NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Australia

  • MIL-OSI Australia: Monday, 21 October 2024

    Source: Victoria Country Fire Authority

    Fire Danger Ratings tell you how dangerous a fire could be if one started.

    They are important because they help you decide what actions to take to protect yourself and others from bushfires and grassfires.

    Fire danger ratings are shown in the same way across all of Australia, so whether you’re at home or travelling, you will see the same rating system. 

    The new Fire Danger Ratings

    There are four levels of fire danger:

    • Moderate – Plan and prepare
    • High – Be ready to act
    • Extreme – Take action now to protect your life and property
    • Catastrophic – For your survival, leave bushfire risk areas

    Fire Danger Ratings will be issued on days when there is a fire risk.

    Each fire danger rating will have a clear set of messages including the actions the community can take to reduce their risk.

    Ratings are forecast using Bureau of Meteorology data for up to four days in advance, based on weather and other environmental conditions such as vegetation.

    The rating is your trigger to take action to stay safe.

    What do the ratings mean and what should you do?

    CATASTROPHIC

    What does it mean?

    If a fire starts and takes hold, lives are likely to be lost.

    • These are the most dangerous conditions for a fire.

    What should I do?

    For your survival, leave bushfire risk areas.

    • Your life may depend on the decisions you make, even before there is a fire.
    • For your survival, do not be in bushfire risk areas.
    • Stay safe by going to a safer location early in the morning or the night before.
    • Homes cannot withstand fires in these conditions. You may not be able to leave and help may not be available.

    EXTREME

    What does it mean?

    Fires will spread quickly and be extremely dangerous.

    • These are dangerous fire conditions.
    • Expect hot, dry and windy conditions.

    What should I do?

    Take action now to protect your life and property

    • Check your bushfire plan and that your property is fire ready
    • If a fire starts, take immediate action. If you and your property are not prepared to the highest level, go to a safer location well before the fire impacts.
    • Reconsider travel through bushfire risk areas.
    • Leaving bushfire risk areas early in the day is your safest option.

    HIGH

    What does it mean?

    Fires can be dangerous.

    What should I do?

    Be ready to act.

    • There’s a heightened risk. Be alert for fires in your area.
    • Decide what you will do if a fire starts.
    • If a fire starts, your life and property may be at risk. The safest option is to avoid bushfire risk areas.

    MODERATE

    What does it mean?

    Most fires can be controlled.

    What should I do?

    Plan and prepare.

    • Stay up to date and be ready to act if there is a fire.

    NO RATING

    The system also introduces an ‘off’ level for days where no proactive action is required by the community. This does not mean that fires cannot happen, but that they are not likely to move or act in a way that threatens the safety of the community. This rating is the thin white wedge on the colour wheel sitting under ‘Moderate’.

    Find out more

    To see the current Fire Danger Rating forecast across the state see Total Fire Bans & Fire Danger Ratings. To see the Fire Danger Rating forecast for where you are, see CFA Local.

    For more detailed information, check out the Australasian Fire and Emergency Service Authorities (AFAC) website and FAQs, or Prepare and Get Ready – VicEmergency

     

    Page last updated:  Thursday, 10 October 2024 7:49:48 PM

    MIL OSI News –

    January 23, 2025
  • MIL-OSI: SIMPPLE Ltd. Announces $1.0 Million Sale of Multi-functional Robots in Singapore, Malaysia, and Thailand

    Source: GlobeNewswire (MIL-OSI)

    Singapore, Oct. 16, 2024 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced the initial sale, for an aggregate of about $1.0 million, of the Company’s proprietary 3-in-1 multifunctional robots and modular robot heads across Singapore, Malaysia, and Thailand.

    Photo Comparison of Gemini (multifunctional robot) and cleaning robot in a retail mall

    Brand-named Gemini, the A.I. video-analytics robots are the first to perform security, digital concierge, and cleaning services in a facilities management setting. These modular robot heads can be retrofitted on traditional cleaning robots, thus converting them to 3-in-1 units with the same A.I. video-analytics capabilities.

    In Singapore, Gemini robots have been deployed at retail malls, commercial office buildings, and healthcare institutions. In Malaysia and Thailand, SIMPPLE’s Gemini heads have been retrofitted to existing cleaning robots and utilized at commercial office buildings.

    According to SIMPPLE chief executive officer Norman Schroeder, Gemini is a “game-changer” in the field of service robotics. The robot can swiftly, accurately, and intelligently conduct security patrols, engage with lost or distressed personnels seeking security assistance, engage in two-way video calls, interface remotely with facility managers, and perform a wide variety of routine cleaning tasks including scrubbing or vacuuming.

    “Gemini can operate independently or in concert with existing CCTV camera systems,” he added, allowing those systems to identify situations needing resolution and task Gemini to resolve them. In so doing, Gemini provides “significant savings and convenience” to facility management companies and integrated services operators, said the CEO.

    “The deployment of Gemini across Singapore, Malaysia, and Thailand,” he said, “further validates the commercial viability of our end-to-end facilities management solution including integrated robotics and artificial intelligence.”

    Additional Gemini sales to customers in Australia, New Zealand, and other markets are expected “in the coming months,” said Mr. Schroeder.

    The development of Gemini was supported by three Singapore government agencies, one of which, in 2019 and 2022, awarded SIMPPLE grants totalling about $380,000 to develop multi-functional robots. In 2024, Gemini was then included in the Advanced Digital Solutions (ADS) grant scheme supported by Singapore’s InfoComm Media Development Authority (IMDA), thus facilitating SIMPPLE’s aggregate $1.0 million Gemini sale described above.

    According to a May 2024 report by Technavio, the global service robotics market is projected to grow by a CAGR of 30.25%, or $90.4 billion, from 2024 to 2028. This rapid growth, said Technavio, will be driven by the continuing integration of advanced technologies such as IoT, A.I., and natural language processing into service robots, and by world governments pouring significant investment into these technologies. Technological advancements in machine learning, adaptive computing, and vision systems will also make service robots increasingly suitable for commercial tasks, said the report.

    Close-up photo of Gemini modular security head at a premium retail mall in Singapore

    About SIMPPLE LTD.

    Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices. 

    For more information on SIMPPLE, please visit: https://www.simpple.ai

    Safe Harbor Statement

    This press release contains forward-looking statements. In addition Photo of Gemini robot within an institution, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.

    Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.

    For investor and media queries, please contact:
    SIMPPLE LTD.
    Investor Relations Department
    Email: ir@simpple.ai

    Visit the Investor Relation Website: https://www.investor.simpple.ai/

    Skyline Corporate Communications Group, LLC
    Scott Powell, President
    1177 Avenue of the Americas, 5th Floor
    New York, NY 10036
    Tel: (646) 893-5835
    Email: info@skylineccg.com  

    Attachment

    • Photo of Gemini robot within an institution

    The MIL Network –

    January 23, 2025
  • MIL-OSI Global: The ‘bully cats’ bred to resemble American bully dogs and how fashion is creating mutant pet breeds

    Source: The Conversation – UK – By Grace Carroll, Lecturer in Animal Behaviour and Welfare, School of Psychology, Queen’s University Belfast

    Sphynx cats were used to create the bully cat mutant. New Africa/Shutterstock

    Pedigree cat breeding has long had its controversies but a new trend for cats bred to look like American bully XL dogs could be one of the most worrying fads yet.

    So-called “bully cats” originated in the US and are a result of mutant breeding. Unlike pedigree breeding, which focuses on keeping animals purebred, mutant breeding involves intentionally combining genetic mutations to create cats with a specific look. In this case, they mix the gene that causes hairlessness in sphynx cats with the gene responsible for the short legs of munchkin cats, making bully cats a munchkin-sphynx cross.

    These cats share a close resemblance to bully dogs, a group of breeds characterised by a solid build, wide body and short coat. American XL bully dogs were banned in the UK in 2023. Recently, bully cats have made their way to the UK, where social media accounts promoting this new mutant breed have emerged.

    YouTube users criticised this video for “making it normal” to breed animals with genetic health problems.

    According to Marjan van Hagen and Jeffrey de Gier, animal welfare and reproduction experts at Utrecht University in The Netherlands, these mutations can have serious health consequences for the cats and limit their freedom of movement. Kittens already have a limited ability to regulate their body temperature and this is made even more difficult by hairlessness and makes them more suspectible to respiratory infections.

    A lack of fur can also lead to sunburn and skin cancer in hairless cats. Like the sphynx, bully cats also lack whiskers, which cats depend on for communication, navigating their environment and gauging spatial dimensions.

    Short-legged cats also face problems. Short legs limit their ability to jump, can put cats at a disadvantage in fights and can lead to painful health conditions. Although breeders claim that bully cats are healthy and long-lived, it’s still too early to determine their long-term health and welfare.

    Some breeders also say they are screening the cats they breed from for conditions such as heart disease. This can help prevent health problems, but it can’t overcome all of the health and welfare issues with mutant breeding.

    A May 2024 study by veterinary epidemiologist Kendy Tzu-Yun Teng and colleagues assessed annual life expectancy in UK cats and found that the average cat lives nearly 12 years, but sphynx cats have the shortest lifespan — just 6.7 years. Bully cats, being both hairless and short-legged, may face twice the number of challenges encountered by sphynx and munchkin breeds.

    In the wild, unrelated species that face comparable environmental challenges often develop similar traits, a process known as “convergent evolution”. Despite coming from different evolutionary paths, these species evolve to look and behave in similar ways.

    Take the sugar glider from Australia, for example. It looks and behaves much like the US flying squirrel, yet one is a marsupial and one is a mammal. Both animals faced the problem of how to move efficiently in a forest canopy, and evolved the same solution.

    Sugar gliders are not related to flying squirrels.
    I Wayan Sumatika/Shutterstock

    In a similar way, many domesticated animals share common traits, collectively known as “domestication syndrome” including increased tameness, juvenile behaviour, floppy ears and smaller teeth. Traits that helped them adjust to life with humans. However, the resemblance between bully cats and dogs doesn’t come from this gradual, natural process. Instead, it’s the result of selective breeding based on aesthetics.

    Veterinarian and animal welfare scientist Wenche Farstad summarises this as breeding for “curiosity or cuteness” in their 2018 paper on ethical breeding. While people normally find traits like round eyes and short nose length to be particularly cute, breeding for hairlessness and shorter legs is better aligned with the concept of breeding for curiosity.

    In this case, the resemblance between bully cats and dogs is more about human-driven design, where appearance is prioritised. The bully cat seems to have been intentionally bred to resemble the bully dog, perhaps due to their perception among young men as a kind of status symbol.

    Could bully cats survive without humans?

    Mutations that hinder survival and reproduction typically become rare in nature. However, humans bypass natural selection by choosing which animals breed, allowing traits that would be disadvantageous in the wild to persist.

    Examples of this can be seen across a number of domestic species. For example, due to the muscularity of their calves, Belgian Blue cattle require caesarean sections in more than 90% of births.

    Another farm animal, the modern broiler chicken, has been bred to grow much faster than its wild counterparts. If allowed to live longer than their usual slaughter age, many would not survive. Bully cats would probably also struggle to survive in the wild, without humans to care for them.

    Crossbreeding programs can help increase genetic diversity and reduce harmful traits in many breeds. However, for mutant breeds like the bully cat – where hairlessness and short legs are defining traits – this isn’t a realistic solution.

    Prospective pet owners need to be aware of the risks associated with owning mutant and experimental breeds. Consumers hold purchasing power. We can discourage breeders from prioritising aesthetics over the health and welfare of the animals by refusing to buy breeds with extreme traits.

    A fashion toward ethical breeding could ensure future cats are healthier, happier and free to enjoy natural feline behaviour like climbing, jumping and lounging in the sun. We should let cats be cats.

    Grace Carroll does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. The ‘bully cats’ bred to resemble American bully dogs and how fashion is creating mutant pet breeds – https://theconversation.com/the-bully-cats-bred-to-resemble-american-bully-dogs-and-how-fashion-is-creating-mutant-pet-breeds-240729

    MIL OSI – Global Reports –

    January 23, 2025
  • MIL-OSI Global: Autocratic nations are reaching across borders to silence critics – and so far nothing seems to stop them

    Source: The Conversation – UK – By Francesca Lessa, Associate Professor in International Relations of the Americas, UCL

    Iranian journalist Pouria Zeraati survived an assassination attempt outside his home in Wimbledon, south London, in late March 2024. Eighteen months earlier, the London-based independent television channel Iran International, for which Zeraati worked, had temporarily relocated to Washington DC over threats that they believe come from the Islamic Revolutionary Guards Corps.

    Both incidents are examples of how it seems that a government can target an individual or organisation based outside their borders, with terrifying results.

    According to the latest research from the V-Dem Institute at the University of Gothenberg, 71% of the world’s population lived in autocracies in 2023 – ten years ago it was 48%. But what’s also new is that autocracies – as well as some other nations – are increasingly reaching across their borders to target people living abroad, enforcing the idea that they can reach their critics wherever they live.

    This kind of state action, taken outside national borders, is known as transnational repression, and is becoming more widespread. The Chinese government is seen as the biggest perpetrator, sometimes using violence to close down criticism or protests against its regime, held in other countries.

    Countries reaching across borders

    More than 20% of the world’s governments are believed to have taken this kind of action outside their borders in the past ten years. These included assassinations, abductions, assaults, detentions and unlawful deportations, according to the NGO Freedom House. These are aimed at forcibly silencing exiled political activists, journalists, former regime insiders and members of ethnic or religious minorities.
    In 2023, 125 such incidents were committed by 25 countries.

    While the majority of countries committing such practices tend to be autocracies, a number of democracies have also taken action across borders, including Israel, Hungary, India and Turkey, according to the report. In 2023, six countries engaged in these practices for the first time, including the Democratic Republic of Congo, El Salvador and Yemen.




    Read more:
    Why the growing number of foreign agent laws around the world is bad for democracy


    Freedom House recorded 1,034 physical attacks between 2014 and 2023, committed by 44 governments in 100 target countries. China, Turkey, Tajikistan, Russia and Egypt are the most prolific perpetrators, with China accounting for a quarter of all incidents.

    This type of terror tactic can take many forms. Freedom House has noted that governments increasingly cooperated to help target exiled dissidents. In 74% of the incidents of transnational repression that took place in 2021, both the origin and the host countries were rated “not free” by Freedom House.

    Awareness of this type of cross-border action is growing. Both human rights groups and academics are now systematically tracking attacks. And several governments, including the US and Australia, have committed to taking action to combat these practices. A bill was introduced in the US Senate in 2023 to specifically tackle transnational repression by foreign governments in the US and abroad.

    I studied the increasing levels of cooperation in transnational repression by different nations in a recent article published in International Studies Quarterly. We look at why states, which are normally reluctant to collaborate, do so when it comes to silencing dissidents abroad.




    Read more:
    Continuing crackdown on churches and NGOs moves Nicaragua further from democracy to authoritarianism


    Historical lessons?

    There are historical parallels between what happened during Operation Condor in South America and what’s happening today. Operation Condor was a system that Argentina, Bolivia, Chile, Paraguay and Uruguay started using in late 1975 with the backing of the US. It was aimed at persecuting exiles. Operation Condor was the most sophisticated, institutionalised and coordinated scheme ever established to persecute citizens who had been forced to flee their homeland.

    Journalist Pouria Zeraati was attacked.

    Three factors were found to explain why this form of repression was able to be used at the time and why countries agreed to cooperate.

    First, politically active exiled dissidents constituted a threat to the reputation and survival of South America’s ruling juntas. They successfully named and shamed the region’s military regimes, discrediting their international public images given the human rights violations perpetrated and resulting in the US cutting funding to Uruguay in 1976 and Argentina in 1977.

    Second, these autocracies, which came to power between 1964 and 1976, drew inspiration from the US National Security Doctrine and the French School of Counterinsurgency. In both, security was considered more important than human rights.

    The history of Operation Condor.

    Finally, two countries catalysed efforts to cooperate in this kind of action. Chile pushed for the formal creation of Operation Condor in 1975. Argentina then expanded it to include Brazil, Peru and Ecuador between 1976 and 1978. This significantly widened Operation Condor’s scope for action to most of South America.

    Why Operation Condor is relevant?

    Operation Condor was the only regional organisation to be created to hunt down political opponents across borders. Lessons from this historical experience are relevant today.

    Cooperation in transnational repression in the last few years also occurs in regional clusters, as shown by research by academics and human rights groups. These groups of nations include, for instance, Belarus, Russia and Tajikistan, as well as Thailand, Cambodia, Laos and Vietnam.

    In recent years these south-east Asian countries have closely collaborated to persecute, arbitrarily arrest and forcibly repatriate exiled activists and refugees, according to the media, the UN and international human rights NGOs.

    Second, one or more countries, predominantly Russia and Turkey, have worked together on efforts to repress critics over a significant period.

    Third, some regional organisations, of authoritarian nature, often enable cooperation in transnational repression, or at least create unsafe environments for migrating dissidents.

    The Shanghai Cooperation Organisation (SCO) and the Gulf Cooperation Council are examples, since they “have expanded their collective efforts against exiles”, according to some sources. SCO member states, especially Russia, China and Uzbekistan, have repeatedly used the organisation to pursue political opponents abroad and persecute them as criminals. This shows the organisation’s role as a platform for the diffusion and consolidation of authoritarian principles.

    Countries engaging in this kind of political repression today often wish to silence dissent wherever it occurs.

    These countries are acting in complete disregard of established principles of international law and international relations, such as sovereignty and the protection of refugees, and seem to be expanding their operations. It remains to be seen if there’s anything that the rest of the international community can do to reverse this terrifying trend, but at least it has started trying.

    Francesca Lessa’s projects “Operation Condor” and “Plancondor.org” received funding from the University of Oxford John Fell Fund, The British Academy/Leverhulme Trust, the University of Oxford ESRC Impact Acceleration Account, the European Commission under Horizon 2020, the Open Society Foundations, and UCL Public Policy through Research England’s QR-PSF funding. Lessa is also the Honorary President of the Observatorio Luz Ibarburu, a network of human rights NGOs in Uruguay.

    – ref. Autocratic nations are reaching across borders to silence critics – and so far nothing seems to stop them – https://theconversation.com/autocratic-nations-are-reaching-across-borders-to-silence-critics-and-so-far-nothing-seems-to-stop-them-233037

    MIL OSI – Global Reports –

    January 23, 2025
  • MIL-OSI Global: In despair about Earth’s future? Look for green shoots

    Source: The Conversation – UK – By Heather Alberro, Lecturer in Sustainability, University of Manchester

    A white stork nesting in the city. Dr.MYM/Shutterstock

    As species go extinct and a habitable climate teeters, it’s understandable to feel despair.

    Some of the world’s top climate scientists have expressed their mounting hopelessness at the prospect of reaching 3°C by 2100. This hellish scenario, well in excess of the 1.5°C countries agreed to aim for when they signed the 2015 Paris agreement, would indeed spell disaster for much of life on Earth.

    As a lecturer in sustainability, I often hear my anxious students bemoan the impossibility of building a way out of ecological collapse. However, the greatest danger is fatalism, and assuming, as Margaret Thatcher claimed, that “there is no alternative”.

    There is a vast ocean of possibility for transforming the planet. Increasingly, cities are in the vanguard of forging more sustainable worlds.

    Car-free futures

    Since the early 1900s, the car has afforded a sense of freedom for some while infringing on the freedoms of others.

    Cars, particularly SUVs, are a major source of air pollution and CO₂ emissions globally. Motorways and car parking spaces have transformed Earth’s terrain and monopolised public space. For those of us in industrialised societies, it is difficult to imagine life without cars.

    Global sales of electric vehicles are projected to continue rising. Yet even these supposed solutions to an unsustainable transport sector require a lot of space and materials to make and maintain.

    With cities set to host nearly 70% of all people by 2050, space and livability are key concerns. As such, cities across Europe and beyond are beginning to reclaim their streets.

    Between 2019 and 2022, the number of low-emissions zones, areas that regulate the most polluting vehicles in order to improve air quality and help to protect public health, expanded by 40% in European cities. Research suggests that policies to restrict car use such as congestion charges and raised parking fees can further discourage their use. However, providing viable and accessible alternatives is also crucial: as such, many cities are also widening walkways, building bike lanes and making public transport cheaper and easier to access.

    An estimated 80,000 cars used to pass daily through the centre of Pontevedra, a city in north-west Spain. Mayor Miguel Anxo Fernandez Lores instituted a ban on cars in 1999 and removed on-street parking spaces. The city has since drastically reduced air pollution and hasn’t had a vehicular death in over a decade.

    Civic life in Pontevedra has benefited from the absence of cars.
    Trabantos/Shutterstock

    Living cities

    Cement and concrete are widely used to make major infrastructure such as roads, bridges, buildings and dams. The cement industry accounts for up to 9% of global emissions. Moreover, the open-pit quarrying of limestone, a key ingredient in cement, involves removing topsoil and vegetation which rips up ecosystems and biodiversity and increases flooding risks.

    A burgeoning “depaving” movement originated in Portland, Oregon in 2008 and has removed concrete and asphalt from cities including Chicago, London and several cities across Canada, replacing it with plants and soil.

    Depaving is an example of the wider urban rewilding movement which aims to restore natural habitats and expand green spaces in cities for social and ecological wellbeing.

    Multispecies coexistence

    A new report by the World Wildlife Fund for Nature (WWF) has documented an average 73% decline in the abundance of monitored wildlife populations globally since 1970. Despite such unfathomable losses, many cities are being transformed into oases of multispecies life.

    Prized for their fur, beavers were hunted to extinction in the UK by the 16th century. Their water damming activities create homes for other species such as birds and invertebrates and help prevent flooding. Eurasian beavers have been thriving in Sweden, Norway and Germany since their reintroduction in the 1920s and 1960s, respectively.

    In 2022, beavers were designated a protected species in England. In October 2023, London saw its first baby beaver in over 400 years.

    Melbourne has launched a project to create a 18,000 square-metre garden in the city by 2028, with at least 20 local plant species for each square metre. An 8-kilometre long pollinator corridor is also being created to allow wildlife to travel between 200 interconnected gardens and further help local pollinators flourish.

    Living alongside larger predators brings unique challenges. However, as with any functional relationship, respect is key for coexistence. Los Angeles and Mumbai are two major cities that are learning to live alongside mountain lions and leopards. Local officials have launched public education initiatives urging people to, for instance, maintain a safe distance from the animals and not walk alone outside at night. In cases where wildlife conflicts occur, such as between wolves and farmers who have lost livestock, non-lethal methods such as wolf-proof fences and guard dogs have been found to be more effective solutions than culls.

    India’s leopard population appears to be rising.
    Nedla/Shutterstock

    Environmental justice now

    Cities, particularly in wealthy countries, are only a small part of the story.

    At just over 500 years old, the modern capitalist system, imposed globally through European colonialism, is a relatively recent development. Despite its influence, the visionary author Ursula K. Le Guin reminded us that “any human power can be resisted and changed by human beings”.

    Indigenous peoples numbering 476 million across 90 countries represent thousands of distinct cultures that persist as living proof of the enduring possibilities of radically different ways of living.

    An online database tracks 4,189 environmental justice movements worldwide. From multi-tribe Indigenous Amazonian alliances keeping illegal miners at bay, to countless local communities and activist groups resisting the construction of new fossil fuel infrastructure. Over the last few years, these place-based struggles have either stopped, stalled or forced the suspension of at least one-quarter of planned extractive projects.

    These examples demonstrate hope in action, and suggest that the radical changes required to avert climate and ecological breakdown are often a simple question of will and collective resolve.

    Reality, like the future, is never fixed. Whether the world is 2, 3 or 4-degrees warmer by 2100 depends on actions taken today. The terrain ahead will be full of challenges. But, glimmers of a better world are already here.



    Don’t have time to read about climate change as much as you’d like?

    Get our award-winning weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 35,000+ readers who’ve subscribed so far.


    Heather Alberro does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. In despair about Earth’s future? Look for green shoots – https://theconversation.com/in-despair-about-earths-future-look-for-green-shoots-232114

    MIL OSI – Global Reports –

    January 23, 2025
  • MIL-OSI USA: MAINE’S SINGLE AREA CODE EXTENDED AN ADDITIONAL TWO AND A HALF YEARS

    Source: US State of Maine

    North American Numbering Plan Administrator (NANPA) Predicts 207 Area Code to be Exhausted no Earlier than the Second Quarter of 2036

    October 16, 2024

    Hallowell, Maine -A semi-annual review of area code exhaust dates by the North American Numbering Plan Administrator (NANPA) shows Maine’s single area code has gained another two and a half years before its predicted exhaust date. The previous estimated exhaust date was the fourth quarter of 2033.

    “The Commission is very active in a number of conservation efforts, working with companies to ensure they get the telephone numbers they need, while asking other companies to return numbers they dont need,” said Chair Philip L. Bartlett II. Our team has been working collaboratively with phone companies, the Federal Communications Commission, the North American Numbering Council (NANC), and NANPA on strategies to extend the entire numbering system, not just Maine.

    The life of the overall area code system has been extended an additional 1-2 years. According to the FCC, NANC estimated that the total societal cost of expanding the universe of numbering resources in NANP would be as much as $270 billion and would require adding two additional digits to all telephone numbers nationwide.

    The Commission has been monitoring the status of the 207 area code closely for several years as the number of service providers in Maine has been increasing significantly along with the volume of numbering requests. In January 2021, the predicted exhaust date was 2024. With this extension to 2036, weve added more than 12 additional years.

    The Commission continues to work collaboratively with officials in other states to share best practices. New Hampshires 603 area code, which is also in danger of exhaustion, has seen its forecast extended by nearly two years from 2027 to 2029.

    The next update from NANPA on area code exhaust dates will be April 2025. The NANPA number exhaustion and prediction reports can be found at https://nationalnanpa.com/reports/reports_npa.html.

    Background

    In 2023, the Maine Public Utilities Commission opened an investigation into Rate Center Consolidation (RCC) . This approach, recommended by a recent NANC report to the FCC , would combine 149 calling areas into one. The result would reduce demand for numbering resources and allow telephone providers to utilize more existing resources. The Commission is in the final stages of considering RCC.

    The Commission has also worked closely with Maine lawmakers to enact measures that reduce the wasteful use of numbering resources while also combatting illegal robocalling.
    Through the course of its work, the Commission has learned that some telephone number providers legally procure telephone numbers and then sell them to companies that bombard Maine people with scam calls. By working closely with NANPA, the FCC, and state lawmakers, we have worked to curb robocalling in Maine, but more work must be done.

    About the Commission

    The Maine Public Utilities Commission regulates electric, telephone, water and gas utilities to ensure that Maine citizens have access to safe and reliable utility service at rates that are just and reasonable for all ratepayers while also helping achieve reductions in state greenhouse gas emissions. Commission programs include Maine Enhanced 911 Service, gas safety and Dig Safe. Philip L. Bartlett, II serves as Chair, Patrick Scully and Carolyn Gilbert serve as Commissioners.

    Learn more about the Commission at https://www.maine.gov/mpuc/.


    CONTACT: Susan Faloon, Media Liaison CELL: 207-557-3704 EMAIL: susan.faloon@maine.gov WEBSITE: https://www.maine.gov/mpuc/

    MIL OSI USA News –

    January 23, 2025
  • MIL-OSI Security: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

    Source: US Department of Homeland Security

    Summary

    The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

    Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

    This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

    The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

    Download the PDF version of this report:

    For a downloadable list of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Overview of Activity

    The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

    Initial Access and Persistence

    The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

    Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

    • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
    • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

    The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

    Lateral Movement

    The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

    Credential Access

    The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

    Privilege Escalation

    In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

    Discovery

    The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

    • Nltest /dclist
    • Nltest /domain_trusts
    • Nltest /domain_trusts/all_trusts
    • Net group “Enterprise admins” /domain
    • Net group “Domain admins” /domain

    Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                               $i=0
                                               $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                               $L='LDAP://' . $D
                                               $D = [ADSI]$L
                                               $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                               $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                               $s = [adsisearcher]$str
                                               $s.searchRoot = $L.$D.distinguishedName
                                               $s.PropertiesToLoad.Add('cn') > $Null
                                               $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                               $s.PropertiesToLoad.Add('description') > $Null
                                               $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                               Foreach ($CA in $s.FindAll()) {
                                                             Write-Host $CA.Properties.Item('cn')
                                                             $CA.Properties.Item('operatingsystem')
                                                             $CA. Properties.Item('description')
                                                             $CA.Properties.Item('distinguishedName')
                                                             $i++
                                               }
                                               Write-host Total servers: $i

    Command and Control

    On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

    Exfiltration and Collection

    In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

    Detection

    To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

    To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

    • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
    • Look for one IP used for multiple accounts, excluding expected logins.
    • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
    • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
    • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
    • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
    • Look for unusual activity in typically dormant accounts.
    • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

    Mitigations

    The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

    • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
    • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
    • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
    • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
    • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
      • Detecting unsuccessful login attempts [CPG 2.G].
      • Having users deny MFA requests they have not generated.
      • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
    • Ensure password policies align with the latest NIST Digital Identity Guidelines.
      • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
    • Disable the use of RC4 for Kerberos authentication.

    These mitigations apply to critical infrastructure entities across sectors.

    The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

    Validate Security Controls

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

    Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

    Version History

    October 2, 2024: Initial version.

    Appendix A: MITRE ATT&CK Tactics and Techniques

    See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Reconnaissance
    Technique Title  ID Use
    Gather Victim Identity Information T1589 The actors likely gathered victim information.
    Table 2: Resource Development
    Technique Title  ID Use
    Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
    Table 3: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
    Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
    External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
    Table 4: Execution
    Technique Title  ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
    Table 5: Persistence
    Technique Title ID Use
    Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
    Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
    Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
    Table 6: Privilege Escalation
    Technique Title ID Use
    Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
    Table 7: Defense Evasion
    Technique Title ID Use
    Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Table 8: Credential Access
    Technique Title ID Use
    Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
    Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
    Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
    Table 9: Discovery
    Technique Title ID Use
    Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
    Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
    Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
    Table 10: Lateral Movement
    Technique Title  ID Use
    Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
    Table 11: Collection
    Technique Title ID Use
    Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
    Table 12: Command and Control
    Technique Title ID Use
    Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
    Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
    Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

    Appendix B: Indicators of Compromise

    See Tables 13 to 15 for IOCs obtained from FBI investigations.

    Table 13: Malicious Files Associated with Iranian Cyber Actors
    Hash Description
    1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
    3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

    Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

    Table 14: Network Indicators
    IP Address Date Range
    95.181.234.12 01/30/2024 to 02/07/2024
    95.181.234.25 01/30/2024 to 02/07/2024
    173.239.232.20 10/06/2023 to 12/19/2023
    172.98.71.191 10/15/2023 to 11/27/2023
    102.129.235.127 10/21/2023 to 10/22/2023
    188.126.94.60 10/22/2023 to 01/12/2024
    149.40.50.45 10/26/2023
    181.214.166.59 10/26/2023
    212.102.39.212 10/26/2023
    149.57.16.134 10/26/2023 to 10/27/2023
    149.57.16.137 10/26/2023 to 10/27/2023
    102.129.235.186 10/29/2023 to 11/08/2023
    46.246.8.138 10/31/2023 to 01/26/2024
    149.57.16.160 11/08/2023
    149.57.16.37 11/08/2023
    46.246.8.137 11/17/2023 to 01/25/2024
    212.102.57.29 11/19/2023 to 01/17/2024
    46.246.8.82 11/22/2023 to 01/28/2024
    95.181.234.15 11/26/2023 to 02/07/2024
    45.88.97.225 11/27/2023 to 02/11/2024
    84.239.45.17 12/04/2023 to 12/07/2023
    46.246.8.104 12/07/2023 to 02/07/2024
    37.46.113.206 12/07/2023
    46.246.3.186 12/07/2023 to 12/09/2023
    46.246.8.141 12/07/2023 to 02/10/2024
    46.246.8.17 12/09/2023 to 01/09/2024
    37.19.197.182 12/15/2023
    154.16.192.38 12/25/2023 to 01/24/2024
    102.165.16.127 12/27/2023 to 01/28/2024
    46.246.8.47 12/29/2023 to 01/29/2024
    46.246.3.225 12/30/2023 to 02/06/2024
    46.246.3.226 12/31/2023 to 02/03/2024
    46.246.3.240 12/31/2023 to 02/06/2024
    191.101.217.10 01/05/2024
    102.129.153.182 01/08/2024
    46.246.3.196 01/08/2024
    102.129.152.60 01/09/2024
    156.146.60.74 01/10/2024
    191.96.227.113 01/10/2024
    191.96.227.122 01/10/2024
    181.214.166.132 01/11/2024
    188.126.94.57 01/11/2024 to 01/13/2024
    154.6.13.144 01/13/2024 to 01/24/2024
    154.6.13.151 01/13/2024 to 01/28/2024
    188.126.94.166 01/15/2024
    89.149.38.204 01/18/2024
    46.246.8.67 01/20/2024
    46.246.8.53 01/22/2024
    154.16.192.37 01/24/2024
    191.96.150.14 01/24/2024
    191.96.150.96 01/24/2024
    46.246.8.10 01/24/2024
    84.239.25.13 01/24/2024
    154.6.13.139 01/26/2024
    191.96.106.33 01/26/2024
    191.96.227.159 01/26/2024
    149.57.16.150 01/27/2024
    191.96.150.21 01/27/2024
    46.246.8.84 01/27/2024
    95.181.235.8 01/27/2024
    191.96.227.102 01/27/2024 to 01/28/2024
    46.246.122.185 01/28/2024
    146.70.102.3 01/29/2024 to 01/30/2024
    46.246.3.233 01/30/2024 to 02/15/2024
    46.246.3.239 01/30/2024 to 02/15/2024
    188.126.89.35 02/03/2024
    46.246.3.223 02/03/2024
    46.246.3.245 02/05/2024 to 02/06/2024
    191.96.150.50 02/09/2024
    Table 15: Devices
    Device Type Description
    Samsung Galaxy A71 (SM-A715F) Registered with MFA
    Samsung SM-G998B Registered with MFA
    Samsung SM-M205F Registered with MFA

    MIL Security OSI –

    January 23, 2025
  • MIL-OSI Canada: Government of Canada to announce support for Cape Breton University

    Source: Government of Canada News

    Sydney, Nova Scotia · October 16, 2024 · Atlantic Canada Opportunities Agency (ACOA)

    Mike Kelloway, Parliamentary Secretary to the Minister of Fisheries, Oceans and the Canadian Coast Guard and Member of Parliament for Cape Breton-Canso, will make an announcement regarding a significant federal contribution for the Canada Games Complex.

    This announcement will be made on behalf of the Honourable Gudie Hutchings, Minister of Rural Economic Development and Minister responsible for ACOA.

    Date: October 17, 2024

    Time: 11:00 a.m. AST

    Location:
    Cape Breton University
    Yvonne LeVert Hospitality Suite
    1250 Grand Lake Road
    Sydney, Nova Scotia
    B1M 1A2

    Connor Burton
    Press Secretary
    Office of the Minister of Rural Economic Development and of the Atlantic Canada Opportunities Agency
    Connor.Burton@acoa-apeca.gc.ca 

    Lori Selig
    Acting Communications Director  
    Atlantic Canada Opportunities Agency
    902-266-7477
    lori.selig@acoa-apeca.gc.ca

    MIL OSI Canada News –

    January 23, 2025
  • MIL-OSI Australia: Online Public Briefing- National Panel of Assessors Request for Tender (RFT)

    Source: Australian Department for Social Services

    16 October 2024

    The Department of Social Services is hosting a National Panel of Assessors (NPA) Request for Tender (RFT) public briefing which will take place on Monday 21 October at 1pm (AEDT).

    To register for the webinar, visit: National Panel of Assessors (NPA) – Public Briefing Webinar (humanitix.com).

    The RFT is open from Wednesday 16 October 2024 to 12pm (AEDT) on Monday 11 November 2024.

    What is the NPA?

    The Australian Government is committed to ensuring that people with disability have access to a range of Assessment Services to support them in the workplace. The NPA program will bring together a panel of independent Providers under a Deed of Standing Offer arrangement to conduct:

    • Supported Wage System (SWS) assessments
    • Ongoing Support Assessments (OSA), and
    • Workplace Modifications Services (WMS) assessments.  

    Respondents to the RFT may bid to provide either or both of the following combinations of assessments:

    • OSA and SWS assessments together, or
    • WMS assessments, including any specialist WMS assessments nominated by the Respondent.

    What the online public briefing will cover?

    The briefing will outline key elements of the NPA RFT, provide an overview of key changes from the Exposure Draft and provide an overview of the procurement process. The presenters are Pene Futcher, Branch Manager, Disability Employment Programs and Sonya McCarthy, Acting Branch Manager, Disability Employment Implementations.

    Questions and comments will not be open for this briefing. It will be an accessible live streamed event. If you are unable to attend the briefing, it will be recorded and made available on engage.dss.gov.au and dss.gov.au.

    For questions about the briefing registration process, please contact DESCommunications@dss.gov.au.

    Find out more

    The RFT is available on AusTender. Find out more about the NPA program.

    All questions in relation to the RFT must be submitted to the Contact Officer at DE2025Purchasing@dss.gov.au. Publication of responses to questions will be managed in accordance with the process outlined in the RFT.

    Last updated: 16 October 2024 – 4:00pm

    MIL OSI News –

    January 23, 2025
  • MIL-OSI Global: What is Temporary Protected Status? A global migration expert explains why the US offers some foreign nationals temporary protection

    Source: The Conversation – USA – By Karen Jacobsen, Henry J. Leir Chair in Global Migration, Fletcher School of Law & Diplomacy, Tufts University

    Haitian students use mobile phones to record an exercise during an English class in Springfield, Ohio, on Sept. 13, 2024. Roberto Schmidt/AFP via Getty Images

    Former President Donald Trump and his running mate, U.S. Sen. JD Vance, have criticized the Biden administration’s decision to allow Haitian nationals who are in the U.S. to apply for permission to stay under a legal classification called Temporary Protected Status. Here is what this designation means and how it’s made:

    TPS permits foreign nationals who are already in the United States – even if they did not enter the country through an official or legal means – to remain for six, 12 or 18 months at a time if the situation in their home country is deemed too dangerous for them to return. Threats that prompt TPS designations include ongoing armed conflict, natural disasters, epidemics and other extraordinary and temporary conditions.

    The Secretary of the U.S. Department of Homeland Security designates a foreign country for TPS when conditions there meet requirements spelled out in federal law. Once the secretary determines that the foreign country is safe for its nationals to return, their protected status expires and people who have been granted it are expected to return to their home country.

    Congress created TPS as part of the Immigration Act of 1990. Since then, administrations have used it to protect thousands of people from dozens of countries. The first nations to be designated, in March 1991, were Kuwait, Lebanon and Liberia.

    As of March 2024, there were 863,880 people from 16 countries under Temporary Protected Status in the U.S. Another 486,418 people had initial or renewal applications pending. An estimated 316,000 people may also be eligible under two new extensions since that date.

    TPS beneficiaries may not be detained by federal officials over their immigration status or deported from the United States. They can obtain work permits and apply for authorization to travel outside the U.S. and return to it.

    People who receive TPS don’t automatically become legal permanent residents. But they can petition for an adjustment of their immigration status, such as applying for permanent residency, a student visa or asylum. Applying for a change of immigration status does not necessarily mean their application will be approved.

    Humanitarian measures

    TPS is not the only tool administrations can use to protect people from countries facing disaster or conflict.

    For example, a Haitian person currently living in the U.S. is eligible for TPS under a designation that lasts through Feb. 3, 2026. In contrast, a Haitian who travels through Mexico and applies for entry to the U.S. at the border is not likely to be admitted.

    However, there is a third possibility for Haitians, known as parole. The federal government can give certain groups permission to enter or remain in the U.S. if it finds “urgent humanitarian or significant public benefit reasons” for doing so.

    People who enter through parole programs must have an approved financial supporter in the U.S., undergo a robust security vetting and meet other eligibility criteria. They typically can stay for one to two years, and may apply for authorization to work.

    One current parole program is for people from Latin American countries that are TPS designates. The U.S. government can grant advance permission to enter the U.S. to up to 30,000 Cubans, Haitians, Nicaraguans and Venezuelans each month. People fleeing these countries – all of which have been designated for Temporary Protected Status – can seek authorization to travel from their homes to the U.S. for urgent humanitarian reasons, and then stay for a temporary period of parole for up to two years.

    Immigrant rights groups rally at the U.S. Capitol following a federal court ruling that threatened the legal standing of thousands with Temporary Protected Status, Sept. 15, 2020.
    Chip Somodevilla/Getty Images

    I’ve studied global migration and asylum policy for 25 years. I see both TPS and parole as legal and carefully considered ways to support people from countries experiencing wrenching conflict, disorder and disaster who are seeking safety in the U.S. Doing away with these programs, as Trump sought to do during his term in office, would make it extremely difficult for people in great danger to escape.

    Neither TPS nor parole programs are automatic roads to citizenship or permanent residence. They are ways to provide humanitarian assistance to people in appalling circumstances, such as rampant gang violence in Haiti and economic hardship and political repression in Venezuela and Nicaragua.

    Certainly, cities need more resources to support large numbers of immigrants. But offering temporary protection to people whose home countries are not safe places to live is a long-standing – and, in my view, crucial – element of U.S. immigration policy.

    Karen Jacobsen does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. What is Temporary Protected Status? A global migration expert explains why the US offers some foreign nationals temporary protection – https://theconversation.com/what-is-temporary-protected-status-a-global-migration-expert-explains-why-the-us-offers-some-foreign-nationals-temporary-protection-240525

    MIL OSI – Global Reports –

    January 23, 2025
  • MIL-OSI Security: NATO Defence Ministers to advance work on deterrence and defence, support to Ukraine and global partnerships

    Source: NATO

    As NATO Defence Ministers prepare to meet at NATO Headquarters in Brussels on Thursday and Friday (17-18 October 2024), Secretary General Mark Rutte previewed the expected outcomes of the meeting in a press conference at NATO Headquarters.

    Allies need “to move further and faster to meet the growing threats we face”, he explained, adding that ”this requires more forces, capabilities and investment to meet the ambitious targets set by our defence plans.” Mr Rutte listed expanded defence industrial capacity, more robust supply chains and new technologies as critical to ensuring the Alliance remains resilient across all domains. He said he expected Ministers to greenlight a new NATO initiative to improve standardisation, explaining that “better implementation of standards can help reduce the cost of defence procurement, so this is essential work for NATO.”
     
    The Secretary General reaffirmed that NATO stands shoulder-to-shoulder with Ukraine, both now and into the future. NATO Defence Ministers will meet with their Ukrainian counterpart, Rustem Umerov in the NATO-Ukraine Council on Thursday evening to discuss the battlefield situation and Ukraine’s most urgent needs. Mr Rutte indicated that work is well on track both to set up the new NATO command in Wiesbaden to coordinate security assistance and training for Ukraine, and to deliver on the pledge of 40 billion euros in military aid for Ukraine. He announced that “NATO Allies provided 20.9 billion euros in military assistance to Ukraine during the first half of 2024 and Allies are on track to meet their commitments for the rest of the year”, adding that “the message is clear: NATO is delivering for Ukraine, and we will continue to do so.”
     
    The Defence Ministers’ meeting will also be an opportunity to exchange views on the current global security situation with NATO’s close partners in the Indo-Pacific and with the European Union. For the first time, Defence Ministers from Australia, Japan, New Zealand and the Republic of Korea are joining a NATO Defence Ministers’ meeting. “In this more interconnected world, it is vital that we tackle our shared security challenges together” the Secretary General concluded.

    MIL Security OSI –

    January 23, 2025
  • MIL-OSI Australia: National consultations show widespread, systemic racism damaging lives

    Source: Australian Human Rights Commission

    Racism is commonplace and normalised in Australia and can affect almost every part of a person’s daily life, according to a new report for the Australian Human Rights Commission (AHRC). National consultations with diverse and marginalised communities revealed first-hand accounts from hundreds of people who have experienced racism. 

    The report, An Anti-Racism Framework: Experiences and perspectives of multicultural Australia, was commissioned by the AHRC and conducted by the Federation of Ethnic Communities’ Councils of Australia (FECCA). Among the key findings was that, despite the diversity of people’s backgrounds – including location, age, disability, sexuality, faith and cultural background – racism was prevalent throughout the country and entrenched in society. 

    Racism, the report found, is often being experienced at the same time as another form of discrimination such as disability or sex discrimination, and is taking place in people’s schools, workplaces, public spaces, and during interactions with health services or law enforcement.  

    The report also found governments and the media are culpable in further marginalising people through a culture of silence, which either ignores or minimises incidents of racism or stokes divisions through sensationalist rhetoric. 

    Race Discrimination Commissioner Giridharan Sivaraman: “These powerful and at times heartbreaking first-hand accounts from diverse and marginalised communities reaffirm the fact that racism in Australia is ubiquitous, insidious and profoundly damaging. 

    “The racism described is more than hurtful words being said to someone. It is systemic, often involving dealings with some level of authority, whose power determines access to opportunities, basic needs, services, or justice.  

    “Racism seeps into almost every aspect of people’s lives, and in ways that have become so normalised that victims don’t feel they can talk about it and decide to ‘learn to live with it’. Everyday racism is hidden in plain sight.  

    “People spoke of how they felt they had to lose their identity to fit in, their experience of subtle acts of discrimination or alienation at school, work or their communities, and biases they felt in dealing with those in power. Sadly, people not feeling safe because of their race is widespread.”  

    The report made 11 recommendations, including:  

    • The Australian Government must lead the way to change and commit to a whole-of-society, anti-racism agenda, such as through a national anti-racism framework.  

    • Combating First Nations racism must be at the forefront of reform.  

    • Public and private institutions, including in education, employment, healthcare, and justice, must have policies in place to address racism in all its forms. This includes incorporating preventative and redress mechanisms, reviewing all current policies and procedures for accessing opportunities and services, and introducing mandatory anti-racism training.  

    • Introducing a national Human Rights Act, also in line with the key finding of the Commission’s landmark Free + Equal Project.  

    “The first step to systemic change is to break the silence around racism. No longer should victims just ‘get on with it’,” Commissioner Sivaraman said.  

    “Racism is a barrier to ensuring all Australians are afforded the same opportunity, dignity, respect and access as others. We must urgently have a sound human rights protection system that establishes a safe and inclusive environment for all.”  

    FECCA conducted more than 40 consultations with 860 participants across all states and territories, and an online survey with more than 400 responses. They each captured people’s personal experiences of racism and their ideas about solutions. The report is part of a suite of work helping inform the National Anti-Racism Framework, which the Commission will deliver to the Federal Government on 26 November.  

    FECCA Chairperson Carlo Carli: “This report shows the need for a comprehensive anti-racism strategy in this country has never been stronger. 

    “We are delighted that the voices of people with lived experience of racism will help shape the National Anti-Racism Framework, driving meaningful change and accountability across all sectors. The courage of those who shared their stories should compel all of us to confront and address the systemic nature of racism in Australia. 

    “By incorporating the insights of those who endure this daily, the National Anti-Racism Framework has the potential to dismantle discriminatory structures and build a fairer society for all.” 

    Read the report: An Anti-Racism Framework: Experiences and perspectives of multicultural Australia 

    Commissioner Sivaraman will release the report today (17 October 2024) at the FECCA Conference in Brisbane.

    A separate report outlining insights from consultations with First Nations communities will be released later this month. It is part of a suite of work that includes this consultations report that will feed into the development of the National Anti-Racism Framework. 

    ENDS | Media contact: media@humanrights.gov.au or 0457 281 897 

    MIL OSI News –

    January 23, 2025
  • MIL-OSI United Kingdom: Joint statement on establishing Multilateral Sanctions Monitoring Team (MSMT)

    Source: United Kingdom – Executive Government & Departments

    Several countries gave a joint statement on the establishment of the Multilateral Sanctions Monitoring Team (MSMT) in response to the termination of the mandate of the Panel of Experts for the UNSC 1718 Sanctions Committee in April this year.

    The Republic of Korea, Japan, the USA, the UK, France, Germany, Italy, the Netherlands, Australia, Canada and New Zealand gave a statement on their recent establishment of the Multilateral Sanctions Monitoring Team (MSMT) for the implementation of UN Security Council Resolutions regarding the DPRK:

    We, the participating states of the MSMT, are aligned in our commitment to uphold international peace and security and to safeguard the global non-proliferation regime and address the threat arising from the Democratic People’s Republic of Korea’s (DPRK) weapons of mass destruction (WMD) and ballistic missile programs, which are in violation of UN Security Council resolutions (UNSCRs).

    In light of the veto which disbanded the UN Security Council’s 1718 Committee Panel of Experts this year, we hereby express our intention to establish the Multilateral Sanctions Monitoring Team (MSMT), a multilateral mechanism to monitor and report violations and evasions of the sanction measures stipulated in the relevant UNSCRs. The goal of the new mechanism is to assist the full implementation of UN sanctions on the DPRK by publishing information based on rigorous inquiry into sanctions violations and evasions attempts.

    We underscore our shared determination to fully implement relevant UNSCRs regarding the DPRK, reaffirm that the path to dialogue remains open, and call on all states to join global efforts to maintain international peace and security in the face of the ongoing threats from the DPRK.

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom –

    January 23, 2025
  • MIL-OSI Canada: Transit investments in Cape Breton Regional Municipality

    Source: Government of Canada News

    News release

    Transit Cape Breton will have new buses on the road after an investment of more than $2.3 million from the federal government.

    Cape Breton Regional Municipality, Nova Scotia, October 16, 2024 — Transit Cape Breton will have new buses on the road after an investment of more than $2.3 million from the federal government.

    This project was announced today by Parliamentary Secretary Jaime Battiste, MP for Sydney-Victoria, Parliamentary Secretary Mike Kelloway, MP for Cape Breton-Canso, and Mayor Amanda McDougall-Merrill.

    Transit Cape Breton will buy two new traditional buses, two new hybrid accessible mini buses, and build five new bus shelters. This project will include the implementation of a new on-demand software that will make paratransit service more efficient by improving ride booking, cutting down route travel time, and increasing the capacity of the service. The project will also support the introduction of a new smart card fare payment system, a contactless payment service that will make paying transit fares faster and easier. 

    Quotes

    “Public transit in CBRM is vital to our community, helping residents get to school and work on time, providing an accessible way to get to meetings and appointments, and offering an affordable alternative to driving. Our government is proud to support these equipment and service upgrades to Transit Cape Breton, building a public transit system that Cape Bretoners can rely on.”

    Jaime Battiste, Parliamentary Secretary to the Minister of Crown-Indigenous Relations and Member of Parliament for Sydney–Victoria on behalf of the Honourable Sean Fraser, Minister of Housing, Infrastructure and Communities

    “Investments in Cape Breton Transit ensure that residents across CBRM from Howie Centre to Glace Bay can get to where they need to go with confidence. This project is going to make scheduling easier and day-to-day commutes better for residents of CBRM.”

    Mike Kelloway, Parliamentary Secretary to the Minister of Fisheries, Oceans and the Canadian Coast Guard and Member of Parliament for Cape Breton–Canso

    “Today marks a significant step forward for our community as we announce vital funding for rural transit in the Cape Breton Regional Municipality. This investment through the Rural Transit Solutions Fund will enhance rural accessibility, connect communities, and support our growing population. Access to transportation is essential in building an inclusive and thriving community – this fund will open up opportunities for employment, education and social events to residents across the CBRM.” 

    Amanda McDougall-Merrill, Mayor of Cape Breton Regional Municipality

    Quick facts

    • The federal government is investing $2,380,000 in this project through the Rural Transit Solutions Fund (RTSF), and Cape Breton Regional Municipality is contributing $595,000.

    • The RTSF helps Canadians living in rural and remote areas get around their communities more easily. It supports the development of rural transit solutions, including new transit service models that could be replicated or scaled up.

    • The RTSF’s Capital Projects stream helps cover capital costs like the purchase of vehicles or digital platforms, as well as support for the purchase of zero-emission vehicles. This stream closed on February 28, 2024.

    • A minimum of 10% of RTSF’s funding is allocated to projects that benefit Indigenous populations and communities.

    • One in five Canadians live in rural communities. Rural communities in Canada account for nearly 30% of the nation’s gross domestic product.

    • The RTSF complements Canada’s strengthened climate plan: A Healthy Environment and a Healthy Economy. Through the plan the federal government has committed to providing federal funding for public transit in support of making clean and affordable transportation available in every community. 

    • The new Canada Public Transit Fund (CPTF) will provide an average of $3 billion a year of permanent funding to respond to local transit needs by enhancing integrated planning, improving access to public transit and active transportation, and supporting the development of more affordable, sustainable, and inclusive communities. 

    • Since 2015, the federal government has committed over $30 billion for public transit and active transportation projects. These historic investments have resulted in close to 2000 projects across the country.

    • The funding announced today builds on the federal government’s work through the Atlantic Growth Strategy to create well-paying jobs and strengthen local economies.

    • Federal funding is conditional on the signing of a contribution agreement.

    Associated links

    Contacts

    For more information (media only), please contact:

    Sofia Ouslis
    Communications Advisor
    Office of the Minister of Housing, Infrastructure and Communities
    Sofia.ouslis@infc.gc.ca

    Media Relations
    Housing, Infrastructure and Communities Canada
    613-960-9251
    Toll free: 1-877-250-7154
    Email: media-medias@infc.gc.ca
    Follow us on X, Facebook, Instagram and LinkedIn
    Web: Housing, Infrastructure and Communities Canada

    Rob MacNamara 
    Communications Advisor – Mayor’s Office
    Cape Breton Regional Municipality
    902-563-5297   
    rjmacnamara@cbrm.ns.ca

    MIL OSI Canada News –

    January 23, 2025
  • MIL-OSI USA: ERO New York City arrests unlawfully present Venezuelan national convicted of assaulting NYPD officers in Times Square

    Source: US Immigration and Customs Enforcement

    NEW YORK — On Oct. 10, Enforcement and Removal Operations New York City arrested Darwin Andres Gomez Izquiel, an unlawfully present noncitizen and national of Venezuela, who was convicted by the New York County Supreme Court of assault in the second degree with intent to cause injury to an officer/fireman/EMT July 29 for his participation in the widely publicized gang assault on two NYPD officers in Times Square.

    Officers from the Criminal Apprehension Program arrested Gomez upon release from the custody of the New York City Department of Corrections pursuant to an ICE detainer and warrant of arrest. He remains in ICE custody pending removal proceedings.

    “Gomez-Izquiel is a criminal and threat to the public servants, residents and businesses of New York City,” said ERO New York City Field Office Director Kenneth Genalo. “We will not allow our communities to become safe havens for noncitizens who refuse to abide our laws. ERO New York City will continue to work with unending determination to apprehend and remove these violent criminal offenders.”

    On Aug. 23, 2023, the U.S. Border Patrol encountered Gomez near the Rio Grande Valley, Texas, after he unlawfully entered the United States without inspection, admission or parole by an immigration official. U.S. Border Patrol initially processed Gomez as an expedited removal after serving him with an order of expedited removal. Two days later, Gomez withdrew his application for admission to the United States and voluntarily returned to Mexico via the Brownsville Port of Entry.

    U.S. Border Patrol again encountered Gomez near the Del Rio Sector on Oct. 3, 2023, after unlawfully entered the United States at a time and place other than as designated by the Secretary of the Department of Homeland Security. U.S. Border Patrol issued Gomez a notice to appear charging inadmissibility pursuant to the Immigration and Nationality Act, provided him with an immigration judge hearing date for June 4, 2024, in Memphis, Tennessee, and released him on his own recognizance with specific reporting instructions for the nearest ERO office of his intended destination. There is no indication that he complied with those reporting instructions.

    On Jan. 27, 2024, the NYPD arrested Gomez for the crimes of assault on police officer/fireman/EMT, second-degree gang assault, obstruction of governmental administration and disorderly conduct. The next day, Gomez was arraigned on the charges and released on his own recognizance.

    That same day, ERO New York City lodged an immigration detainer with the New York City Department of Corrections’ Rikers Custody Management Unit against Gomez’s release.

    Gomez did not appear for his removal hearing before an immigration judge in Memphis June 4 due to his incarceration on Rikers Island in the custody of the New York City Department of Corrections. The presiding immigration judge did not take action on his case.

    On July 29, the New York County Supreme Court convicted Gomez of assault in the second degree with intent to cause injury to an officer/fireman/EMT and obstruct governmental administration and sentenced him to a custodial term of 364 days.

    As part of its mission to identify and arrest removable noncitizens, ERO lodges immigration detainers against noncitizens who have been arrested for criminal activity and taken into custody by state or local law enforcement. An immigration detainer is a request from U.S. Immigration and Customs Enforcement to state or local law enforcement agencies to notify ICE as early as possible before a removable noncitizen is released from their custody. Detainers request that state or local law enforcement agencies maintain custody of the noncitizen for a period not to exceed 48 hours beyond the time the individual would otherwise be released, allowing ERO to assume custody for removal purposes in accordance with federal law.

    Detainers are critical public safety tools because they focus enforcement resources on removable noncitizens who have been arrested for criminal activity. Detainers increase the safety of all parties involved — ERO personnel, law enforcement officials, removable noncitizens and the public — by allowing an arrest to be made in a secure and controlled custodial setting as opposed to at-large within the community. Because detainers result in the direct transfer of a noncitizen from state or local custody to ERO custody, they also minimize the potential that an individual will reoffend. Additionally, detainers conserve scarce government resources by allowing ERO to take criminal noncitizens into custody directly rather than expending resources locating these individuals at-large.

    ERO conducts removals of individuals without a lawful basis to remain in the United States, including at the order of immigration judges with the Justice Department’s Executive Office for Immigration Review. The Executive Office for Immigration Review is a separate entity from the Department of Homeland Security and ICE. Immigration judges in these courts make decisions based on the merits of each individual case, determining if a noncitizen is subject to a final order of removal or eligible for certain forms of relief from removal.

    As one of ICE’s three operational directorates, ERO is the principal federal law enforcement authority in charge of domestic immigration enforcement. ERO’s mission is to protect the homeland through the arrest and removal of those who undermine the safety of U.S. communities and the integrity of U.S. immigration laws, and its primary areas of focus are interior enforcement operations, management of the agency’s detained and non-detained populations, and repatriation of noncitizens who have received final orders of removal. ERO’s workforce consists of more than 7,700 law enforcement and non-law enforcement support personnel across 25 domestic field offices and 208 locations nationwide, 30 overseas postings, and multiple temporary duty travel assignments along the border.

    Members of the public can report crimes or suspicious activity by dialing 866-DHS-2-ICE (866-347-2423) or completing the ICE online tip form.

    Learn more about ERO New York City’s mission to increase public safety in our New York City communities on X, formerly known as Twitter, at @ERONewYork.

    MIL OSI USA News –

    January 23, 2025
  • MIL-OSI Global: This year’s Nobel prize exposes economics’ problem with colonialism

    Source: The Conversation – UK – By Jostein Hauge, Assistant Professor in Development Studies, University of Cambridge

    Bumble Dee / Shutterstock

    Daron Acemoglu, Simon Johnson and James Robinson have been awarded the 2024 Nobel memorial prize in economics for their influential work on how institutions shape economic development. Some would say the decision to award these scholars the Nobel was long overdue.

    The paper that formed the basis of their work is one of the most cited in economics. Acemoglu and Robinson’s subsequent book, Why Nations Fail, has also been hugely influential.

    These works have inspired a rich debate on the relationship between societal institutions and economic development – so in that sense, congratulations are in order. But they have also been the subject of substantial criticism. In the aftermath of the award, it is fitting to highlight the blind spots in their analysis.

    The most important piece of criticism concerns the connection between the quality of a country’s societal institutions and its level of economic development. Acemoglu, Johnson and Robinson’s work divides institutions into two categories: “inclusive” and “extractive”.

    Inclusive institutions – such as those that enforce property rights, protect democracy and limit corruption – foster economic development, according to the laureates. In contrast, extractive institutions, which give rise to a high concentration of power and limited political freedom, seek to concentrate resources in the hands of a small elite and thus stifle economic development.

    The laureates claim the introduction of inclusive institutions has had a positive long-term effect on economic prosperity. Indeed, these institutions are today found primarily in high-income countries in the west.

    A huge problem with this analysis, however, is the claim that certain institutions are a precondition for economic development.

    Mushtaq Khan, a professor of economics at Soas, University of London, has analysed Acemoglu, Johnson and Robinson’s work extensively. He argues that it mainly shows today’s high-income countries score higher on western-based institution indexes, and not that economic development was achieved because states first established inclusive institutions.

    In fact, history is rife with examples of countries that grew rapidly without having these inclusive institutions in place as a precondition for growth. East Asian states such as Singapore, South Korea and Taiwan are good examples. Most recently, so too is China.

    Yuen Yuen Ang’s award-winning books on China’s development process have laid out in detail how China was riddled with corruption during its growth process. In the wake of this year’s Nobel award, Ang went as far as saying that the laureates’ theory not only fails to explain growth in China, but also growth in the west. She points out that institutions in the US were smeared with corruption during the country’s development process.

    Ignoring the brutality of colonialism

    Nations are not wrong to pursue some of the inclusive institutions outlined in Acemoglu, Johnson and Robinson’s work. But another worrying part of their analysis is that it legitimises the supremacy of western institutions – and, at worst, processes of imperialism and colonialism.

    Their work has, indeed, been criticised for not paying attention to the brutality of colonialism. We need to dig a bit deeper into their methods to understand this criticism.

    The laureates establish their claim by looking at long-term development in settler colonies versus non-settler colonies. In settler colonies, such as the US, Canada and Australia, Europeans established inclusive institutions. But in non-settler colonies, which include large parts of Africa and Latin America, Europeans established extractive institutions.

    Acemoglu, Johnson and Robinson point out that, over time, settler colonies perform better. European institutions are thus better for development, they argue.

    But, considering that the process of colonisation is a central method of their paper, it’s a mystery that the laureates do not discuss the costs of colonialism more broadly.

    Even in settler colonies, where inclusive institutions were eventually developed, years of violence – in many cases verging on the genocide of native populations – predated the development of such institutions. Should this not be factored into the development process?

    According to this year’s laureates, Europeans settled in the poorest and most sparsely populated places, and introduced institutions that contributed to long-term prosperity.
    Johan Jarnestad / Nobel Prize Outreach

    After receiving the award, Acemoglu said that normative questions of colonialism didn’t concern them: “Rather than asking whether colonialism is good or bad, we note that different colonial strategies have led to different institutional patterns that have persisted over time.”

    This statement might come a shock to some people – why is Acemoglu not concerned about whether colonialism is good or bad? But for those familiar with the inner workings of the economics discipline, this statement doesn’t come as a surprise.

    It has, sadly, become a badge of honour in mainstream economics to analyse the world without a normative lens or value judgments. This is a broader issue with the discipline and, in part, explains why economics has become increasingly insular and distant from other social sciences.

    The Nobel prize in economics, which actually wasn’t among the five original Nobel prizes, also illustrates this problem. The list of past winners is narrow in geographical and institutional scope, mainly consisting of economists based at economics faculties in a small number of elite universities in the US.

    Furthermore, a recent study found the institutional and geographic concentration of awards in economics is much higher than in other academic fields. Almost all the winners of major awards have had to journey through one of the top US universities (limited to less than ten) in their career.

    This year’s Nobel prize in economics is no exception. Perhaps this is why it feels like every year, the prize goes to someone who asks “how does a change in variable X affect variable Y”, rather than asking difficult questions about colonialism, imperialism or capitalism – and daring to question the supremacy of western institutions.

    Jostein Hauge does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. This year’s Nobel prize exposes economics’ problem with colonialism – https://theconversation.com/this-years-nobel-prize-exposes-economics-problem-with-colonialism-241400

    MIL OSI – Global Reports –

    January 23, 2025
  • MIL-OSI Banking: Azure Cobalt 100-based Virtual Machines are now generally available

    Source: Microsoft

    Headline: Azure Cobalt 100-based Virtual Machines are now generally available

    We are excited to announce the general availability of the new Azure Cobalt 100 Virtual Machines (VMs). These VMs run on Microsoft’s first fully custom Arm-based Cobalt 100 CPU and represent a significant milestone in our end-to-end approach to building cloud infrastructure.

    Today we are announcing the general availability of the new Azure Cobalt 100-based Virtual Machines (VMs). These VMs run on Microsoft’s first 64-bit Arm-based Azure Cobalt 100 CPU, which has been fully designed in-house. They represent a significant milestone in our journey in designing and building out our cloud infrastructure, with optimization and customization across every layer of the infrastructure stack—from silicon, to servers, to services. Through vertical integration across hardware and software, Azure Cobalt 100-based VMs are one of Microsoft’s latest examples of innovating to enhance and optimize our cloud infrastructure with an end-to-end systems approach, to deliver the right mix of performance, power efficiency, and scale for our customers.

    The Cobalt 100-based VMs consist of our new general purpose Dpsv6-series and Dplsv6-series and our memory-optimized Epsv6-series VM series. They offer up to 50% better price performance than our previous generation Arm-based VMs, making them an attractive option for a wide range of scale-out and cloud-native Linux-based workloads, including data analytics, web and application servers, open source databases, caches, and more. 

    The new Azure Cobalt 100-based VMs deliver leading performance across various workloads compared to previous generations of Azure Arm-based VMs: up to 1.4x CPU performance, up to 1.5x performance on Java-based workloads, and up to 2x performance on web servers, .NET applications, and in-memory cache applications compared to the previous generation Azure Arm-based VMs. These VMs also support 4x local storage IOPS (with NVMe) and up to 1.5x network bandwidth compared to the previous generation Azure Arm-based VMs.

    The new VMs are broadly available in Canada Central, Central US, East US 2, East US, Germany West Central, Japan East, Mexico Central, North Europe, Southeast Asia, Sweden Central, Switzerland North, UAE North, West Europe, and West US 2. The number of regions will continue to expand in 2024 and beyond with Australia East, Brazil South, France Central, India Central, South Central US, UK South, West US 3, and West US coming soon.

    Customer adoption and scenarios

    We have been working with several internal and external customers during the preview period. For example, IC3, the platform that powers billions of customer conversations in Microsoft Teams, is serving its growing customer base more efficiently, achieving up to 45% better performance on Cobalt 100-based VMs.

    We’re also delivering Cobalt 100-based VMs to many of our independent software vendor (ISV) partners offering platform as a service (PaaS) and software as a service (SaaS) solutions on Microsoft Azure.

    “The Cobalt 100, Microsoft Azure’s new Arm-based processor, represents a huge step forward for optimizing performance and productivity. Cadence and Microsoft’s collaboration helps our mutual customers tackle the demands of giga-scale compute that advanced-node silicon design demands. The Cobalt 100 helps our thousands of electronic design automation (EDA) and systems customers meet their ever-increasing demands for throughput to speed time-to-market.” —Mahesh Turaga, Vice President (VP) of Cloud Business Development, Cadence

     “We are really excited about the new Cobalt 100 VMs. We are making them the primary platform for our Databricks SQL Serverless offering on Azure, as they offer outstanding efficiency and allow us to deliver significant price-performance improvements to our customers. Customers using our Azure Databricks classic Jobs offering will also greatly benefit from Cobalt VMs by selecting them for their Jobs cluster nodes, achieving noticeable performance improvements while keeping operating costs down.” —Michael Kiermaier, VP of Business Strategy and Operations, Databricks

    “At Elastic, we are driving innovation and cost-efficiency by enabling customers to leverage our Search AI-powered observability, security, and search solutions on Arm-based architecture. Azure Virtual Machines with Cobalt 100 Arm CPUs enables Elastic to deliver better throughput and up to 37% improved performance compared to Azure’ previous generation Arm based VMs.”  —Uri Cohen, Vice President, Product Management, Elastic

    “At Rescale, our mission is to elevate innovation by providing the best tools in high performance computing, data, and AI to organizations of every size to deliver engineering and scientific breakthroughs that enrich humanity. We have tested the Azure Cobalt 100 VMs to power our high-performance computing platform and found it to deliver about a 40% improvement in performance compared to Azure’s previous generation Arm-based VMs. We look forward to upgrading our Azure infrastructure to these new VMs and offer comparable performance improvements to our customers so they can tackle complex challenges with greater speed and efficiency.” —Adam McKenzie, Chief Technology Officer, Rescale 

    “Siemens EDA continues to expand its partnership with Microsoft to develop innovative solutions for our mutual silicon and electronic systems customers. Our collaboration around Microsoft Azure Cobalt 100 Arm-based VMs running analog, standard-cell, memory, and digital verification workloads has demonstrated compelling performance and economic benefits. The general availability of these new VMs marks an important milestone for the industry, highlighting its fast-growing reliance on continuously advancing hardware and software platforms optimized for high throughput and efficiency.” —Craig Johnson, Vice President, Siemens EDA Strategy

    “We have extensively tested Azure’s new Cobalt 100 VMs and compared them to the previous generation Arm VMs on Azure using Snowflake workloads. We’re thrilled with the significant improvements in performance. And now, we’re excited to adopt these latest Cobalt 100 VMs and share that performance improvement with our customers!” —Gabe Bryant, Senior Manager, Snowflake

    “In the face of unprecedented compute and memory demands driven by increasingly sophisticated systems, designers are leveraging the cloud to scale their computing resources. Our close collaboration with Microsoft Azure facilitates the adoption of Arm architecture-based compute resources by providing customers with industry-leading, AI-driven EDA tools enabled on the Azure cloud to help them address the escalating workload demands.” —Sanjay Bali, senior vice president of EDA strategy and product management at Synopsys

    “Templafy relies on the stability and scalability of Microsoft Azure to run our document generation platform for enterprises worldwide, and we’re excited about the new Azure Cobalt 100 VMs. After evaluation we’ve observed significant performance improvements, including approximately 25% higher throughput and 35% lower CPU usage compared to Azure’s previous generation Arm-based VMs. We look forward to harnessing these advancements to enhance our platform’s performance and deliver even better experiences for our customers when it comes to their critical business documents.”  —Marco van Kimmenade, Director of Engineering, Templafy

    Synergy with our technology partners

    We value the collaboration with our technology partners.

    “The Cobalt 100 processor is a fantastic example of how Arm-based silicon, supported by a robust software ecosystem, is addressing the growing compute complexity of modern infrastructure,” said Mohamed Awad, Senior Vice President and General Manager of Infrastructure Business, Arm. “Following years of collaboration with Microsoft to bring Arm-based VMs to market, the general availability of Cobalt 100 marks an important milestone in our partnership, and demonstrates the power, efficiency and flexibility of Arm Compute Subsystems in driving the workloads of the future.”

    The journey to Arm: Embracing innovation and customer benefits

    Microsoft has a longstanding history of contributing to Arm architecture and integrating Arm technology. This experience has enabled us to develop important industry standards that prepared the Arm architecture for datacenter-scale computing. We have also been working closely with Arm on industry initiatives such as ServerReady and SystemReady and received industry recognition for both initiatives. Our journey into Arm-based VMs is based on a vision to deliver superior price-performance and power efficiency. The Cobalt 100-based VMs embody this vision by offering these benefits. By embracing Arm-based VMs, we have been able to offer our customers a unique combination of performance and cost effectiveness.

    Developer ecosystem 

    The developer ecosystem for Arm continues to thrive and has seen tremendous progress in the last couple of years. Major developer platforms and languages such as C++, .NET, and Java provide Arm-native versions. We have invested in Arm-specific optimizations for each of these platforms and languages so we’re fully leveraging the capabilities of the Arm architecture.  

    The larger ecosystem has embraced Arm with many popular infrastructure and deployment solutions now available with native Arm support. GitHub Actions, GitHub’s continuous integration and continuous delivery (CI/CD) workflow engine, is an integral part of many developers’ workflows and used to continuously build, test, and deploy apps. This is now available for Arm in two flavors—self-hosted runners that can be hosted on an Arm VM or on local Arm hardware, and GitHub-hosted runners. 

    Containers are a popular deployment target for many reasons: a streamlined development workflow, isolation and security, efficient resource utilization, portability, and reproducibility. Microsoft Azure Kubernetes Service (AKS) now supports the creation of Arm agent nodes as well as mixing x86 and Arm architecture nodes within a cluster. 

    Specifications

    You can select from a range of Azure Virtual Machines of three memory ratios for a given vCPU size, giving you the flexibility to choose the configuration that works best for your workloads in terms of CPU performance and memory needs. All these VM series are available with and without local disks so that you can deploy the option that best fits your workload.  

    • The new Dpsv6-series and Dpdsv6-series general-purpose VMs offer up to 96 vCPUs and 384 GiB of RAM (4:1 memory-to-vCPU ratio). They are ideal for scale-out workloads, cloud-native solutions like AKS, small to medium open-source databases, application servers, and web servers. Arm developers can use these VMs in CI/CD pipelines, development, and test scenarios.
    • The new Dplsv6-series and Dpldsv6-series VMs provide up to 96 vCPUs and 192 GiB of RAM (2:1 memory-to-vCPU ratio). They are perfect for media encoding, small databases, gaming servers, microservices, and workloads that don’t need high RAM per vCPU.  
    • The new Epsv6-series and Epdsv6-series memory-optimized VMs offer up to 96 vCPUs and 672 GiB of RAM (up to 8:1 memory-to-vCPU ratio). These VMs are designed for memory-intensive workloads such as large databases, in-memory caching applications, and data analytics.

    The new virtual machines support all remote disk types such as Standard SSD, Standard HDD, Premium SSD and Ultra Disk storage. To learn more about various disk types and their regional availability, please refer to Azure managed disk type. Disk storage is billed separately from virtual machines. You can deploy these new VMs using existing methods including the Azure portal, SDKs, APIs, PowerShell, and the command-line interface (CLI). 

    You can learn more about the new Azure Cobalt 100-based VMs by visiting the specification pages: Dpsv6-series, Dpdsv6-series, Dplsv6-series, Dpldsv6-series, Epsv6-series, Epdsv6-series.   

    Pricing 

    To learn more about the pricing of Azure Cobalt 100-based VMs, please visit the Azure Virtual Machines pricing and Pricing calculator pages. 

    You can also take advantage of Reserved Instances, Azure savings plan for compute, and Spot Virtual Machines to lower your costs. Reserved VM Instances can reduce costs and improve your budget forecasting through upfront one-year or three-year commitments. For a limited time, you can save up to 15% more when you purchase one-year Azure Reserved Virtual Machine (VM) Instances for select Linux VMs. This offer is available between from October 1, 2024 to March 31, 2025. See here for more details. The Azure savings plan for compute gives you the flexibility to save across multiple Azure services, including Azure VMs. Spot Virtual Machines can significantly reduce the cost of running in Azure and further optimize your cloud spend for workloads that can tolerate interruptions and have flexible execution time.

    A new era of price performance and power efficiency

    The general availability of Azure Cobalt 100-based VMs marks the beginning of a new era in Azure’s infrastructure. With our custom silicon program, we are delivering exceptional price performance and power efficiency to our customers. We are excited to see the impact of these innovations on our customers’ businesses and we look forward to bringing even better solutions to our customers in the future.

    Thank you for joining us on this exciting journey.

    For questions, please go to Azure Support and our experts will be there to help you. 

    Additional resources 

    MIL OSI Global Banks –

    January 23, 2025
  • MIL-OSI USA: Press Release: FDIC Appoints Hansel Cordeiro as Director of New Office of Professional Conduct

    Source: US Federal Deposit Insurance Corporation FDIC

    WASHINGTON – The Federal Deposit Insurance Corporation (FDIC) today announced its Board of Directors has approved the appointment of Hansel J. Cordeiro as Director of the agency’s new Office of Professional Conduct (OPC). 

    In June, the Board announced the creation of the OPC to serve as a single point of entry for employee complaints of harassment and other interpersonal misconduct.  In this role, Mr. Cordeiro will lead the OPC’s work to receive, investigate and report on complaints of interpersonal misconduct within the FDIC workplace. OPC will also determine and discipline anyone violating the FDIC’s anti-harassment or anti-retaliation policies.  Mr. Cordeiro will report on the work of the OPC directly to the FDIC Board. 

    Mr. Cordeiro was selected from among several highly qualified candidates after a competitive nationwide public solicitation.  Most recently, he served as Executive Director of Accountability and Strategic Business Management at the Federal Aviation Administration (FAA).  In that role, Mr. Cordeiro led the FAA’s anti-harassment program, the largest program within the U.S. Department of Transportation; established the agency’s anti-harassment policies; and oversaw the receipt and investigation of allegations of harassment, sexual misconduct, and retaliation involving FAA employees and contractors, as well as management actions on substantiated allegations.  In addition, he oversaw anti-harassment training for more than 45,000 FAA employees and contractors. 

    Prior to his role at FAA, Mr. Cordeiro served at the U.S. Department of Veterans Affairs (VA) in various executive and leadership positions, including leading efforts to remediate deficiencies in the Office of Accountability and Whistleblower Protection, which is responsible for improving personnel and organizational accountability within VA. Mr. Cordeiro also served in the Office of General Counsel as a principal legal advisor to several Secretaries of Veterans Affairs on employment and labor law issues. Mr. Cordeiro began his government career at the U.S. Office of Personnel Management, where he developed and implemented several landmark reforms to the federal government’s personnel systems.

    Mr. Cordeiro has a Juris Doctor from the Washburn University School of Law and a Bachelor of Arts degree from Hunter College of the City University of New York.

    ###

    MEDIA CONTACT: 
    MediaRequests@fdic.gov

    FDIC: PR-89-2024

    MIL OSI USA News –

    January 23, 2025
  • MIL-OSI New Zealand: Dinner for Defence Chiefs 2024

    Source: New Zealand Governor General

    E nga rau rangatira mā, e huihui nei I tenei po, tēnei aku mihi nui ki a koutou. Nau mai, piki mai, tauti mai.

    Thank you for accepting the invitation to join Richard and myself here for dinner at Government House. I especially wanted the chance to meet the most senior leaders of the NZDF, with a new CDF and new Heads of Armed Services. You take up these roles at a critical time in the country and world history.

    This is an opportunity to thank you and your loved ones, for the support you give me in undertaking my role as Governor General and Commander-in-Chief.

    I have had the opportunity over the past three years to meet the men and women serving our nation and I couldn’t be prouder of the calibre of people that we have defending our interests – whether it be in peace-keeping or Treaty monitoring, surveillance and intelligence, or information gathering to inform our national and international obligations, we do a sterling job with far fewer resources than other five-eye nations.

    Current conflict in Lebanon, Israel, Gaza and Syria, highlights the sometimes life-threatening circumstances our United Nations peace-keepers can encounter in our nation’s commitment to contribute to a wider international rules based order and stability.

    Cyclone Gabrielle and subsequent extreme weather events, remind New Zealanders of how much we and our Pacific neighbours depend on the courage and expertise of Defence personnel to assist people in coping with the aftermath of extreme weather events. Climate change is a huge challenge for us all.

    I have been proud to act as reviewing officer at graduation ceremonies and Beat Retreat in Waitangi and look forward to ‘push the colour’ at the upcoming Kings Colour ceremony in Christchurch which reinstates a crucial part of our military legacy, recognising as it does the Māori Battalion and Pioneer Battalion battles. We will be the first Commonwealth country to issue the new Kings Colours under King Charles III.

    Tonight’s dinner is our way of saying, on behalf of fellow New Zealanders, how much we appreciate your leadership in the delivery of Defence services on behalf of Aotearoa New Zealand.

    I fully intended this to be a celebration of recent leadership appointments. At the same time, I acknowledge HMNZS Manawanui and the aftermath of its loss may be top of mind for us all.

    My thoughts have been with you all, especially Rear Admiral Golding, the crew of Manawanui and Defence personnel involved in the response to this sinking.

    The progress of Defence Chiefs through to the highest levels of command is testament to the wealth of experience, training, and expertise you bring to those challenges, and which will serve you in good stead in inspiring those you lead with hope and confidence into the future.

    Every time I visit other countries, be it the Republic of Korea such as the DMZ, Malaysia or Australia, they sing the praises of the New Zealand members of the Armed Forces and their contribution to their efforts. This goes beyond doing one’s duty, to being the best person to fulfil a wider brief of leadership and collaboration. Thank you for this.

    I wish you all the very best with your duties and look forward to working with you all. Please enjoy the hospitality of Government House tonight.

    MIL OSI New Zealand News –

    January 23, 2025
  • MIL-OSI Canada: Joint statement on establishing Multilateral Sanctions Monitoring Team for implementation of UN Security Council resolutions on Democratic People’s Republic of Korea

    Source: Government of Canada News

    We, the participating states of the Multilateral Sanctions Monitoring Team (MSMT), are aligned in our commitment to upholding international peace and security, safeguarding the global non-proliferation regime and addressing the threat arising from the Democratic People’s Republic of Korea’s (DPRK’s) weapons of mass destruction and ballistic missile programs, which are in violation of UN Security Council resolutions (UNSCRs).

    October 16, 2024- Ottawa, Ontario – Global Affairs Canada

    “We, the participating states of the Multilateral Sanctions Monitoring Team (MSMT), are aligned in our commitment to upholding international peace and security, safeguarding the global non-proliferation regime and addressing the threat arising from the Democratic People’s Republic of Korea’s (DPRK’s) weapons of mass destruction and ballistic missile programs, which are in violation of UN Security Council resolutions (UNSCRs).

    “In light of the veto which disbanded the UN Security Council’s 1718 Committee Panel of Experts this year, we hereby express our intention to establish the MSMT, a multilateral mechanism to monitor and report violations and evasions of the sanction measures stipulated in the relevant UNSCRs. The goal of the new mechanism is to assist in the full implementation of UN sanctions on the DPRK by publishing information based on rigorous inquiry into sanctions violations and evasion attempts.

    “We underscore our shared determination to fully implement relevant UNSCRs regarding the DPRK; reaffirm that the path to dialogue remains open; and call on all states to join global efforts to maintain international peace and security in the face of the ongoing threats from the DPRK.”

    Signed: Australia, Canada, France, Germany, Italy, Japan, Netherlands, New Zealand, Republic of Korea, U.K, and U.S.

    MIL OSI Canada News –

    January 23, 2025
  • MIL-OSI Australia: Wagga Wagga added as second site for innovative paramedic pilot

    Source: New South Wales Premiere

    Published: 17 October 2024

    Released by: Minister for Regional Health


    A second NSW hospital has joined an innovative pilot scheme that has paramedics working alongside other healthcare professionals to improve access to care in regional settings.

    Wagga Wagga Base Hospital has joined Mudgee Hospital’s emergency department in the Integrated Paramedic Workforce Model Pilot, which is seeing paramedics included in a multidiscplinary team to provide care to patients in the hospital’s Rapid Access Clinic.

    The paramedics will be working alongside other clinical staff in the Rapid Access Clinic, which was originally developed in 2018 to help reduce waiting times in the hospital’s Emergency Department.

    The Rapid Access Clinic has since been expanded to offer a range of healthcare services including diagnostics, allied health, Hospital in the Home, an Infusion Clinic, minor procedures and specialist team review.

    The Wagga Wagga trial will see up to two NSW Ambulance paramedics rostered on in the Rapid Access Clinic and Hospital in the Home service, working alongside regular clinic staff for a period of eight weeks.

    How a paramedic works with existing Rapid Access Clinic staff as part of the multidisciplinary team in treatment areas will depend on each patient’s individual needs and hospital staff will inform patients if a paramedic is involved in their care.

    The trial, which is open to NSW Ambulance paramedics across the state, is evaluating how paramedics may be able to complement existing workforces in healthcare settings.

    Quotes attributable to Minister for Regional Health Ryan Park

    “In Wagga Wagga, paramedics will provide additional clinical care working alongside our dedicated doctors, nurses and allied health teams to provide treatment, and improve access to care.

    “Attracting and retaining healthcare workers in regional settings is a longstanding challenge faced by every state and territory in Australia, and the NSW Government is committed to building a more supported regional health workforce through innovative initiatives like the Integrated Paramedic Workforce Model Pilot.”

    Quotes attributable to Member for Wagga Wagga Dr Joe McGirr

    “I welcome the news that Wagga Wagga Base Hospital has been selected to trial this innovative model to improve access to care.

    “Access to care in regional and rural areas is something we need to improve, and I look forward to the results of this pilot.”

    Quotes attributable to Murrumbidgee Local Health District Chief Executive Jill Ludford

    “Murrumbidgee Local Health District has a long history of innovation in the delivery of high-quality care, so we are proud to join Mudgee Hospital in trialling another innovation – the Integrated Paramedic Workforce Model Pilot.

    “Our District continues to work closely with our colleagues at NSW Ambulance to consider how and when paramedics will provide their skills, to ensure all patients receive appropriate care from appropriate staff.”

    MIL OSI News –

    January 23, 2025
  • MIL-OSI Australia: Return of UFC Octagon puts Sydney cage on the world stage

    Source: New South Wales Ministerial News

    Published: 17 October 2024

    Released by: The Premier, Minister for Jobs, Minister for Sport, Minister for Tourism


    The Ultimate Fighting Championship (UFC) will return to Sydney, attracting tens of thousands of fans, millions of dollars in spending, and millions of global television viewers, as the Minns Labor Government delivers on another election commitment.

    The UFC 312 event will be held in The Octagon at Qudos Bank Arena on 9 February 2025. This event is the second of three mega events the Minns Government secured as part of a four year deal with the world’s premier mixed martial arts organisation.

    The first event in the Sydney series (UFC 293) in September 2023 sold out in 13 minutes with 18,168 people attending. 9,500 (52%) were from overseas or interstate, injecting more than $15.3 million into the NSW visitor economy.

    The highly anticipated UFC 312 is also expected to sell-out and deliver another significant boost to the NSW visitor economy. It will also generate valuable global exposure for Sydney as the nation’s premier city for major sporting events through the UFC’s huge pay-per-view television audience and online following.

    There are now more than 700 million UFC fans across the globe, including a combined 233 million followers across UFC’s social media channels. In Australia and New Zealand combined, UFC has more than 4.3 million fans and 6 million social media followers.

    The UFC’s contribution to NSW goes beyond the Octagon, earlier this year the UFC signed a three-year partnership with PCYC NSW Fit for Life program to establish the UFC’s first youth mentoring initiative in the country.

    Today the NSW Premier Chris Minns, the Minister for Jobs and Tourism John Graham and the Minister for Sport Steve Kamper will join UFC Vice President for Australia/NZ Pete Kloczko and No.1 UFC featherweight and former champion Alex Volkanovski, to announce the global juggernaut will again light up the NSW sporting calendar.

    Ticket sales and the fight card for UFC 312 will be announced later this year. For all the latest information head to ufc.com/Sydney.

    NSW Premier Chris Minns said:

    “UFC’s return to Sydney is another step in us delivering on this election commitment.

    “Last years event was a huge success and we expect next years event will match that, showcasing Sydney on the global stage as a top destination for sporting events.

    “We are continuing to secure a calendar of unmissable events that help local businesses and create jobs, and that’s exactly what these UFC events do.”

    Minister for Jobs and Tourism John Graham said:

    “Hosting the UFC cage puts Sydney on the world stage, demonstrating that we punch above our weight when it comes to hosting blockbuster events.

    “When the Octagon comes to town, so do thousands of visitors who stay in our hotels, eat in our cafes and restaurants and visit other attractions.

    “Hosting the UFC alongside our calendar of incredible arts and cultural events like Vivid or SXSW Sydney, shows NSW has a diverse world class offering that will continue driving our visitor economy to new heights.”

    Minister for Sport Steve Kamper said:

    “The Minns Labor Government is focused on securing Sydney’s place as the premier destination of the Asia Pacific, and we are once again ready to showcase Sydney to millions around the world with UFC 312.

    “This partnership is delivering more than just a boost to our economy, with PCYC NSW and UFC partnering together to deliver a life changing program which will promote a healthy lifestyle and positive decision making.”

    MIL OSI News –

    January 23, 2025
  • MIL-Evening Report: Why do humans have near-equal numbers of male and female babies, unlike many other animals? A new genetic study looks for clues

    Source: The Conversation (Au and NZ) – By Jenny Graves, Distinguished Professor of Genetics and Vice Chancellor’s Fellow, La Trobe University

    Ibragimova / Shutterstock

    We know that boys and girls are produced in much the same frequency. But how – and why – is this 1:1 ratio achieved?

    A new paper searches huge human data sets for gene variants that throw the 1:1 sex ratio off balance, and test the biological and theoretical rules of sex ratio.

    What produces the 1:1 sex ratio?

    Early scientists credited divine providence with ensuring that “every male should have its female”.

    Of course, we now know that sex chromosomes are the real determiners of sex. Females have two X chromosomes; males have a single X and a male-specific Y.

    The Y carries a male-determining gene called SRY, which kickstarts the differentiation of a ridge of cells into a testis. The embryonic testis makes male hormones which direct the embryo to develop as a boy. Without SRY, an alternative pathway is activated that makes an ovary, and the embryo develops as a girl.

    The 1:1 ratio results from the way the X and Y chromosomes are doled out in sperm and eggs. Our cells all have two sets of chromosomes that constitute our genome, one set from each parent. A special type of cell division makes sperm and eggs with just a single set of chromosomes, so that a fertilised egg once again has two sets (one set from the sperm and the other from the egg).

    So sperm all get a single copy of each chromosome – and just one sex chromosome, either an X or a Y. XX females make eggs with a single chromosome set, all of which carry an X.

    When a sperm fertilises an egg, the sex chromosome the sperm carries determines the sex of the baby. Embryos that receive one X from the mother and another X from the father are destined to be XX girls, and embryos that receive a Y-bearing sperm will develop as XY boys.

    So the 1:1 XY ratio in sperm should produce a 1:1 ratio of XX girls and XY boys.

    Sex ratio variation

    But there are lots of exceptions to a 1:1 ratio in the animal kingdom. There are genetic mutations that subvert the orderly segregation of the X and Y, or that preferentially kill male or female embryos.

    Why should the sex ratio be stuck at 1:1 anyway? After all, a few males can fertilise the eggs of many females.

    Indeed, for many animals, unequal sex ratios are the norm. For instance, the mouse-sized marsupial Antechinus stuartii produces only 32% males, even when assessed at birth (so it’s not that male babies die more often).

    Many birds have sex ratios far from 1:1, and some show very specific adaptations that make ecological sense. For instance, the second kookaburra chick to hatch, facing a lower chance of survival, is usually a female, the sex most likely to survive.

    And there are systems of non-standard sex chromosomes. Polar mammals and strange rodents, for instance, are famous for systems in which a mutant X chromosome quashes SRY to form fertile XY females, or a mutated version of SRY doesn’t work. In these species, females predominate, which makes sense for mammals that have to get all their breeding done in a short summer.

    Insects take the cake. An extreme case is a kind of mite that produces a ratio of 15 females to 1 male. In many fruit fly species, 95% of sperm carry the X chromosome, so the progeny are largely female.

    Why a 1:1 sex ratio in humans? Fisher’s principle

    So if sex ratio is so malleable, why have humans (and most mammals) gone for a 1:1 ratio? The great British statistician Ronald Fisher proposed that the ratio is self-correcting and will tend to 1:1 unless there are evolutionary forces that select for distortions.

    The argument is simple. Given every baby must have a mother and a father, if there is a deficiency in one sex, the parents of the rarer sex will have more grandchildren than parents of the more common sex.

    For instance, if males are the rarer sex, parents who by chance produce more sons than daughters will leave more grandchildren than those that produce more daughters than sons. As a result, son-producing genes will get a boost until parity is reached.

    So do we see measurable and heritable departures from 1:1 in the family sex ratio of human sons to daughters? What about Fisher’s principle – is there any evidence that strong evolutionary effects are constraining the human population sex ratio to be 1:1?

    In the new research published this week, researchers Siliang Song and Jianzhi Zhang from the University of Michigan conducted an exhaustive examination of huge human data sets from the United Kingdom and found the answer is an emphatic no. They did identify two genetic variants that affected sex ratio, but these seemed not to be passed on through families.

    So why do humans obey the 1:1 rule? Is it just statistical artefact, because any one family has relatively so few children that even large departures from a 1:1 ratio get evened out across many families?

    Some families have the gene variants to produce more sons than daughters, but other families produce more daughters than sons. Song and Zhang’s analysis suggests this high variability is part of the problem for demonstrating any systematic bias.

    Another possibility is that humans face special evolutionary constraints. Perhaps the human tendency for monogamy places additional evolutionary pressure on humans to adhere to Fisher’s principle in a way that does not apply to other animal species.

    Whatever the answer, this paper by Song and Zhang raises many intriguing questions, and will be a stimulus to further research on the longstanding and fascinating question of parity in the human sex ratio.

    Jenny Graves receives funding from the Australian Research Council.

    Arthur Georges receives funding from the Australian Research Council.

    – ref. Why do humans have near-equal numbers of male and female babies, unlike many other animals? A new genetic study looks for clues – https://theconversation.com/why-do-humans-have-near-equal-numbers-of-male-and-female-babies-unlike-many-other-animals-a-new-genetic-study-looks-for-clues-241360

    MIL OSI Analysis – EveningReport.nz –

    January 23, 2025
  • MIL-Evening Report: Pokies? Lotto? Sports betting? Which forms of problem gambling affect Australians the most?

    Source: The Conversation (Au and NZ) – By Alex Russell, Principal Research Fellow, CQUniversity Australia

    ArliftAtoz2205/Shutterstock

    Gambling, especially sports and race betting, is a hot political issue at the moment.

    This is largely due to the recommendations from a 2023 report from a nonpartisan federal government committee, chaired by the late Peta Murphy, called You Win Some, You Lose More.

    This report recommended “the Australian government, with the cooperation of the states and territories, implement a comprehensive ban on all forms of advertising for online gambling”.

    This has led to lots of debate and controversy.

    Recently, Peter V’landys, head of the NRL and Racing NSW, claimed lotteries were more harmful than race and sports betting combined, citing independent statistics.

    Let’s explore the relative harm of different types of gambling and see if this claim holds up.

    Australians love a punt

    Gambling is widespread in Australia, with more than half of adults engaging in at least one form each year.

    According to the latest national data, lotteries are the most common type (40% of Australians buy a ticket annually), followed by race betting (17%), pokies (16%), scratchies (15.7%) and sports betting (9.6%).

    However, the popularity of a gambling form doesn’t necessarily reflect its harm. Different gambling activities have distinct characteristics.

    Two key factors mean that some gambling forms are more harmful than others: the speed of gambling and bet size.

    Pokies allow for frequent, small bets, with spins every three seconds. Race and sports betting can involve much larger sums and betting that is relatively fast, but still slower than pokie spins.

    Sports betting, in particular, is getting faster with in-play betting and microbetting.

    Poker machines, or ‘pokies’ are the biggest single source of gambling losses in Australia.

    Lotteries, on the other hand, are much slower-paced.

    People typically spend a small amount on tickets and wait for a draw to find out if they’ve won.

    Although it’s possible to spend a lot on tickets, people tend not to, unlike with faster gambling forms.

    The average spend on pokies among the 16% who play them is around $4,782 per year, compared to an average spend on lotteries of $377 per year. These are averages. Most won’t spend these amounts but some will spend far more, which raises the average amount.

    V’landys’ claim about lotteries being more harmful than race and sports betting was based on “independent statistics”.

    He said that of 100 people seeking help from a gambling hotline, 70 had issues with pokies, 15 with lotteries, eight with race betting, four with sports betting, and three with casinos.

    We were unable to verify these figures – if anyone has the data, we’d love to see the research to assess them.

    However, we do have publicly available data.

    What the data say

    The NSW GambleAware website’s 2020-21 report shows that of 2,886 people seeking help, 73.3% identified pokies as their primary form of gambling, while only 13 people (less than 1%) listed lotteries. Race betting accounted for 13.1%, and sports betting for 7.9%.

    These patterns were consistent with previous years.

    People who experience problems also usually take part in more than one form of gambling, as the NSW report showed.

    When these secondary gambling activities were considered, sports betting was cited by 35.5%, race betting by 33.5%, pokies by 19.5%, and lotteries by 13.7%.

    What we discovered

    The best evidence on gambling problems and harm comes from large-scale prevalence studies, typically commissioned by governments and conducted by independent researchers.

    These studies offer high-quality insights into how each gambling form contributes to problems.

    While one prevalence study is great, our team recently combined data from seven national and state-based prevalence studies. This resulted in a very high-quality dataset that we can use to study this question.

    In our analysis, we used statistical techniques to show how strongly each gambling form is associated with problems.

    These techniques give us regression coefficients, which are just numbers that tell us how strong the association is. A higher number means a stronger association between that form and gambling problems.

    The most problematic form was pokies (coefficient = 0.147), followed by casino games (0.136), sports betting (0.068) and race betting (0.038).

    Lotteries, with a coefficient of 0.001, were the least problematic and were not statistically significant even in our large sample.

    As you might guess from such a low number, there’s very little relationship between lotteries and gambling problems.

    What about prevalence?

    Prevalence matters too – while pokies were most strongly associated with problems, the number of people participating in each gambling form is also important.

    Let’s consider an analogy – a car that gives out a lot of exhaust fumes. That car is harmful, but if virtually no one owns one, then it’s not going to account for much pollution.

    The same idea applies for gambling forms. If a gambling form is very harmful but very few people do it, it doesn’t account for many problems in the population.

    It works the other way, too – if there is a very clean type of car that many people drive, they also won’t add up to much pollution.

    Similarly, if we have gambling forms that have very little association with problems, it won’t add up to many problems in the population, even if lots of people take part.

    The regression coefficients tell us how problematic each gambling form is. Prevalance tells us how many people do it.

    When we combine these two bits of information, we can work out the degree of problems in the community that come from each form.

    When we did this, pokies were responsible for 52-57% of gambling problems in the community.

    Sports and race betting each contributed 9-11%, with a combined total of around 20%.

    Lotteries accounted for just 0.1-1% of problems.

    Even if we include scratchies as part of lotteries, this only adds another 2-5% of problems, still far below sports and race betting.



    The real issue

    What’s the takeaway?

    Lotteries are widely played but are not typically associated with much harm.

    Sports and race betting, despite having fewer participants, are more harmful due to their faster pace and the potential for large, frequent bets.

    Lotteries involve slower betting and lower spending, making them much less risky.

    If we aim to reduce gambling harm in our community, the focus should be on pokies, which are widespread in pubs and clubs outside WA, casino games and race and sports betting.

    These forms have features that make them far more harmful than slower-paced gambling like lotteries.

    Alex Russell receives funding from Gambling Research Australia, the Department of Social Services, the NSW Responsible Gambling Fund, the Victorian Responsible Gambling Foundation, the ACT Gambling and Racing Commission, the New Zealand Ministry of Health, the South Australian Government, the Australian Communications and Media Authority, the Northern Territory Department of Industry, Tourism and Trade, the Alberta Gambling Research Institute and Arts Queensland. He previously provided statistical advice on projects to inform a casino group about gambling and gambling problems amongst their employees, and what could be done to reduce this.

    He is a board member for the Australian Loneliness Research Foundation.

    Matthew Browne has received funding from the ACT Gambling and Racing Commission, the NSW Office of Responsible Gambling, the Victorian Responsible Gambling Foundation, Gambling Research Australia, the Alberta Gambling Research Institute, the Queensland Department of Justice and Attorney-General, the Commonwealth Department of Social Services, the Office of Responsible Gambling, and the South Australian Independent Gambling Authority for various research studies on gambling behaviour, youth gambling, and the social costs of gambling, and gambling-related harm.

    Matthew Rockloff receives funding from Matthew Rockloff has received funding from the ACT Gambling and Racing Commission, the NSW Office of Responsible Gambling, the Victorian Responsible Gambling Foundation, Gambling Research Australia, the Alberta Gambling Research Institute, the Queensland Department of Justice and Attorney-General, the Commonwealth Department of Social Services, the Office of Responsible Gambling, and the South Australian Independent Gambling Authority for various research studies on gambling behaviour, youth gambling, and the social costs of gambling, and gambling-related harm.

    – ref. Pokies? Lotto? Sports betting? Which forms of problem gambling affect Australians the most? – https://theconversation.com/pokies-lotto-sports-betting-which-forms-of-problem-gambling-affect-australians-the-most-240665

    MIL OSI Analysis – EveningReport.nz –

    January 23, 2025
  • MIL-OSI Australia: Work to begin at Bungleboori Picnic Area in Gardens of Stone State Conservation Area

    Source: New South Wales Environment and Heritage

    The Bungleboori picnic area will be the focus of major construction work from Monday 21 October 2024, with new facilities to include a car park, toilets, picnic shelters and seating.

    Located in the centre of the park at the junction of Maiyingu Marragu Trail and Glowworm Tunnel Rd, Bungleboori will become the main meeting point for the Gardens of Stone State Conservation Area, with visitor signage and wayfinding to inform and direct park users to key precincts and points of interest.

    The new picnic area will transform the site from a degraded area to a centralised visitor information hub, with connections to walking tracks and cycling trails to be established over the next 24 months.

    Bungleboori picnic area will also cater for visitors of all abilities, with accessible toilets, picnic facilities and accessible pathways with connectivity to visitor information.

    Work will begin in the coming weeks, commencing with road closures to facilitate the removal of weeds.

    Work is also continuing in other areas of the park, with walking track, road, lookout and car park works underway at Lost City.

    Access to Lost City South Road remains closed while work continues.

    Visitors are reminded to check NSW National Parks and Wildlife Service (NPWS) alerts before they travel to any NSW national park for the latest information and to help plan their trip in advance.

    Quotes attributed to NPWS Blue Mountains Branch Director David Crust

    It is exciting to see key visitor precincts come to life as our visitor infrastructure program for Gardens of Stone State Conservation Area continues.

    When completed in early 2025, Bungleboori will be the starting location for many future park activities, with maps and information available to guide visitors.

    The new visitor facilities at Bungleboori will include accessible parking as well as long vehicle parking, along with accessible toilets, shelters and seating.

    Closures will be in place while work is underway at Bungleboori and on Lost City South Road.

    Work on Lost City South Road is expected to continue until the end of the year, with visitor facilities to follow early in 2025.

    Visitors can access Lost City via Lost City North Road during the closure.

    Once Lost City South Road is open to visitors, Lost City North Road will be closed for improvement works.

    MIL OSI News –

    January 23, 2025
  • MIL-Evening Report: Victorian students will get ‘anti-Tate’ lessons – but much more is needed to tackle gendered violence in schools

    Source: The Conversation (Au and NZ) – By Stephanie Wescott, Lecturer in Humanities and Social Sciences, Monash University

    Monkey Business Images/ Shutterstock

    The Victorian government has announced new teaching resources to tackle the influence of “manosphere” figures, such as Andrew Tate, in the state’s schools.

    This follows ongoing reports of disturbing events involving sexist abuse by students in both independent and government schools in Victoria and around the country.

    But while this week’s announcement is a welcome and necessary step, we need a more comprehensive plan to eliminate gender-based violence in our schools.

    What is the ‘manosphere’?

    The “manosphere” is an overlapping collection of extreme men’s communities on social media that are anti-women and against women’s empowerment. This includes Tate, the “misogynist influencer” who is facing trial in Romania on charges of human trafficking and rape (which he denies).

    Our recent research found women teachers are increasingly exposed to sexism, misogyny and sexual harassment as the result of boys’ exposure to “manfluencer” ideas and behaviours. These problems are further compounded by the infiltration of far-right sentiments into schools, which has been linked to far-right online forums.

    At the same time, women teachers report they are not being supported by school leadership.




    Read more:
    We research online ‘misogynist radicalisation’. Here’s what parents of boys should know


    What’s in the Victorian resources?

    The new teaching resources were developed by education academics Helen Cahill and Debbie Ollis, in consultation with teachers, students and parents.

    They aim to give students skills to counter the influence of “Tate-types”, and to navigate issues such as consent, sextortion, pornography and gender-based bullying.

    They will be part of respectful relationships education, which is mandatory in Victorian government schools (following a recommendation of the 2015 Royal Commission into Family Violence).

    Problems with respecful relationship education

    There have been implementation issues with respectful relationships education.

    A 2022 review (of which one of us, Naomi Pfitzner, was an author) found problems with the funding, quality of resources and training supplied to schools, and with schools’ levels of commitment

    Previous research also suggests teachers may be hesitant to engage with controversial or tricky topics. There is a risk some issues are being left out of classroom discussions.

    Crucially, respectful relationships is not mandatory in all Victorian schools — independent and faith-based schools in Victoria need to opt in.

    In other Australian states and territories, respectful relationships education is not compulsory in any school system.

    We need more information

    Education departments around the country collect various forms of data about school life, such as learning and attendance. But we don’t have accurate national data on the prevalence of gender-based violence in schools.

    Without the full picture of how widespread gender-based violence is in Australian schools, it is difficult to resource and design an appropriate response.

    Gender-based violence in schools is inextricably connected to the endemic levels of violence against women in Australia.

    We cannot separate a broader culture that enables gendered slurs, misogyny and gender inequity — known enablers of gender-based violence — from attitudes towards women and girls in schools.

    We need more information about the experiences of female students and staff in Australian schools.
    Monkey Business Images/ Shutterstock

    What now?

    Women have been raising the alarm about sexual harassment of female teachers for decades. But on top of already slow or inadequate responses, the problem has become more complex.

    The proliferation of online misogynist content requires a new, tailored approach.

    Our current project with Australia’s National Research Organisation for Women’s Safety is examining how online misogyny in the manosphere influences young boys and men in Australia. We will then create resources to support teachers and help make schools safer for all young people.

    It is shameful many girls’ first experience of gendered violence happens as students at school. And teachers deserve a safe workplace free from misogyny and sexism.

    Stephanie Wescott receives funding from Australia’s National Research Organisation for Women’s Safety (ANROWS).

    Alexandra Phelan receives funding from Australia’s National Research Organisation for Women’s Safety (ANROWS).

    Naomi Pfitzner has received funding from the Australia’s National Research Organisation for Women’s Safety, the Victorian and Queensland governments and the Australian government. She was an author of the review into Respectful Relationships Education in Australia mentioned in this article.

    Sarah McCook receives funding from Australia’s National Research Organisation for Women’s Safety (ANROWS).

    Steven Roberts receives funding from Australia’s National Research Organisation for Women’s Safety (ANROWS), the Australian government and the Australian Research Council. He is a Board Director at Respect Victoria, but this article is written wholly independently from that role.

    – ref. Victorian students will get ‘anti-Tate’ lessons – but much more is needed to tackle gendered violence in schools – https://theconversation.com/victorian-students-will-get-anti-tate-lessons-but-much-more-is-needed-to-tackle-gendered-violence-in-schools-241473

    MIL OSI Analysis – EveningReport.nz –

    January 23, 2025
  • MIL-OSI New Zealand: Parliament Hansard Report – Thursday, 17 October 2024 – Volume 779 – 001424

    Source: New Zealand Parliament – Hansard

    BUSINESS STATEMENT

    Hon CHRIS BISHOP (Leader of the House): Next week, the House will consider the first readings of the Mental Health Bill and the Policing (Police Vetting) Amendment Bill. We will consider further stages of the Gambling (Definition of Remote Interactive Gambling) Amendment Bill, the Resource Management (Freshwater and Other Matters) Amendment Bill, and the Contracts of Insurance Bill. On Thursday morning, there will be extended hours for private, local, and members’ business. On Thursday afternoon there will be a two-hour debate on constituency and local issues.

    Just finally, in closing, I’ve just been informed that today is the final day of the Australian Associated Press news outlet in New Zealand. I think they’ve been here for 50 years, including in the press gallery, and I’m sure all members wish them well.

    Hon KIERAN McANULTY (Labour): I thank the Leader of the House for the update and thank him for including an extended sitting to cover off the deficit in members’ days. By my calculation, there still is one owing to the House. Can he commit to ensuring there’ll be another extended sitting before the end of the year to tally it up?

    Hon CHRIS BISHOP (Leader of the House): Ha, ha! I think it depends on how you define the “owing” point. As the member will be aware, we have had some unanticipated and quite tragic interruptions to the House this year. But certainly, from the Government’s point of view, we will do our best, subject to other important business between now and the end of the year, to fit that in.

    MIL OSI New Zealand News –

    January 23, 2025
  • MIL-OSI New Zealand: Parliament Hansard Report – Business Statement – 001422

    Source: New Zealand Parliament – Hansard

    BUSINESS STATEMENT

    Hon CHRIS BISHOP (Leader of the House): Next week, the House will consider the first readings of the Mental Health Bill and the Policing (Police Vetting) Amendment Bill. We will consider further stages of the Gambling (Definition of Remote Interactive Gambling) Amendment Bill, the Resource Management (Freshwater and Other Matters) Amendment Bill, and the Contracts of Insurance Bill. On Thursday morning, there will be extended hours for private, local, and members’ business. On Thursday afternoon there will be a two-hour debate on constituency and local issues.

    Just finally, in closing, I’ve just been informed that today is the final day of the Australian Associated Press news outlet in New Zealand. I think they’ve been here for 50 years, including in the press gallery, and I’m sure all members wish them well.

    Hon KIERAN McANULTY (Labour): I thank the Leader of the House for the update and thank him for including an extended sitting to cover off the deficit in members’ days. By my calculation, there still is one owing to the House. Can he commit to ensuring there’ll be another extended sitting before the end of the year to tally it up?

    Hon CHRIS BISHOP (Leader of the House): Ha, ha! I think it depends on how you define the “owing” point. As the member will be aware, we have had some unanticipated and quite tragic interruptions to the House this year. But certainly, from the Government’s point of view, we will do our best, subject to other important business between now and the end of the year, to fit that in.

    MIL OSI New Zealand News –

    January 23, 2025
  • MIL-OSI New Zealand: Select committee hearings on banking inquiry to start next week

    Source: New Zealand Parliament

    Media release

    Organisation: Finance and Expenditure Committee

    For release: 17 October 2024

    Select committee hearings on banking inquiry to start next week

    The Finance and Expenditure Committee has released its plans for the parliamentary inquiry into banking competition, along with the written submissions received on the inquiry so far.

    Public hearings on the inquiry are set to kick off next week on Wednesday, 23 October.

    The committee has hearings scheduled with all the major banks—including the Australian-owned “Big 4” and the main New Zealand-owned banks—over the remainder of 2024. The schedule of hearings is appended to this media release as Appendix 1. Please note that the schedule is subject to change at short notice, particularly if the House of Representatives sits under urgency. Up to date information for the week ahead can be found on the Parliament website (see links at end).

    The committee received over 140 written submissions in response to its call for public submissions. Written submissions have been published online and are available on the Parliament website (see links at end). Over 60 submitters have asked to speak to the committee at public hearings.

    The committee intends to progress hearings with all submitters—including organisations and individual members of the public—in 2024. Submitters will be contacted in the coming weeks to schedule their time with the committee. We intend to organise one hearing focused particularly on rural communities and agricultural lending. Once the schedule of hearings has been finalised, we intend to publish the schedule via a further media release.

    The committee has invited members of the Primary Production Committee to attend all hearings. The Primary Production Committee has a particular interest in the relationship between rural bank lending and banking competition. We look forward to working with our colleagues from that committee over the course of our inquiry.

    The committee intends to consider the overall timetable for completing the inquiry once hearings have been completed. The committee also intends to consider whether it is necessary to invite targeted written cross-submissions once hearings have been completed.

    LINKS
    ENDS

    For media enquiries contact:
    Clerk of Committee
    Finance and Expenditure Committee
    Finance.Expenditure@parliament.govt.nz 

    Appendix 1—Schedule of confirmed hearings as at Wednesday, 16 October 2024
    Inquiry into banking competition

    Weds 16 Oct Weds 23 Oct Wed 30 Oct Weds 6 Nov Weds 13 Nov Weds 20 Nov Weds 27 Nov 2 – 6 Dec Weds 11 Dec Weds 18 Dec
    House sitting House sitting House not sitting House sitting House sitting House sitting  House not sitting Scrutiny week House sitting House sitting
      ANZ
    9.00am –
    9.45am
      Rabobank
    9.00am –
    9.45am
    ASB
    9.00am –
    9.45am
    Westpac
    9.00am –
    9.45am
        BNZ
    8.00am –
    8.45am
    TSB
    8.45am –
    9.05am
    Kiwibank
    9.00am –
    9.30am
    Heartland
    9.30am
    9.50am
    Cooperative
    Bank
    10.00am –
    10.20am
    SBS
    10.20am –
    10.40am

    MIL OSI

    MIL OSI New Zealand News –

    January 23, 2025
  • MIL-OSI Australia: Search and Rescue Success

    Source: Northern Territory Police and Fire Services

    On Monday this week, Northern Territory Police Search and Rescue Section conducted a search operation north of Adelaide River following reports of a missing 73-year-old man.

    John had not been seen since 10pm Sunday night with the alarm being raised with police early Monday morning prompting a search by Adelaide River Police members with the assistance of John’s carer.

    It was quickly escalated to the Search and Rescue Section (SRS) as temperatures reached 34°c and John was known to suffer from late-stage dementia as well as type 2 diabetes.

    A large-scale response was deployed including one Longranger helicopters with TRG air observers, 3 members from the mounted unit, 4 motorcycles and one ATV, 3 Australian Search and Rescue K9’s, 7 SRS members and one drone.

    Just before 5pm that evening, a police search team located John approximately 800 meters from his residence on a vacant property.

    He was found in a disoriented state and was transported to the local medical clinic for assessment and treatment before being safely returned to his carer.

    Acting Sergeant Chris Grotherr said, “The report of a missing person who suffers from dementia is always concerning, particularly considering the high temperatures in the area.

    “We would like to extend a huge thank you to everyone involved in this rescue.

    “Without the support of each responder, this successful outcome wouldn’t have been possible.”

    MIL OSI News –

    January 23, 2025
←Previous Page
1 … 490 491 492 493 494 … 546
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress