generating unique domain names based on various input data, the algorithm complicates traditional domain-based blocking strategies. This adaptability allows the malicious actors to maintain persistent command-and-control communications, even when specific domains are identified and blacklisted, requiring security solutions to base their protection not on a fixed list of domains, but on an algorithm for generating them.

    Since early 2022, Grandoreiro leverages a known Delphi component shared among different malware families named RealThinClient SDK to remotely access victim machines and perform fraudulent actions. This SDK is a flexible and modular framework for building reliable and scalable Windows HTTP/HTTPS applications with Delphi. By using RealThinClient SDK, the program can handle thousands of active connections in an efficient multithreaded manner.

    Grandoreiro C2 Communication

    Operator tool

    Grandoreiro’s Operator is the tool that allows the cybercriminal to remotely access and control the victim’s machine. It’s a Delphi-based software that lists its victims whenever they start browsing a targeted financial institution website.

    Grandoreiro’s Operator tool

    Once the cybercriminal chooses a victim to operate on, they will be presented with the following screen, seen in the image below, which allows many commands to be executed and visualizes the victim’s desktop.

    Grandoreiro’s Operator commands

    Cloud VPS

    One overlooked feature of the Grandoreiro malware is what is called “Cloud VPS” by the attackers — it allows cybercriminals to set up a gateway computer between the victim’s machine and the malware operator, thus hiding the cybercriminal’s real IP address.

    This is also used by them to make investigation harder, as the first thing noted is the gateway’s IP address. When requesting a seizure, an investigator just finds the gateway module. Meanwhile, the criminal has already set up a new gateway somewhere else and new victims connect to the new one through its DGA.

    Grandoreiro Cloud VPS

    Victims and targets

    The Grandoreiro banking trojan is primed to steal the credentials accounts for 1,700 financial institutions, located in 45 countries and territories. After decrypting the strings of the malware, we can see the targeted banks listed separated by countries/territories. This doesn’t mean that Grandoreiro will target a specific bank from the list; it means it is ready to steal credentials and act, if there is a local partner or money mule who can operationalize and complete the action. The banks targeted by Grandoreiro are located in Algeria, Angola, Antigua and Barbuda, Argentina, Australia, Bahamas, Barbados, Belgium, Belize, Brazil, Canada, Cayman Islands, Chile, Colombia, Costa Rica, Dominican Republic, Ecuador, Ethiopia, France, Ghana, Haiti, Honduras, India, Ivory Coast, Kenya, Malta, Mexico, Mozambique, New Zealand, Nigeria, Panama, Paraguay, Peru, Philippines, Poland, Portugal, South Africa, Spain, Switzerland, Tanzania, Uganda, United Kingdom, Uruguay, USA, and Venezuela. It’s important to note that the list of targeted banks and institutions tend to slightly change from one version to another.

    From January to October 2024, our solutions blocked more than 150,000 infections impacting more than 30,000 users worldwide, a clear sign the group is still very active. According to our telemetry, the countries most affected by Grandoreiro infections are Mexico, Brazil, Spain, and Argentina, among many others.

    Conclusion

    We understand how difficult it is to eradicate a malware family, but it is possible to impede their operation with the cooperation of law enforcement agencies and the private sector — modern financial cybercrime can and must be fought.

    Brazilian banking trojans are already an international threat; they’re filling the gaps left by Eastern European gangs who have migrated into ransomware. We know that in some countries, internet banking is declining on desktops, forcing Grandoreiro to target companies and government entities who are still using operating in that way.

    The threat actors behind the Grandoreiro banking malware are continuously evolving their tactics and malware to successfully carry out attacks against their targets and evade security solutions. Kaspersky continues to cooperate with INTERPOL and other agencies around the world to fight the Grandoreiro threat among internet banking users.

    This threat is detected by Kaspersky products as HEUR:Trojan-Banker.Win32.Grandoreiro, Trojan-Downloader.OLE2.Grandoreiro, Trojan.PDF.Grandoreiro and Trojan-Downloader.Win32.Grandoreiro.

    For more information, please contact: crimewareintel@kaspersky.com

    Indicators of Compromise

    Host based
    f0243296c6988a3bce24f95035ab4885
    dd2ea25752751c8fb44da2b23daf24a4
    555856076fad10b2c0c155161fb9384b
    49355fd0d152862e9c8e3ca3bbc55eb0
    43eec7f0fecf58c71a9446f56def0240
    150de04cb34fdc5fd131e342fe4df638
    b979d79be32d99824ee31a43deccdb18

    MIL OSI Global Banks

  • MIL-Evening Report: The best government money can buy? How New Zealanders feel about political party funding

    Source: The Conversation (Au and NZ) – By Mona Krewel, Senior Lecturer in Comparative Politics, Te Herenga Waka — Victoria University of Wellington

    Getty Images

    Companies and shareholders associated with the government’s fast-track projects gave more than $500,000 in donations to National, ACT and New Zealand First, according to a recent analysis by RNZ.

    While it is impossible to say whether these companies were listed for consideration because of their donations, allegations of possible “undue influence” are inevitably made.

    New Zealand’s reputation as a country with little to no corruption owes nothing to our lack of rigour in the regulation of party donations. As Philippa Yasbek, the author of a report by the Helen Clark Foundation calling for tougher rules to combat the risk of political corruption, said:

    Our political integrity and honesty have largely evolved from social norms over many decades. Politicians by and large knew the conduct that was expected of them by New Zealand society. Sadly, today, we’re naive to think that’s enough.

    Some political parties seem to take little heed of the existing rules. The Electoral Commission has issued warnings to several parties about large donations being declared too late.

    The Independent Electoral Review released early this year recommended parties give up access to corporate donations in exchange for greater public funding. Other recommendations included a cap on political donations set at NZ$30,000, and a much lower threshold for disclosing donors’ names.

    As one might expect, the political parties disagree about how funding should be regulated, as their main income sources vary. Labour approves of the proposals, although analysis indicates its revenue streams would suffer most if such policies were in place.

    ACT is strongly opposed to the principle of public funding, although there are already significant public funds supporting parliament and party advertising during election campaigns.

    What New Zealanders think

    But what about public opinion? Do people believe large donors have “undue influence”?

    The latest New Zealand Election Study, conducted after the 2023 election, included a module of questions that give insights into New Zealanders’ attitudes to potential party funding reforms. The study is a representative sample of nearly 2,000 eligible voters.

    What stands out? Many people answered “don’t know” to the questions – which is quite reasonable. The laws that regulate political party activity in New Zealand are complex and of little relevance to most.

    Nonetheless, some clear messages emerge. In general, a near majority of people were concerned about the influence of “big interests”. When asked if they agreed with the statement “The New Zealand government is largely run by a few big interests”, 45% agreed and 27% disagreed.

    Drilling deeper into the data, about 35% of business owners agreed, compared to just under half of people who don’t own a business.



    Asked whether they believed donors exert “undue influence” on politicians, 43% agreed. Only 18% disagreed. Almost 40% had no opinion on this topic and either didn’t know or took a neutral position.

    While Labour, Green and NZ First voters leaned heavily to “undue influence”, National and ACT voters were evenly divided between “undue” and “not undue”.

    National voters also strongly opted for “don’t know”. About a third of business owners perceived undue influence, compared with about 45% of non-owners.



    The 2023 Election Study also included a question on the recommendation made by the Electoral Review that corporate groups and trade unions should be prohibited from making direct donations to political parties: 53% supported this change, while only 17% opposed it.



    The Independent Electoral Review also recommended a limit of $30,000 for any individual donation: 57% agreed, compared to 14% who disagreed. While support was strongest on the left and among New Zealand First voters, significant numbers of National and ACT voters also agreed (47% and 44%).



    Finally, we asked for people’s views on anonymity of “promoter donations”. Promoters are people or groups registered to advertise during an election campaign for an issue, or for or against a political party. They can collect anonymous donations that are not subject to the same disclosure requirements as parties.

    Only 14% of respondents believed in continued promoter donation anonymity on the basis of privacy, and 47% preferred greater transparency. Breaking this down by party vote, some National and ACT voters prefer transparency over privacy, although more were either neutral or answered “don’t know”.



    Support for reform

    These results show public perceptions of undue influence by donors are widespread. While these perceptions are strongest on the left, they also penetrate deeply into groups who vote for the parties on the right, and into the business community.

    And while the political parties have conflicts of interest, there is significant support for the recommendations of the Independent Electoral review across party lines among the New Zealand public, and inside the business community.

    Assuming political parties in a democracy should be responsive to voters’ concerns and demands, this should give them food for thought when it comes to potential party funding reform.


    This article is based on our submission to the Justice Select Committee inquiry into the 2023 general election.


    The New Zealand Election Study (NZES) has been funded by Te Herenga Waka-Victoria University of Wellington, the New Zealand Electoral Commission, the Gama Foundation, and the University of Auckland.

    ref. The best government money can buy? How New Zealanders feel about political party funding – https://theconversation.com/the-best-government-money-can-buy-how-new-zealanders-feel-about-political-party-funding-241881

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Russia: Financial news: On holding auctions on October 23, 2024 to place OFZ issues No. 26245RMFS and No. 29025MFS

    Translation. Region: Russian Federation –

    Source: Moscow Exchange – Moscow Exchange –

    For bidders

    We inform you that, based on the letter of the Bank of Russia and in accordance with Part I. General Part and Part II. Stock Market Section of the Rules for Conducting Trading on the Stock Market, Deposit Market and Credit Market of Moscow Exchange PJSC, the order establishes the form, time, term and procedure for holding auctions for the placement and trading of the following federal loan bonds:

    1.

    Name of the Issuer Ministry of Finance of the Russian Federation
    Name of security federal loan bonds with constant coupon income
    State registration number of the issue 26245RMFS from 08.05.2024
    Date of the auction October 23, 2024
    Information about the placement (trading mode, placement form) The placement of Bonds will be carried out in the Trading Mode “Placement: Auction” by holding an Auction to determine the placement price. BoardId: PACT (Settlements: Ruble)
    Trade code SO26245RMFS9
    ISIN code PO000A108EG6
    Calculation code B01
    Additional conditions of placement The share of non-competitive bids in relation to the total volume of bids submitted by the Bidder may not exceed 90%.
    Trading time Trading hours: bid collection period: 14:30 – 15:00; bid execution period: 15:30 – 18:00.

    2.

    Name of the Issuer Ministry of Finance of the Russian Federation
    Name of security variable coupon federal loan bonds
    State registration number of the issue 29025RMFS from 09/29/2023
    Date of the auction October 23, 2024
    Information about the placement (trading mode, placement form) The placement of Bonds will be carried out in the Trading Mode “Placement: Auction” by holding an Auction to determine the placement price. BoardId: PACT (Settlements: Ruble)
    Trade code SU29025RMFS2
    ISIN code PO000A106Z61
    Calculation code B01
    Additional conditions of placement The share of non-competitive bids in relation to the total volume of bids submitted by the Bidder may not exceed 90%.
    Trading time Trading hours: bid collection period: 12:00 – 12:30; bid execution period: 13:00 – 18:00.

    Contact information for media 7 (495) 363-3232PR@moex.com

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please note; This information is raw content directly from the information source. It is accurate to what the source is stating and does not reflect the position of MIL-OSI or its clients.

    https://www.moex.com/n74197

    MIL OSI Russia News

  • MIL-OSI Economics: How higher education is reimagining student experiences with Azure OpenAI Service

    Source: Microsoft

    Headline: How higher education is reimagining student experiences with Azure OpenAI Service

    Learn how using Azure OpenAI Service in higher education can help leaders reimagine learning models and reduce administrative burdens.

    Imagine a future where every student has a personalized learning path, where faculty can focus on teaching instead of administrative tasks, and where academic research accelerates breakthrough discoveries. This is not a distant vision—generative AI is making it possible today. AI-driven innovations empower higher education leaders to reimagine learning models, reduce administrative burdens, and advance academic research, positioning institutions to not only enhance student success but also lead in educational innovation, securing a competitive edge in an evolving landscape.

    A July 2024 Forrester report commissioned by Microsoft found that education institutions using Azure OpenAI Service saw improved student outcomes, streamlined operations, and increased access to technology. By Year 3, they are expected to boost content generation efficiency by 30% to 60% and improve chatbot resolution rates by 20% to 50%, driving positive impacts on graduation and employment rates.

    As AI adoption accelerates, institutions must also prioritize trust by focusing on scalable security, data privacy, and governance measures. Microsoft supports this transition with AI solutions that integrate built-in protections, addressing risks such as prompt injections and bias, while maintaining data privacy and compliance to safeguard institutions.

    Join us as we explore five key use cases of generative AI in higher education, along with examples of institutions that have successfully implemented AI to deliver more equitable and personalized student experiences.

    1. Around-the-clock real-time campus support

    As student expectations evolve, meeting their demand for around-the-clock support has become a critical factor in student satisfaction and institutional efficiency. For example, Tecnológico de Monterrey’s TECgpt is an AI platform that offers quick access to information like tuition, scholarships, and campus services, allowing users to retrieve personal details, such as scholarship status, within minutes.

    Similarly, the University of South Florida improved response times and reduced staff workloads by automating IT ticketing with Azure OpenAI, launching an AI-powered Help Desk in just one week. The University of Hong Kong has also deployed several Azure OpenAI-powered chatbots to handle IT queries, administrative tasks, and course selection, freeing staff to focus on more complex issues. Education leaders are automating routine tasks and delivering personalized academic assistance at scale, boosting retention and accelerating graduation rates while streamlining operations.

    I can invest more time in people now that I don’t have to worry about those recurring repetitive tasks because people are what it’s all about. It is revolutionizing all our workflows, our teaching, and our learning spaces quite rapidly. With Copilot, we’re able to do things bigger, better, but also equitably across the university space. It’s changing the way we do everything, and that is a big deal.

    Tim Henkel, Assistant Vice Provost for Teaching and Learning, University of South Florida (USF)

    AI innovations are reshaping how institutions engage with students by offering around-the-clock support for inquiries about housing, student life, and campus services, significantly enhancing the overall student experience. These AI tools also provide personalized academic and career guidance, helping students select courses, optimize degree plans, and receive tailored advising.

    Additionally, AI-powered virtual assistants streamline the financial aid process, guiding students through eligibility requirements, deadlines, and submissions, ensuring timely completion. Through AI integration, institutions can deliver responsive, student-centered services while improving operational efficiency, ultimately enriching the campus experience.

    With Azure OpenAI, USF can rapidly classify and summarize IT tickets, eliminating that first level of eyes on an issue.

    2. Personalize learning experiences at scale

    In an environment where institutional success depends on student engagement and outcomes, personalized learning is becoming a strategic priority. With Data Science in Microsoft Fabric and Azure AI Services, institutions can integrate real-time data analysis from their LMS, leveraging AI to customize lessons, content, and pacing based on student performance.  AI tutors provide personalized, instant feedback, helping students make continuous progress and tackle challenging tasks with confidence. These tools empower institutions to deliver adaptive learning tailored to each student’s needs.

    The Azure OpenAI Service provided remarkably high-quality hints generated by GPT-4 from a robust and scalable API that reliably handled heavy loads from hundreds of students working simultaneously near homework deadlines.

    John DeNero, Faculty Director and Associate Teaching Professor, UC Berkeley

    Universities around the world are leveraging AI to improve student outcomes and streamline administrative tasks. At the University of Sydney, the Cogniti platform utilizes AI teaching assistants to tailor feedback and adjust learning paths, boosting student engagement and academic success. IU International University of Applied Sciences in Germany offers an AI study buddy, Syntea, with always-available multilingual support and enhanced student engagement through personalized feedback. It also reduces course completion times by 27%, all while seamlessly integrating across platforms like myCampus and Microsoft Teams.

    Similarly, UC Berkeley’s 61A-Bot, a specialized AI assistant powered by Azure OpenAI Service, has significantly enhanced student learning by providing real-time support and reducing homework completion times in their computer science courses. As institutions worldwide adopt AI-driven solutions, education leaders are transforming both learning personalization and operational efficiency, driving significant improvements in student success.

    Get started with Azure

    3. Accelerate learning for all with multi-language support

    AI improves educational access by offering multi-language support through real-time translation, note-taking, and content delivery, enabling all students to engage fully in their preferred language. Flexible learning options allow students to review materials at their own pace, while chatbots offer seamless language transitions and targeted support to enhance comprehension and engagement.

    By utilizing the advanced language models in Azure OpenAI Service, Cool English is taking an innovative step for English education in Taiwan, helping students reach their learning goals and overcome the challenges of limited opportunities for real-life conversational and writing practice.

    Dr. Hao-Jan Howard Chen, Professor, Department of English at National Taiwan Normal University

    This potential is already being realized through initiatives like National Taiwan Normal University’s “Cool English” platform, powered by Azure OpenAI, which has helped over 1.4 million students enhance their English skills through adaptive, conversational practice. Similarly, the Korea Advanced Institute of Science and Technology (KAIST) developed a multilingual chatbot to help EFL students write essays in English, offering seamless language switching and personalized guidance outside class hours. Powered by Azure OpenAI’s advanced models, the chatbot provides feedback and answers questions to help students improve their writing without generating essays for them. AI-powered language tools help create inclusive learning environments, enhance student outcomes, and attract a diverse international student body.

    AI can help higher education institutions provide multi-language support to students.

    4. Accelerate academic research

    AI is transforming academic research by accelerating discovery and innovation, and automating tasks like literature reviews, data analysis, and report generation. In April 2023, Microsoft Research launched the Accelerating Foundation Models Research (AFMR) initiative to accelerate the use of large-scale AI models in academia. Through Azure AI Services, AFMR provides universities with access to powerful foundation models, supporting research in fields such as healthcare, scientific discovery, and multicultural empowerment. With over 200 projects in 15 countries, AFMR is building a global AI research community.

    If you have a really good idea, it’s very hard to just search the literature and try to find everything. This is sort of like having a super adviser, a brilliant astronomer with an encyclopedic memory who can say, ‘Well, that could be a very good idea and here’s why,’ or ‘That’s likely a bad idea and here’s why.’

    Alyssa Goodman, Robert Wheeler Wilson Professor of Applied Astronomy, Harvard University

    Universities are harnessing foundation models to accelerate scientific discovery and hypothesis generation. A collaboration between astronomers at Harvard University and The Australian National University has led to the development of an astronomy-focused chat application that utilizes GPT-4. This tool draws from over 300,000 astronomy papers, helping researchers extract key information and analyze data to develop new theories.

    At Georgia Tech, researchers are utilizing Microsoft’s Azure OpenAI Service to analyze global EV charging data, uncovering insights for policy development and improving infrastructure reliability to support sustainable and equitable EV adoption. With AI solutions like Azure OpenAI Service, higher education institutions can automate repetitive tasks, improve collaboration, and scale research efforts, all while ensuring data security and focusing on high-impact academic work.

    5. Trustworthy AI for education

    There is a critical need for organizations to deploy AI responsibly. As AI transforms education, decision makers must ensure these systems are secure, private, and fair. A key strategy is to choose AI platforms with built-in safeguards, like content filtering and bias detection. For example, South Australia’s Department for Education successfully piloted EdChat, an AI chatbot powered by Azure AI, which protects 1,500 students across eight schools from harmful content while empower educators to focus on the benefits.

    Equally important is the protection of sensitive student information. With built-in features to safeguard text content, including moderation and groundedness detection, institutions can ensure responsible AI deployment while protecting student data with enterprise-grade security and robust privacy measures to prevent breaches.

    South Australia’s Department for Education successfully piloted EdChat, an AI chatbot using Azure AI.

    Key principles of trustworthy AI:

    • Security: AI systems must be resilient against threats.
    • Safety: AI must operate reliably in sensitive environments like classrooms.
    • Privacy: Protecting personal data is essential to maintain trust.

    AI is not just a tool—it’s the catalyst for a new era in education. By enhancing student support, personalizing learning, and accelerating academic research, AI empowers institutions to break down barriers, expand access, and create more inclusive and innovative learning environments. Those who embrace AI today will lead the future of education, building adaptable, forward-thinking institutions focused on student success.

    The question is no longer if AI should be integrated, but how quickly it can be implemented to unlock its full potential. The future of education is here—is your institution ready to lead it?

    Get started with Azure

    Ready to transform your institution with AI? Partner with Microsoft to unlock new possibilities and drive educational success:

    MIL OSI Economics

  • MIL-Evening Report: ‘They do not respect our land. They do not respect our people’. Brazil’s traditional people take on BHP in one of the world’s biggest class actions

    Source: The Conversation (Au and NZ) – By Ebony Birchall, Lecturer, Law School, Macquarie University

    Australian mining giant BHP is at the centre of one of the world’s largest class actions, the trial for which started this week in London.

    The Fundão Dam in Mariana, Brazil, co-owned by BHP, collapsed in 2015 spilling a gigantic wave of toxic mud across 700 kilometres of land. Nineteen people were killed, villages and livestock wiped out, vast areas of land rendered uninhabitable and rivers and water supplies contaminated.

    Corporate accountability

    The class action has renewed questions about the responsibilities multibillion-dollar corporations have to local communities.

    Leaders of the traditional people groups impacted by the disaster visited Australia with their lawyer Tom Goodhead from international legal firm Pogust Goodhead to raise awareness of the case two weeks ago.

    Goodhead told a public forum at Macquarie University this was a case of corporate negligence and putting profit before safety. He said the operators were warned of the risk of dam collapse and continued to push operations beyond what was safe.

    The class action is brought on behalf of more than 600,000 claimants. The trial is expected to run for 12 weeks and will be heard in the UK, because this is where BHP was headquartered at the time of the disaster.

    The UK courts will apply the Brazilian laws, which say environmental polluters must pay for the damage they cause.

    Can BHP fix this?

    The claimants’ lawyers say the case is valued at more than A$68.8 billion. The figure is based on an estimation of the impact of the disaster on land, culture and sacred places, as well as some form of recompense for the lost lives.

    Maycon Krenak, one of the Krenak chiefs, explained:

    [the] river has always been there for us to guarantee our livelihoods. It is a sacred space for us. The river is where we carry out our sacred practices. That’s where we sing, where we dance, where we gather. The new leaders, [our] children, have to learn how to swim in a water tank of a thousand litres.

    BHP is reported as saying its Renova Foundation, established in 2016, has spent more than A$11.5 billion to compensate victims and remediate the environment.

    But Thatiele Monic, president of the Vila Santa Efigênia and Adjacências Quilombola Association said the victims don’t trust the foundation.

    In the same way that the mining company invades our land, the Renova Foundation also is invading our space and our territories. They do not respect our land. They do not respect our people, and they are creating more and more conflict. So that people are essentially giving up pursuing this.

    Poor human rights record

    Australian corporations operating overseas have a poor record on human rights.

    Two weeks ago, a preliminary report of the Panguna Mine Legacy Impact Assessment uncovered human rights violations, including risks to life, at Rio Tinto’s abandoned Panguna mine in Bougainville, Papua New Guinea.

    The gold and copper mine triggered a brutal civil war between 1988 and 1998. Despite decades passing since the mine was decommissioned, the recent report confirms the mine continues to pose risks to life and safety due to the collapsing mine and ongoing contamination down rivers and into new areas.

    Australian mining corporations have also been linked to death and destruction in their operations in Africa.

    Corporate activities within Australia have impacted our own Aboriginal and Torres Strait Islander Peoples. For example, Rio Tinto’s explosion at Juukan Gorge destroyed sites of cultural significance dating more than 46,000 years.

    Where Australia stands

    The Australian government has endorsed the UN Guiding Principles on Business and Human Rights and the OECD Guidelines for Multinational Enterprises both of which outline corporations’ human rights obligations.

    The UNGPs say states should set out clearly the expectation that corporations in their jurisdiction respect human rights in all their operations – even those occurring overseas.

    The Human Rights Law Centre found in a 2018 report on this topic that the Australian government was not doing enough to hold corporations to account.

    It found Australian corporations operating overseas did so with impunity. Efforts to seek justice locally is often thwarted by corruption, lack of resources or ineffective legal process. At the same time, attempts by overseas communities to take legal action in Australian courts face enormous hurdles and rarely succeed.

    This is why cases like the class action for claimants in Mariana are crucial for corporate accountability.

    In my 2023 report with colleagues Surya Deva and Justine Nolan, we found this kind of litigation can raise awareness, facilitate broader industry developments and shape laws and policy.

    Our report also found litigation needs to be supported by strong regulatory responses from governments, and complementary advocacy like shareholder or consumer engagement.

    Cost of litigation

    Litigation comes with significant risks to victims and their allies.

    In a controversial development for corporate accountability in Australia, oil and gas giant Santos is using legal processes to challenge environmental groups who supported traditional owners opposing their Barossa gas project. Santos’ tactics, if allowed to continue, could limit public interest litigation in the future.

    Thatiele Monic ended her speech at the Macquarie University event with a question worth repeating

    This has happened in Brazil, but it has happened in many other places, and if we don’t do anything about it, and we don’t talk about it, it will continue to happen in many more other places. This is not the future I want for myself and for my people. I’d like to know. What future do you want for yourselves?

    Ebony Birchall is affiliated with Macquarie University’s B&HR Access to Justice Lab.

    ref. ‘They do not respect our land. They do not respect our people’. Brazil’s traditional people take on BHP in one of the world’s biggest class actions – https://theconversation.com/they-do-not-respect-our-land-they-do-not-respect-our-people-brazils-traditional-people-take-on-bhp-in-one-of-the-worlds-biggest-class-actions-241777

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Australia: Strengthening education and skills links with India

    Source: Australian Ministers for Education

    Today the Albanese Government welcomes India’s Education Minister Shri Dharmendra Pradhan to Melbourne to further strengthen the education and skills links between our two countries. 

    Minister Pradhan has travelled to Australia for the second Australia-India Education and Skills Council (AIESC) meeting which will be held tomorrow in Sydney. 

    Discussions will focus on Australia’s research strengths and models for industry engagement which support innovation, businesses and economic growth.

    The visit will showcase researchers and research centres who are making a significant contribution to bilateral research collaboration.

    We will also explore further partnerships to deliver Australia’s world-class education in India and how we can bridge skills gaps through education and training. 

    The AIESC meeting coincides with Deakin and Wollongong universities opening in India this year, with more Australian universities expected to follow their lead. 

    Since the first AIESC meeting last November, we have continued to build our bilateral education relationship, completed an agricultural skills program in India, continued to implement the mutual recognition mechanism, and established a new STEM research fellowships program for women.

    A joint communique will be issued after the conclusion of the second AIESC meeting and will be publicly available at South Asia Resources – Department of Education, Australian Government.

    While in Australia, Minister Pradhan will also address the Australian International Education Conference and visit Australian universities, a public school and an early childhood education and care centre.

    Quotes attributable to Minister for Education Jason Clare:

    “It is an honour to welcome Minister Pradhan back to Australia for his second visit since 2022.

    “This is the fourth time we have caught up here or in India in the last two years.  

    “I look forward to showcasing Australia’s education system and working together to further strengthen Australia’s education links with India.”

    Quotes attributable to Minister for Skills and Training, Andrew Giles:

    “Australia and India are close mates and I’m looking forward to discussing how we can collaborate even more effectively to bridge critical skills gaps and strengthen our relationship. 

    “We’ll be exploring how we can work together to build the research workforces we’ll need in the future and better support industries in transition.”

    MIL OSI News

  • MIL-OSI Australia: Funding boost for 2,500 First Nations boarding school students

    Source: Australia Government Ministerial Statements

    Indigenous students studying at boarding schools will have support to finish their schooling and boost their success, with the Albanese Labor Government extending the Indigenous Boarding Providers Grants Program until the end of 2026.

    Boarding plays an important role for many Indigenous students from rural and remote communities. 

    A $43.2 million investment will support approximately 2,500 students attending more than 40 boarding schools and stand-alone boarding facilities and deliver wrap-around supports to boost students’ success at school.

    This investment is one of the ways the Albanese Government is helping to close the gap in education outcomes.

    Secondary schools and boarding providers that mainly support First Nations students from remote and very remote areas may be eligible to receive funding under the program. 

    This new investment comes as the Indigenous Boarding Design Review, which is identifying ways to improve the sector, is being finalised. The program will provide certainty to providers while the Government considers and responds to the Review.

    The investment also follows the Albanese Government’s Central Australia Boarding Response Fund last week offering $18 million to three Alice Springs schools to upgrade or build facilities.

    Quotes attributable to Minister for Education Jason Clare:

    “This investment in boarding facilities across Australia is about supporting Indigenous school students in remote communities. 

    “It will mean supporting more students to finish school and deliver certainty for providers. 

    “This builds on the $18 million in funding for three boarding schools in Central Australia and is another way the Government is building a better and fairer education system.”

    Quotes attributable to Minister for Indigenous Australians Malarndirri McCarthy:

    “The Albanese Government is committed to supporting First Nations students to achieve their full learning potential.

    “For many First Nations students from remote and very remote areas, boarding school is their only option to engage in education. 

    “This investment will provide critical support for First Nations boarding students while the government considers the outcomes of the Indigenous Boarding Design Review.”

    MIL OSI News

  • MIL-OSI Europe: MOTION FOR A RESOLUTION on the People’s Republic of China’s misinterpretation of UN Resolution 2758 and its continuous military provocations around Taiwan – B10-0134/2024

    Source: European Parliament

    Markéta Gregorová, Ville Niinistö, Maria Ohisalo, Hannah Neumann, Diana Riba i Giner, Nicolae Ştefănuță, Erik Marquardt
    on behalf of the Verts/ALE Group

    B10‑0134/2024

    European Parliament resolution on the People’s Republic of China’s misinterpretation of UN Resolution 2758 and its continuous military provocations around Taiwan

    (2024/2891(RSP))

    The European Parliament,

     having regard to its recommendation of 21 October 2021 to the Vice-President of the Commission / High Representative of the Union for Foreign Affairs and Security Policy on EU-Taiwan political relations and cooperation[1],

     having regard to its resolution of 7 June 2022 on the EU and the security challenges in the Indo-Pacific[2],

     having regard to its resolution of 15 September 2022 on the situation in the Strait of Taiwan[3],

     having regard to its resolution of 13 December 2023 on EU-Taiwan trade and investment relations[4],

     having regard to its recommendation of 13 December 2023 to the Council and the Vice-President of the Commission / High Representative of the Union for Foreign Affairs and Security Policy concerning EU-China relations[5],

     having regard to the joint communication of the Commission and the High Representative of the Union for Foreign Affairs and Security Policy of 16 September 2021 on the EU strategy for cooperation in the Indo-Pacific (JOIN(2021)0024),

     having regard to the Strategic Compass for Security and Defence – For a European Union that protects its citizens, values and interests and contributes to international peace and security, approved by the Council on 21 March 2022 and endorsed by the European Council on 24 March 2022,

     having regard to NATO’s 2022 Strategic Concept,

     having regard to the statement by the spokesperson of the European External Action Service of 14 October 2024 on China’s latest military drills,

     having regard to the G7 Foreign Ministers’ statement of 3 August 2022 on preserving peace and stability across the Taiwan Strait,

     having regard to United Nations General Assembly Resolution 2758 (XXVI) of 25 October 1971 on the restoration of the lawful rights of the People’s Republic of China in the United Nations,

     having regard to Article 7 of the United Nations Framework Convention on Climate Change (UNFCCC) of 9 May 1992,

     having regard to Rule 5 of the Standing Rules of Procedure of the Assembly of the International Civil Aviation Organization (ICAO),

     having regard to Article 4 of the Constitution of the International Criminal Police Organization (Interpol),

     having regard to Article 8 and Article 18, paragraph (h), of the Constitution of the World Health Organization (WHO),

     having regard to Rule 136(2) of its Rules of Procedure,

    A. whereas the statutes of most international organisations tasked with addressing global issues including climate change, the preservation of human health and the suppression of transnational crime, such as the WHO, the UNFCCC, Interpol and the ICAO, provide opportunities for non-state entities to participate without infringing on the rights of member states;

    B. whereas the People’s Republic of China (PRC) has made instrumental use of UN Resolution 2758 as a legal basis for its position that Taiwan is part of the PRC and a foundational element of its One China principle; whereas UN Resolution 2758 does not include the words ‘Republic of China’ or ‘Taiwan’, but only states that the PRC will represent ‘China’ at the UN, and does not make any determination regarding the status of Taiwan; whereas, however, the PRC continues to misinterpret UN Resolution 2758 to block Taiwan’s meaningful participation in international organisations;

    C. whereas the EU and Taiwan are like-minded partners that share the common values of freedom, democracy, human rights and the rule of law; whereas the EU remains decisively committed to its One China policy;

    D. whereas following the Taiwanese President Lai Ching-te’s annual speech on 10 October 2024, the PRC, on 14 October 2024, conducted a comprehensive military exercise across the Taiwan Strait, amounting to the fourth round of large-scale war games in just over two years;

    E. whereas the median line, which was set up in a decades-old tacit agreement between both sides of the Taiwan Strait, was designed to reduce the risk of conflict by keeping the military aircraft from both sides of the Strait at a safe distance and thus prevent fatal miscalculations; whereas the PRC’s People’s Liberation Army violated the median line only four times between 1954 and 2020, but now routine incursions reflect Beijing’s intent to irreversibly reset long-standing benchmarks;

    F. whereas on 14 October 2024, China also deployed 17 vessels from its coast guard, which was a larger deployment than in a previous exercise held in May this year, when coast guard vessels had been deployed for the first time; whereas four formations of Chinese coast guard ships patrolled the island and briefly entered its restricted waters; whereas the very frequent deployment of coast guard ships by the PRC in the Taiwan Strait, in what they consider ‘law enforcement’ missions, sends a clear message of sovereignty from the PCR, keeps constant pressure on Taiwanese authorities and causes a dangerous increase in the risk of collisions, in what is one of the most concrete indications of China’s intention to erode the status quo;

    G. whereas full-scale military exercises by the PRC have also been coupled with cyberattacks against Taiwanese authorities and other grey-zone activities such as cognitive and legal warfare and disinformation, aimed at discouraging the Taiwanese population, eroding Taiwanese legitimate sovereign rights and, ultimately, instilling the belief that reunification is inevitable;

    H. whereas on 16 October 2024, the authorities of the PRC stated ‘We are willing to strive for the prospect of peaceful reunification with the utmost sincerity and endeavour, but we will never commit ourselves to renouncing the use of force,’ reiterating Xi Jinping’s landmark speech at the opening of the Chinese Communist Party’s 20th Party Congress in October 2022; whereas Xi Jinping also referred to permanent military pressure in the Taiwan Strait as ‘new normality’; whereas Chinese diplomats even threatened ‘re-education’ of Taiwanese people after reunification;

    I. whereas the PRC has been behaving aggressively across a vast area of the Indo-Pacific and exerting varying degrees of military or economic coercion, which has led to disputes with neighbours such as Japan, India, the Philippines and Australia;

    1. Strongly reiterates its commitment to the EU’s One China policy and to maintaining peace and stability across the Taiwan Strait, in the whole Indo-Pacific region and beyond;

    2. Expresses the view that UN Resolution 2758 does not establish the PRC’s sovereignty over Taiwan; underlines how Taiwan has proven to be a very reliable partner in dealing with the many challenges of our time and supports Taiwan’s participation in meetings, mechanisms and activities of relevant international organisations, particularly the WHO, the UNFCCC, Interpol and the ICAO; calls on the Commission and the Member States to promote Taiwan’s inclusion in such international forums in accordance with their statutory rules;

    3. Strongly condemns the PRC’s practice of regularly resorting to comprehensive military exercises in the Taiwan Strait; is very concerned by the increasing, unwarranted mobilisation of the PRC coast guard, which confirms that the PRC considers the waters around Taiwan as its own and increases the risks of accidents; considers this to be yet another worrying confirmation that China is deliberately jeopardising the status quo in the Taiwan Strait;

    4. Is very concerned at the adoption of guidelines for punishing ‘diehard “Taiwan independence” separatists for conducting or inciting secession’ jointly announced by the Supreme People’s Court, the Supreme People’s Procuratorate, the ministries for public security and state security and the justice ministry in June 2024, which could lead to harsh punishments for the crime of secession, up to and including the death penalty; strongly condemns the sentencing of one Taiwanese activist to nine years in prison in September this year, after his arrest while in the PRC in 2022, as well as the constant harassment of Taiwanese people working and living in the PRC;

    5. Expresses concern at the expectation that China will become more aggressive militarily in the Taiwan Strait, as well as in the Indo-Pacific region more broadly;

    6. Urges the PRC authorities to restore full respect for the Taiwan’s Strait median line and to put a stop to all other grey-zone actions against Taiwan;

    7. Remains resolutely opposed to any unilateral change in the Taiwan Strait and against the will of Taiwanese citizens; remains equally strongly opposed to the threat or use of force, and stresses that any attempt by Beijing to subjugate Taiwan would come at an extraordinarily high price for the PRC;

    8. Commends Taiwan for the remarkable democratic journey it has undertaken over the last 30 years, solidly anchored upon freedoms, the rule of law, democratic institutions and free and fair elections; highlights the recognition of same-sex marriage by Taiwan in 2019, the first such recognition in Asia; strongly encourages Taiwan to keep working towards the abolition of the death penalty;

    9. Welcomes the very responsible reactions by the Taiwanese political elite to provocations by the PRC and expresses its great respect for the whole of Taiwanese society for its extraordinary resilience and strength;

    10. Welcomes the latest annual speech by President Lai Ching-te, who also appealed to China to work with him for peace; considers this to be an encouraging sign of movement towards stronger unity within the Taiwanese political spectrum; highlights that Taiwanese sovereignty is supported across the whole political spectrum and finds its best expression in the conducting of free and fair elections and in the maturity of Taiwanese democracy;

    11. Stresses that the EU and Taiwan are like-minded partners and share common values of freedom, democracy, human rights and the rule of law, thereby making Taiwan a strategically important partner for the EU in the Indo-Pacific region;

    12. Acknowledges that the ‘One Country, Two Systems’ principle does not provide any credible prospect for the preservation of the status quo in the Taiwan Strait; stresses the need to further develop EU-Taiwan relations with the preservation of peace and democracy at their core;

    13. Highlights the importance of coupling dialogue with deterrence; stresses the need, hence, to identify a fully-fledged and multidimensional strategy that would ensure that any unilateral change in the status quo in the Taiwan Strait would come at a prohibitively high cost to the PRC;

    14. Welcomes the posting of a liaison officer at the European Economic and Trade Office in Taiwan to coordinate joint efforts to tackle disinformation and interference as a first important step towards deeper EU-Taiwan cooperation, and calls for the EU to further deepen cooperation with Taiwan in this key area;

    15. Stresses the need to strengthen the focus on the PRC’s grey-zone activities against Taiwan and to renew EU support for the resilience of Taiwanese society and democracy as a whole; encourages, with this in mind, increased scientific, cultural and political interaction at the highest level possible, as well as the deepening of parliamentary diplomacy and visits; prioritises the creation of a common civic space with Taiwan by fostering exchanges and common activities with Taiwanese civil society and media organisations; underlines the importance of the people-to-people dimension of this cooperation;

    16. Stresses the crucial role of Taiwan in the global supply chain of key high-tech sectors, notably semiconductors; welcomes the recent investment projects by Taiwanese companies in some Member States and underlines the importance for Taiwan’s security of continuing to deepen its investments in the EU; calls on the Commission and the Member States to start working on a resilient supply chain agreement with Taiwan or other bilateral agreements to deepen the economic relationship; highlights the potential for cooperation on foreign direct investment screening policy and on tackling economic coercion and retaliation;

    17. Reiterates the importance of respecting international law, in particular the UN Convention on the Law of the Sea with its provisions on the obligation to settle disputes by peaceful means, and on maintaining freedom of navigation and overflight;

    18. Instructs its President to forward this resolution to the Council, the Commission, the Vice-President of the Commission / High Representative of the Union for Foreign Affairs and Security Policy, the governments and parliaments of the member states of the United Nations, and the Government and Legislative Yuan of Taiwan.

     

    MIL OSI Europe News

  • MIL-Evening Report: What’s the difference between fusion and fission? A nuclear physicist explains

    Source: The Conversation (Au and NZ) – By Matthew Hole, Professor, Mathematical Sciences Institute and School of Computing, Australian National University

    Quality Stock Arts/Shutterstock

    Globally, nuclear power accounts for roughly 10% of electricity generation. In some countries, such as France, this figure is nearly 70%.

    Big tech companies such as Google are also turning to nuclear power to meet the huge power demands of their data centres.

    The source of all nuclear power is the binding energy of an atom. The energy stored in an atom can be released in two main ways: fission or fusion. Fission involves splitting big heavy atoms into smaller, lighter ones. Fusion involves combining little atoms together into bigger ones.

    Both processes release a lot of energy. For example, one nuclear fission decay of U235, an isotope of uranium typically used as the fuel in most power plants, produces more than 6 million times the energy per single chemical reaction of the purest coal. This means they are great processes for generating power.

    What is fission?

    Fission is the process behind every nuclear power plant in operation today. It occurs when a tiny subatomic particle called a neutron is slammed into an uranium atom, splitting it. This releases more neutrons, which continue colliding with other atoms, setting off a nuclear chain reaction. This in turn releases a tremendous amount of energy.

    To convert this energy to electricity a heat exchanger is installed, which turns water to steam, driving a turbine to produce power.

    The fission reaction can be controlled by suppressing the supply of neutrons. This is achieved by inserting “control rods” which soak up neutrons. Historically, nuclear accidents such as Chernobyl have occurred when the control rods fail to engage and quench the neutron supply, and/or coolant circulation fails.

    So called “third generation” designs improve on early designs by incorporating passive or inherent safety features which require no active controls or human intervention to avoid accidents in the event of malfunction. These features may rely on pressure differentials, gravity, natural convection, or the natural response of materials to high temperatures.

    The first third generation reactors were the Kashiwazaki 6 and 7 advanced boiling water reactors in Japan.

    The Kashiwazaki-Kariwa Nuclear Power Station in Japan.
    Tokyo Electric Power Co, CC BY-SA

    An unresolved challenge for fission is that the byproducts of the reaction are radioactive for a long time, in the order of thousands of years. If reprocessed, the fuel source and waste can also be used to make a nuclear weapon.

    Fission power is a demonstrated technology. It is also scalable from large scale (the largest is the 7.97 gigawatt Kashiwazaki-Kariwa Nuclear Power Plant in Japan) through to small-to-medium reactors that produce around 150 megawatts of electricity, as used on a ship or nuclear submarine. These are the reactors that will power Australia’s eight nuclear submarines promised as part of a trilateral security partnership with the United Kingdom and the United States.

    What is fusion?

    Fusion is the process that powers the Sun and stars. It is the opposite process to fission. It occurs when atoms are fused together.

    The easiest reaction to initiate in the laboratory is the fusion of isotopes of hydrogen, deuterium and tritium. Per unit mass, the reaction produces 4 times more energy than the fission of U235.

    The fuel ion deuterium is incredibly abundant on Earth and in the universe. Tritium is radioactive with a half-life of 12 years, so is very rare on Earth. The universe is 13.8 billion years old; the only isotopes of light nuclei (hydrogen, helium and lithium) found in nature are those that are stable on those time scales.

    In a fusion power plant, tritium would be manufactured using a “lithium blanket”. This is a solid lithium wall in which fusion neutrons slow and ultimately react to form tritium.

    However, at present it’s very difficult for scientists to create a fusion reaction outside of the laboratory. That’s because it requires incredibly hot conditions to fuse: the optimal conditions are 150 million degrees Celsius.

    Fusion is the process that powers the Sun.
    SOHO (ESA & NASA)

    At these temperatures the fuel ions exist in the plasma state, where electrons and (nuclear) ions are dissociated. The byproduct of this process isn’t radioactive; rather, it’s helium, an inert gas.

    The leading technology path to demonstrate sustained fusion is called “toroidal magnetic confinement”. This is when the plasma is confined at extreme temperatures in a very large doughnut-shaped magnetic bottle.

    Unlike fission, this technology path requires continuous external heating to reach fusion conditions and a strong confining field. Terminate either and the reaction stops. The challenge is not uncontrolled meltdown, but getting the reaction to occur at all.

    A major unresolved challenge for toroidal magnetic confinement fusion, which attracts the majority of research interest, is the demonstration of a burning self-heated plasma. This is when the heating power produced by the reaction itself is primary. This is the objective of the publicly funded multi-national ITER project, the world’s largest fusion experiment, and the privately funded SPARC experiment at Massachusetts Institute of Technology.

    However, the consensus of much of the scientific community is that fusion will not be commercially viable until at least 2050.

    A climate solution?

    I am often asked if nuclear power could save Earth from climate change. I have many colleagues in climate science, and indeed my late wife was a high-profile climate scientist.

    The science is clear: it is too late to stop climate change. The world needs to do everything it can to reduce carbon dioxide emissions and minimise catastrophic damage, and it needs to have done it decades ago.

    For the planet, fission is part of that global solution, together with widespread rollout and adoption of renewable sources of power such as wind and solar.

    On a longer time scale, one hopes that fusion might replace fission. The fuel supply is much larger and ubiquitously distributed, the waste problem is orders of magnitude smaller in volume and timescale, and the technology cannot be weaponised.

    Matthew Hole receives funding from the Australian government through the Australian Research Council and the Australian Nuclear Science and Technology Organisation (ANSTO), and the Simons Foundation. He is also affiliated with ANSTO, the ITER Organisation as an ITER Science Fellow, and is Chair of the Australian ITER Forum.

    ref. What’s the difference between fusion and fission? A nuclear physicist explains – https://theconversation.com/whats-the-difference-between-fusion-and-fission-a-nuclear-physicist-explains-240438

    MIL OSI AnalysisEveningReport.nz