Category: Baltics

  • MIL-OSI: Live Coin Watch Exclusive: Bitcoin Solaris Announces Phase 5 Presale Ahead of Nova App Mining Launch

    Source: GlobeNewswire (MIL-OSI)

    TALLINN, Estonia, May 27, 2025 (GLOBE NEWSWIRE) — Bitcoin Solaris, the next-generation decentralized blockchain built for mobile-first mining, has officially entered Presale Phase 5, pricing BTC-S tokens at 5 USDT. This announcement comes just ahead of the beginning of a selected group testing of Nova App Beta, a breakthrough mobile mining platform designed to allow users to earn tokens directly from their smartphones.

    Bitcoin Solaris is offering a fixed supply of 21 million tokens, with only 20% (4.2 million tokens) allocated to the entire presale. With no inflationary mechanics, the tokenomics are designed to reward early participation through a capped supply and verifiable, transparent distribution.

    Nova App: Mobile Mining for Everyone

    Scheduled to launch soon, the Nova App enables users to earn BTC-S by contributing idle storage and processing power on their smartphones. With no technical knowledge or staking required, the app automatically rewards users based on uptime and minimal hardware contribution—democratizing access to on-chain earnings and transforming smartphones into passive income nodes.

    High-Speed Infrastructure Designed for Scale

    Built on a dual-layer blockchain, Bitcoin Solaris supports 10,000+ TPS and delivers 2-second finality through its combination of Proof-of-Stake (PoS), Proof-of-Capacity (PoC), Proof-of-History (PoH), and Proof-of-Time (PoT). This scalable architecture ensures that mobile miners worldwide can participate without congestion, latency, or centralization risks.

    Fully Audited and Verified

    Bitcoin Solaris has completed multiple independent security audits. Cyberscope verified its smart contract code and emission logic, while Freshcoins audited its mobile mining performance. Full KYC verification adds a layer of governance transparency uncommon in early-stage blockchain projects.

    Strategic Entry Point Remains Open — But Not for Long

    Bitcoin Solaris is currently in Presale Phase 5, with BTC-S priced at 5 USDT. The token is projected to launch at 20 USDT, offering early buyers a potential 4X return. Of the total 21 million BTC-S supply, 4.2 million (20%) are allocated to the entire presale. There is no inflationary mechanism — once distributed, no additional tokens will be created.

    Presale participants not only secure tokens at a fixed price but gain early access to Nova App mining before user growth increases difficulty and dilutes returns. It’s a defined moment — structurally similar to Bitcoin under $100 — where participation is low, supply is accessible, and upside is still untapped.

    In a recent feature, Crypto Volt outlined how Bitcoin Solaris’s presale structure, mobile mining model, and supply cap recreate the early mechanics of Bitcoin itself. His breakdown shows why BTC-S is one of the few projects positioned to deliver protocol-scale wealth to individual users — not just funds and insiders.

    Presale Access:
    https://bitcoinsolaris.com

    Follow Bitcoin Solaris:

    X (Twitter): https://x.com/BitcoinSolaris
    Telegram: https://t.me/Bitcoinsolaris

    Media Contact:
    Xander Levine
    info@bitcoinsolaris.com
    Email: press@bitcoinsolaris.com

    Press Kit: [Available Upon Request]

    Disclaimer: This is a paid post and is provided by Bitcoin Solaris. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility.Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/f3d92a04-bda3-46a5-8dc5-1da8a7560224

    https://www.globenewswire.com/NewsRoom/AttachmentNg/d41349a6-2964-4db3-9bd2-fb6db1cf878f

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7c9590f8-f573-427d-99c5-d7e355c0453c

    https://www.globenewswire.com/NewsRoom/AttachmentNg/e550c186-89f4-4f88-8c03-ec213e09e3c1

    The MIL Network

  • MIL-OSI Asia-Pac: President Lai meets and hosts luncheon for delegation led by Governor Lourdes A. Leon Guerrero of Guam

    Source: Republic of China Taiwan

    Details
    2025-05-27
    President Lai meets delegation from European Parliament
    On the morning of May 27, President Lai Ching-te met with a delegation from the European Parliament. In remarks, President Lai thanked the European Parliament for continuing to pay close attention to peace and stability across the Taiwan Strait and voice support for Taiwan. The president expressed hope for an even closer relationship and diversified cooperation between Taiwan and the European Union. The president said that Taiwan and the EU can work together in such areas as semiconductors, AI, and green energy to create more resilient supply chains for global democracies and contribute to global prosperity and development. A translation of President Lai’s remarks follows: I warmly welcome our guests to the Presidential Office. After being elected last year, MEPs Reinis Pozņaks and Beatrice Timgren are making their first visits to Taiwan, demonstrating support for Taiwan through concrete action. On behalf of the people of Taiwan, I extend my sincerest welcome and appreciation. I would also like to take this opportunity to thank the European Parliament for continuing to pay close attention to peace and stability across the Taiwan Strait. Just last month, the European Parliament adopted resolutions with regard to annual reports on the implementation of the European Union’s Common Foreign and Security Policy and Common Security and Defence Policy. These resolutions reaffirmed the EU’s steadfast commitment to maintaining the status quo across the Taiwan Strait. The European Parliament also condemned China for continuing to take provocative military actions against Taiwan and emphasized that Taiwan is a key democratic partner in the Indo-Pacific region. It called on the EU and its member states to continue working closely with Taiwan to strengthen economic, trade, and investment ties. Once again, I thank the European Parliament for voicing support for Taiwan. Just as MEPs Pozņaks and Timgren are visiting Taiwan to strengthen Taiwan-EU exchanges, our Minister of Economic Affairs Kuo Jyh-huei (郭智輝) also led a delegation to Europe last year, marking the first in-person dialogue between high-ranking economic and trade officials of Taiwan and the EU. Moving ahead, we look forward to bringing Taiwan-EU ties even closer and to diversifying our cooperation. The EU is Taiwan’s largest source of foreign investment. Both sides are highly complementary in such areas as semiconductors, AI, and green energy. Through our joint efforts, we can create more resilient supply chains for global democracies and further contribute to global prosperity and development. Looking ahead, I hope that MEPs Pozņaks and Timgren will continue to make the case in the European Parliament for the signing of a Taiwan-EU economic partnership agreement. This would not only yield mutually beneficial development, but also consolidate economic security and boost international competitiveness for both sides. In closing, I am sure that you will gain a deeper understanding of Taiwan through this visit. Please feel welcome to come back as often as possible as we continue to elevate Taiwan-EU ties.  MEP Pozņaks then delivered remarks, saying that it is a great honor to be here and thanking everybody involved in arranging this trip that allows them the opportunity to better know Taiwan. He added that it is definitely not the last time they will be here, as Taiwan is a very beautiful country. MEP Pozņaks mentioned that he comes from Latvia, and despite their being on the other side of the world, they know how the Taiwanese people feel, because they also have a big neighbor who is claiming that Latvia belongs to them. Unfortunately, he said, there is already war in Europe, but he is confident that their situation is similar to Taiwan’s, adding that they have a neighbor who uses disinformation attacks. MEP Pozņaks said that we live in very challenging times, and that our choices will define the future of the world, asking whether it will be a world where the rule of law prevails or where physical power and aggression succeeds. Coming from a small country, he said he clearly understands that for them there is no other possibility; they must protect the world where the rule of law prevails. That is why now, he emphasized, it is very crucial for all democracies around the world to stick together to protect our freedoms, values, and democracy. MEP Timgren then delivered remarks, thanking President Lai for meeting with them and saying it is a big honor. Noting that they arrived here two days ago and that while she really loves Taiwan, its food, and the good weather, she stated that the reason they are here is because of the values that we share, our good relationships, and solidarity with other democratic countries in the world, which is important for them in Europe and in Sweden. MEP Timgren, referring to MEP Pozņaks’s earlier remarks, said that they face a big threat from Russia that is discernible even in the European Parliament. Actually, she pointed out, there is a war inside Europe that shows us how important it is that we support one another. She said that the Russian people thought it would be easy to take over Ukraine, but it was not, because all European countries stepped up and provided weapons and support. And that is why, MEP Timgren said, it is important that democratic countries maintain good relationships and let China and Russia see that we have good relationships, because a part of defense is solidarity. In closing, she expressed her gratitude for having the honor to be here in this beautiful country.

    Details
    2025-05-20
    President Lai hosts state banquet for President Surangel Whipps Jr. of Republic of Palau
    On the evening of May 20, President Lai Ching-te, accompanied by Vice President Bi-khim Hsiao, hosted a state banquet at the Presidential Office in honor of President Surangel Whipps Jr. of the Republic of Palau and his wife. In remarks, President Lai said that he looks forward to working closely with President Whipps to promote tourism exchanges and sports cooperation so that Taiwan and Palau shine brightly together on the international stage. A translation of President Lai’s remarks follows: It is a pleasure to host this banquet tonight at the Presidential Office for President Whipps, First Lady Valerie Whipps, and the esteemed members of their delegation. Welcome to Taiwan. During my trips to Palau in 2022 and last year, President and First Lady Whipps received me with great hospitality. Wearing my island shirt, I enjoyed a very friendly reception from the people of Palau. It felt warm and friendly, just like being welcomed back home. The first time I visited Palau, President Whipps and I piloted a boat to the Milky Way lagoon. We both tried volcanic mud facial masks. We also fished together and enjoyed the breeze as we walked on the beach. Last year, on my second visit to Palau, I was honored to be invited to address the National Congress. I also observed the results of the close bilateral cooperation between our two nations. Due to its world-famous ocean scenery, Palau is sometimes referred to as “God’s aquarium.” And it is even possible to snorkel with sharks. It leaves a deep impression. Nothing compares to seeing Palau firsthand. During the COVID-19 pandemic, Taiwan and Palau launched a travel bubble that created a safe means of travel. Now, with the pandemic behind us, I hope that even more Taiwanese can tour Palau and gain a greater understanding of our diplomatic ally. In addition to tourism exchanges, I mentioned on my visit to Palau last year that I hoped Taiwan and Palau could promote sports cooperation by providing training away from home. Next month, Palau will be holding the Pacific Mini Games. And right now, Palau’s national baseball and table tennis teams are holding training sessions here in Taiwan. We will do our utmost to support Palau’s national players and we hope they stand out and achieve outstanding results in the events. I look forward to working closely with President Whipps so that Taiwan and Palau shine brightly together on the international stage. Thank you! Mesulang! President Whipps then delivered remarks, saying that it is truly an honor to be here once again one year after President Lai’s inauguration. Mentioning that this is his first state visit after being reelected to a second term, he said that it is important to be here among friends, and that we are more than friends, we are family. He thanked President Lai for the generous words and, most importantly, Taiwan’s enduring support. He remarked that our relationship continues to get stronger in each passing year. President Whipps said that President Lai’s diplomacy initiative, leadership, and vision deeply resonate with them. Diplomacy must be rooted in our shared values, he said, and an unwavering support for our allies and a commitment to a sustainable, inclusive development are all deeply appreciated by their people. President Whipps emphasized that, as we look into the future and the challenges that we face, from security to climate change, it is so important that we are united. He added that it is important for the world, and especially important for them in Palau, that they stand up for Taiwan, so that Taiwan can participate on international fora that address climate change, security, and health, because they know the world is better when Taiwan has a seat at the table. Mentioning that Palau will host the Pacific Islands Forum next year, President Whipps said that Palau remains committed to working closely with Taiwan to ensure a successful event, and that they will continue to speak up for Taiwan’s indispensable contributions as we stand together against any efforts to silence or isolate democratic partners. President Whipps said that our nations have navigated challenges and emerged stronger, bound by a partnership that is built on trust, respect, and hope for a better world. Whether it is in clean energy, education, smart medicine, or tourism, our shared journey is just beginning, he said, and we are stronger together.  Also in attendance at the banquet were Palauan Minister of State Gustav Aitaro, Minister of Public Infrastructure and Industries Charles Obichang, Minister of Human Resources, Culture, Tourism and Development Ngiraibelas Tmetuchl, Senate Floor Leader Kerai Mariur, House of Delegates Floor Leader Warren Umetaro, High Chief of Ngiwal State Elliot Udui, Governor of Peleliu State Emais Roberts, and Governor of Koror State Eyos Rudimch.

    Details
    2025-05-20
    President Lai and President Surangel S. Whipps, Jr. of Palau hold bilateral talks and witness signing of cooperation agreements  
    On the afternoon of May 20, following a welcome ceremony with military honors for President Surangel S. Whipps, Jr. of the Republic of Palau and his wife, President Lai Ching-te, accompanied by Vice President Bi-khim Hsiao, held bilateral talks with President Whipps at the Presidential Office. The two leaders also jointly witnessed the signing of a technical cooperation agreement and an agreement on diplomatic staff training cooperation. In remarks, President Lai thanked Palau for standing firm in its backing of Taiwan’s international participation as geopolitical tensions continue to increase in the Pacific region. He added that he looks forward to the cooperative ties between Taiwan and Palau continuing to expand into even broader areas, allowing our economies and societies to further progress as we jointly advance peace, stability, and prosperity in the Indo-Pacific region. A translation of President Lai’s remarks follows: I welcome our guests to Taiwan once again. Last year on May 20, President Whipps led a delegation to attend the inauguration ceremony for myself and Vice President Hsiao. I am delighted, on the anniversary of my first year in office, to meet with old friends of Taiwan again, as President Whipps returns for this visit. Taiwan-Palau relations have grown even closer in recent years thanks to the strong support of President Whipps. In 2022, during my term as vice president, I led a delegation to Palau as a demonstration of how our nations were together boosting tourism development as we jointly faced the challenges of the COVID-19 pandemic. Every time I visit Palau, and every time I meet with President Whipps, I feel very deeply that Taiwan and Palau are like family. We are both maritime nations and share a common Austronesian heritage and culture. We are also staunch partners in upholding such values as freedom, democracy, and respect for human rights. Last December, when I went on my first overseas trip since taking office, one of the nations I visited was Palau. We celebrated the 30th anniversary of Palau’s independence and 25 years of diplomatic relations, underscoring our friendly ties. Taiwan and Palau enjoy close exchanges and cooperation in a range of areas, including climate change, education, agriculture and fisheries, healthcare, humanitarian assistance, sports, and culture. After this meeting, President Whipps and I will witness the signing of a technical cooperation agreement and an agreement on diplomatic staff training cooperation, demonstrating once again our diverse collaboration and strong friendship. I believe that by working together, Taiwan and Palau can contribute to each other’s development and overcome the regional and global challenges we currently face. In particular, as geopolitical tensions continue to increase in the Pacific region, Palau has wisely and courageously upheld democratic values and stood firm in its backing of Taiwan’s international participation. Palau has never stopped voicing support for Taiwan, including at the United Nations General Assembly, the World Health Organization, the UN Framework Convention on Climate Change Conference of the Parties, and the UN Ocean Conference. We have been deeply moved by this support. I thank President Whipps again for his high regard and support for Taiwan. I look forward to the cooperative ties between our nations continuing to expand into even broader areas. This will allow our economies and societies to further progress as we jointly advance peace, stability, and prosperity in the Indo-Pacific region. President Whipps then delivered remarks, saying that it is a great honor for him to be here, standing in this historic place – a symbol of strength, resilience, and the democratic spirit of the Taiwanese people. On behalf of the government of Palau, President Whipps extended heartfelt gratitude to President Lai and the people of Taiwan for the warm welcome and gracious hospitality toward him and his delegation. President Whipps then extended sincere thanks for President Lai’s visit to Palau in December – his second visit to Palau – and for having Minister of Foreign Affairs Lin Chia-lung (林佳龍) attend his inauguration as a special envoy. He added that this also marks his third visit to Taiwan since President Lai took office, saying that this demonstrates the strength of our growing relationship. President Whipps indicated that the increased engagements and numerous entrepreneurs that President Lai has brought from Taiwan to Palau have resulted in fruitful visits, and that President Lai’s leadership represents hope, unity, and continued advancement of democracy and freedom, not only for Taiwan, but for the broader Indo-Pacific region. President Whipps went on to say that this visit to Taiwan reaffirms our deep friendship and shared values between our two nations. He emphasized that Palau and Taiwan are bound not by proximity, but by purpose, in that both are island nations and believe in human dignity, the rule of law, and the right of our people to determine their own futures. President Whipps stated that although we are celebrating 26 years of diplomatic relations, Taiwan has been a steadfast partner of Palau for decades, and that one of the MOUs they are signing further extends the relationship that began in December of 1984. From healthcare and medical missions, to education, agriculture, renewable energy, infrastructure, the private sector, tourism development, and climate resilience, he said, our cooperation has improved lives and strengthened our communities. The president also indicated that during the COVID-19 pandemic, Taiwan stood with Palau, noting that both sides began the tourism bubble, and that President Lai came to Palau to reopen the two weekly direct flights that have now been increased to four. That solidarity will never be forgotten, he said. As the world faces growing uncertainty and complex challenges from climate change to global tensions, President Whipps said, this friendship becomes even more vital. The president concluded his remarks by expressing hope that both nations continue to stand together, work together, and advocate together for peace, prosperity, and for the right of small nations to be seen, heard, and respected. After the bilateral talks, President Lai and President Whipps witnessed the signing of the technical cooperation agreement and the agreement on diplomatic staff training cooperation by Minister Lin and Palauan Minister of State Gustav Aitaro. The delegation also included Palauan Minister of Public Infrastructure and Industries Charles Obichang, Minister of Human Resources, Culture, Tourism and Development Ngiraibelas Tmetuchl, Senate Floor Leader Kerai Mariur, House of Delegates Floor Leader Warren Umetaro, High Chief of Ngiwal State Elliot Udui, Governor of Peleliu State Emais Roberts, and Governor of Koror State Eyos Rudimch.  

    Details
    2025-05-20
    President Lai interviewed by Nippon Television and Yomiuri TV
    In a recent interview on Nippon Television’s news zero program, President Lai Ching-te responded to questions from host Mr. Sakurai Sho and Yomiuri TV Shanghai Bureau Chief Watanabe Masayo on topics including reflections on his first year in office, cross-strait relations, China’s military threats, Taiwan-United States relations, and Taiwan-Japan relations. The interview was broadcast on the evening of May 19. During the interview, President Lai stated that China intends to change the world’s rules-based international order, and that if Taiwan were invaded, global supply chains would be disrupted. Therefore, he said, Taiwan will strengthen its national defense, prevent war by preparing for war, and achieve the goal of peace. The president also noted that Taiwan’s purpose for developing drones is based on national security and industrial needs, and that Taiwan hopes to collaborate with Japan. He then reiterated that China’s threats are an international problem, and expressed hope to work together with the US, Japan, and others in the global democratic community to prevent China from starting a war. Following is the text of the questions and the president’s responses: Q: How do you feel as you are about to round out your first year in office? President Lai: When I was young, I was determined to practice medicine and save lives. When I left medicine to go into politics, I was determined to transform Taiwan. And when I was sworn in as president on May 20 last year, I was determined to strengthen the nation. Time flies, and it has already been a year. Although the process has been very challenging, I am deeply honored to be a part of it. I am also profoundly grateful to our citizens for allowing me the opportunity to give back to our country. The future will certainly be full of more challenges, but I will do everything I can to unite the people and continue strengthening the nation. That is how I am feeling now. Q: We are now coming up on the 80th anniversary of the end of World War II, and over this period, we have often heard that conflict between Taiwan and the mainland is imminent. Do you personally believe that a cross-strait conflict could happen? President Lai: The international community is very much aware that China intends to replace the US and change the world’s rules-based international order, and annexing Taiwan is just the first step. So, as China’s military power grows stronger, some members of the international community are naturally on edge about whether a cross-strait conflict will break out. The international community must certainly do everything in its power to avoid a conflict in the Taiwan Strait; there is too great a cost. Besides causing direct disasters to both Taiwan and China, the impact on the global economy would be even greater, with estimated losses of US$10 trillion from war alone – that is roughly 10 percent of the global GDP. Additionally, 20 percent of global shipping passes through the Taiwan Strait and surrounding waters, so if a conflict breaks out in the strait, other countries including Japan and Korea would suffer a grave impact. For Japan and Korea, a quarter of external transit passes through the Taiwan Strait and surrounding waters, and a third of the various energy resources and minerals shipped back from other countries pass through said areas. If Taiwan were invaded, global supply chains would be disrupted, and therefore conflict in the Taiwan Strait must be avoided. Such a conflict is indeed avoidable. I am very thankful to Prime Minister of Japan Ishiba Shigeru and former Prime Ministers Abe Shinzo, Suga Yoshihide, and Kishida Fumio, as well as US President Donald Trump and former President Joe Biden, and the other G7 leaders, for continuing to emphasize at international venues that peace and stability across the Taiwan Strait are essential components for global security and prosperity. When everyone in the global democratic community works together, stacking up enough strength to make China’s objectives unattainable or to make the cost of invading Taiwan too high for it to bear, a conflict in the strait can naturally be avoided. Q: As you said, President Lai, maintaining peace and stability across the Taiwan Strait is also very important for other countries. How can war be avoided? What sort of countermeasures is Taiwan prepared to take to prevent war? President Lai: As Mr. Sakurai mentioned earlier, we are coming up on the 80th anniversary of the end of WWII. There are many lessons we can take from that war. First is that peace is priceless, and war has no winners. From the tragedies of WWII, there are lessons that humanity should learn. We must pursue peace, and not start wars blindly, as that would be a major disaster for humanity. In other words, we must be determined to safeguard peace. The second lesson is that we cannot be complacent toward authoritarian powers. If you give them an inch, they will take a mile. They will keep growing, and eventually, not only will peace be unattainable, but war will be inevitable. The third lesson is why WWII ended: It ended because different groups joined together in solidarity. Taiwan, Japan, and the Indo-Pacific region are all directly subjected to China’s threats, so we hope to be able to join together in cooperation. This is why we proposed the Four Pillars of Peace action plan. First, we will strengthen our national defense. Second, we will strengthen economic resilience. Third is standing shoulder to shoulder with the democratic community to demonstrate the strength of deterrence. Fourth is that as long as China treats Taiwan with parity and dignity, Taiwan is willing to conduct exchanges and cooperate with China, and seek peace and mutual prosperity. These four pillars can help us avoid war and achieve peace. That is to say, Taiwan hopes to achieve peace through strength, prevent war by preparing for war, keeping war from happening and pursuing the goal of peace. Q: Regarding drones, everyone knows that recently, Taiwan has been actively researching, developing, and introducing drones. Why do you need to actively research, develop, and introduce new drones at this time? President Lai: This is for two purposes. The first is to meet national security needs. The second is to meet industrial development needs. Because Taiwan, Japan, and the Philippines are all part of the first island chain, and we are all democratic nations, we cannot be like an authoritarian country like China, which has an unlimited national defense budget. In this kind of situation, island nations such as Taiwan, Japan, and the Philippines should leverage their own technologies to develop national defense methods that are asymmetric and utilize unmanned vehicles. In particular, from the Russo-Ukrainian War, we see that Ukraine has successfully utilized unmanned vehicles to protect itself and prevent Russia from unlimited invasion. In other words, the Russo-Ukrainian War has already proven the importance of drones. Therefore, the first purpose of developing drones is based on national security needs. Second, the world has already entered the era of smart technology. Whether generative, agentic, or physical, AI will continue to develop. In the future, cars and ships will also evolve into unmanned vehicles and unmanned boats, and there will be unmanned factories. Drones will even be able to assist with postal deliveries, or services like Uber, Uber Eats, and foodpanda, or agricultural irrigation and pesticide spraying. Therefore, in the future era of comprehensive smart technology, developing unmanned vehicles is a necessity. Taiwan, based on industrial needs, is actively planning the development of drones and unmanned vehicles. I would like to take this opportunity to express Taiwan’s hope to collaborate with Japan in the unmanned vehicle industry. Just as we do in the semiconductor industry, where Japan has raw materials, equipment, and technology, and Taiwan has wafer manufacturing, our two countries can cooperate. Japan is a technological power, and Taiwan also has significant technological strengths. If Taiwan and Japan work together, we will not only be able to safeguard peace and stability in the Taiwan Strait and security in the Indo-Pacific region, but it will also be very helpful for the industrial development of both countries. Q: The drones you just described probably include examples from the Russo-Ukrainian War. Taiwan and China are separated by the Taiwan Strait. Do our drones need to have cross-sea flight capabilities? President Lai: Taiwan does not intend to counterattack the mainland, and does not intend to invade any country. Taiwan’s drones are meant to protect our own nation and territory. Q: Former President Biden previously stated that US forces would assist Taiwan’s defense in the event of an attack. President Trump, however, has yet to clearly state that the US would help defend Taiwan. Do you think that in such an event, the US would help defend Taiwan? Or is Taiwan now trying to persuade the US? President Lai: Former President Biden and President Trump have answered questions from reporters. Although their responses were different, strong cooperation with Taiwan under the Biden administration has continued under the Trump administration; there has been no change. During President Trump’s first term, cooperation with Taiwan was broader and deeper compared to former President Barack Obama’s terms. After former President Biden took office, cooperation with Taiwan increased compared to President Trump’s first term. Now, during President Trump’s second term, cooperation with Taiwan is even greater than under former President Biden. Taiwan-US cooperation continues to grow stronger, and has not changed just because President Trump and former President Biden gave different responses to reporters. Furthermore, the Trump administration publicly stated that in the future, the US will shift its strategic focus from Europe to the Indo-Pacific. The US secretary of defense even publicly stated that the primary mission of the US is to prevent China from invading Taiwan, maintain stability in the Indo-Pacific, and thus maintain world peace. There is a saying in Taiwan that goes, “Help comes most to those who help themselves.” Before asking friends and allies for assistance in facing threats from China, Taiwan must first be determined and prepared to defend itself. This is Taiwan’s principle, and we are working in this direction, making all the necessary preparations to safeguard the nation. Q: I would like to ask you a question about Taiwan-Japan relations. After the Great East Japan Earthquake in 2011, you made an appeal to give Japan a great deal of assistance and care. In particular, you visited Sendai to offer condolences. Later, you also expressed condolences and concern after the earthquakes in Aomori and Kumamoto. What are your expectations for future Taiwan-Japan exchanges and development? President Lai: I come from Tainan, and my constituency is in Tainan. Tainan has very deep ties with Japan, and of course, Taiwan also has deep ties with Japan. However, among Taiwan’s 22 counties and cities, Tainan has the deepest relationship with Japan. I sincerely hope that both of you and your teams will have an opportunity to visit Tainan. I will introduce Tainan’s scenery, including architecture from the era of Japanese rule, Tainan’s cuisine, and unique aspects of Tainan society, and you can also see lifestyles and culture from the Showa era.  The Wushantou Reservoir in Tainan was completed by engineer Mr. Hatta Yoichi from Kanazawa, Japan and the team he led to Tainan after he graduated from then-Tokyo Imperial University. It has nearly a century of history and is still in use today. This reservoir, along with the 16,000-km-long Chianan Canal, transformed the 150,000-hectare Chianan Plain into Taiwan’s premier rice-growing area. It was that foundation in agriculture that enabled Taiwan to develop industry and the technology sector of today. The reservoir continues to supply water to Tainan Science Park. It is used by residents of Tainan, the agricultural sector, and industry, and even the technology sector in Xinshi Industrial Park, as well as Taiwan Semiconductor Manufacturing Company. Because of this, the people of Tainan are deeply grateful for Mr. Hatta and very friendly toward the people of Japan. A major earthquake, the largest in 50 years, struck Tainan on February 6, 2016, resulting in significant casualties. As mayor of Tainan at the time, I was extremely grateful to then-Prime Minister Abe, who sent five Japanese officials to the disaster site in Tainan the day after the earthquake. They were very thoughtful and asked what kind of assistance we needed from the Japanese government. They offered to provide help based on what we needed. I was deeply moved, as former Prime Minister Abe showed such care, going beyond the formality of just sending supplies that we may or may not have actually needed. Instead, the officials asked what we needed and then provided assistance based on those needs, which really moved me. Similarly, when the Great East Japan Earthquake of 2011 or the later Kumamoto earthquakes struck, the people of Tainan, under my leadership, naturally and dutifully expressed their support. Even earlier, when central Taiwan was hit by a major earthquake in 1999, Japan was the first country to deploy a rescue team to the disaster area. On February 6, 2018, after a major earthquake in Hualien, former Prime Minister Abe appeared in a video holding up a message of encouragement he had written in calligraphy saying “Remain strong, Taiwan.” All of Taiwan was deeply moved. Over the years, Taiwan and Japan have supported each other when earthquakes struck, and have forged bonds that are family-like, not just neighborly. This is truly valuable. In the future, I hope Taiwan and Japan can be like brothers, and that the peoples of Taiwan and Japan can treat one another like family. If Taiwan has a problem, then Japan has a problem; if Japan has a problem, then Taiwan has a problem. By caring for and helping each other, we can face various challenges and difficulties, and pursue a brighter future. Q: President Lai, you just used the phrase “If Taiwan has a problem, then Japan has a problem.” In the event that China attempts to invade Taiwan by force, what kind of response measures would you hope the US military and Japan’s Self-Defense Forces take? President Lai: As I just mentioned, annexing Taiwan is only China’s first step. Its ultimate objective is to change the rules-based international order. That being the case, China’s threats are an international problem. So, I would very much hope to work together with the US, Japan, and others in the global democratic community to prevent China from starting a war – prevention, after all, is more important than cure.

    Details
    2025-05-13
    President Lai interviewed by Japan’s Nikkei  
    In a recent interview with Japan’s Nikkei, President Lai Ching-te responded to questions regarding Taiwan-Japan and Taiwan-United States relations, cross-strait relations, the semiconductor industry, and the international economic and trade landscape. The interview was published by Nikkei on May 13. President Lai indicated that Nikkei, Inc. is a global news organization that has received significant recognition both domestically and internationally, and that he is deeply honored to be interviewed by Nikkei and grateful for their invitation. The president said that he would like to take this rare opportunity to thank Japan’s government, National Diet, society, and public for their longstanding support for Taiwan. Noting that current Prime Minister Ishiba Shigeru and former Prime Ministers Abe Shinzo, Suga Yoshihide, and Kishida Fumio have all strongly supported Taiwan, he said that the peoples of Taiwan and Japan also have a deep mutual affection, and that through the interview, he hopes to enhance the bilateral relationship between Taiwan and Japan, deepen the affection between our peoples, and foster more future cooperation to promote prosperity and development in both countries. In response to questions raised on the free trade system and the recent tariff war, President Lai indicated that over the past few decades, the free economy headed by the Western world and led by the US has brought economic prosperity and political stability to Taiwan and Japan. At the same time, he said, we have also learned or followed many Western values. The president said he believes that Taiwan and Japan are exemplary students, but some countries are not. Therefore, he said, the biggest crisis right now is China, which exploits the free trade system to engage in plagiarism and counterfeiting, infringe on intellectual property rights, and even provide massive government subsidies that facilitate the dumping of low-priced goods worldwide, which has a major impact on many countries including Japan and Taiwan. If this kind of unfair trade is not resolved, he said, the stable societies and economic prosperity we have painstakingly built over decades, as well as some of the values we pursue, could be destroyed. Therefore, President Lai said he thinks it is worthwhile for us to observe the recent willingness of the US to address unfair trade, and if necessary, offer assistance. President Lai emphasized that the national strategic plan for Taiwanese industries is for them to be rooted in Taiwan while expanding their global presence and marketing worldwide. Therefore, he said, while the 32 percent tariff increase imposed by the US on Taiwan is indeed a major challenge, we are willing to address it seriously and find opportunities within that challenge, making Taiwan’s strategic plan for industry even more comprehensive. When asked about Taiwan’s trade arrangements, President Lai indicated that in 2010 China accounted for 83.8 percent of Taiwan’s outbound investment, but last year it accounted for only 7.5 percent. In 2020, he went on, 43.9 percent of Taiwan’s exports went to China, but that figure dropped to 31.7 percent in 2024. The president said that we have systematically transferred investments from Taiwanese enterprises to Japan, Southeast Asia, Europe, and the US. Therefore, he said, last year Taiwan’s largest outbound investment was in the US, accounting for roughly 40 percent of the total. Nevertheless, only 23.4 percent of Taiwanese products were sold to the US, with 76.6 percent sold to places other than the US, he said.  The president emphasized that we don’t want to put all our eggs in one basket, and hope to establish a global presence. Under these circumstances, he said, Taiwan is very eager to cooperate with Japan. President Lai stated that at this moment, the Indo-Pacific and international community really need Japan’s leadership, especially to make the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) excel in its functions, and also requested Japan to support Taiwan’s CPTPP accession. The president said that Taiwan hopes to sign an Economic Partnership Agreement (EPA) with Japan to build closer ties in economic trade and promote further investment, and that we also hope to strengthen relations with the European Union, and even other regions. Currently, he said, we are proposing an initiative on global semiconductor supply chain partnerships for democracies, because the semiconductor industry is an ecosystem. The president raised the example that Japan has materials, equipment, and technology; the US has IC design and marketing; Taiwan has production and manufacturing; and the Netherlands excels in equipment, saying we therefore hope to leverage Taiwan’s advantages in production and manufacturing to connect the democratic community and establish a global non-red supply chain for semiconductors, ensuring further world prosperity and development in the future, and ensuring that free trade can continue to function without being affected by dumping, which would undermine future prosperity and development. The president stated that as we want industries to expand their global presence and market internationally while staying rooted here in Taiwan, having industries rooted in Taiwan involves promoting pay raises for employees, tax cuts, and deregulation, as well as promoting enterprise investment tax credits. He said that we have also proposed Three Major Programs for Investing in Taiwan for Taiwanese enterprises and are actively resolving issues regarding access to water, electricity, land, human resources, and professional talent so that the business community can return to Taiwan to invest, or enterprises in Taiwan can increase their investments. He went on to say that we are also actively signing bilateral investment agreements with friends and allies so that when our companies invest and expand their presence abroad, their rights and interests as investors are ensured.  President Lai mentioned that Taiwan hopes to sign an EPA with Japan, similar to the Taiwan-US Initiative on 21st-Century Trade and the Economic Prosperity Partnership Dialogue, or the Enhanced Trade Partnership arrangement with the United Kingdom, or similar agreements or memorandums of understanding with Canada and Australia that allow Taiwanese products to be marketed worldwide, concluding that those are our overall arrangements. Looking at the history of Taiwan’s industrial development, President Lai indicated, of course it began in Taiwan, and then moved west to China and south to Southeast Asia. He said that we hope to take this opportunity to strengthen cooperation with Japan to the north, across the Pacific Ocean to the east, and develop the North American market, making Taiwan’s industries even stronger. In other words, he said, while Taiwan sees the current reciprocal tariffs imposed by the US as a kind of challenge, it also views these changes positively. On the topic of pressure from China affecting Taiwan’s participation in international frameworks such as the CPTPP or its signing of an EPA with Japan, President Lai responded that the key point is what kind of attitude we should adopt in viewing China’s acts of oppression. If we act based on our belief in free trade, he said, or on the universal values we pursue – democracy, freedom, and respect for human rights – and also on the understanding that a bilateral trade agreement between Taiwan and Japan would contribute to the economic prosperity and development of both countries, or that Taiwan’s accession to the CPTPP would benefit progress and prosperity in the Indo-Pacific region, then he hopes that friends and allies will strongly support us. On the Trump administration’s intentions regarding the reciprocal tariff policy and the possibility of taxing semiconductors, as well as how Taiwan plans to respond, President Lai said that since President Trump took office, he has paid close attention to interviews with both him and his staff. The president said that several of President Trump’s main intentions are: First, he wants to address the US fiscal situation. For example, President Lai said, while the US GDP is about US$29 trillion annually, its national debt stands at US$36 trillion, which is roughly 124 percent of GDP. Second, he went on, annual government spending exceeds US$6.5 trillion, but revenues are only around US$4.5 trillion, resulting in a nearly US$2 trillion deficit each year, about 7 percent of GDP. Third, he said, the US pays nearly US$1.2 trillion in interest annually, which exceeds the US$1 trillion defense budget and accounts for more than 3 percent of GDP. Fourth, President Trump still wants to implement tax cuts, aiming to reduce taxes for 85 percent of Americans, he said, noting that this would cost between US$500 billion and US$1 trillion. These points, President Lai said, illustrate his first goal: solving the fiscal problem. President Lai went on to say that second, the US feels the threat of China and believes that reindustrialization is essential; without reindustrialization, the US risks a growing gap in industrial capacity compared to China. Third, he said, in this era of global smart technology, President Trump wants to lead the nation to become a world center of AI. Fourth, he aims to ensure world peace and prevent future wars, President Lai said. In regard to what the US seeks to achieve, he said he believes these four areas form the core of the Trump administration’s intentions, and that is why President Trump has raised tariffs, demanded that trading partners purchase more American goods, and encouraged friendly and allied nations to invest in the US, all in order to achieve these goals. President Lai indicated that the 32 percent reciprocal tariff poses a critical challenge for Taiwan, and we must treat it seriously. He said that our approach is not confrontation, but negotiation to reduce tariffs, and that we have also agreed to measures such as procurement, investment, resolving non-tariff trade barriers, and addressing origin washing in order to effectively reduce the trade deficit between Taiwan and the US. Of course, he said, through this negotiation process, we also hope to turn challenges into opportunities. The president said that first, we aim to start negotiations from the proposal of zero tariffs and seek to establish a bilateral trade agreement with the US. Second, he went on, we hope to support US reindustrialization and its aim to become a world AI hub through investment, while simultaneously upgrading and transforming Taiwan’s industries, which would help further integrate Taiwan’s industries into the US economic structure, ensuring Taiwan’s long-term development.  President Lai emphasized again that Taiwan’s national industrial strategy is for industries to stay firmly rooted in Taiwan while expanding their global presence and marketing worldwide. He repeated that we have gone from moving westward across the Taiwan Strait, to shifting southbound, to working closer northward with Japan, and now the time is ripe for us to expand eastward by investing in North America. In other words, he said, while we take this challenge seriously to protect national interests and ensure that no industry is sacrificed, we also hope these negotiations will lead to deeper Taiwan-US trade relations through Taiwanese investment in the US, concluding that these are our expectations. The president stated that naturally, the reciprocal tariffs imposed by the US will have an impact on Taiwanese industries, so in response, the Taiwanese government has already proposed support measures for affected industries totaling NT$93 billion. In addition, he said, we have outlined broader needs for Taiwan’s long-term development, which will be covered by a special budget proposal of NT$410 billion, noting that this has already been approved by the Executive Yuan and will be submitted to the Legislative Yuan for review. He said that this special budget proposal addresses four main areas: supporting industries, stabilizing employment, protecting people’s livelihoods, and enhancing resilience. As for tariffs on semiconductors, President Lai said, Taiwan Semiconductor Manufacturing Company (TSMC) has committed to investing in the US at the request of its customers. He said he believes that TSMC’s industry chain will follow suit, and that these are concrete actions that are unrelated to tariffs. However, he said, if the US were to invoke Section 232 and impose tariffs on semiconductors or related industries, it would discourage Taiwanese semiconductor and ICT investments in the US, and that we will make this position clear to the US going forward. President Lai indicated that among Taiwan’s exports to the US, there are two main categories: ICT products and electronic components, which together account for 65.4 percent. These are essential to the US, he said, unlike final goods such as cups, tables, or mattresses. He went on to say that what Taiwan sells to the US are the technological products required by AI designers like NVIDIA, AMD, Amazon, Google, and Apple, and that therefore, we will make sure the US understands clearly that we are not exporting end products, but the high-tech components necessary for the US to reindustrialize and become a global AI center. Furthermore, the president said, Taiwan is also willing to increase its defense budget and military procurement. He stated that Taiwan is committed to defending itself and is strongly willing to cooperate with friends and allies to ensure regional peace and stability, and that this is also something President Trump hopes to see. Asked whether TSMC’s fabs overseas could weaken Taiwan’s strategic position as a key hub for semiconductor manufacturing, and whether that could then give other countries fewer incentives to protect Taiwan, President Lai responded by saying that political leaders around the world including Japan’s Prime Minister Ishiba and former Prime Ministers Abe, Suga, and Kishida have emphasized, at the G7 and other major international fora, that peace and stability in the Taiwan Strait are essential for global security and prosperity. In other words, he explained, the international community cares about Taiwan and supports peace and stability in the Taiwan Strait because Taiwan is located in the first island chain in the Indo-Pacific, directly facing China. He pointed out that if Taiwan is not protected, China’s expansionist ambitions will certainly grow, which would impact the current rules-based international order. Thus, he said, the international community willingly cares about Taiwan and supports stability in the Taiwan Strait – that is the reason, and it has no direct connection with TSMC. He noted that after all, TSMC has not made investments in that many countries, stressing that, on that point, it is clear. President Lai said that TSMC’s investments in Japan, Europe, and the US are all natural, normal economic and investment activities. He said that Taiwan is a democratic country whose society is based on the rule of law, so when Taiwanese companies need to invest around the world for business needs, the government will support those investments in principle so long as they do not harm national interests. President Lai said that after TSMC Chairman C.C. Wei (魏哲家) held a press conference with President Trump to announce the investment in the US, Chairman Wei returned to Taiwan to hold a press conference with him at the Presidential Office, where the chairman explained to the Taiwanese public that TSMC’s R&D center will remain in Taiwan and that the facilities it has already committed to investing in here will not change and will not be affected. So, the president explained, to put it another way, TSMC will not be weakened by its investment in the US. He further emphasized that Taiwan has strengths in semiconductor manufacturing and is very willing to work alongside other democratic countries to promote the next stage of global prosperity and development. A question was raised about which side should be chosen between the US and China, under the current perception of a return to the Cold War, with East and West facing off as two opposing blocs. President Lai responded by saying that some experts and scholars describe the current situation as entering a new Cold War era between democratic and authoritarian camps; others assert that the war has already begun, including information warfare, economic and trade wars, and the ongoing wars in Europe – the Russo-Ukrainian War – and the Middle East, and the Israel-Hamas conflict. The president said that these are all matters experts have cautioned about, noting that he is not a historian and so will not attempt to define today’s political situation from an academic standpoint. However, he said, he believes that every country has a choice, which is to say, Taiwan, Japan, or any other nation does not necessarily have to choose between the US and China. What we are deciding, he said, is whether our country will maintain a democratic constitutional system or regress into an authoritarian regime, and this is essentially a choice of values – not merely a choice between two major powers. President Lai said that Taiwan’s situation is different from other countries because we face a direct threat from China. He pointed out that we have experienced military conflicts such as the August 23 Artillery Battle and the Battle of Guningtou – actual wars between the Republic of China and the People’s Republic of China. He said that China’s ambition to annex Taiwan has never wavered, and that today, China’s political and military intimidation, as well as internal united front infiltration, are growing increasingly intense. Therefore, he underlined, to defend democracy and sovereignty, protect our free and democratic system, and ensure the safety of our people’s lives and property, Taiwan’s choice is clear. President Lai said that China’s military exercises are not limited to the Taiwan Strait, and include the East China Sea, South China Sea, and even the Sea of Japan, as well as areas around Korea and Australia. Emphasizing that Taiwan, Japan, Australia, and the Philippines are all democratic nations, the president said that Taiwan’s choice is clear, and that he believes Japan also has no other choice. We are all democratic countries, he said, whose people have long pursued the universal values of democracy, freedom, and respect for human rights, and that is what is most important. Regarding the intensifying tensions between the US and China, the president was asked what roles Taiwan and Japan can play. President Lai responded that in his view, Japan is a powerful nation, and he sincerely hopes that Japan can take a leading role amid these changes in the international landscape. He said he believes that countries in the Indo-Pacific region are also willing to respond. He suggested several areas where we can work together: first, democracy and peace; second, innovation and prosperity; and third, justice and sustainability. President Lai stated that in the face of authoritarian threats, we should let peace be our beacon and democracy our compass as we respond to the challenges posed by authoritarian states. Second, he added, as the world enters an era characterized by the comprehensive adoption of smart technologies, Japan and Taiwan should collaborate in the field of innovation to further drive regional prosperity and development. Third, he continued, is justice and sustainability. He explained that because international society still has many issues that need to be resolved, Taiwan and Japan can cooperate for the public good, helping countries in need around the world, and cooperating to address climate change and achieve net-zero transition by 2050. Asked whether he hopes that the US will continue to be a leader in the liberal democratic system, President Lai responded by saying that although the US severed diplomatic ties with the Republic of China, for the past few decades it has assisted Taiwan in various areas such as national defense, security, and countering threats from China, based on the Taiwan Relations Act and the Six Assurances. He pointed out that Taiwan has also benefited, directly and indirectly, in terms of politics, democracy, and economic prosperity thanks to the US, and so Taiwan naturally hopes that the US remains strong and continues to lead the world. President Lai said that when the US encounters difficulties, whether financial difficulties, reindustrialization issues, or becoming a global center for AI, and hopes to receive support from its friends and allies to jointly safeguard regional peace and stability, Taiwan is willing to stand together for a common cause. If the US remains strong, he said, that helps Taiwan, the Indo-Pacific region, and the world as a whole. Noting that while the vital role of the US on the global stage has not changed, the president said that after decades of shouldering global responsibilities, it has encountered some issues. Now, it has to make adjustments, he said, stating his firm belief that it will do so swiftly, and quickly resume its leadership role in the world. Asked to comment on remarks he made during his election campaign that he would like to invite China’s President Xi Jinping for bubble tea, President Lai responded that Taiwan is a peace-loving country, and Taiwanese society is inherently kind, and therefore we hope to get along peacefully with China, living in peace and mutual prosperity. So, during his term as vice president, he said, he was expressing the goodwill of Taiwanese society. Noting that while he of course understands that China’s President Xi would have certain difficulties in accepting this, he emphasized that the goodwill of Taiwanese society has always existed. If China reflects on the past two or three decades, he said, it will see that its economy was able to develop with Taiwan as its largest foreign investor. The president explained that every year, 1 to 2 million Taiwanese were starting businesses or investing in China, creating numerous job opportunities and stabilizing Chinese society. While many Taiwanese businesses have profited, he said, Chinese society has benefited even more. He added that every time a natural disaster occurs, if China is in need, Taiwanese always offer donations. Therefore, the president said, he hopes that China can face the reality of the Republic of China’s existence and understand that the people of Taiwan hope to continue living free and democratic lives with respect for human rights. He also expressed hope that China can pay attention to the goodwill of Taiwanese society. He underlined that we have not abandoned the notion that as long as there is parity, dignity, exchange, and cooperation, the goodwill of choosing dialogue over confrontation and exchange over containment will always exist. Asked for his view on the national security reforms in response to China’s espionage activities and infiltration attempts, President Lai said that China’s united front infiltration activities in Taiwan are indeed very serious. He said that China’s ambitions to annex Taiwan rely not only on the use of political and military intimidation, but also on its long-term united front and infiltration activities in Taiwanese society. Recently, he pointed out, the Taiwan High Prosecutors Office of the Ministry of Justice prosecuted 64 spies, which is three times the number in 2021, and in addition to active-duty military personnel, many retired military personnel were also indicted. Moreover, he added, Taiwan also has the Chinese Unification Promotion Party, which has a background in organized crime, Rehabilitation Alliance Party, which was established by retired military personnel, and Republic of China Taiwan Military Government, which is also composed of retired generals. He explained that these are all China’s front organizations, and they plan one day to engage in collaboration within Taiwan, which shows the seriousness of China’s infiltration in Taiwan. Therefore, the president said, in the recent past he convened a high-level national security meeting and proposed 17 response strategies across five areas. He then enumerated the five areas: first, to address China’s threat to Taiwan’s sovereignty; second, to respond to the threat of China’s obscuring the Taiwanese people’s sense of national identity; third, to respond to the threat of China’s infiltrating and recruiting members of the ROC Armed Forces as spies; fourth, to respond to the threat of China’s infiltration of Taiwanese society through societal exchanges and united front work; and fifth, to respond to the threat of China using “integration plans” to draw Taiwan’s young people and Taiwanese businesses into its united front activities. In response to these five major threats, he said, he has proposed 17 response strategies, one of which being to restore the military trial system. He explained that if active-duty military personnel commit military crimes, they must be subject to military trials, and said that this expresses the Taiwanese government’s determination to respond to China’s united front infiltration and the subversion of Taiwan. Responding to the question of which actions Taiwan can take to guard against China’s threats to regional security, President Lai said that many people are worried that the increasingly tense situation may lead to accidental conflict and the outbreak of war. He stated his own view that Taiwan is committed to facing China’s various threats with caution. Taiwan is never the source of these problems, he emphasized, and if there is an accidental conflict and it turns into a full-scale war, it will certainly be a deliberate act by China using an accidental conflict as a pretext. He said that when China expanded its military presence in the East China Sea and South China Sea, the international community did not stop it; when China conducted exercises in the Taiwan Strait, the international community did not take strong measures to prevent this from happening. Now, he continued, China is conducting gray-zone exercises, which are aggressions against not only the Taiwan Strait, the South China Sea, and the East China Sea, but also extending to the Sea of Japan and waters near South Korea. He said that at this moment, Taiwan, the Philippines, Japan, and even the US should face these developments candidly and seriously, and we must exhibit unity and cooperation to prevent China’s gray-zone aggression from continuing to expand and prevent China from shifting from a military exercise to combat. If no action is taken now, the president said, the situation may become increasingly serious. Asked about the view of some US analysts who point out that China will have the ability to invade Taiwan around 2027, President Lai responded that Taiwan, as the country on the receiving end of threats and aggression, must plan for the worst and make the best preparations. He recalled a famous saying from the armed forces: “Do not count on the enemy not showing up; count on being ready should it strike.” This is why, he said, he proposed the Four Pillars of Peace action plan. First, he said, we must strengthen our national defense. Second, he added, we must strengthen economic resilience, adding that not only must our economy remain strong, but it must also be resilient, and that we cannot put all our eggs in the same basket, in China, as we have done in the past. Third, he continued, we must stand shoulder to shoulder with friends and allies such as Japan and the US, as well as the democratic community, and we must demonstrate the strength of deterrence to prevent China from making the wrong judgment. Fourth, he emphasized, as long as China treats Taiwan with parity and dignity, Taiwan is willing to conduct exchanges and cooperate with China and seek cross-strait peace and mutual prosperity through exchanges and cooperation. Regarding intensifying US-China confrontation, the president was asked in which areas he thinks Taiwan and Japan should strengthen cooperation; with Japan’s Ishiba administration also being a minority government, the president was asked for his expectations for the Ishiba administration. President Lai said that in the face of rapid and tremendous changes in the political situation, every government faces considerable challenges, especially for minority governments, but the Japanese government led by Prime Minister Ishiba has quite adequately responded with various strategies. Furthermore, he said, Japan is different from Taiwan, explaining that although Japan’s ruling party lacks a majority, political parties in Japan engage in competition domestically while exhibiting unity externally. He said that Taiwan’s situation is more challenging, because the ruling and opposition parties hold different views on the direction of the country, due to differences in national identity. The president expressed his hope that in the future Taiwan and Japan will enjoy even more comprehensive cooperation. He stated that he has always believed that deep historical bonds connect Taiwan and Japan. Over the past several decades, he said, when encountering natural disasters and tragedies, our two nations have assisted each other with mutual care and support. He said that the affection between the people of Taiwan and Japan is like that of a family. Pointing out that both countries face the threat of authoritarianism, he said that we share a mission to safeguard universal values such as democracy, freedom, and respect for human rights. The president said that our two countries should be more open to cooperation in various areas to maintain regional peace and stability as well as to strengthen cooperation in economic and industrial development, such as for semiconductor industry chains and everyday applications of AI, including robots and drones, adding that we can also cooperate on climate change response, such as in hydrogen energy and other strategies. He said our two countries should also continue to strengthen people-to-people exchanges. He then took the opportunity to once again invite our good friends from Japan to visit Taiwan for tourism and learn more about Taiwan, saying that the Taiwanese people wholeheartedly welcome our Japanese friends.  

    Details
    2025-05-20
    President Lai interviewed by Nippon Television and Yomiuri TV
    In a recent interview on Nippon Television’s news zero program, President Lai Ching-te responded to questions from host Mr. Sakurai Sho and Yomiuri TV Shanghai Bureau Chief Watanabe Masayo on topics including reflections on his first year in office, cross-strait relations, China’s military threats, Taiwan-United States relations, and Taiwan-Japan relations. The interview was broadcast on the evening of May 19. During the interview, President Lai stated that China intends to change the world’s rules-based international order, and that if Taiwan were invaded, global supply chains would be disrupted. Therefore, he said, Taiwan will strengthen its national defense, prevent war by preparing for war, and achieve the goal of peace. The president also noted that Taiwan’s purpose for developing drones is based on national security and industrial needs, and that Taiwan hopes to collaborate with Japan. He then reiterated that China’s threats are an international problem, and expressed hope to work together with the US, Japan, and others in the global democratic community to prevent China from starting a war. Following is the text of the questions and the president’s responses: Q: How do you feel as you are about to round out your first year in office? President Lai: When I was young, I was determined to practice medicine and save lives. When I left medicine to go into politics, I was determined to transform Taiwan. And when I was sworn in as president on May 20 last year, I was determined to strengthen the nation. Time flies, and it has already been a year. Although the process has been very challenging, I am deeply honored to be a part of it. I am also profoundly grateful to our citizens for allowing me the opportunity to give back to our country. The future will certainly be full of more challenges, but I will do everything I can to unite the people and continue strengthening the nation. That is how I am feeling now. Q: We are now coming up on the 80th anniversary of the end of World War II, and over this period, we have often heard that conflict between Taiwan and the mainland is imminent. Do you personally believe that a cross-strait conflict could happen? President Lai: The international community is very much aware that China intends to replace the US and change the world’s rules-based international order, and annexing Taiwan is just the first step. So, as China’s military power grows stronger, some members of the international community are naturally on edge about whether a cross-strait conflict will break out. The international community must certainly do everything in its power to avoid a conflict in the Taiwan Strait; there is too great a cost. Besides causing direct disasters to both Taiwan and China, the impact on the global economy would be even greater, with estimated losses of US$10 trillion from war alone – that is roughly 10 percent of the global GDP. Additionally, 20 percent of global shipping passes through the Taiwan Strait and surrounding waters, so if a conflict breaks out in the strait, other countries including Japan and Korea would suffer a grave impact. For Japan and Korea, a quarter of external transit passes through the Taiwan Strait and surrounding waters, and a third of the various energy resources and minerals shipped back from other countries pass through said areas. If Taiwan were invaded, global supply chains would be disrupted, and therefore conflict in the Taiwan Strait must be avoided. Such a conflict is indeed avoidable. I am very thankful to Prime Minister of Japan Ishiba Shigeru and former Prime Ministers Abe Shinzo, Suga Yoshihide, and Kishida Fumio, as well as US President Donald Trump and former President Joe Biden, and the other G7 leaders, for continuing to emphasize at international venues that peace and stability across the Taiwan Strait are essential components for global security and prosperity. When everyone in the global democratic community works together, stacking up enough strength to make China’s objectives unattainable or to make the cost of invading Taiwan too high for it to bear, a conflict in the strait can naturally be avoided. Q: As you said, President Lai, maintaining peace and stability across the Taiwan Strait is also very important for other countries. How can war be avoided? What sort of countermeasures is Taiwan prepared to take to prevent war? President Lai: As Mr. Sakurai mentioned earlier, we are coming up on the 80th anniversary of the end of WWII. There are many lessons we can take from that war. First is that peace is priceless, and war has no winners. From the tragedies of WWII, there are lessons that humanity should learn. We must pursue peace, and not start wars blindly, as that would be a major disaster for humanity. In other words, we must be determined to safeguard peace. The second lesson is that we cannot be complacent toward authoritarian powers. If you give them an inch, they will take a mile. They will keep growing, and eventually, not only will peace be unattainable, but war will be inevitable. The third lesson is why WWII ended: It ended because different groups joined together in solidarity. Taiwan, Japan, and the Indo-Pacific region are all directly subjected to China’s threats, so we hope to be able to join together in cooperation. This is why we proposed the Four Pillars of Peace action plan. First, we will strengthen our national defense. Second, we will strengthen economic resilience. Third is standing shoulder to shoulder with the democratic community to demonstrate the strength of deterrence. Fourth is that as long as China treats Taiwan with parity and dignity, Taiwan is willing to conduct exchanges and cooperate with China, and seek peace and mutual prosperity. These four pillars can help us avoid war and achieve peace. That is to say, Taiwan hopes to achieve peace through strength, prevent war by preparing for war, keeping war from happening and pursuing the goal of peace. Q: Regarding drones, everyone knows that recently, Taiwan has been actively researching, developing, and introducing drones. Why do you need to actively research, develop, and introduce new drones at this time? President Lai: This is for two purposes. The first is to meet national security needs. The second is to meet industrial development needs. Because Taiwan, Japan, and the Philippines are all part of the first island chain, and we are all democratic nations, we cannot be like an authoritarian country like China, which has an unlimited national defense budget. In this kind of situation, island nations such as Taiwan, Japan, and the Philippines should leverage their own technologies to develop national defense methods that are asymmetric and utilize unmanned vehicles. In particular, from the Russo-Ukrainian War, we see that Ukraine has successfully utilized unmanned vehicles to protect itself and prevent Russia from unlimited invasion. In other words, the Russo-Ukrainian War has already proven the importance of drones. Therefore, the first purpose of developing drones is based on national security needs. Second, the world has already entered the era of smart technology. Whether generative, agentic, or physical, AI will continue to develop. In the future, cars and ships will also evolve into unmanned vehicles and unmanned boats, and there will be unmanned factories. Drones will even be able to assist with postal deliveries, or services like Uber, Uber Eats, and foodpanda, or agricultural irrigation and pesticide spraying. Therefore, in the future era of comprehensive smart technology, developing unmanned vehicles is a necessity. Taiwan, based on industrial needs, is actively planning the development of drones and unmanned vehicles. I would like to take this opportunity to express Taiwan’s hope to collaborate with Japan in the unmanned vehicle industry. Just as we do in the semiconductor industry, where Japan has raw materials, equipment, and technology, and Taiwan has wafer manufacturing, our two countries can cooperate. Japan is a technological power, and Taiwan also has significant technological strengths. If Taiwan and Japan work together, we will not only be able to safeguard peace and stability in the Taiwan Strait and security in the Indo-Pacific region, but it will also be very helpful for the industrial development of both countries. Q: The drones you just described probably include examples from the Russo-Ukrainian War. Taiwan and China are separated by the Taiwan Strait. Do our drones need to have cross-sea flight capabilities? President Lai: Taiwan does not intend to counterattack the mainland, and does not intend to invade any country. Taiwan’s drones are meant to protect our own nation and territory. Q: Former President Biden previously stated that US forces would assist Taiwan’s defense in the event of an attack. President Trump, however, has yet to clearly state that the US would help defend Taiwan. Do you think that in such an event, the US would help defend Taiwan? Or is Taiwan now trying to persuade the US? President Lai: Former President Biden and President Trump have answered questions from reporters. Although their responses were different, strong cooperation with Taiwan under the Biden administration has continued under the Trump administration; there has been no change. During President Trump’s first term, cooperation with Taiwan was broader and deeper compared to former President Barack Obama’s terms. After former President Biden took office, cooperation with Taiwan increased compared to President Trump’s first term. Now, during President Trump’s second term, cooperation with Taiwan is even greater than under former President Biden. Taiwan-US cooperation continues to grow stronger, and has not changed just because President Trump and former President Biden gave different responses to reporters. Furthermore, the Trump administration publicly stated that in the future, the US will shift its strategic focus from Europe to the Indo-Pacific. The US secretary of defense even publicly stated that the primary mission of the US is to prevent China from invading Taiwan, maintain stability in the Indo-Pacific, and thus maintain world peace. There is a saying in Taiwan that goes, “Help comes most to those who help themselves.” Before asking friends and allies for assistance in facing threats from China, Taiwan must first be determined and prepared to defend itself. This is Taiwan’s principle, and we are working in this direction, making all the necessary preparations to safeguard the nation. Q: I would like to ask you a question about Taiwan-Japan relations. After the Great East Japan Earthquake in 2011, you made an appeal to give Japan a great deal of assistance and care. In particular, you visited Sendai to offer condolences. Later, you also expressed condolences and concern after the earthquakes in Aomori and Kumamoto. What are your expectations for future Taiwan-Japan exchanges and development? President Lai: I come from Tainan, and my constituency is in Tainan. Tainan has very deep ties with Japan, and of course, Taiwan also has deep ties with Japan. However, among Taiwan’s 22 counties and cities, Tainan has the deepest relationship with Japan. I sincerely hope that both of you and your teams will have an opportunity to visit Tainan. I will introduce Tainan’s scenery, including architecture from the era of Japanese rule, Tainan’s cuisine, and unique aspects of Tainan society, and you can also see lifestyles and culture from the Showa era.  The Wushantou Reservoir in Tainan was completed by engineer Mr. Hatta Yoichi from Kanazawa, Japan and the team he led to Tainan after he graduated from then-Tokyo Imperial University. It has nearly a century of history and is still in use today. This reservoir, along with the 16,000-km-long Chianan Canal, transformed the 150,000-hectare Chianan Plain into Taiwan’s premier rice-growing area. It was that foundation in agriculture that enabled Taiwan to develop industry and the technology sector of today. The reservoir continues to supply water to Tainan Science Park. It is used by residents of Tainan, the agricultural sector, and industry, and even the technology sector in Xinshi Industrial Park, as well as Taiwan Semiconductor Manufacturing Company. Because of this, the people of Tainan are deeply grateful for Mr. Hatta and very friendly toward the people of Japan. A major earthquake, the largest in 50 years, struck Tainan on February 6, 2016, resulting in significant casualties. As mayor of Tainan at the time, I was extremely grateful to then-Prime Minister Abe, who sent five Japanese officials to the disaster site in Tainan the day after the earthquake. They were very thoughtful and asked what kind of assistance we needed from the Japanese government. They offered to provide help based on what we needed. I was deeply moved, as former Prime Minister Abe showed such care, going beyond the formality of just sending supplies that we may or may not have actually needed. Instead, the officials asked what we needed and then provided assistance based on those needs, which really moved me. Similarly, when the Great East Japan Earthquake of 2011 or the later Kumamoto earthquakes struck, the people of Tainan, under my leadership, naturally and dutifully expressed their support. Even earlier, when central Taiwan was hit by a major earthquake in 1999, Japan was the first country to deploy a rescue team to the disaster area. On February 6, 2018, after a major earthquake in Hualien, former Prime Minister Abe appeared in a video holding up a message of encouragement he had written in calligraphy saying “Remain strong, Taiwan.” All of Taiwan was deeply moved. Over the years, Taiwan and Japan have supported each other when earthquakes struck, and have forged bonds that are family-like, not just neighborly. This is truly valuable. In the future, I hope Taiwan and Japan can be like brothers, and that the peoples of Taiwan and Japan can treat one another like family. If Taiwan has a problem, then Japan has a problem; if Japan has a problem, then Taiwan has a problem. By caring for and helping each other, we can face various challenges and difficulties, and pursue a brighter future. Q: President Lai, you just used the phrase “If Taiwan has a problem, then Japan has a problem.” In the event that China attempts to invade Taiwan by force, what kind of response measures would you hope the US military and Japan’s Self-Defense Forces take? President Lai: As I just mentioned, annexing Taiwan is only China’s first step. Its ultimate objective is to change the rules-based international order. That being the case, China’s threats are an international problem. So, I would very much hope to work together with the US, Japan, and others in the global democratic community to prevent China from starting a war – prevention, after all, is more important than cure.

    MIL OSI Asia Pacific News

  • MIL-OSI Europe: EUROPE/CZECH REPUBLIC – The “Night of the Churches”, an opportunity for encounters in the time of agnosticism

    Source: Agenzia Fides – MIL OSI

    photo Chiara Dommarco

    by Chiara DommarcoPrague (Agenzia Fides) – On Friday, May 23, the Czech Republic hosted the 17th edition of the “Night of Churches” (Noc kostelů), centered this year on the theme of hope, in line with the ongoing Jubilee Year. A total of 1,868 churches remained open and accessible free of charge from the afternoon until late at night across the country, including several Protestant places of worship.The event attracted tens of thousands of visitors, who also had the opportunity to meet with men and women religious, as well as lay volunteers who took care of the various scheduled activities in the program, amidst a constant flow of attendees.Various cultural initiatives were proposed during the event, including concerts, exhibitions and food and wine stands.“The goal of each of us is happiness. We need the kind of happiness that comes from love that fills us, so that we can say: I am loved, therefore I am. And I will always be in the Love that never deceives and from which nothing and no one can separate me”. These words were part of a message shared by Metropolitan Archbishop of Prague, Jan Graubner, addressed to the visitors—including thousands of tourists in the capital.Czech Minister of Culture Martin Baxa also praised the initiative, highlighting how it offers “a unique and personal experience.”In the late afternoon, the Italian Embassy in Prague offered a free guided tour of the Chapel of the Italians (Vlašská Kaple), located in the renowned Klementinum complex. The chapel has been recently restored and is only opened to the public a few times a year.In the Bohemian and Moravian lands, the Night of Churches holds special significance. While interconfessional conflicts—such as the Hussite Wars and the Bohemian phase of the Thirty Years’ War—have left a painful legacy, the longstanding positive contributions of Christian communities in these lands were later undermined by religious persecution under Nazi occupation and during the Communist regime.Furthermore, according to a 2017 survey, the Czech Republic has the highest percentage of agnostics among former Soviet-bloc countries. (Pew Research Center).The 2021 national census reports that only 7% of the population declared themselves as Catholic. Initiatives like this, therefore, promote knowledge of the artistic heritage of the country and of the Christian communities that have contributed to its development, all within a peaceful and constructive atmosphere.This year, the initiative’s public and ecumenical dimension was especially evident in the participation of the Chapel of the Chamber of Deputies of the Czech Parliament. Inaugurated in 2016, the chapel stands as a symbol of reconciliation among the country’s various Christian denominations.In its dual function of national reconciliation and affirmation of the positive value of Christian confessions for Czech society as a whole, the Chapel hosted performances of several modern Christian-inspired songs during the evening.The “Night of Churches” initiative began in 1995 in Frankfurt, and then spread to other German cities, Austria since 2005 and, more recently, to parts of South Tyrol, the Czech Republic, in Slovakia and Estonia. (Agenzia Fides, 26/5/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI: Bitcoin Solaris Launches Beta Access to Solaris Nova App and Enters Final Phases of Presale

    Source: GlobeNewswire (MIL-OSI)

    TALLINN, Estonia, May 26, 2025 (GLOBE NEWSWIRE) — Bitcoin Solaris, the next-generation blockchain project powered by the Helios Consensus Mechanism, has officially opened beta access to its Solaris Nova app and is now in Phase 5 of its limited presale. This marks a pivotal moment for the project as it expands accessibility through mobile mining and prepares for full-scale launch.

    Solaris Nova Beta: Mining from Your Smartphone
    The Solaris Nova app introduces one of the most accessible blockchain participation models to date. With just a smartphone, users can mine BTC-S tokens using the app’s intuitive one-click interface eliminating the need for expensive hardware or technical expertise.

    Beta access is currently open to early community members, with wider availability expected in the coming weeks. The app includes an integrated wallet for secure token management and will soon support seamless liquidity features and DeFi compatibility.

    The Game-Changer: Helios Consensus
    At the heart of Bitcoin Solaris’s innovation is the Helios Consensus Mechanism—a hybrid protocol that merges the best of both worlds: the reliability of Proof-of-Work (PoW) and the efficiency of Delegated Proof-of-Stake (DPoS). This dual-layer approach not only enhances decentralization but also slashes energy usage by up to 99.95%.

    Here’s what makes it stand out:

    • Security of PoW ensures robust protection against double-spending and malicious activity.
    • Speed and Scalability of DPoS allow Bitcoin Solaris to process up to 10,000 transactions per second.
    • Fair Mining Access opens participation to anyone with a smartphone through the upcoming Solaris Nova app.

    While Ethereum has focused on gas fee optimization and L2 integrations, Bitcoin Solaris is laying an entirely new foundation—one that could redefine what blockchain access and profitability look like.

    Features that Make Bitcoin Solaris a Wealth Engine
    Bitcoin Solaris is more than a protocol—it’s a complete wealth-building ecosystem. Here’s what gives it an edge:

    • Universal Mobile Mining: Mine BTC-S from your smartphone, tablet, or laptop. No expensive equipment. No technical hurdles.
    • One-Click Interface: The Solaris Nova app simplifies mining with just a tap.
    • In-App Wallet: Securely store and manage tokens without needing third-party tools.
    • Liquid, DeFi-Ready: Solaris tokens are designed for real-world liquidity and future integrations.
    • Energy-Efficient: Reduces consumption without sacrificing decentralization.

    Why Work for Money When BTC-S Can Work for You?

    Beta access to the Solaris Nova app is already underway for early community members. While the official release is pending, there’s still an opportunity to be part of this exclusive test phase.

    Presale Update: Limited Supply, Rapid Growth

    Bitcoin Solaris is currently in Phase 5 of its presale, with tokens priced at $5. The presale has already raised over $1.2 million from more than 8,900 participants, underlining the growing interest in the project’s mobile-first approach and energy-efficient blockchain design.

    • Current Token Price: $5
    • Next Phase Price: $6
    • Launch Price: $20
    • Presale Bonus: 11%
    • Presale Ends: July 31, 2025

    The presale runs only until July 31, 2025, offering a staggering potential return of up to 1,900%. Over 8,900 users have already jumped in, with over $1.2 million raised, making it one of the fastest-growing crypto sales this year.

    To stay updated with the latest announcements and community events, follow Bitcoin Solaris on X or join the vibrant discussions happening daily in their Telegram group.

    Growing Recognition in the Space
    Influencers and crypto analysts are taking notice. A standout review from Token Galaxy dives deep into why Bitcoin Solaris may be the most disruptive project of the year. Their breakdown highlights not just the tech, but the team, transparency, and early community impact.

    And it’s not just influencers. Independent audits from Cyberscope and Freshcoins, along with full KYC verification, reinforce Bitcoin Solaris’s legitimacy in a sea of hype coins.

    Join the Future of Decentralized Participation
    The beta rollout of the Solaris Nova app and the current presale phase represent critical steps in the Bitcoin Solaris roadmap. With its focus on inclusive mining, transparent operations, and sustainable technology, Bitcoin Solaris is building more than a blockchain. it’s creating a movement.

    To join the presale or learn more:

    Media Contact:
    Xander Levine
    info@bitcoinsolaris.com
    Email: press@bitcoinsolaris.com

    Press Kit: [Available Upon Request]

    Disclaimer: This is a paid post and is provided by Bitcoin Solaris The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility.Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at:
    https://www.globenewswire.com/NewsRoom/AttachmentNg/a1961200-cc3d-4bbd-854a-cccb4e666cf4
    https://www.globenewswire.com/NewsRoom/AttachmentNg/aaea121d-60b7-4103-a60f-a63daf31f971
    https://www.globenewswire.com/NewsRoom/AttachmentNg/0038fbba-7d02-4315-8a4a-75843aa09c56
    https://www.globenewswire.com/NewsRoom/AttachmentNg/0149f0b4-f20d-405d-a0cb-af70b620cbdb

    The MIL Network

  • MIL-OSI: Report on the unaudited financial performance of the bank during the first quarter of 2025

    Source: GlobeNewswire (MIL-OSI)

    Urbo bankas UAB, company code 112027077, address: Konstitucijos pr.18B, Vilnius.

    Urbo Bankas earned a net profit of EUR 1.2 million in the first quarter of 2025.

    At the end of the first quarter of this year, the loan portfolio of Urbo Bankas reached EUR 438.9 million, an increase of 34.7% compared to a year ago. The bank’s net interest income increased by 7.3% to EUR 5.8 million. Deposit volumes grew by 17.9% over the same period to EUR 576.4 million.

    “The favourable economic situation – low inflation, a steadily declining Euribor interest rate and still positive business and consumer expectations – has also led to an increase in borrowing volumes. The growth trends in consumer and mortgage lending in the retail segment continue to be stable, while the number of investment projects carried out by farmers and small and medium-sized enterprises is also growing consistently,” says Marius Arlauskas, Head of Administration of Urbo Bankas.

    According to him, the lower profit was due to the varying dynamics of interest income and expenses, increased investments in the development of electronic payment systems and new premises in some of the bank’s branches, as well as a decline in the volume of non-core activities.

    In the first quarter of 2025, the bank’s net fee and commission income decreased by 22.2% to EUR 0.7 million compared to the same period last year. Net profit on foreign currency transactions decreased by EUR 100 thousand to EUR 0.4 million in the comparable period due to the contraction of the foreign exchange market in Lithuania.

    “The performance indicators for the first quarter clearly point to both the overall financial trends and the bank’s priority areas of activity. For example, the declining number of foreign currency transactions indicates that the need to conduct foreign exchange transactions in cash is declining in the market, the shrinking of premium collection revenues signals that these activities are moving to the electronic space, and the growth of loan and deposit portfolios shows the potential of businesses and individuals to both borrow and accumulate funds,” says Mr. Arlauskas.

    The total assets of Urbo Bankas at the end of Q1 2025 amounted to EUR 668.5 million, or 15.9% more than a year ago (EUR 576.5 million). The bank’s shareholders’ equity increased by 9.2% year-on-year to EUR 63.8 million.

    At the end of March this year, Urbo Bankas had 279 employees, and its customer service network consisted of 25 territorial branches.  

    For more information please contact: Julius Ivaška, Head of Business Division, tel. +370 601 04 453, e-mail media@urbo.lt

    Attachment

    The MIL Network

  • MIL-OSI Europe: Debates – Thursday, 22 May 2025 – Brussels – Revised edition

    Source: European Parliament

    Verbatim report of proceedings
     253k  688k
    Thursday, 22 May 2025 – Brussels

       

    PRESIDENZA: ANTONELLA SBERNA
    Vicepresidente

     
    1. Opening of the sitting

       

    (La seduta è aperta alle 09:00)

     

    2. Choose Europe for Science (debate)

     

      Ekaterina Zaharieva, Member of the Commission. – Madam President, honourable Members, thank you for the opportunity to present our Choose Europe for Science initiative.

    As President von der Leyen stated in the Sorbonne in Paris a few weeks ago, Europe is determined to start a new age of invention and ingenuity. We are making a clear choice to place research and innovation at the heart of our societies and economies. Europe is choosing science.

    Today, this choice is more urgent than ever. Science is a source of prosperity, but it is also fundamental to our sovereignty and economic security, our resilience, democracy and leading role on the global stage. For example, scientific leadership in AI or quantum is directly linked to the ability of protecting our society and our values. We need talent to progress in those crucial technology domains.

    Countries understand this. Global research and development has recently surpassed EUR 2.5 trillion per year. At the same time, we also see science exploited for political ends, and academic freedom is under pressure.

    Last month, we had the opportunity to discuss developments on the other side of the Atlantic. Their universities, and fields like vaccine science and climate research, are being targeted by funding cuts.

    But it is not only in the United States. Elsewhere in the globe, scientists are instrumentalised, at best, and openly attacked, at worst. In conflict zones, schools and universities are not spared. In Ukraine, Putin’s war has physically damaged over 1 400 science-related buildings, constituting 30 % of all research institutions, and displaced 20 % of the country’s researchers.

    In this context, Europe must do more than hold its ground. We must become the best place in the globe to do research, the place our young people choose for their careers, and the place global talent comes to help us tackle global challenges.

    This is the ambition of Choose Europe for Science. It builds on four dimensions. First: scientific freedom. Europe must remain the global leader in free and open research. We need a research and innovation union where knowledge flows as freely as goods, services and capital. This is why we commit to protecting freedom of scientific research through law with the new European Research Area Act. This is in line with the European Parliament’s resolution of January 2024 on protecting the freedom of scientific research.

    Second: funding. Horizon Europe is already the largest international research programme. It is a global magnet that received applicants from 194 countries, with 90 countries associated and more wanting in.

    In addition, earlier this month, President von der Leyen announced a EUR 500 million package for the programming period 2025–2027. It will include a new seven-year super grant under the European Research Council. We will support the brightest researchers regardless of their origin.

    We are also expanding our Marie Skłodowska-Curie Actions with a new pilot starting in October. It will build on the attractive conditions offered by Marie Skłodowska-Curie Actions, with longer contracts and more secure professional perspectives to support excellent early-career scientists choosing Europe.

    For established researchers, we are doubling the top-up funding for grantees moving in Europe. We also work with Member States to reach our 3 % GDP target for R&D by 2030.

    Furthermore, the European Regional Development Fund is spending around EUR 35 billion to increase research and innovation capacity across the Union. This will help reduce the innovation divide by strengthening regional R&I ecosystems. Member States and regions are improving their innovation performance and cohesion, and thus retain their talents and attract new ones. Under the next Framework Programme, we will put forward ambitious proposals on research and innovation funding.

    Third: fast-tracking innovation. We must ensure our excellent research can be translated into breakthrough innovation, so that our citizens can benefit from science. Horizon Europe beneficiaries already submitted over 600 patent applications, and we are going further. Next week I will present Europe’s first start-up and scale-up strategy. Retaining and attracting talent will be a crucial dimension of this strategy. Next year we will table a new European Innovation Act, further simplifying and accelerating the path to market.

    Finally: global talent. If you want the best minds to choose Europe, we need to make it easier for them to come and live here. We are working to make the legal framework for researchers more effective, and to speed up entry to the EU. At the same time, we will strengthen our EURAXESS platform, which already links global researchers with thousands of opportunities across the EU.

    Honourable Members, to achieve this ambition, we also need mobilisation at national level. In the past weeks, we have witnessed our Member States opening their doors to talent, from the Welcome to Poland initiative and Choose France for Science, to Estonia’s Mobilitas 3.0 or Czechia’s Junior Star, and many more.

    Here we need a true Team Europe approach to maximise our efforts. As the European Commission, we stand ready to promote this coordinated approach, including through enhanced public communication, starting from tomorrow’s Competitiveness Council. I wish to thank the Polish Presidency for its leadership on this subject.

    To conclude, the aim of Choose Europe for Science is clear: to make Europe the leading destination for researchers on Earth. We can achieve this together as a Union with the active commitment from the Member States and, of course, with the crucial support of this House. The European Parliament has long championed scientific excellence and academic freedom. Your leadership has paved the way to our action today. So thank you very much and I look forward to working together.

     
       

     

      Christian Ehler, on behalf of the PPE Group. – Madam President, Commissioner, ladies and gentlemen, I think Choose Europe for Science, the initiative announced by President von der Leyen, is an important signal for Europe and the world, but luckily it had been accompanied also by a press conference where the President had been announcing that there will be a stand‑alone research programme, which necessarily is the base for that ambition.

    I think we should also emphasise that this is not that we want to attract the most talented in the world, it is that we stand in also for the freedom of science. Much smaller programmes, like the programme for researchers at risk, are an expression for that stand-in. Yes, we want to be attractive for the world, but we also are the safe haven for researchers, women researchers in Afghanistan, researchers under pressure in other parts of the world – we are the safe haven for them. So it’s both: our expression for excellence or ambition for excellence, but also our expression for standing in for the freedom of science.

    Basically, we all know that it’s just going to work if we have a strong research programme. We can appeal to the world, but if we do not have a higher ambition in terms of research, it’s not going to be attractive. What we need is, simply put, more money. The last programme had been designed for a budget of EUR 120 billion and we ended up with EUR 80 billion. So, research budgets are in constraints and that is in complete opposition to what our formulated ambition had been – that at least 3 % of the GDP of Europe should be allocated to research and innovation.

    So in a way, ambitions should follow also with the political courage to prioritise research and innovation in Europe. If I may conclude: now that the Commission and even the President have fully recognised the importance of science for the future of Europe, we also expect the Commission’s proposal for FP10 to be a Commission which also chooses science for Europe.

     
       

     

      Giorgio Gori, a nome del gruppo S&D. – Signora Presidente, signora Commissaria, onorevoli colleghi, negli ultimi mesi l’amministrazione Trump ha attaccato l’autonomia del sistema educativo e universitario degli Stati Uniti, ha ridotto i finanziamenti agli atenei e limitato la libertà accademica. Queste scelte indeboliscono l’attrattività degli Stati Uniti per ricercatori e talenti globali. La rivista Nature ha rilevato che le domande di lavoro all’estero degli scienziati statunitensi sono cresciute del 32% tra gennaio e marzo 2025 rispetto all’anno precedente.

    La Commissione europea ha colto questa opportunità annunciando un piano da 500 milioni di euro, per il periodo 25-27, volto ad attrarre ricercatori internazionali. Tra le misure previste, una super sovvenzione di sette anni gestita dal Consiglio europeo della ricerca che offre stabilità e incentivi raddoppiati per chi si trasferisce in Europa. Questa iniziativa è un passo nella giusta direzione per rafforzare la posizione dell’Europa nella ricerca scientifica globale.

    Tuttavia, è essenziale fare di più. Negli ultimi venti anni l’Europa ha perso molto terreno rispetto ad altre regioni del mondo – su tutte Cina e Stati Uniti – riguardo alla capacità di attrarre investimenti per la ricerca e di coltivare talenti e progetti nei settori dell’innovazione più avanzata. E questa è una delle cause del declino della competitività europea.

    Non basta, quindi, l’iniziativa della Commissione: gli Stati membri vanno spinti a costruire un quadro legislativo in grado di valorizzare e sostenere stabilmente la capacità dei ricercatori, di quelli che sono emigrati e vogliamo che tornino, di quelli che vogliamo attrarre e, soprattutto, di quelli che sono rimasti ma che vivono e lavorano in condizioni di precarietà.

    Vanno aumentati i finanziamenti nazionali e i salari dei ricercatori, vanno progettati percorsi di carriera solidi e trasparenti e per chi sceglie di venire in Europa vanno semplificate le procedure di visto. Solo così la ricerca potrà fiorire in Europa, diventando motore di innovazione e di ricerca.

     
       

     

      Catherine Griset, au nom du groupe PfE. – Madame la Présidente, chers collègues, à la Sorbonne, haut lieu de la culture française, Emmanuel Macron et Ursula von der Leyen ont organisé une mise en scène européiste: faire passer des activistes américains pour des martyrs de la liberté académique. Soyons clairs: ces chercheurs ne sont pas persécutés, ils sont sanctionnés pour avoir transformé les universités en foyer idéologique, où la science cède la place à la propagande.

    Alors qu’on leur déroule le tapis rouge, que devient la recherche en Europe? Elle est noyée sous des financements pour des projets sur le genre, la race ou la déconstruction. Erasmus+ subventionne même des universités islamistes. «Horizon Europe» est devenu un guichet pour l’idéologie. Quant à la Hongrie, elle est exclue, non pour des raisons scientifiques, mais parce qu’elle ose penser autrement. Voilà la liberté académique selon Bruxelles: un outil politique.

    Comme si cela ne suffisait pas, on efface désormais la France, jusque dans sa propre langue. Pour cette opération de communication, le français a été remplacé par un «globish» fade et sans racine. Les identités sont gommées, les cultures sont nivelées et l’Europe est standardisée à coups de slogans creux. C’est plus qu’un renoncement, c’est une soumission culturelle assumée. Cette opération n’a rien de scientifique: il s’agit d’un plan de rééducation idéologique et nous la combattrons.

     
       

     

      Piotr Müller, w imieniu grupy ECR. – Pani Przewodnicząca! Widzimy na świecie w tej chwili wyścig nauki w różnych miejscach, w różnych dyscyplinach, ale przede wszystkim w takich obszarach, jak sztuczna inteligencja, rozwój energetyki, biotechnologii, najnowszych technologii informatycznych. W tych obszarach Unia Europejska powinna poczynić wszystko, aby stanąć w tym wyścigu jak równy z równym, w szczególności w kontekście konkurencji ze Stanami Zjednoczonymi czy z Chinami.

    Jest to tylko możliwe wtedy, gdy faktycznie środki finansowe skoncentrujemy na tych najważniejszych obszarach i faktycznie na nich się skupimy. Z racji tego, że oczywiste jest, że zasoby podatkowe, zasoby finansowe, którymi dysponuje Unia Europejska i państwa członkowskie, są ograniczone, musimy podjąć taką decyzję. I musimy też odważnie powiedzieć, że wydatkowanie środków finansowych na lewicowe, ideologiczne badania jest po prostu stratą środków finansowych. Jest stratą nadziei na postęp nauki w takich obszarach, o których przed chwilą powiedziałem. I dzisiaj odważnie lewica musi wybrać, czy chcecie, aby finansować wasze lewicowe pomysły, badania na temat tego, czy jest 30 czy 35 płci, czy chcecie, żeby Europa podążała w wyścigu w zakresie rozwoju sztucznej inteligencji, energetyki czy innych obszarów, które przełożą się na jakość życia obywateli.

    Szanowni Państwo, to nie jest kwestia dyskusji o wolności nauki, bo każdy może prowadzić badania naukowe, jakie sobie chce. Może decydować o tym samodzielnie. To jest decyzja o tym, gdzie idą pieniądze podatników. A pieniądze podatników powinny iść tam, gdzie efekty przełożą się na lepsze życie obywateli.

     
       

     

      Valérie Hayer, au nom du groupe Renew. – Madame la Présidente, Madame la Commissaire, chers collègues, «le réchauffement climatique est un canular inventé par les Chinois pour nuire à l’industrie américaine», «le bruit des éoliennes cause le cancer», «le pacte vert pour l’Europe est un manifeste communiste», «un désinfectant est plus efficace qu’un vaccin contre la COVID-19», «l’huile de foie de morue réduit la mortalité liée à la rougeole», «les professeurs sont l’ennemi, nous devons attaquer agressivement les universités». Ces déclarations sont l’œuvre de Donald Trump et de son administration qui ont fait de la science et des scientifiques des ennemis de l’Amérique.

    Mes chers collègues, ce n’est pas seulement aux États-Unis, mais partout dans le monde où les extrêmes progressent, que la liberté scientifique est menacée. L’initiative «Choose Europe for Science» promeut cette liberté scientifique. Elle vise à renforcer l’attractivité des carrières scientifiques en Europe. Elle veut accélérer l’innovation en facilitant le passage de la recherche fondamentale au marché.

    Madame la Commissaire, le groupe Renew Europe soutient pleinement cette initiative. Il est à vos côtés pour faire de l’Europe ce pôle d’attraction pour la science. Il est à vos côtés pour défendre notre identité, celle d’une démocratie européenne qui nous protège de tout obscurantisme. Alors travaillons ensemble pour octroyer davantage de moyens aux scientifiques européens et étrangers et pour faciliter le retour des chercheurs européens expatriés.

    Je le dis aux scientifiques du monde entier: entendez cet appel et choisissez l’Europe pour continuer à travailler. Des financements, un environnement favorable, des facilités administratives, la mobilisation d’un budget de 500 millions d’EUR, ainsi que le soutien inconditionnel à la liberté et à l’excellence scientifique sont là pour vous. L’Europe est généreuse, car elle a besoin des scientifiques.

    Chers collègues, sans recherche, sans innovation, nous ne parviendrons pas à répondre à l’enjeu de notre compétitivité. C’est l’une des conditions pour faire de l’Union européenne une puissance politique pleine et entière. L’équation est posée. Alors avançons.

     
       

     

      Anna Strolenberg, on behalf of the Verts/ALE Group. – Madam President, the plan to attract scientists to Europe is called Choose Europe. But what does it mean to choose Europe? It means to choose academic freedom, to choose a continent that still believes in climate change – and thank God for that – it means to choose diversity being a strength instead of a weakness.

    Choosing Europe also means long and difficult visa procedures. It also means having your diplomas recognised in one country, but not in the other. To choose Europe means to talk about researchers and professors that we want, but sometimes forgetting about the nurses, truckers and caregivers that we need.

    Choose Europe also means that sometimes we don’t use our full workforce potential because refugees and women don’t always find a job. I want the best talent to come to Europe, but I also want the best for talent in Europe, and I believe we can do both if we invest in the people here and if we see labour migration as an opportunity.

    So why don’t we train the people in Ljubljana but also look for them in Lagos? Why don’t we help women in Düsseldorf to find a job, but also look for them in Delhi? Why don’t we pay our professors and teachers in Saint-Étienne a fair wage, but also look for them in San Francisco?

    I would say, let’s not ask why people would choose Europe, but let’s ask ourselves, how can we make Europe the destination of choice for all talent?

     
       

     

      Ilaria Salis, a nome del gruppo The Left. – Signora Presidente, onorevoli colleghi, mentre negli Stati Uniti di Trump la libertà accademica è apertamente sotto attacco, anche in Europa non possiamo dormire sonni tranquilli. L’abbiamo visto nella repressione delle sacrosante proteste contro il genocidio a Gaza e contro l’occupazione coloniale della Palestina: studenti e ricercatori manganellati, conferenze annullate e accuse infondate e pretestuose di antisemitismo. È un segnale grave, gravissimo.

    L’iniziativa Choose Europe for Science è importante e la sostengo: l’Europa dovrebbe sempre essere un rifugio, un luogo di libertà, cooperazione e speranza. Sarebbe bello – aggiungo – se lo fosse anche per migranti e richiedenti asilo, che fanno altri lavori e provengono da altre parti del mondo; ma non lo è.

    Apriamo le porte solo alle eccellenze, come se il sapere non fosse sempre frutto di un lavoro collettivo, spesso invisibile e quasi sempre sottopagato. È una visione miope, che tradisce un’idea elitaria della conoscenza: l’idea capitalistica. L’Università va difesa nella sua interezza, come comunità, come luogo di sviluppo condiviso e non come vetrina di merito individuale.

    In Italia chi fa ricerca è spesso un lavoratore povero, intrappolato in una precarietà cronica, costretto a una mobilità imposta, con conseguenze materiali e psicologiche devastanti. I posti di lavoro sono pochi, le prospettive pesanti, spesso solo all’estero. L’Università non si costruisce selezionando pochi eccellenti ma garantendo a tutte e tutti l’accesso al sapere.

    Pertanto servono politiche pubbliche ambiziose, inclusive, di massa. Servono veri investimenti nella ricerca, perché la produzione di sapere è il miglior valore aggiunto che possiamo generare, non solo sul piano economico ma, soprattutto, sul piano culturale, sociale e democratico.

     
       

     

      Marc Jongen, im Namen der ESN-Fraktion. – Frau Präsidentin! Choose Europe for Science. Warum sollten junge Wissenschaftler das tun? Doch nur, wenn sie sich zum Komplizen der politischen Lebenslüge unserer Eliten machen, dass Europa noch immer für Exzellenz, für akademische Freiheit und für Wohlstand steht. Die traurige Wahrheit ist doch: Es gibt heute Hexenjagden gegen kritische Wissenschaftler in ganz Europa, die nicht hundertprozentig dem linksliberalen Mainstream folgen, wie vor Kurzem gegen den jungen Historiker Hasselhorn in Deutschland. Lesen Sie das mal nach, Herr Brandstätter! Und Frau von der Leyen hat es in Paris in ihrer Rede Anfang Mai ja gesagt: Diversity is the lifeblood of science. Trump räumt gerade in den USA mit ideologischen Diversitätsprogrammen auf. Und wer deshalb von dort flüchtet, der ist sicher kein exzellenter Forscher, sondern Ideologe, den wir nicht noch mit teuren Programmen nach Europa locken sollten. Wir müssen aufhören, Agendawissenschaften wie Gender, Critical Race usw. in Europa zu fördern, und endlich auch einen freien Diskurs in der Klimaforschung zulassen. Nur dann werden wir wieder Exzellenz herstellen, und dann werden auch die pathetischen Worte von Macron und von der Leyen an der Sorbonne, die ja sehr schön waren, aber leider heuchlerisch, wieder der Wahrheit entsprechen.

     
       

     

      Letizia Moratti (PPE). – Signora Presidente, signor Commissario, onorevoli colleghi, la scienza è uno degli strumenti più potenti che abbiamo per migliorare la vita dei nostri cittadini. È grazie agli studi, alle ricerche, alle competenze e alle eccellenze del nostro continente se oggi possiamo contare su terapie innovative contro il cancro o su vaccini che hanno sconfitto la poliomelite e la pandemia da COVID-19.

    L’intelligenza artificiale sta aprendo nuove frontiere: potenzia la ricerca, accelera le scoperte e rende le nostre industrie più competitive a livello globale. La scienza dunque non è astratta: è concreta, genera soluzioni, crea futuro.

    Eppure in Europa il trasferimento tecnologico rimane una delle nostre maggiori debolezze. Abbiamo ottimi ricercatori, ma non sempre riusciamo a trasformare la ricerca in valore sociale ed economico. Gli investimenti pubblici in ricerca nell’Unione europea – fondamentali investimenti che vanno potenziati – sono pari al 2,2 percento del PIL, mentre negli USA sfiorano il 3,5 percento. Anche gli investimenti privati sono ancora troppo bassi: solo l’1,5 percento del PIL contro il 2,2 percento degli Stati Uniti.

    Dobbiamo agire per colmare questi gap. Serve facilitare la ricerca di spin-off e start-up universitarie, promuovere partnership pubblico-privato, creare un ecosistema favorevole che attragga investimenti, acceleri il trasferimento tecnologico e quindi attragga i migliori ricercatori.

    L’Unione europea deve essere protagonista nell’affermare una scienza libera che non solo scopre ma costruisce per il bene dei propri cittadini. E questo significa anche sostenere con forza la sua applicazione industriale ed economica: è una sfida che dobbiamo vincere.

     
       

     

      Lina Gálvez (S&D). – Señora presidenta, señora comisaria, en un momento en el que, por un lado, Europa necesita mejorar su competitividad, pero, por el otro, la libertad académica y la ciencia están siendo también cuestionadas en otros lugares del mundo, la iniciativa Elige Europa para la ciencia es más importante que nunca.

    Europa debe posicionarse como refugio para las y los investigadores que buscan desarrollar sus ideas en un entorno de libertad y de respeto por la diversidad, por el pensamiento crítico que inspira el propio método científico, y Elige Europa para la ciencia es un paso en la dirección correcta, pero debe ser un proyecto verdaderamente europeo para evitar crear desigualdades. No podemos permitir que esta medida beneficie solo a algunos territorios: esa no es la Europa que queremos.

    Queremos que Europa sea un lugar donde puedan investigar en libertad y abordar los desafíos globales, donde puedan colaborar con personas expertas de todo el mundo y donde se puedan aprovechar bien las oportunidades de financiación. Y para eso debemos garantizar, principalmente, dos cosas: primero, un presupuesto fuerte, y segundo, un programa europeo de ciencia e innovación autónomo. Afortunadamente, la presidenta de la Comisión el otro día anunció que así sería.

    Tenemos que convencernos de que, sin ciencia, no hay ni competitividad, ni democracia, ni proyecto europeo.

     
       

     

      Annamária Vicsek (PfE). – Elnök Asszony! A kutatás és innováció kulcsfontosságú Európa versenyképességének megőrzésében, ezért üdvözlendő a Bizottság célkitűzése, hogy megállítsa, sőt visszafordítsa az agyelszívást. A válassza Európát, válassza a tudományt elnevezésű kezdeményezésben viszont egy súlyos ellentmondást láthatunk. Miközben Brüsszel tengerentúli kutatókat csábít, addig egyes uniós kutatókat kizár a közös programokból. A magyar kutatók már három éve nem férnek hozzá a Horizon Europe forrásaihoz. Nem tudományos vagy adminisztratív hibák miatt, hanem politikai okokból.

    Az Európai Bizottság a magyar kutatói közösség kizárásával akarja büntetni a magyar kormányt, pedig ezzel pont azt fogja eredményezni, amit elvileg meg akarna akadályozni, az agyelszívást. A magyar kutatók ma nemcsak az uniós, hanem már harmadik országbeli kollégáikkal szemben is hátrányban vannak. Ez a kirekesztés nemcsak igazságtalan, hanem Európa versenyképességét is gyengíti. A kiváló magyar kutatók megérdemlik, hogy az egységes kutatási térséghez tartozzanak.

     
       

     

      Marion Maréchal (ECR). – Madame la Présidente, chers collègues, Emmanuel Macron et Ursula von der Leyen se sont livrés à la Sorbonne à un drôle de numéro: les voilà donc ardents défenseurs d’une recherche académique libre et indépendante contre l’obscurantisme de l’administration Trump.

    Pour l’occasion, le président français n’a pas eu honte de proposer 100 millions d’euros pour attirer les chercheurs américains, alors que dans le même temps, le budget français dévolu à l’enseignement supérieur et à la recherche s’est vu retirer 1 milliard d’euros en 2025.

    Pendant que les États-Unis consacrent plus de 3,5 % de leur PIB à la recherche et au développement, l’UE, elle, peine à dépasser les 2,2 %. L’Europe, en effet, peine à garder ses chercheurs, puisque, depuis 2010, le taux de départ des docteurs européens vers les États-Unis est d’environ 20 %.

    Alors, avant de vouloir faire venir les chercheurs américains anti-Trump en Europe, commençons déjà par comprendre et faire en sorte de garder nos propres chercheurs en Europe grâce à une rémunération et à des crédits dignes de ce nom.

    Profitons-en aussi pour nous interroger sur les orientations budgétaires de la recherche publique dans nos pays qui, en France par exemple, avec le CNRS, est devenu le paradis des sciences molles pour militants woke au détriment de la recherche scientifique qui, elle, crée de la richesse et de l’emploi.

     
       

     

      Christophe Grudler (Renew). – Madame la Présidente, Madame la Commissaire, fin mars, nous alertions déjà sur la situation aux États-Unis: coupes budgétaires massives, recul des libertés académiques, licenciements. Aujourd’hui, ses scientifiques cherchent un refuge. L’Europe a donc une opportunité unique: devenir le nouvel eldorado de la science libre.

    À cet égard, je salue l’initiative «Choose Europe» et l’annonce d’une enveloppe de 500 millions d’euros jusqu’en 2027, mais soyons clairs: les 22 millions d’euros du programme pilote, via l’action Marie Curie, ne suffiront pas. Ce programme pilote doit ouvrir la voie, oui, mais l’ouvrir vite, avec des procédures d’accueil simplifiées, une sélection rapide des projets et des perspectives de long terme pour celles et ceux qui veulent reconstruire ici leur avenir scientifique.

    Par ailleurs, l’excellence scientifique n’est pas incompatible avec l’agenda stratégique de l’Union, bien au contraire. Les projets portés dans ce cadre peuvent, par leurs résultats, contribuer aux priorités de l’Union, du climat à la santé en passant par les technologies critiques et de rupture.

    Enfin, j’en appelle à toutes les universités, académies et centres de recherche européens: rejoignez le mouvement, ouvrez vos portes.

     
       

     

      Vladimir Prebilič (Verts/ALE). – Gospa predsedujoča! Spoštovane kolegice in kolegi! Kot profesor iz prve roke poznam preobrazbo na moč znanosti, ki mora biti svobodna, odprta za sodelovanje in ima intelektualno dostojanstvo.

    V času, ko so ogrožene akademske svoboščine v Združenih državah Amerike in drugje, kjer so dejstva spolitizirana, akademiki pa utišani, mora Evropa dajati zgled. Biti moramo upanje za tiste, ki iščejo resnico in ne nadzora. Za tiste, ki iščejo sodelovanje in ne cenzure. Zato moramo odpreti vrata svetu z novimi programi, kot so Erasmus+ za Indijo in Afriko, ter vzpostaviti nova partnerstva s tretjimi državami.

    To niso le programi mednarodne izmenjave, ampak so lahko tudi rešilni čoln za tiste, ki so danes ogroženi na Harvardu, Columbiji in drugje. Evropa mora sprejeti bistre ume iz vsega sveta. Naj jasno povem, če verjamete v svobodno misel in dostojanstvo znanja, potem izberite Evropo za znanost.

     
       

     

      Catarina Martins (The Left). – Senhora Presidente, Senhora Comissária, este debate é um desfile de horrores.

    Um grupo da extrema-direita chega e defende cortar o financiamento a universidades que se posicionam contra o genocídio na Palestina. Logo a seguir, outro dos grupos da extrema-direita vem defender cortes na investigação científica sobre mulheres. Como se não chegasse, vem o terceiro grupo de extrema-direita deste Parlamento e propõe adotar o conceito fascista de ciência: só se investiga o que lhes der razão.

    A questão da liberdade académica não é um problema só nos Estados Unidos, onde a administração de Donald Trump está a perseguir as universidades e os cientistas. A interferência e a ameaça contra as universidades, o desrespeito completo pela autonomia, a falta de conhecimento — onde sobram racismo, misoginia e homofobia, elevados a critérios da ciência, que se pode ou não produzir —, também já estão na Hungria. Já está à espreita em tantos países europeus. E não foi, afinal, o que ouvimos aqui hoje?

    A iniciativa Escolhe a Europa para a Ciência tem o objetivo de atrair cientistas de outras partes do mundo para fazer ciência na Europa. E é bom que a Europa o queira fazer, que se queira abrir ao mundo e que perceba que a ciência é fundamental.

    Mas olhemos para o que está a acontecer: orçamento para a ciência insuficiente, xenofobia no centro da política de imigração e, mais, com a cobertura crescente que populares e liberais dão à extrema-direita um pouco por toda a Europa, quem acolherá os investigadores americanos, europeus, seja onde for, quando a perseguição, aqui, também se tornar a regra?

     
       

     

      Zsuzsanna Borvendég (ESN). – Elnök Asszony! A kutatás-fejlesztés erősítése a versenyképesség egyik kulcsa, de a célok kijelölése tagállami hatáskör. Központosítással durva aránytalanságok állhatnak elő, és komoly problémák léphetnek fel. Már a bolognai folyamat is színvonalesést eredményezett az egyetemeken, de figyelmeztető jel az is, hogy a Covid-diktatúra idején boszorkányüldözést folytattak azon tudósok ellen, akik megkérdőjelezték a WHO diktátumait.

    A tudományos szabadság nem tűri a politikai és ideológiai nyomásgyakorlást, ezért káros, hogy a tervezet eleve kiemeli a zöld átállást, a gender-tanokat, és kiemelt figyelmet fordít az ukrán kutatókra, ezzel kvázi meghatározva a támogatás politikai feltételeit. A mobilitás túlhangsúlyozásával az európai kutatók hátrányba kerülhetnek a harmadik országból érkezőkkel szemben. Vagyis rejtetten a migrációt segíti a tervezet, ráadásul nehezíti a kutatók visszatérését saját hazájukba, ezzel az Unión belüli agyelszívást fokozzák, ami a kevésbé gazdag tagállamokat súlyosan érinti.

     
       

     

      Diana Iovanovici Şoşoacă (NI). – Doamnă președintă, da, vorbim despre cercetare. Este foarte frumos, aveți intenții foarte bune, vă gândiți la bani, vă gândiți să aduceți cei mai buni cercetători din Statele Unite ale Americii, ăia de care America nu mai are nevoie, dar nu vă uitați la cercetătorii din Europa și, bineînțeles, fiind româncă, vreau să-mi laud cercetătorii din România: cercetători care au pus bazele Institutului de la Măgurele de Fizică Atomică, pe care îl lăsați în paragină; cercetători care au pus bazele celui mai important institut, „Cantacuzino” – datorită căruia n-am mai fi avut nevoie de vaccinuri COVID cu cercetări pe care nu știu pentru cine le-ați făcut, poate pentru Auschwitz, pentru că au omorât și omoară și acum, nu știu ce cercetători au fost – Institut „Cantacuzino” care nu mai există, iar cercetătorii au fost puși să se ducă la adunat de legume prin țările dumneavoastră; Institutul de Geriatrie „Ana Aslan”, cea care a inventat elixirul tinereții.

    Nu faceți absolut nimic pentru Europa. Vă bateți joc! Aduceți doar vaccinuri care au efecte secundare și omoară oameni. Ideologii de gen, asta este cercetarea europeană. Când veți învăța să respectați Europa și cercetătorii europeni, atunci veți avea excelență.

     
       

     

      Angelika Niebler (PPE). – Frau Präsidentin, Frau Kommissarin, liebe Kolleginnen, liebe Kollegen! Europa ist ein hervorragender Standort für Wissenschaftler aus der ganzen Welt. Die Freiheit der Lehre, der Forschung, der Wissenschaft ist für uns in Europa ein ganz hohes Gut. Dafür zu werben und Anreize zu setzen, dass Talente nach Europa kommen, ist genau das Richtige. Ich begrüße das neue Förderprogramm für Spitzenforschung, Spitzenforscher und internationale Talente. Ich begrüße diese Superfinanzhilfe für den Europäischen Forschungsrat. Ich begrüße die bessere finanzielle Ausstattung für Marie-Curie-Stipendien. Das alles, meine lieben Kolleginnen und Kollegen, sind doch hervorragende Initiativen, und sie helfen auch, eben unseren Standort noch weiter attraktiv zu machen.

    Woran wir wirklich noch arbeiten müssen, ist, dass wir hier auch die Rahmenbedingungen für die Talente, die nach Europa kommen, erleichtern. Ich höre aus der Wissenschaftscommunity, dass es immer noch Riesenprobleme in den Mitgliedstaaten bei der Erteilung von Visa gibt, dass es beim Start schwierig ist – auch in dieser neuen Umgebung. Das ist jetzt nicht in erster Linie Aufgabe der Kommission, aber vielleicht kann man doch auch darauf hinwirken, dass die Talente, die zu uns nach Europa kommen wollen, sich hier auch wirklich willkommen fühlen. Und das beginnt damit, dass wir bei der Visaerteilung Erleichterungen schaffen.

     
       

     

      Sofie Eriksson (S&D). – Fru talman! Det vi ser i USA just nu är ett systematiskt sönderfall, en demokrati som monteras ner bit för bit, en president som föraktar rättsstaten, som underminerar vetenskapen, som bara verkar bry sig om att berika sig själv och andra superrika, som gärna vill hålla folkflertalet utan utbildning och förnekar dem utbildning eftersom att vi vet att en bildad befolkning kommer att ifrågasätta auktoriteter.

    Men vi hör ju samma rop här i denna sal här i dag från extremhögern som hånar vetenskap, som förnekar klimatförändringarna, som vill bygga makten på rädsla och förakt. Det duger inte.

    Därför måste Europa svara, inte med tystnad utan med mod. Det är nu som vi måste ta ställning. Vi ska vara den självklara platsen i världen där kunskapen får andas, där sanningen inte är till salu. Därför är det här initiativet från kommissionen viktigt. Men det behövs mer än ord. Det krävs handling, det krävs förnuft. För låt det nu inte bli så att vi skrumpnar till torra, bruna, orangea och sura apelsiner, utan låt oss vara stolta i Europa där vetenskapen alltid har en plats.

     
       

     

      Jana Nagyová (PfE). – Paní předsedající, paní komisařko, bylo nebylo, Evropa kdysi bývala centrem pokroku, místem, kam lidé upírali oči v naději na lepší budoucnost. Ta doba je však pryč. Svým přesvědčením, že jsme ti nejlepší, svou nabubřelostí a byrokracií jsme nechali mnoho mozků a vynálezů utéct do třetích zemí. Problémy jsou nad slunce jasné, odliv mozků, o třetinu nižší výdaje na výzkum a vývoj a jen čtvrtina registrovaných patentů ve srovnání s USA a Čínou. Uvádění inovací na trh podle reálné situace je ještě horší. Není divu. Zásadním krokem pro Evropu je totiž splnění úkolu, který zde zůstává nedokončený již téměř sedmdesát let od doby Římských smluv, a to je realizace čtyř svobod. Roztříštěnost trhů stojí Evropu každý rok přes 200 miliard EUR a přitom my hledáme nové finanční zdroje. Máme je na talíři.

    Člověk však musí věřit, že bude lépe. Proto věřím, že poslední kroky Evropské komise, a to je program Choose Europe for Science a příslib samostatného programu Horizont přinesou své ovoce. Jen doufám, že přístup do něj bude nastaven tak, aby i menší státy měly reálnou šanci z toho čerpat. Jinak bude platit „Poslední zhasíná“.

     
       

     

      Diego Solier (NI). – Señora presidenta, señora comisaria, hay dos cosas raras de ver: una patera yendo hacia un país comunista y un investigador pensando en quedarse en Europa. Europa quiere ser el hogar de la ciencia, pero para eso tiene que ser un lugar donde vivir, trabajar y crear no sea un deporte de riesgo.

    Somos un continente con democracias sólidas: sanidad, educación, movilidad… Sí, pero ¿puede un joven e investigador pagar un piso en Ámsterdam, Múnich o Madrid con un contrato de tres años? Financiamos ciencia con Horizonte Europa, pero llenamos a los investigadores de papeles y formularios. Los científicos pasan más tiempo acreditando que investigando.

    Además, no podemos permitir que nuestros investigadores vivan en la precariedad. Necesitamos más vínculos con las empresas, más empleabilidad y más sinergias. Si queremos que elijan Europa, hagamos de Europa una elección real, no una apuesta inestable. La ciencia necesita libertad, continuidad y estabilidad. Sin ciencia no hay Europa.

     
       

     

      Oihane Agirregoitia Martínez (Renew). – Señora presidenta, estamos en un momento en el que presidentes de distintos Estados son invitados a la Casa Blanca con intención de ser ridiculizados, se dispara contra diplomáticos y civiles de todos los bandos cuando se quiere presionar ante violaciones de derechos humanos y actuaciones inhumanas y la plutocracia y extremismos ganan terreno, limitando libertades fundamentales y pensamientos críticos. Hagamos de Euskadi y de Europa un espacio de oportunidad para quienes quieran mejorar sus condiciones de vida desde el respeto a los valores europeos y un lugar de desarrollo profesional para quienes quieran sumar sus capacidades investigadoras a las nuestras y nos ayuden a reducir dependencias a partir de la innovación y el desarrollo. De eso va el programa Elige Europa para la ciencia.

    En este nuevo tablero geopolítico, el liderazgo científico e innovador proporciona una ventaja competitiva cada vez mayor. Y eso, en el medio y en el largo plazo, se traduce en nuevos y mejores puestos de trabajo, más autonomía estratégica y menos desigualdades.

    Por lo tanto, en una Euskadi que siempre ha apostado por la investigación y el desarrollo, por la libertad científica y el fomento del talento, esperamos que esos más de 1 250 millones de euros sirvan para hacer crecer nuestro espacio de oportunidad y nuestro país.

     
       

     

      Anthony Smith (The Left). – Madame la Présidente, Madame la Commissaire, c’est formidable, formidablement hypocrite! Mme von der Leyen et M. Macron s’érigent en défenseurs des libertés académiques et politiques en octroyant l’accueil aux scientifiques étasuniens, par exemple, persécutés pour leur engagement en faveur de la Palestine.

    Ce sont les mêmes qui, ici, s’enlisent dans des circonvolutions pour ne pas dénoncer le génocide en cours à Gaza. Les mêmes qui, ici, frappent d’anathème les militants et les étudiants dénonçant les massacres de Tsahal; les mêmes qui, ici, accusent d’antisémitisme toute personne critiquant le gouvernement d’extrême droite de M. Netanyahou.

    Depuis que M. Macron est au pouvoir, le budget de l’enseignement supérieur par étudiant a baissé de 15 % en France. Une destruction méthodique de l’université publique a lieu sous nos yeux. Les universités ne parviennent plus à boucler leur budget et la précarisation des personnels et des étudiants atteint des niveaux records.

    Assez de cette hypocrisie et de ces plans de communication obscènes! Nous défendrons toujours les libertés politiques et académiques et les moyens nécessaires à leur expression, tout comme nous défendrons toujours l’accueil des réfugiés, peu importe leur origine.

     
       

     

      Hélder Sousa Silva (PPE). – Senhora Presidente, Senhora Comissária, caros colegas, só teremos uma Europa desenvolvida, próspera e soberana se colocarmos a ciência e a inovação no centro do nosso projeto comum. A iniciativa Escolhe a Europa para a Ciência é um passo crucial nessa direção.

    Pela primeira vez, os investigadores terão não só financiamento robusto e direto da União Europeia, mas também a garantia de contratos prolongados por parte das instituições e a necessária continuidade da carreira científica.

    Além disso, com a exigência de cofinanciamento que esta iniciativa impõe, devemos garantir que todas as instituições sediadas em regiões com menos recursos possam realmente participar sem deixar ninguém para trás.

    Mas precisamos de sonhar mais alto. Precisamos de garantir que esta iniciativa posiciona a União Europeia como líder global em ciência e inovação, oferecendo um ambiente de investigação aberto, bem financiado, coeso e com forte ligação ao setor empresarial. É muito importante que tal aconteça.

    (O orador aceita responder a uma pergunta «cartão azul»)

     
       

     

      Bruno Gonçalves (S&D).Dear President, colleagues, Commissioner, o futuro da indústria e da competitividade europeia não se constrói com salários baixos nem com desregulação sem limites; constrói-se com uma estratégia para a inovação, estratégia que nos faltou.

    A iniciativa Chose Europe, agora apresentada, acrescenta 500 milhões EUR, que permitem valorizar os nossos jovens qualificados e novos centros de investigação. Mas o aumento de financiamento abre também portas ao recrutamento dos melhores cientistas que já não estão na Europa.

    Falo daqueles que, nos Estados Unidos e noutros países, sofreram cortes no apoio ao seu trabalho e que sentem a ciência ameaçada por parte dos mesmos que em Gaza ameaçam crianças, mas que no mundo ameaçam a verdade.

    Esta é uma oportunidade única para reinventar a Europa como líder de uma nova era do conhecimento na descarbonização, na inteligência artificial ou nas biotecnologias de saúde. Mas, sejamos claros, o futuro não vai esperar por nós. E é por isso que, mais do que é importante apresentar, é urgente fazer. Essa deve ser razão suficiente para que o Velho Continente volte a ser o mais iluminado.

    (O orador aceita responder a uma pergunta «cartão azul»)

     
       

     

      João Oliveira (The Left), Pergunta segundo o procedimento «cartão azul». – Senhor Deputado Bruno Gonçalves, quero fazer-lhe duas perguntas.

    Primeiro, como é que Portugal sai da situação de dependência dos países mais fortes, das grandes potências da União Europeia, no acesso aos fundos para a ciência? A União Europeia acaba de anunciar um conjunto de medidas com grandes fundos associados. Portugal continua sempre numa posição de dependência, porque, para aceder a esses fundos, as nossas unidades de ciência e de investigação precisam sempre de encontrar alguma espécie de consórcio com unidades de países mais importantes, mais fortes, para conseguir aceder aos fundos.

    A segunda pergunta é esta: como é que o PS resolve a contradição do seu discurso e do seu posicionamento, defendendo, por um lado, o investimento na ciência e na investigação, mas, por outro lado, estando de acordo com todas as restrições e condicionamentos orçamentais que a União Europeia nos impõe, nomeadamente através do Pacto de Estabilidade?

    Precisamos de fazer o investimento em ciência e tecnologia, e isso não é compatível com a aceitação das restrições orçamentais que a União Europeia nos impõe.

     
       

     

      Bruno Gonçalves (S&D), Resposta segundo o procedimento «cartão azul». – Se eu pudesse responder com uma venda, eu diria que esta intervenção vem de um partido profundamente europeísta, preocupado com a Europa e com a forma como os fundos europeus são alocados ao nosso país. Não é o caso.

    E, portanto, responderei sendo de um partido profundamente europeísta, de um partido que criou, em Portugal, a Fundação para a Ciência e a Tecnologia, de um partido que aprofundou a integração europeia também no conhecimento, e que já na última legislatura — não na última legislatura do governo AD, mas do governo do Partido Socialista — criou clusters em Portugal que não só permitiram aceder a mais fundos, mas permitiram aceder a mais fundos entre empresas e universidades portuguesas.

    E, portanto, essa visão cética sobre a Europa é algo que caracteriza bem a bancada de onde o senhor deputado vem, mas não é algo que seja refletido nos dados públicos, que nos demonstram que, hoje, temos pessoas mais qualificadas, mais inovação — e muito mais do que tínhamos antes da integração europeia.

     
       

     

      Kris Van Dijck (ECR). – Voorzitter, mevrouw de commissaris, ik ben blij dat het besef er is dat investeringen in onderzoek en innovatie een absolute noodzaak zijn voor ons concurrentievermogen. Ik ben ook trots dat Vlaanderen hierin een koploper is en zelfs de ambitie uitspreekt om van 3,5 % naar 5 % van het bbp te evolueren.

    Het gemiddelde in de Europese Unie ligt nu rond de 2,2 % en dat is ruim onvoldoende. Onze productiviteit lijdt hieronder. Zo kunnen we de wereldwijde concurrentie niet aangaan en dreigen we aan welvaart in te boeten. Dus goed dat de Commissie actie onderneemt. Maar sta me toe, mevrouw de commissaris, drie belangrijke kanttekeningen te maken:

    1) laat fundamenteel onderzoek niet vallen. Dat brengt het Europese concurrentievermogen op lange termijn immers in gevaar;

    2) behoud de zeer waardevolle bottom-upbenadering in het Marie Curie-programma. Hierin is politieke sturing niet wenselijk;

    3) let op met het reguleren van academische vrijheid, want het enige kader ter bescherming van de academische vrijheid is net dat er geen kader is.

    Conclusie: kiezen voor onderzoek en innovatie is kiezen voor de toekomst.

     
       

     

      Jüri Ratas (PPE). – Austatud president! Head ametikaaslased, komisjon. Toetan tugevalt ideed, et teadus peab olema Euroopa poliitika keskmes, kui me tahame tagada meie tulevikku ja konkurentsivõimet. Teadus on nagu voolav jõgi, mis toidab kogu meie ühiskonda, meie majandust ja meie tulevikku. Kui me ei hoolitse selle jõe eest, siis ta kuivab ja koos sellega takerdub ka meie edasiminek. Me ei saa lubada, et see teema jääb Euroopa Liidus vaid tühjaks hüüdlauseks. Peame kiiresti jõudma tegudeni. Euroopa teadus on tähtis meie konkurentsivõime, julgeoleku ja heaolu jaoks. Euroopast peab saama teaduse liider. Peame olema innovatsiooni esirinnas ja toetama ka teiste riikide teadlasi Euroopas tegutsemas. Tean seda ka Eesti kogemusest. Meie teaduse maastik on maailmatasemel, kuid meie teadlased, ülikoolid ja teadusasutused vajavad kindlamat tuge, suuremaid investeeringuid, et nad saaksid jätkata Euroopas tipptasemel lahenduste väljatöötamist ja viiksid siin oma unistused ellu. Ma tänan!

     
       

     

      Elena Sancho Murillo (S&D). – Señora presidenta, señora comisaria, la ciencia y la innovación son nuestro presente y nuestro futuro y, por eso, Elige Europa para la ciencia debe ser la hoja de ruta para afrontar los retos de los próximos años.

    ¿Qué hubiera sido de nuestra historia sin Marie Curie, la española Margarita Salas, Charles Darwin o Grace Hopper? Os aseguro que la historia tal y como la conocemos no hubiera sucedido. Continuemos rompiendo barreras en defensa de la ciencia y de la tecnología y rompiendo, además, techos de cristal para que las mujeres también seamos líderes y estemos presentes en esta transformación de la innovación y de la ciencia.

    El desarrollo en I+D, la tecnología, la inteligencia artificial y la digitalización deben reforzarse como herramientas de avance, de libertad, de seguridad y de competitividad europea frente a las amenazas de los oligarcas estadounidenses como Donald Trump o Elon Musk.

    Elige Europa para la ciencia debe ser el compromiso por el liderazgo de Europa en innovación para que nuestros jóvenes elijan venir y quedarse en Europa. La inversión anunciada son buenas noticias, pero debemos seguir siendo ambiciosos. Debemos seguir atrayendo talento a Europa a través de más inversión y buenas condiciones laborales. Si queremos el avance científico de Europa, debemos estar del lado de los científicos y científicas.

     
       

     

      Eszter Lakos (PPE). – Elnök Asszony! Európa vezet a tudományos publikációk számában és a nemzetközi együttműködésekben, de a globális versenyképességhez innovatívabb, befogadóbb tudományos ökoszisztémákra van szükségünk. Olyanokra, amelyek bevonzzák a legbrilliánsabb elméket. Először is vonzó hellyé kell válnunk a legjobb kutatók számára. Ez kiszámítható, hosszútávú finanszírozást, külön keretprogramot, világos és vonzó karrierutakat, jó munka-magánélet egyensúlyt jelent, különösen a nőknek és a fiatal kutatóknak, valamint egy olyan kutatási kultúrát, amely a kiválóságra, a nyitottságra és a bizalomra épül.

    Nem feledkezhetünk meg a kutatási innovációs szakadék csökkentéséről sem. Erős európai kutatási térséget kell kiépítenünk, kiváló infrastruktúrákkal, amelyek minden régiót és tagállamot bevonnak, beleértve Magyarországot is, amely a jövőben, amikor majd mi, a Tisza leszünk kormányon, visszaadjuk az Akadémia szabadságát, és majd ismét élénk tudományos ökoszisztémává válhat, ahol a tehetség valóban kibontakozhat. Európának erősítenie kell tudományos szuverenitását, nem csak a csúcstechnológiába kell befektetnie, hanem az azt létrehozó emberekbe is.

     
       

       

    Procedura “catch-the-eye”

     
       

     

      Liudas Mažylis (PPE). – Pirmininke, komisare, kolegos. Dabartinė JAV administracija ruošiasi nurėžti finansavimą nuo, pavyzdžiui, NASA, nuo Ligų kontrolės, prevencijos centro. Būdamas mokslininkas, žinau, per kokius sunkiai įveikiamus biurokratinius brūzgynus tenka brautis formuojant, pavyzdžiui, sveikatos duomenų registrus. Tokių duomenų nepalaikant, ta unikali sukaupta globali vertybė nueina niekais. Tad Komisijos pirmininkės pasiūlytas pusės milijardo paketas apskritai yra laiku ir vietoj. Tai turi aprėpti mokslininkus iš įvairių trečiųjų valstybių, įskaitant, pavyzdžiui, Ukrainą. Tiesa, septynerių metų „super grantai“ gali kelti nelygybės pavojų tarp jau egzistuojančių ir dar tik besiformuojančių kompetencijos centrų. Tačiau džiugina požiūris į jaunus mokslininkus ir jog nepamirštama parama jiems. Dar pridurčiau apie būtinybę į finansavimą įtraukti dvigubos paskirties tyrimus. Dėkoju.

     
       

     

      Vytenis Povilas Andriukaitis (S&D). – Madam President, Commissioner, you know very well, Manuel Heitor’s report – align, act, accelerate. The report is based on the Letta Report proposing a fifth freedom, but a fifth freedom for research and development requires infrastructure and an ecosystem at pan-European, supranational level.

    And of course, Draghi mentioned the necessity to build a research and innovation union. A union requires a lot of effort and a whole-of-Commission approach and a whole-of-government approach. We are just proposing to establish a pilot project using European reference networks, using artificial intelligence fabrics, using a health data space, using biobanks and one million genomics to build an ecosystem and a reduction in the area of rare diseases, rare cancers and low prevalence diseases.

    It would be a good example to have pan-European infrastructure. I will send you our proposals.

     
       

       

    IN THE CHAIR: VICTOR NEGRESCU
    Vice-President

     
       

     

      Helmut Brandstätter (Renew). – Mr President, some right-wing colleagues told us that Trump wants to chase away just the ‘woke’ scientists. That’s wrong. I have here the editorial of The Lancet, a well-known publication of science. What they’re writing is that Elon Musk’s department slashed federal budgets and awards, interrupting investigations into paediatric cancer, diabetes, HIV, prematurely ending at least 113 clinical trials and withholding funds from more than 200 universities. PhD projects have been cancelled, graduate admissions rescinded and infrastructure investment foregone. The visas of foreign-born American students and faculty have been revoked.

    So that’s the situation. In the United States, they can’t work freely anymore. So please, Commissioner, go there, get them. We really have to do something. They have great talent and they should come to Europe.

    One more thing: yesterday, we had a conference about the mental health of the children of Ukraine. They are refugees – 20 000 of them were stolen and brought to Russia. They need a lot for mental health. Please think about them as well. Let’s do something for them.

     
       

     

      João Oliveira (The Left). – Senhor Presidente, Senhora Comissária Zaharieva, o desenvolvimento científico e tecnológico é um aspeto absolutamente essencial para o desenvolvimento de qualquer país. E as assimetrias e as desigualdades de desenvolvimento entre os países da União Europeia são um problema grave, que tem de ser combatido — e, por isso, é absolutamente essencial que as opções da União Europeia em matéria de ciência e tecnologia deem um contributo decisivo para esbater, para eliminar essas diferenças e essas desigualdades de desenvolvimento entre cada país.

    Mas as opções que têm sido feitas são exatamente no sentido contrário. Não apenas nas políticas económicas, que determinam, para alguns países, melhores condições de desenvolvimento científico e tecnológico e de incorporação da ciência e da tecnologia na sua atividade produtiva, mas também porque, no acesso aos fundos, as condições de acesso entre países não são iguais, e os países menos desenvolvidos têm mais dificuldades em aceder aos fundos da União Europeia para poderem garantir melhores condições para o desenvolvimento científico e tecnológico.

    Os países menos desenvolvidos têm mais dificuldades também em fazer o investimento com os seus próprios recursos orçamentais, porque as limitações e os condicionamentos da União Europeia pesam mais.

    É preciso inverter essas opções para garantir que haja verdadeiramente coesão dentro da União Europeia.

     
       

     

      Lukas Sieper (NI). – Herr Präsident, liebe Kollegen! Ich bin Ihnen sehr dankbar für diese Debatte, die mir erneut vor Augen geführt hat, was der Unterschied zwischen Politikern und Wissenschaftlern ist. Ich denke, Choose Europe for Science ist eine sehr wichtige Initiative, die aber nicht genug auf das eigentliche Ziel eingeht, das wir damit verfolgen. Jeder weiß, dass es dabei am Ende des Tages um die Einführung einer fünften Grundfreiheit geht: der Wissenschaftsfreiheit. Aber das sollte in diesem Programm ausdrücklich erwähnt werden. Wir sollten in der Lage sein, mit unserer Wissenschaftsfreiheit Visionen für die Zukunft zu schaffen, und nicht nur kleinteilig das Jetzt zu regeln. Und das Gleiche gilt auch im Kleineren. Es ist richtig und wichtig, was im Einzelnen hinsichtlich der Anerkennung von Forschungsabschlüssen und der Erleichterungen für Visa darin steht. Aber wir gucken zu wenig auf diejenigen, die noch keine Forscher sind, nämlich diejenigen, die jetzt gerade in der Schule sind. Wir brauchen europaweit harmonisierte Schulfächer, wie zum Beispiel Digitalkompetenz und Medien, damit jene, die in Zukunft in Europa exzellent forschen können, dafür alle nötigen Kompetenzen mitbringen.

     
       

       

    (End of catch-the-eye procedure)

     
       

     

      Ekaterina Zaharieva, Member of the Commission. – Mr President, honourable Members, I’m really grateful for your intervention. I felt really broad support for the Choose Europe for Science initiative, which confirms that uniting us is one of the most powerful attitudes that science has. It goes beyond the national and party borders and I think that’s precisely why Europe’s research is open to all of those who share our values.

    Today, already 42 % of our young doctoral and postdoctoral researchers that we support through Marie Skłodowska-Curie Actions come from outside the EU and 80 % of our publications that we fund through Horizon Europe are open access. I think that we have to be proud of our European model that we have for research. In Europe, science is free. In Europe, we celebrate both questions and our diverse academic traditions. In Europe, people are at the centre of scientific research and we should be proud of that.

    I heard a lot of you who said we have to improve the conditions of European researchers who are already here and that we have to create a true union of science and research. This was actually one of my number one priorities. In the five minutes at the beginning, I unfortunately wasn’t able to present the full package of Choose Europe for Science, but I can reassure you that we are working on everything that you mentioned, like improving career development, improving conditions for scientists in Europe, visa facilitation – we worked with Commissioner Brunner and with the Member States on that – and all the other questions that were raised and proposals that I heard today.

    I want to share with you one concrete number: now, with only 5 % of the world’s population, Europe is already home to one fourth of scientists in the world. In a decade, the number of European researchers will have grown by 45 %, which is significant. That means that young people choose science and choose to become scientists despite disinformation and science scepticism on the rise. They embrace science and for those young people who choose science, we are obliged to continue to do our best for Europe to remain the best place to do science in the world. I am committed and I rely on your support to work to achieve this.

     
       

     

      President. – Thank you, Commissioner Zaharieva, for your statement and your involvement.

    The debate is closed.

     

    3. Deliberations of the Committee on Petitions in 2023 (debate)

     

      Peter Agius, deputising for the rapporteur. – Mr President, the Committee of Petitions is about giving a voice to citizens. It is the committee of the citizens. Through us, citizens can put pressure on the Commission, on the Member States to make sure that from laws we pass to rights.

    Because after all, this is what citizens really care about. They do not care about laws; they care about rights reaching them and their families. During the year 2023, the Committee of Petitions received 1 452 petitions representing a 16 % increase over previous years, but we believe there is room for much more. We believe there should be much more awareness about this important tool for citizens.

    The main topics of the petitions were the environment, internal market and fundamental rights. We received, for instance, many petitions on the Data Protection Regulation and its breaches in various Member States. We received petitions on the rule of law and democracy and a lot of petitions on environmental concerns. In fact, it’s fair to say that there is no Petitions Committee hearing without matters on environmental protection discussed in the committee, including wildlife conservation, forest policy and breaches to the Habitats Directive.

    We received many petitions also in the area of health, and this clearly shows that citizens want more out of Europe in this area. And in many discussions we had in the committee, it is with pride that I say that a lot of our discussions lead to changes, lead to implementation, lead to enforcement, lead to investigations. Of course, we need more of this. We need the Commission to dedicate even more resources to following up, to responding to petitions and to implementation.

    In 2023 we organised also four public hearings, some jointly with other committees, and these covered a wide range of petition-driven issues, including the Schengen border concerns, the impact of climate change on social security and vulnerable groups. The committee and the Commission maintain a very solid ongoing cooperation and we need, as we said, more involved Commission services and dedication to responding to petition concerns.

    Nixtieq nagħlaq bil-messaġġ bil-Malti billi nenfasizza r-rabta ċara li hemm bejn id-drittijiet tagħna bħala ċittadini Ewropej u ż-żmien li ndumu biex neħduhom id-drittijiet. Bl-Ingliż ngħidu Justice delayed is justice denied. U hawn nieħu eżempju minn Malta, l-elettorat tiegħi. F’Malta suppost għandna standards Ewropej għal baħar nadif imma tiltaqa’ ma’ familji bit-tfal, jgħidulek: “Jien ma nistax ingawdi l-bajja għax hemm id-drenaġġ ħiereġ fil-bajja”. Fil-fatt, meta tara l-istorja tara li l-Kummissjoni Ewropea ilha għaxar snin tibgħat l-ittri. Is-sena l-oħra kellna sentenza tal-qorti li fl-aħħar qalet li għandna bżonn ninfurzaw il-liġi Ewropea. Però, sadanittant, dawk it-tfal saru adulti u ma gawdewiex il-bajja. Ejja nagħmluha aktar, kollha kemm aħna, biex niffukaw fuq l-implimentazzjoni. Għax wara kollox l-implimentazzjoni twassal għad-drittijiet.

    Aħna fil-kumitat tal-petizzjonijiet ser nagħmlu l-biċċa tagħna billi nagħtu l-vuċi liċ-ċittadini li ħafna drabi m’għandhomx triq oħra ħlief li jiġu quddiemna. Għalhekk nagħlaq billi nirringrazzja lill-kollegi tal-gruppi politiċi kollha u anki MEPs bla grupp, tal-ħidma dedikata immens f’dan il kumitat u nħares ‘il quddiem għal djalogu interessanti llum u vot b’saħħtu u koerenti għar-riżoluzzjoni li għandna quddiemna.

     
       

     

      Glenn Micallef, Member of the Commission. – Mr President, honourable Members, on behalf of the Commission, I would like to welcome Mr Falcă’s report, which offers a comprehensive overview of the activities of the Committee on Petitions in 2023.

    As Mr Agius has just said, petitions are an effective channel for direct contact and open dialogue on problems affecting the daily lives of Europeans.

    As mentioned by Commissioner Šefčovič last week in the structured dialogue with your committee, the Commission remains committed to providing timely and pertinent contributions to the European Parliament’s response to these concerns.

    A clear signal of this commitment is that, throughout 2023, Commission representatives were present at all meetings of the Committee on Petitions, including at the highest political level. For example, Vice‑President Šefčovič was with you in February 2023 for a structured dialogue in accordance with the Framework Agreement on relations between our two institutions, and Commissioner Dalli took part in the annual workshop on the Rights of Persons with Disabilities in November 2023.

    According to your report, in 2023, you sent us 557 new petitions for opinion. In total, we provided on 984 petitions. The Commission continues to deploy the resources necessary to ensure that all petitions you send are properly addressed.

    Looking at the petitions received in 2023, the main topics raised were the environment, the economy and fundamental rights. These concerns remain valid today and broadly align with the priorities of this Commission, as outlined in President von der Leyen’s political guidelines and reflected in the 2025 Commission Work Programme adopted earlier this year, which focuses on bold action to bolster our security, prosperity and democracy.

    I would like to reiterate our commitment on addressing petitions that raise concerns on the implementation of EU law – a core priority under this mandate, and something crucial to maintaining the credibility of the EU institutions.

    In February, we adopted a communication on implementation and simplification, setting out our vision for fast and visible improvements for Europeans and European businesses.

    When it comes to the enforcement of EU law, the Commission takes action where necessary, using the infringement procedure. But the infringement procedure is not designed to offer concrete solutions for individuals or ensure individual redress. Rather, it is aimed at addressing systemic problems affecting a large amount of people, often across Member States.

    Petitioners pointing to the incorrect application of EU law in individual cases would benefit more from the mechanisms available at national level, such as the national courts, regulatory bodies or ombudsman. If the problem has a cross‑border dimension, the Solvit network may offer quick and flexible remedies.

    We have heard your calls for more transparency and better information‑sharing with regard to the Commission’s enforcement actions. We publish decisions on every step of an infringement procedure on the Europol webpage.

    In the current version of the Infringement Register, the public can search for cases, with a link to the petition portal of Parliament. Tools such as this make it easier to track the progress of specific infringements, and to verify if there is any petition linked to any ongoing investigations.

    The petitions portal now also links to the Infringement Register, allowing those who intend to file a petition to check whether an infringement procedure is already in progress.

    In addition, the Commission has recently published a new Europol webpage to give user‑friendly information on infringement cases, the transposition of directives and EU pilot dialogues.

    Finally, I want to commend your committee for your work on the European Citizens’ initiatives, in particular for advocating to increase the impact of European Citizens’ initiatives and for contributing to the organisation of public hearings for successful initiatives.

    Several legislative acts in recent years have been triggered by successful European Citizens’ Initiatives, such as the revised Drinking Water Directive, the Regulation on the Transparency and Sustainability of EU Risk Assessment in the Food Chain and the Nature Restoration Law.

    The next public hearing will be on the successful European Citizens’ Initiative on Cohesion Policy for the equality of the regions and the sustainability of regional cultures.

     
       

     

      Rosa Estaràs Ferragut, en nombre del Grupo PPE. – Señor presidente, señor comisario, la labor central de la Comisión de Peticiones es defender los derechos fundamentales de los ciudadanos, protegerlos y hacer un seguimiento de sus peticiones para que puedan participar activamente en la vida de la Unión Europea.

    El examen de esta Comisión de Peticiones de 2023 se ha hecho con eficacia, atención, imparcialidad, equidad y transparencia. Los ciudadanos han enviado peticiones sobre muchos temas, como ha comentado el ponente, pero me gustaría referirme especialmente a la preocupación sobre la situación del Estado de Derecho en España: se han presentado más de cuarenta peticiones sobre este tema, básicamente por los ataques a los jueces, las colonizaciones de las instituciones y la reducción de las penas por delitos de corrupción.

    Entre las misiones realizadas, me gustaría destacar las de Irlanda, Rumanía y España y, más concretamente, esta última, de la que debo resaltar y lamentar los ataques y tensiones que allí se vivieron. Yo estuve presente y nos insultaron diciendo: «Fuera, fascistas, de estos barrios. No metan las narices donde no les llaman». Creo que esta no debe ser la actitud.

    También me preocupa que no se haga un seguimiento de las recomendaciones que formulamos, pues lo hacemos para poder proteger los derechos de los ciudadanos. Por último, quiero poner en valor el trabajo tan magnífico que se ha hecho desde esta comisión.

     
       

     

      Sandra Gómez López, en nombre del Grupo S&D. – Señor presidente, desde el Grupo S&D lamentamos profundamente el resultado de la votación en la Comisión de Peticiones. A pesar del trabajo constructivo que realizamos con el ponente y de los compromisos alcanzados con los grupos proeuropeos, seguramente por influencia y por imposición del Partido Popular español ‑que es quien realmente politiza y manosea esta comisión‑, la Comisión de Peticiones decidió romper el consenso y aliarse con la extrema derecha, dejando un informe que poco viene a reflejar los verdaderos intereses y preocupaciones de la ciudadanía.

    Lo siento por el ponente, pero lo importante de este informe –de este debate– ni siquiera son las enmiendas o el informe, es la estrategia de la Comisión de Peticiones, sobre todo en el año 2023, que ha consistido en politizarla, utilizarla y manosearla para la propia agenda del Partido Popular. Y, realmente, peticiones que sí que son importantes y son de la ciudadanía nunca fueron atendidas o, como estamos viendo, son vetadas por intereses políticos, como es el caso de una petición gallega o de una sobre la DANA en Valencia, en donde su ciudadanía –las víctimas– ha podido verse antes con Úrsula von der Leyen o con Roberta Metsola que comparecer en la Comisión de Peticiones.

    Yo le quiero hacer una pregunta al resto de delegaciones del Partido Popular o de Patriots. ¿Van a seguir consintiendo que una delegación concreta utilice una comisión, que debería atender a la ciudadanía, pero que se ha convertido una especie de sucursal del Congreso de los Diputados? ¿Están utilizando recursos del Parlamento Europeo para hacer oposición a un Gobierno de un Estado miembro?

    Nosotros no vamos a aceptar que una comisión, que debería ser un verdadero instrumento de participación ciudadana, sea una mera fábrica de confrontación política, una pantalla de propaganda, y que se haya convertido en eso, además, exactamente en el año 2023, bajo la presidencia del Partido Popular Español y de Dolors Montserrat. Nosotros no vamos a ser cómplices y, por lo tanto, no vamos a permitir que se destruya lo que tanto costó construir: una Europa al servicio de la ciudadanía y no de sus partidos.

     
       

     

      Pál Szekeres, a PfE képviselőcsoport nevében. – Elnök Úr! Először is szeretném megköszönni azt a munkát, amit a Petíciós Bizottság végzett a 2023-as esztendőben az uniós polgárok hangjának meghallgatásáért. A jelentés számos fontos témát tár fel az alapvető joguktól kezdve a környezetvédelemig. De engedjék meg, hogy egy területre külön felhívjam a figyelmet, a fogyatékossággal élő személyek jogainak védelmére, és ezen belül különösen a jelnyelv használatának előmozdítására.

    Üdvözlöm, hogy a szakbizottság elismerte, hogy a kommunikáció nem luxus, hanem alapjog. Ezért nagyon fontos, hogy szorgalmazzuk a Parlament eljárási szabályzatának módosítását annak érdekében, hogy a siket polgárok tudjanak a saját anyanyelvükön, a nemzeti jelnyelven kommunikálni. Ez nem csupán technikai kérdés, hanem kötelezettség is, amelyet az ENSZ fogyatékossággal élő személyek jogairól szóló egyezménye is aláír és deklarálja. Én üdvözlöm a pozitív lépéseket, és felszólítom a kollégákat, hogy ne engedjék, hogy az eredmények kirakatintézkedésekké silányuljanak, és nagyon fontosnak tartom, hogy továbbra is támogassuk az európai polgárokat, hogy petíciókat tudjanak benyújtani, hogy tudjuk, hogy mi a véleményük a munkánkról.

     
       

     

      Jana Toom, on behalf of the Renew Group. – Mr President, Commissioner, dear colleagues, the work of the Committee of Petitions is unfortunately often underestimated, which I consider a big mistake, because we are the first – if not the only – direct channel for Europeans to address their concerns and seek solutions.

    This report very well reflects these expectations, as well as our ability to meet them. This ability, to be honest, is pretty limited. While citizens are very well aware of their rights, they are not so well aware, for instance, of Article 51 of the European Charter of Fundamental Rights, which clearly states that the charter is obligatory to follow only if Member States implement European law, which leaves a huge gap between the rights and values we promote and the real life of our citizens, which in turn leads to disappointment and Euroscepticism.

    There are two ways: we leave this as it is and wait for the next crisis to force us to open the Treaties and remove these and other obstacles, or we find courage to put political pressure on our governments and not only promote, but truly defend the rights of Europeans are entitled to exercise – at least on paper.

     
       

     

      Ana Miranda Paz, em nome do Grupo Verts/ALE. – Senhor Presidente, Senhor Comissário, com este relatório, os grupos à direita e a extrema-direita deste Parlamento conseguiram silenciar e minar o importante trabalho realizado pela Comissão das Petições, em 2023, sobre temas ambientais e climáticos e sobre direitos das pessoas. A Comissão das Petições é, para mim, como deputada europeia, das mais importantes deste Parlamento Europeu.

    Mas não fizeram só isso, também usaram esta comissão para tratar de assuntos da exclusiva responsabilidade dos Estados-Membros — nomeadamente do Estado espanhol —, com acusações infundadas, gerando um ambiente de pouco consenso e levando a que a maioria das alterações do nosso grupo fossem rejeitadas sempre por questões ideológicas — como sempre fazem e continuam a fazer.

    Um dos aspetos mais censuráveis é a atitude do Partido Popular espanhol desde que as maiorias parlamentares mudaram. Antes, era capaz de pactuar com os grupos progressistas deste Parlamento e, agora, prefere alinhar-se com a extrema-direita para bloquear qualquer iniciativa interessante e construtiva proposta pelos outros grupos parlamentares, ignorando, assim, a cidadania europeia. Tal como as petições que, no ano passado, foram apresentadas contra a empresa de macrocelulose Altri — um projeto que trouxe à rua mais de 100 mil pessoas —, não lhes importa.

    Por isso, Senhor Relator, tenham este aspeto em conta, porque temos de mudar as coisas na Comissão das Petições e temos de fazer um trabalho que seja de todos os grupos, conjuntamente, e não trabalho sectário e manipulado, como fez o Partido Popular espanhol, manipulando também esta Comissão das Petições.

     
       

     

      Marcin Sypniewski, w imieniu grupy ESN. – Szanowny Panie Przewodniczący! Zalewacie nas codziennie tysiącami stron raportów i analiz, a tak naprawdę macie duży problem z transparentnością. W sprawie tajnych SMS-owych negocjacji szefowej Komisji Europejskiej z Pfizerem sprawa musiała trafić do sądu. Były tu ukrywane ustalenia na miliardy euro. I co? Jest wyrok Trybunału Sprawiedliwości, i co z tego? Żadnych konsekwencji.

    Podobnie w sprawie popularnych polskich pasów bezpieczeństwa dla dzieci, Smart Kids Belt, które zostały zaorane przez regulacje unijne. Tu też sąd stwierdził, że Komisja prowadziła kontakty z konkurentami i to wykończyło polską firmę. I żadnych konsekwencji. Posłowie nie mają też dostępu do ważnych dokumentów i ustaleń. Jaka to jest transparentność? Tylko w teorii. I te instytucje tak naprawdę działają tylko dla elit, a nie dla ludzi. I to widać w tych petycjach, które rozpatrujemy.

    Od siedmiu lat nie możecie znieść zmiany czasu, ale gdy trzeba wydać kolejne miliardy euro, gdy trzeba załatwić kolejną zapomogę dla Ukrainy, to działamy ekspresowo i bez namysłu. To małe sprawy, ważne dla ludzi powinny być załatwiane ekspresowo, a ważne sprawy dotyczące wielomiliardowych wydatków powinny być rozpatrywane rozważnie i z namysłem.

     
       

     

      Maria Walsh (PPE). – Mr President, I speak today on behalf of the communities in Donegal and Mayo – places where families are living in homes that are literally falling apart around them. These houses were built with defective concrete blocks containing too much mica and pyrite, causing serious structural damage, emotional and financial strain for many, many people.

    In 2023, I joined colleagues from the Petitions Committee on its fact-finding mission to Donegal, a powerful moment that helped bring much-needed European attention to this crisis. The Parliament visit was built on years of local advocacy and resulted in clear, practical recommendations: first being faster access to a scheme that is fit for purpose, less red tape, stronger support for families, including mental health services, and accountability, with assurances that this would never happen again.

    We must properly enforce rules on construction materials and hold those to account and prevent this from ever happening again. We must ensure colleagues in the Irish Government and this Parliament deliver on those recommendations to strengthen the protections for everyone’s future.

     
       

       

    Catch-the-eye procedure

     
       

     

      Elena Nevado del Campo (PPE). – Señor presidente, son los ciudadanos los que se dirigen al Parlamento, por lo tanto, les pido que no les insulten.

    El Partido Socialista español pretende instrumentalizar hasta el Parlamento Europeo. Confunde su forma de hacer con el derecho de los españoles a trasladar sus preocupaciones a este Parlamento y su preocupación por los permanentes atentados al Estado de Derecho que estamos padeciendo. Porque los españoles, en 2023, fueron los ciudadanos que más peticiones presentaron a esta comisión. Esto es la consecuencia del asalto de nuestro Gobierno al CIS, el ataque a los jueces y a los tribunales, la colonización de las empresas y el uso de la Fiscalía, del Tribunal Constitucional y del Banco de España. Es la consecuencia de casos como el caso Koldo, el del hermano del presidente, la amnistía por los condenados por el procés, el derecho a protestar por la imputación de la mujer del presidente y un largo etcétera. Eso es lo que debe preocuparnos. La Comisión de Peticiones está para responder a estos problemas. No les insulten.

     
       

     

      Petras Gražulis (ESN). – Pirmininkaujantis, gerbiamas Komisare. Kai kartą šiandien Lietuvoj renkama peticija Europos Parlamentui, nes buvusi, buvusi, dabar esantys valdžioje, socialdemokratai, dalyvaudami rinkiminėje kampanijoje, pasipriešino tuometinei valdžiai ir sakė, kad mokesčių nekels. Tame tarpe nekilnojamo turto, gyventojų pajamų mokesčių ir kitų. Atėję į valdžią, jie šiandien po pateikimo priėmė mokesčių pakėlimą. Žmonės piktinasi apgauti. Vieną kalbą prieš rinkimus, o po rinkimus atlieka visai kitus veiksmus. Žmonės mato, kaip švaistomas visuomeninis turtas, kaip plečiasi biurokratija. Tai nustatinėja net ir Valstybės kontrolė, tačiau nesiima veiksmų, apiplėšinėja žmones. Aš tikiuosi, kad ir Europos Komisija, ir Europos peticijų komitetas atsižvelgs ir rimtai nagrinės šimtus tūkstančių surinktų Lietuvos piliečių parašų.

     
       

     

      Μαρία Ζαχαρία (NI). – Κύριε Πρόεδρε, η Επιτροπή Αναφορών αποτελεί το βασικό θεσμικό βήμα μέσω του οποίου οι Ευρωπαίοι πολίτες εκφράζουν τις αγωνίες, τις ανησυχίες και τα προβλήματά τους. Ο ρόλος μας είναι ξεκάθαρος: να υπερασπιζόμαστε και να προωθούμε τα δικαιώματά τους χωρίς εκπτώσεις. Είναι απογοητευτικό ότι μια δεξιά-ακροδεξιά συμμαχία εντός της επιτροπής δρα για να κλείνει αναφορές που ενοχλούν τις δεξιές κυβερνήσεις. Επίσης, είναι απογοητευτικό το γεγονός ότι η πλειοψηφία των κρατών μελών επιλέγει συστηματικά να μην απαντά στα ερωτήματα που τους τίθενται από αυτήν την επιτροπή. Η λογοδοσία προς τους πολίτες δεν μπορεί να είναι επιλεκτική. Πρέπει να είναι καθολική και χωρίς υπεκφυγές. Γι’ αυτόν ακριβώς τον λόγο, είχα προτείνει, τουλάχιστον, την εφαρμογή της διαδικασίας «name and shame» για εκείνα τα κράτη μέλη που αρνούνται να συνεργαστούν, να απαντήσουν και να λογοδοτήσουν. Δυστυχώς, τα περισσότερα μέλη των πολιτικών Ομάδων επέλεξαν να προστατεύσουν τις κυβερνήσεις τους. Εμείς, ωστόσο, θα επιμένουμε, θα συνεχίσουμε να διεκδικούμε ονομαστική λογοδοσία για την υπεράσπιση των δικαιωμάτων των απλών ανθρώπων.

     
       

     

      Λευτέρης Νικολάου-Αλαβάνος (NI). – Κύριε Πρόεδρε, θέλουμε να καταγγείλουμε την απόφαση του Ευρωκοινοβουλίου και της Επιτροπής Αναφορών να κλείσουν χωρίς συζήτηση αναφορά των αντιστασιακών ελληνικών οργανώσεων για τις γερμανικές επανορθώσεις, με τον προκλητικό ισχυρισμό ότι δεν εμπίπτει στις αρμοδιότητες της Ευρωπαϊκής Ένωσης. Όμως οι αποζημιώσεις για τα εγκλήματα των Ναζί, το αναγκαστικό κατοχικό δάνειο, την κλοπή αρχαιολογικών θησαυρών καθορίζονται από διεθνείς συμβάσεις που δεσμεύουν δύο κράτη μέλη. Η Ευρωπαϊκή Ένωση θεωρεί αρμοδιότητά της να παρεμβαίνει σε κάθε διεθνές ζήτημα, σε ιμπεριαλιστικούς πολέμους σε κάθε γωνιά του πλανήτη· να στηρίζει τη γενοκτονία του παλαιστινιακού λαού από το Ισραήλ· από τη Ρωσία, πριν καν τελειώσει ο πόλεμος στην Ουκρανία, απαιτεί επανορθώσεις. Στο θέμα των γερμανικών αποζημιώσεων, όμως, κάνουν τους αναρμόδιους. Η στάση της Ευρωπαϊκής Ένωσης, της κυβέρνησης της Νέας Δημοκρατίας και των προηγούμενων, που δεν διεκδικούν για να μη διαταραχθούν οι σχέσεις με τη Γερμανία, είναι πρόκληση απέναντι στον ελληνικό λαό, την ηρωική αντίστασή του και τις βαριές θυσίες του στην πάλη κατά του φασισμού. Συνεχίζουμε τον αγώνα ώστε οι κυβερνήσεις της Γερμανίας, της Ελλάδας και η Ευρωπαϊκή Ένωση να τοποθετηθούν επίσημα απέναντι στις δίκαιες απαιτήσεις του ελληνικού λαού για τις γερμανικές πολεμικές αποζημιώσεις.

     
       

       

    (End of catch-the-eye procedure)

     
       

       

    (The sitting was suspended at 10:45)

     
       

       

    PRESIDENZA: PINA PICIERNO
    Vicepresidente

     

    5. Voting time

       

    (Per i risultati delle votazioni e altri dettagli che le riguardano: vedasi processo verbale)

     

    5.1. Amending Regulation (EU) No 228/2013 as regards additional assistance and further flexibility to outermost regions affected by severe natural disasters and in the context of cyclone Chido devastating Mayotte (vote)

     

      Presidente. – Iniziamo con la richiesta di decisione d’urgenza presentata dalla Commissione AGRI per quanto riguarda l’assistenza integrativa e l’ulteriore flessibilità per le regioni ultraperiferiche colpite da gravi calamità naturali e nel contesto delle devastazioni provocate a Mayotte dal ciclone Chido (cfr. punto 5.1 del processo verbale).

     

    5.2. Amending Regulation (EU) 2023/956 as regards simplifying and strengthening the carbon border adjustment mechanism (A10-0085/2025 – Antonio Decaro) (vote)

       

    – Dopo la votazione:

     
       

       

    (Il Parlamento accoglie la richiesta di rinvio in commissione)

     

    5.3. Modification of customs duties applicable to imports of certain goods originating in or exported from the Russian Federation and the Republic of Belarus (A10-0087/2025 – Inese Vaidere) (vote)

       

    – Prima della votazione:

     
       

     

      Inese Vaidere, rapporteur. – Madam President, dear colleagues, many agricultural producers have become increasingly dependent on Russian fertiliser imports. The dependency on Russian gas is being replaced with a new dependency on Russian fertiliser.

    In addition, it has had a negative impact on the European fertiliser industry. Instead of a ban on importing Russian fertilisers as we, the European Parliament already called for in September, the Commission proposed to gradually, over a period of three years, increase import duties for fertilisers and agricultural goods from Russia and Belarus.

    This will give the farming sector time to adjust and the fertiliser industry time to boost their production. Additionally, European producers will benefit from increased tariffs on other agricultural goods imported from Russia and Belarus. To prevent that these tariff measures have a negative effect on the agricultural sector, we have asked the Commission to provide a statement about their action plan.

    Dear colleagues, I urge you to adopt this proposal without any amendments. This way, we will be able to ensure that this regulation enters into force, as foreseen, by 1 July this year. Every delayed day will mean lost lives in Ukraine.

    Of course, this proposal is a compromise and it’s never the case that compromises make everyone happy. Can you name a law that everyone is 100 % happy with?

    The Council has already confirmed their readiness to adopt this regulation without any amendments. I sincerely thank the Members who were able to set aside their particular interests for a while to agree on the overarching goal at the forefront. We need to stop financing Russia’s war in Ukraine. War is right next to our external borders. Stopping it is needed for our safety.

     
       

     

      Glenn Micallef, Member of the Commission. – Madam President, honourable Members, the European Commission would like to make the following declaration.

    The Union’s food security depends on the continuous existence of the autonomous Union’s nitrogen‑based fertiliser production industry that can supply the European Union market. The present level of imports from the Russian Federation, competing unfairly in the EU market due to gas price differences, is undermining the EU industry.

    At the same time, it is essential to ensure that Union farmers have predictable, sufficient and affordable access to nitrogen‑based fertilisers as this is indispensable to the stabilisation of the EU agricultural markets. Article 2 of the Regulation provides that the Commission shall monitor prices applicable in the Union of the goods listed in Annex II during four years from the application of this Regulation.

    The Commission recalls that it already publishes regularly data reflecting the price evolution of fertilisers. Trends shown by this data set are discussed during the EU Fertilisers Market Observatory meetings.

    On this basis, the Commission will continue the monitoring of the prices of nitrogen‑based fertilisers subject to this Regulation and will make the information about the results of this monitoring available to the Member States on a regular monthly basis through a consolidated document published on the website of the Commission.

    The Commission notes that the Regulation provides for the suspension of tariffs for concerned fertiliser products imported from origins other than the Russian Federation and the Republic of Belarus, as one of the potential appropriate actions in case of a substantial surge in fertiliser prices. The Commission commits to take such action if this case arises.

    Already in 2022, the Commission proposed, and the Council accepted, a temporary suspension of common customs tariffs on some nitrogen‑based fertilisers from countries other than Russia and Belarus due to a significant price increase in the Union market.

    Furthermore, the Commission recalls that since the start of Russia’s war of aggression against Ukraine, it adopted measures to support European farmers in all Member States whenever it was considered necessary. The Commission recognises the need to take fully into account the competitiveness of the EU fertilisers industry in the future actions implementing the Clean Industrial Deal.

     

    5.4. Granting equivalence to Moldova and Ukraine for field inspections and seed production (A10-0043/2025 – Veronika Vrecionová) (vote)

     

      Presidente. – Procediamo ora con la relazione dell’onorevole Vrecionová sulla concessione alla Moldova e all’Ucraina dell’equivalenza delle ispezioni in campo e la produzione di sementi (cfr. punto 5.4 del processo verbale).

     

    5.5. Amendments to the Capital Requirements Regulation as regards securities financing transactions under the net stable funding ratio (vote)

     

      Presidente. – Passiamo ora alla proposta sulle modifiche al regolamento (UE) n. 575/2013 relativo ai requisiti prudenziali per quanto riguarda i requisiti per le operazioni di finanziamento tramite titoli nell’ambito del coefficiente netto di finanziamento stabile (cfr. punto 5.5 del processo verbale).

     

    5.6. Euratom Research and Training Programme for the period 2026-2027 complementing Horizon Europe (A10-0083/2025 – Borys Budka) (vote)

     

      Presidente. – Passiamo ora alla relazione dell’onorevole Budka sul programma di ricerca e formazione di Euratom per il periodo 2026-2027 che integra Orizzonte Europa (cfr. punto 5.6 del processo verbale).

     

    5.7. Partial renewal of Members of the Court of Auditors – HR nominee (A10-0088/2025 – Ondřej Knotek) (vote)

     

      Presidente. – Passiamo ora alla relazione dell’onorevole Knotek sul rinnovo parziale dei membri della Corte dei conti – Candidata HR (cfr. punto 5.7 del processo verbale).

     

    5.8. Deliberations of the Committee on Petitions in 2023 (A10-0063/2025 – Gheorghe Falcă) (vote)

       

    – dopo la votazione sull’emendamento 42:

     
       

     

      Fabienne Keller (Renew). – Madame la Présidente, chers collègues, je souhaite vous proposer un amendement oral au rapport annuel sur lequel nous votons actuellement. L’amendement est ajouté à la fin du paragraphe 35 et est formulé comme suit. Je vais le lire en anglais.

    ‘Urges, in that sense, the European Commission, in due respect of the spirit of the ECI – the European Citizens’ Initiative procedure – to provide adequate, concrete and effective follow‑up to ECIs related to fundamental rights of citizens, such as the one calling for a binding legal ban on conversion practices targeting LGBTIQ+ citizens in the EU and the ECI ‘My voice, my choice’.’

    Chers collègues, cet amendement est nécessaire, à l’heure où les droits des communautés LGBT et les droits des femmes sont menacés partout en Europe. Avec mon groupe Renew Europe et avec beaucoup d’entre vous, je l’espère, nous sommes engagés en faveur de la défense de ces droits inscrits dans la Charte des droits fondamentaux de l’Union européenne et nous apporterons notre soutien aux communautés LGBT lors de la Pride de Budapest le 28 juin prochain.

     
       

       

    (Il Parlamento non accetta di porre in votazione l’emendamento orale)

     
       

       

    (Con questo si conclude il turno di votazioni)

     
       

       

    (La seduta è sospesa per pochi istanti)

     

    6. Resumption of the sitting

       

    (La seduta è ripresa alle 11.42)

     

    7. Explanations of vote

     

      Presidente. – L’ordine del giorno reca le dichiarazioni di voto.

     

    7.1. Amending Regulation (EU) 2023/956 as regards simplifying and strengthening the carbon border adjustment mechanism (A10-0085/2025 – Antonio Decaro)

     

      Jadwiga Wiśniewska (ECR). – Pani Przewodnicząca! Zagłosowałam za przyjęciem rozporządzenia upraszczającego i wzmacniającego mechanizm CBAM. Uważam, że to krok w dobrym kierunku. Uproszczenia zaproponowane są odpowiedzią na realne problemy związane z implementacją CBAM. CBAM ma chronić unijny przemysł obciążony restrykcyjną polityką klimatyczną poprzez nałożenie opłat na import towarów takich jak: stal, cement, aluminium, wodór czy nawozy z państw trzecich.

    Niestety pierwotne przepisy okazały się zbyt skomplikowane. Objęły nawet mikroprzedsiębiorstwa importujące niewielkie ilości towarów. Dlatego propozycję, by wyłączyć z systemu tak zwanych importerów okazjonalnych, czyli tych, którzy sprowadzają do Unii mniej niż 50 ton rocznie, uważam za rozsądne i proporcjonalne rozwiązanie, zmniejszające obciążenia biurokratyczne dla MŚP i niezakłócające unijnej konkurencji.

    Niemniej mechanizm CBAM wciąż wymaga dopracowania. Kluczowe wyzwania to zapewnienie wiarygodności danych dotyczących emisyjności produktów z państw trzecich oraz zapobieganie obchodzeniu przepisów. Co więcej, CBAM nie może być jedyną odpowiedzią na problemy przemysłu. Potrzebne są komplementarne działania, w tym powrót do bezpłatnych uprawnień emisyjnych i dalsze wsparcie dla firm dotkniętych wysokimi kosztami energii.

     
       

     

      Presidente. – Non c’è la possibilità di intervenire su quella relazione.

     

    8. Approval of the minutes of the part-session and forwarding of texts adopted

     

      Presidente. – Il processo verbale della seduta odierna e di quella di ieri sarà sottoposta all’approvazione del Parlamento all’inizio della prossima seduta. Se non vi sono obiezioni, procederò alla trasmissione immediata delle risoluzioni approvate nella seduta odierna ai loro destinatari.

     

    9. Dates of the next part-session

     

      Presidente. – La prossima tornata si svolgerà dal 16 al 19 giugno 2025 a Strasburgo.

     

    10. Closure of the sitting

       

    (La seduta è tolta alle 11.46)

     

    11. Adjournment of the session

     

      Presidente. – Dichiaro interrotta la sessione del Parlamento europeo.

     

    MIL OSI Europe News

  • MIL-OSI United Kingdom: Largest Ukraine trade mission boosts UK defence partnerships

    Source: United Kingdom – Executive Government & Departments

    Press release

    Largest Ukraine trade mission boosts UK defence partnerships

    Largest multinational Ukraine trade mission boosts defence partnerships for British business

    • The UK led its largest-ever trade mission to Ukraine, with 51 defence companies taking part.
    • The mission brought together UK industry and likeminded European nations to secure contracts and boost high-skilled jobs across the UK.
    • Trade missions help strengthen national security, the foundation of the Plan for Change, and open up opportunities for our world class defence sector.

    A record 51 UK and international companies joined the fifth UK-Ukraine trade mission in Kyiv this week, making it the largest British-led trade delegation to Ukraine to date.

    Participating companies from across the defence economy specialising in areas like uncrewed systems and military goods are securing contracts which will boost high-skilled jobs in regions across the country, supporting the government’s Plan for Change.

    This week’s mission brought together leading UK defence firms to deepen cooperation with Ukrainian industry and partners from Norway, the Netherlands, Sweden, Finland and Latvia. This collaboration is vital in demonstrating a united multinational industrial front with European allies, scaling up support for Ukraine’s defence needs and strengthening supply chain resilience with international partners.

    This latest mission is a significant step in the UK’s 100 Year Partnership with Ukraine, reinforcing the UK’s long-term support for Ukraine’s defence, security and recovery and drawing on the collective industrial capacity and capability of European allies.

    Defence is a key growth sector in the Government’s upcoming modern Industrial Strategy and a prime example of how Government and industry can work together to aid our allies and boost UK security.

    Lord Coaker, Defence Minister said:

    Working with the Netherlands, Norway, and Ukraine we’re building resilient supply chains, putting Ukraine in the strongest possible position to achieve a just and lasting peace for years to come.

    The UK is continuing to lead the way on support for Ukraine, from military support to leading the Ukraine Defence Contact Group where since the UK took the chair nearly £23bn has been pledged in military support for Ukraine.

    Kevin Craven, CEO of ADS said:

    It is a privilege for industry to lead the UK in engagement both within Ukraine and with our Ukrainian counterparts. Indeed, this week’s trade mission – the most multinational of its kind to date – has been nothing but inspiring.

    The UK defence industry’s support to Ukraine is unwavering and stands ready to increase production capacity, develop innovative new capabilities, and build a resilient ecosystem. 

    Continued collaboration, both with our government counterparts and international allies, is pivotal as illegal Russian aggression continues to intensify. We will continue to deepen our industrial ties and fulfil our moral duty to the Ukrainian people.

    Marte Gerhardsen, Norwegian State Secretary said:

    European allies needs to stand together with Ukraine for as long as it takes. We work closely with Ukraine the UK and other European countries. The Russian aggression against Ukraine continues, and the need to rapidly strengthen Ukrainian and European defence capabilities are apparent.

    The security situation demands that we innovate and adapt. We need to ensure that our industries can meet the growing demands from our governments and armed forces.

    One of the purposes of the visit is to facilitate the establishment of projects and collaborations by more Norwegian companies in Ukraine. I am pleased to see how Norwegian companies work with Ukrainian partners to scale up productions.

    The mission follows the new UK-EU Security & Defence Partnership that was agreed on Monday, which could lead to significant opportunities for the UK’s world-leading defence industries, generating more high-skilled jobs across all regions of the UK.

    By joining forces with our European partners, the UK is strengthening its own defence industry while contributing directly to Ukraine’s long-term resilience.

    Background:

    • JEF nations represented on this mission include: Norway, Sweden, Finland, the Netherlands, and Latvia
    • DBT and MOD working closely together through the cross-government Task Force HIRST to drive increases in UK, Ukrainian and allies’ industrial capacity to support the Armed Forces of Ukraine, as well as domestic military resilience. It has recently secured a £1.6bn deal for air defence missiles for Ukraine.
    • The UK is fully committed to working with allies to step up support to ensure Ukraine remains in the strongest possible position, which is why £4.5 billion of military support will be provided this year – more than ever before.
    • Defence already supports 434,000 jobs and is an engine for growth. The Government’s new Defence Industrial Strategy will make sure national security and a high-growth economy are aligned and delivering on our promise to crack down on waste and boost Britain’s defence industry.
    • This week’s mission builds on the Joint Expeditionary Force (JEF) Oslo Summit held earlier this month, highlighting the UK’s growing cooperation with European partners on defence and security.

    Updates to this page

    Published 23 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: International Day of Solidarity with Political Prisoners in Belarus: Joint Statement to the OSCE, May 2025

    Source: United Kingdom – Executive Government & Departments

    Speech

    International Day of Solidarity with Political Prisoners in Belarus: Joint Statement to the OSCE, May 2025

    UK and 37 other countries call for immediate and unconditional release of political prisoners in Belarus.

    I am delivering this statement on behalf of the following participating States, who are members of the Informal Group of Friends of Democratic Belarus: Belgium, Bulgaria, Canada, Croatia, Czechia, Cyprus, Denmark, Estonia, Finland, France, Germany, Greece, Iceland, Ireland, Italy, Latvia, Lithuania, Luxemburg, Montenegro, the Netherlands, Norway, Portugal, Romania, Slovenia, Spain, Sweden, Ukraine, the United Kingdom, and my own country Poland. 

    The following participating States are also joining this statement: Albania, Austria, Bosnia and Herzegovina, Liechtenstein, Malta, Moldova, North Macedonia, San Marino and Switzerland.  

    Since the death of political prisoner and activist Vitold Ashurak in prison on 21 May 2021, we mark the International Day of Solidarity with Political Prisoners in Belarus annually.  

    Since May 2021, at least seven more political prisoners have died in the regime’s captivity: Mikalai Klimovich, Ales Pushkin, Vadzim Khrasko, Ihar Lednik, Aliaksandr Kulinich, Dmitry Schletgauer and Valiantsin Shtermer. They were unjustly persecuted for their political opinions, and failed to receive adequate medical attention and care. 

    In June last year, a group of 38 participating states invoked the Vienna Human Dimension mechanism and questioned many individual cases related to prisoners’ dignity, access to medication and medical care, to legal counsel of their own choosing, to effective remedies and a fair legal trial, as well as contacts with their families. The Belarus authorities did not bring any meaningful response to these questions nor has Belarus made progress on the recommendations of either the 2020 or 2023 Moscow Mechanism reports. 

    Some of those prisoners have since then been released, after completion of their sentences or through pardons, however the arbitrary detention of citizens for exercising their human rights persists. As of May 15, 2025, VIASNA estimates that there were 1189 political prisoners in Belarus. Many of them have serious health issues, disabilities, are over the age of 60, and are suffering from mental disorders. Many of them are subjected to torture and ill-treatment, including deprivation of necessary medical assistance. The UN Committee against Torture reported that torture in these prisons is systemic, habitual, widespread and deliberate with a pattern of impunity for perpetrators. 

    This is the day to remember them all. A day to reiterate our call for the Belarusian authorities:  

    • to stop repressing individuals for exercising their rights to freedom of expression, to freedom of association and to peaceful assembly;  

    • to release all political prisoners immediately and unconditionally, and to ensure their rehabilitation.  

    This is also the day to express our solidarity with relatives and friends of political prisoners, who are subject to political and administrative repression in Belarus and in exile, as part of a wider brutal crackdown on opposition figures, human rights defenders, civil society representatives, journalists and other media actors, and other citizens who dare voice any opposition or dissent.  

    In the face of this disregard of OSCE principles and commitments by the Belarusian authorities, we will continue to support the Belarusian people’s aspiration for a free, democratic and independent Belarus.

    Updates to this page

    Published 23 May 2025

    MIL OSI United Kingdom

  • MIL-OSI: Bitcoin Solaris 2025 Presale Gains Momentum with Explosive Growth and Mobile Mining Breakthrough

    Source: GlobeNewswire (MIL-OSI)

    TALLINN, Estonia, May 23, 2025 (GLOBE NEWSWIRE) — As the crypto market enters a new phase of innovation and user empowerment, Bitcoin Solaris (BTC-S) is emerging as one of 2025’s most compelling blockchain opportunities. With its ongoing presale generating buzz across the industry, Bitcoin Solaris is redefining accessibility and scalability in Web3, offering everyday users a real shot at building long-term wealth.

    A New Era of Decentralized Accessibility

    Bitcoin Solaris introduces a next-generation hybrid blockchain that merges Proof-of-Work and Delegated Proof-of-Stake (PoW + DPoS) mechanisms, supporting lightning-fast speeds of up to 10,000 transactions per second and 2-second finality. With cross-chain compatibility and seamless integration with Solana’s tech stack, Bitcoin Solaris delivers both performance and flexibility.

    Key features include:

    • Hybrid PoW + DPoS architecture for scalability and decentralization
    • ZK privacy options, DeFi/NFT capabilities, and mobile-first design
    • Cyberscope and Freshcoins-audited smart contracts
    • Freshcoins KYC verification for added transparency

    Most notably, the Solaris Nova App—currently in beta—allows users to mine BTC-S directly from smartphones or laptops without expensive hardware or technical skills, making it one of the most accessible crypto experiences to date.

    And people are noticing. A growing number of influencers and early adopters are joining the conversation. One of the most talked-about reviews is from CryptoChester, who breaks down why Bitcoin Solaris is poised to lead the next market wave.

    Why Work for Money When BTC-S Can Work for You?

    Tokenomics That Build Trust

    Bitcoin Solaris adheres to a deflationary model with a 21 million total token supply, reflecting a long-term vision grounded in utility and scarcity. The distribution model prioritizes community and miner incentives:

    • 66.66% for mining (14 million BTC-S)
    • 20% for presale
    • 5% for liquidity pools
    • 2% each for ecosystem development, community rewards, marketing, and staking
    • 0.33% for team and advisors

    This transparent structure ensures decentralization, trust, and broad-based participation from the ground up.

    Presale Highlights: A 90-Day Opportunity

    The Bitcoin Solaris presale is designed to reward early adopters and generate sustainable momentum. With only 90 days to participate, it’s already breaking records:

    • Current Price: $4
    • Next Phase: $5
    • Launch Price: $20
    • Bonus: 12%

    But what makes it stand out even more?

    • Runs for only 90 days, launch Date: July 31, 2025
    • Over $1,000,000 raised already
    • More than 8,900 unique users onboarded
    • Potential return: 1,900%
    • One of the shortest and most explosive presales of the year

    And that growth isn’t just hype—it’s backed by substance. To stay updated or get involved, explore their Telegram or check the buzz on X.

    This is one of the fastest-growing presales in the 2025 crypto landscape, driven by strong fundamentals and community excitement.

    Double Rewards Referral Program

    Bitcoin Solaris is boosting community growth with a referral program that rewards both you and your invitees. During the presale, you’ll earn 5% in BTC-S tokens for every purchase made through your referral link, while your referrals get a 5% bonus on their token buy. Simply log into your account at bitcoinsolaris.com, grab your referral link, and start sharing it across social media, crypto groups, or directly with friends. It’s a win-win system built to grow the ecosystem and your rewards.

    Join the Bitcoin Solaris Movement

    With a rapidly growing user base, audited infrastructure, and mobile-friendly innovation, Bitcoin Solaris is positioning itself as a cornerstone of the next crypto cycle. Whether you’re new to digital assets or a seasoned investor, BTC-S offers a compelling pathway to participate in—and benefit from—the decentralized future.

    Get involved before July 31, 2025. The clock is ticking.

    For more information:
    Website: bitcoinsolaris.com
    Telegram: @Bitcoinsolaris
    X (Twitter): @BitcoinSolaris

    Media Contact:
    Xander Levine
    info@bitcoinsolaris.com

    Disclaimer: This is a paid post and is provided by Bitcoin Solaris The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility.Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/e0de5d24-8d39-48ec-9ac3-a58c3ce8fa14

    https://www.globenewswire.com/NewsRoom/AttachmentNg/4812643c-7ca2-4e66-90f4-a08aabbc474c

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7232e923-9a0b-406b-af65-991e2329843e

    https://www.globenewswire.com/NewsRoom/AttachmentNg/dadbff09-25b1-4b4d-98c3-c9e8e643680b

    The MIL Network

  • MIL-OSI Security: Investigating Torture: FBI-HSI Investigation Leads to U.S. Citizen’s Conviction for Human Rights Violations in Iraq

    Source: US FBI

    Seeking Victims and Witnesses

    In the meantime, O’Donnell and Burke continued their investigation. They believed that interviews with Roggio’s former employees—largely Estonians, but also other Europeans who’d been handpicked by his special assistant—could help strengthen the case. And that gut feeling proved right.

    When the duo learned that a former female employee of Roggio’s—an Estonian citizen—was slated to travel through John F. Kennedy International Airport in New York, they worked with Estonia’s Internal Security Service to interview her about her experience with Roggio. The woman turned out to be the first international employee of Roggio’s weapons facility. She shared enough information with O’Donnell and Burke to justify a trip to Estonia to conduct a more in-depth interview with her in a friendlier setting.

    Investigators hoped that the interview could help them put the finishing touches on their counterproliferation investigation. But that trip yielded more than just a follow-up conversation.

    It also gave investigators the chance to meet a second former weapons factory employee, who surprised the investigators with a six-year-old cellphone recording that captured Roggio making threats of torture, confessing to that and other crimes, and even speaking to motive.

    This was the first time they’d heard torture allegations concerning Roggio.

    After interviewing these and other former employees, investigators returned to the U.S. with a case, having identified a new and urgent objective: to seek guidance and expertise from the FBI’s International Human Rights Unit to seek a potential prosecution for torture violations.

    The FBI is responsible for investigating torture if the victim is a U.S. person, or if the perpetuator is either a U.S. person or if they’re physically located within our country’s borders. This jurisdiction comes from 18 USC, Section 2340A.

    The agents knew they had to act quickly—and carefully.

    Careful collaboration between the case team, the FBI’s International Human Rights Unit (part of our Criminal Investigative Division), federal victim services providers, multiple FBI legal attaché offices, the U.S. Department of Justice, and our Estonian law enforcement partners enabled the case team to travel to Estonia to conduct forensic interviews with these subjects.

    The investigators got the greenlight to take a joint trip with DOJ prosecutors to explore the matter of torture in great detail. The investigative team leveraged their agencies’ resources and connections, as well as international partnerships, to locate and interview multiple former employees of Roggio’s who may have witnessed or been victims of torture.

    FBI Supervisory Child-Adolescent Forensic Interviewer Jacqueline Goldstein—who, at the time, held a similar role at HSI—helped ensure these conversations were cognizant of the trauma that these people’s experiences with Roggio may have left them with, while still being admissible in court and supporting investigative needs.

    “It’s designed to pass judicial scrutiny,” she said. “So it’s non-leading, non-suggestive. But it’s also trauma-informed so that the investigative interviewing process is uniquely suited to the developmental, cognitive, clinical needs of that individual, and we’re not creating additional trauma in that investigative process.”

    And with that, in August 2021, investigators were finally able to interview Roggio’s victim: a man who’d been held in captivity and subjected to physical and mental torture—including physical beatings, suffocation, and choking—for more than a month.

    “He had very vivid recollection,” O’Donnell said. “Some people blacked out everything. This guy remembered every detail of a lot of what happened.”

    Law enforcement also captured statements from a wider group of former employees who’d been forced to witness Roggio’s brutality against the victim. They also convinced the witnesses to travel to the United States to testify against Roggio in federal court.

    As a result of these efforts, a federal grand jury returned a superseding indictment in 2022—which added a charge of torture and a charge of conspiracy to commit torture to Roggio’s already long list of alleged crimes—and he was again arrested.

    MIL Security OSI

  • MIL-OSI Europe: Joint statement, Nordic-Baltic Summit at Harpsund

    Source: Government of Sweden

    We, the Heads of Government of Denmark, Estonia, Finland, Latvia, Norway, Poland, and Sweden met today in Harpsund, Sweden, at a pivotal time for our security. As a result of this Summit, all the leaders of the Nordic-Baltic countries and Poland, have agreed the following:

    MIL OSI Europe News

  • MIL-OSI China: Bulgarian saffron, Croatian tuna granted Chinese market access

    Source: People’s Republic of China – State Council News

    NINGBO, May 22 — Bulgarian saffron and Croatian tuna were granted Chinese market access on Thursday, adding to the list of imported agricultural and food products from Central and Eastern European Countries (CEECs) for Chinese consumers.

    Import access was approved for these products during the fourth China-CEEC Expo & International Consumer Goods Fair, which opened on Thursday in Ningbo, east China’s Zhejiang Province.

    According to data released by China’s General Administration of Customs (GAC) on the same day, a total of 126 types of agricultural and food products from CEECs have been granted access to China.

    China has streamlined its approval processes and enhanced its customs clearance efficiency in recent years, allowing CEEC delicacies such as Polish amber beer and Latvian canned fish to enter the Chinese market more easily.

    Against the backdrop of a complex international landscape, China-CEEC cooperation is providing greater certainty and vitality to the world economy, according to GAC deputy chief Zhao Zenglian.

    China’s expansion of agricultural imports has bolstered bilateral trade. Customs data shows that China-CEEC trade totaled 142.27 billion U.S. dollars in 2024 — up 6.3 percent year on year and outpacing China’s overall import-export growth by 2.5 percentage points.

    MIL OSI China News

  • MIL-OSI Australia: Guide to functional currency rules

    Source: New places to play in Gungahlin

    How to use the functional currency rules guide

    The electronic version of this document is the only authorised version. Printed copies may be out of date.

    Read this guide to find out more about the functional currency rules, including:

    • eligibility requirements
    • the implications for tax accounting and tax reporting.

    You can use this guide if you are:

    • an Australian resident or a non-resident with a permanent establishment in Australia and both of the following apply
      • you keep your accounts solely or predominantly in a particular foreign currency
      • you wish to work out your taxable income (or tax loss) using that foreign currency – that is, using your ‘applicable functional currency’
    • a non-resident disposing of indirect interests in real property in Australia and the sole or predominant currency in which you keep your accounts at the time of disposal is a foreign currency. The application of functional currency rules is mandatory in this situation.

    This guide does not cover income from overseas permanent establishments of resident taxpayers.

    Functional currency translation rules

    The functional currency translation rules are an exception to the core foreign currency translation rules.

    Under the core foreign currency translation rules, amounts in a foreign currency must be translated into Australian dollars (A$). There are also rules about when and at what exchange rate a translation is to take place for a given type of transaction.

    Under the functional currency rules, you can use a currency other than A$ as the unit of account to work out your taxable income or tax loss. The core foreign currency translation rules continue to apply to amounts and transactions not covered by the functional currency rules.

    If you are an eligible taxpayer who keeps your accounts solely or predominantly in a particular foreign currency, you can choose to use that foreign currency as the unit of account to work out your taxable income or tax loss.

    If you have made such a choice (that is, an effective functional currency choice), you do not translate transactions you undertake in either a foreign currency or in your applicable functional currency into A$. Rather, you translate only your net amount of taxable income or tax loss calculated in your applicable functional currency into A$.

    The core foreign currency translation rules are contained in section 960-50 of Subdivision 960-C of the Income Tax Assessment Act 1997 (ITAA 1997).

    The functional currency translation rules are contained in section 960-80 of Subdivision 960-D of the ITAA 1997.

    How the functional currency rules work

    Once you choose to use a non-Australian dollar applicable functional currency, you must use that currency as the unit of account in your day-to-day tax accounting. After working out your taxable income or tax loss in the applicable functional currency, you must translate that amount into A$ to report on your tax return.

    You must also carry out your instalment income calculations in your applicable functional currency and translate that amount into A$ for reporting purposes.

    Eligibility to account in a functional currency

    Only certain taxpayers can choose to work out their taxable income or tax loss using a non-Australian dollar applicable functional currency. This guide is relevant only if you are either of the following:

    • a resident who must prepare financial reports under section 292 of the Corporations Act 2001
    • a non-resident carrying on business through a permanent establishment in Australia.

    Your applicable functional currency is the sole or predominant currency in which you keep your ‘accounts’ at the time you choose to use functional currency.

    ‘Accounts’ means ledgers, journals, statements of financial performance, profit and loss accounts, balance sheets and statements of financial position and includes statements, reports and notes attached to, or intended to be read, with such items.

    Find out more in subsection 960-70(4) of the ITAA 1997.

    The following taxpayers using a non-A$ applicable functional currency are not covered in this guide:

    • Australian residents carrying on business through overseas permanent establishments, using a non-A$ applicable functional currency to work out their taxable income or loss
    • attributable taxpayers in respect of controlled foreign companies (CFC) and transferor trusts, using a non-A$ applicable functional currency to work out the ‘attributable income’ of the CFC or transferor trust.

    When to make a functional currency choice

    The functional currency rules started to apply on 1 July 2003.

    Ordinarily, if you choose to use a foreign currency as your applicable functional currency to work out your taxable income or tax loss, your choice will take effect after the end of the tax year during which you made it.

    You must make your functional currency choice in writing.

    In some circumstances, you can make your functional currency choice after the start of the tax year in which you intend it to take effect. This is referred to as a ‘backdated start up choice’. You must make a ‘backdated start up choice within 90 days of either of the following:

    • the start of the tax year, if your entity existed at that time
    • the day your entity came into existence, if it did not exist at the start of the tax year.

    See details on:

    Withdrawing an existing functional currency choice and substituting a new choice

    You can withdraw your existing functional currency choice if the functional currency you are using ceases to be the sole or predominant currency in which you keep your ‘accounts’. Your functional currency choice withdrawal will take effect from the end of the tax year in which you withdraw it.

    Your withdrawal:

    • cannot be backdated
    • must be made in writing
    • should be available as part of the business’s tax records.

    After your previous functional currency choice is withdrawn, you can make a choice to use the new sole or predominant currency in which you keep your accounts to work out your taxable income or tax loss. You must make this choice in writing. If you don’t make a new functional currency choice, the core foreign currency translation rules will apply, which means that all amounts must be translated into A$.

    See details on:

    Documenting your choice to use a non-Australian dollar applicable functional currency

    When making your written choice to use a non-Australian dollar currency as your applicable functional currency, include all the following:

    • the name and tax file number of the entity making the choice
    • the use to which the functional currency is being put – for example, to work out taxable income or tax loss
    • the date the choice takes effect
    • the unit of account that the entity intends to use as its functional currency
    • the signature of the entity’s public officer and the date the written functional currency choice was signed.

    You do not need to send your written functional currency choice to us. However, it should be available as part of your business’ tax records.

    Non-functional currency amounts you receive or pay

    All amounts included in working out your taxable income or tax loss must be in the applicable functional currency. This means you must translate all amounts you receive or pay in another currency, including A$ amounts, into the applicable functional currency.

    The functional currency translation rules, including applicable exchange rates, follow the principles in the core foreign currency translation rules for translating foreign currency amounts to A$. This is covered in subsection 960-50(6) of Subdivision 960-C and also subsection 960-80(6) of Subdivision 960-D of the ITAA 1997.

    However, the A$ is treated as a foreign currency while your applicable functional currency is not a foreign currency for the purposes of working out your taxable income or tax loss in the applicable functional currency. This is covered in subsection 960-80(1) of the ITAA 1997.

    A foreign exchange (forex) realisation gain or loss may arise for certain amounts if there is a difference in prevailing exchange rates at the relevant times. For example, the exchange rate applicable at the time you incur an amount may be different from the exchange rate applicable when you pay it. In this situation, changes in the value of the A$ against the applicable functional currency can bring about a forex gain or loss – an example follows.

    Example 1: trigger of foreign currency loss

    Stellar Rex Incorporated (Stellar Rex), a USA company with a branch (permanent establishment) in Australia, chooses to account for their Australian branch’s taxable income in a functional currency. For Stellar Rex’s purposes, US dollars (US$) is the applicable functional currency and A$ is a foreign currency.

    Stellar Rex contracts to purchase a depreciating asset from an Australian company in A$ as follows:

    Year 1

    Stellar Rex contracts to purchase the asset for A$10,000. Stellar Rex holds the asset from the date of contract.

    At the contract time, A$1.00 = US$0.50.

    Therefore, the cost of the asset in the applicable functional currency is US$5,000.

    Year 2

    Thirteen months after beginning to hold the asset, Stellar Rex pays A$10,000 for the asset.

    At this time A$1.00 = US$0.55, so the A$10,000 Stellar Rex pays is equivalent to US$5,500.

    A forex realisation loss of US$500 is made under Forex realisation event (FRE) 4 when Stellar Rex pays A$10,000 for the asset in year 2. As the payment was made more than 12 months after first holding the asset, the loss is not a short-term forex realisation loss – refer to section 775-75 of the ITAA 1997.

    Therefore, Stellar Rex will take this loss into account as an allowable deduction when calculating the taxable income or tax loss of its Australian branch for year 2. The taxable income of the Australian branch is calculated in US$ and translated into A$ at the end of the tax year for the purpose of working out the amount of A$ income tax it is liable to pay.

    End of example

    Find out more about foreign currency translation (conversion) rules.

    Pre-choice amounts

    Special translation rules apply to amounts that are attributable to transactions or events that happened before your current functional currency choice took effect (‘pre-choice’ amounts). Pre-choice amounts that are relevant for working out your taxable income or tax loss for a year after your functional currency choice takes effect must be translated into your applicable functional currency in accordance with these special rules. This includes pre-choice amounts that are denominated in the same non-A$ currency as your applicable functional currency.

    See details on:

    If you haven’t previously made a functional currency choice, you should translate a relevant pre-choice amount as follows:

    • firstly, into A$ at the exchange rate applicable at the time of the transaction or event
    • secondly, into the applicable functional currency at the exchange rate at the time your functional currency choice took effect.

    If you have previously made a choice to use a non-A$ currency as your applicable functional currency, you should translate a relevant pre-choice amount:

    • firstly, into the previous applicable functional currency at the exchange rate applicable at the time of the transaction or event
    • secondly, into the new applicable functional currency at the exchange rate at the time your new functional currency choice took effect.

    Example 2: sale of assets acquired before making a functional currency choice

    Fion Incorporated (FION), a non-resident corporation, operates through a permanent establishment in Australia. FION conducts most of its business in Yen (¥).

    In the year ended 30 June (year 1) FION chooses to use ¥ as its applicable functional currency. The choice applies for the year commencing 1 July (year 2).

    In the year ended 30 June (year 3) FION sells a tourist resort for ¥600 million, which it had purchased before year 1 for ¥500 million.

    As FION’s applicable functional currency is ¥, the capital gain or capital loss on the disposal of the tourist resort will be calculated in ¥. However, FION had not made a choice to use ¥ as its applicable functional currency at the time it purchased the tourist resort – that is, it was still using A$ for tax purposes. Therefore, the ¥ cost of the resort is translated to A$ at the exchange rate prevailing at the time of the purchase. This A$ amount is then translated to ¥ at the exchange rate prevailing at the time FION’s choice to use ¥ as its applicable functional currency took effect.

    For the purposes of this example, the exchange rates were:

    • A$1.00 = ¥68.50 at the time FION purchased the resort
    • A$1.00 = ¥62.00 at the time FION’s functional currency choice took effect.

    This means the cost base for the purpose of calculating the capital gain or loss on the disposal of the tourist resort is:

    • (¥500,000,000 ÷ 68.50) × 62.00
    • = A$7,299,270 × 62.00
    • = ¥452,554,745.

    The capital gain calculated in FION’s applicable functional currency is:

    • sale proceeds = ¥600,000,000
    • less ¥452,554,745
    • capital gain = ¥147,445,255.

    End of example

    Tax reporting and functional currency

    The functional currency rules allow you to work out your taxable income or tax loss in your applicable functional currency. However, all tax reporting must still be expressed in A$. When reporting on your tax return or activity statement, work out the reported amounts in your applicable functional currency and then translate these amounts into A$.

    For tax reporting purposes, when a translation is needed for label amounts (other than the taxable income amount), use the same translation rate as the taxable income translation rate. If you don’t have a taxable income amount in a given income year (that is, you have a tax loss), you should use the same rate you would have used to translate a taxable income amount into A$.

    How to treat different amounts

    Amount type

    Treatment

    Amounts used in working out taxable income or tax loss in the applicable functional currency (FC).

    Note sections 6AB and 6AC of the Income Tax Assessment Act 1936 (ITAA 1936) with regard to foreign income and foreign tax and the ‘grossing-up’ of foreign income to include foreign tax paid.

    Include the amount in the taxable income calculation in the FC before translating taxable income from the FC into A$.

    Amounts used to work out taxable income or a tax loss that are in a foreign currency. For example:

    • A$ amounts, including the ‘gross-up’ amount for a franked dividend
    • amounts of foreign income, including the ‘gross-up’ amount for foreign tax paid in respect of that income.

    Section 6AC of the ITAA 1936 requires the amount of foreign income included in your assessable income to be ‘grossed-up’ to include any foreign tax you paid in relation to the foreign income. If you receive a franked dividend, section 207-20 of the ITAA 1997 requires you to ‘gross-up’ your assessable income by the amount of the franking credit – and also entitles you to a tax offset equal to the amount of the franking credit.

    Translate into the FC using the applicable exchange rate for that amount.

    As ‘gross-up’ amounts contribute to the calculation of your taxable income or tax loss, you must translate them into the FC. Include the FC value in the taxable income calculation before translating taxable income from FC into A$ – see Example 3 and Example 4.

    Carry-forward losses

    Carry-forward losses are allowable deductions that reduce taxable income.

    Identify the carry forward loss amount in the FC from the previous income year.

    Include these amounts in the taxable income calculation in the FC before translating taxable income from FC into A$.

    When reporting the value of a tax loss, translate it from FC into A$.

    Tax exempt amounts that reduce carry-forward losses

    Tax exempt amounts that reduce carry-forward losses are translated into the FC generally upon being derived. They are then used to absorb the loss to the extent of their value.

    When reporting the value of a tax exempt amount, translate it into A$.

    Foreign income tax offsets (FITO)

    Subsection 770-10(1) of the ITAA 1997 provides that you are entitled to a foreign income tax offset for foreign income tax you paid in respect of an amount of foreign income that is included in your assessable income in a year of income. (FITO in relation to the ‘attributable income’ of a CFC is not dealt with in this guide.)

    The value of foreign income tax offset amounts is not used in working out taxable income, except for when calculating the ‘attributable income’ of a controlled foreign company (CFC) or transferor trust.

    The core foreign currency translation rules apply, and the value of foreign tax paid used to calculate foreign income tax offsets is translated into A$ when the foreign tax is paid – see Example 3.

    Franking credits

    A credit that arises in the franking account of an entity (a franking credit) is a tax offset.

    The amount of the tax offset you are entitled to as a result of receiving a franked dividend is not translated into your FC. Your tax offset amount will equal the A$ amount of the franking credit attached to the dividend you received before it was translated into functional currency.

    Add the A$ value of franking credits to your franking account without translation into FC – see Example 4.

    You must keep your franking account in A$.

    Tax offsets and rebates

    Tax offsets and rebates are not used to work out taxable income or a tax loss.

    The core foreign currency translation rules apply.

    If the amount is already in A$, then no translation takes place.

    If the amount is in a non-A$ currency, translate the amount into A$.

    Do not translate into FC first.

    Values expressed in law

    Paragraph 960-80(2)(i) of the ITAA 1997 covers this.

    Translate these amounts to FC at the applicable rate – see Example 5.

    Example 4: franking credits

    US$1.00 = A$2.00

    XYZ Corporation (XYZ) is an Australian resident company, which chooses to use US$ as its applicable functional currency.

    XYZ derives a fully franked dividend as follows:

    • A$70 cash.
    • A$30 gross-up amount (franking credit value).

    To find out more, refer to subsection 207-20(1) of the ITAA 1997.

    Assessable income calculation

    XYZ translates A$100 ($70 + $30) into US$ as follows:

    • A$100 × 0.5 = US$50.

    At the end of the tax year, US$50 (and other taxable income values) are translated into A$ at regulation rate.

    Franking account balance

    Add A$30 to franking account balance. No translation takes place.

    End of example

    Mandatory application of functional currency for indirect Australian real property interests

    If:

    • you are a foreign resident
    • a CGT event happens in relation to a CGT asset that is an indirect Australian real property interest for you, and
    • at the time of the CGT event, the sole or predominant currency in which you keep your accounts is a currency other than Australian currency

    you must use the applicable functional currency to work out the amount of any capital gain or capital loss. Subsection 960-61(2) of the ITAA 1997 covers this.

    This requirement applies to CGT events that happen on or after 12 December 2006.

    Capital gains and losses

    There are 2 steps to work out a capital gain or capital loss.

    Step 1 translate an amount that is not in the applicable functional currency into the applicable functional currency.

    Step 2 translate the amount of any capital gain or capital loss into Australian currency.

    See more details at table item 6 of subsection 960-80(1) of the ITAA 1997.

    Exchange rates to apply

    Different exchange rates apply to the translation of amounts that are elements in the calculation of capital gain or loss.

    See more details at subsection 960-80(4) of the ITAA 1997.

    The exchange rate to be used when translating amounts will be either the:

    • rate at the time the costs are incurred
    • rate at the time of the CGT event.

    Exchange rate applicable at the time the costs are incurred

    Amounts relating to the payments made and costs incurred that form part of the cost base of a CGT asset, are translated into your functional currency at the exchange rate applicable at the time the costs are incurred.

    See details in:

    • table item 5 of subsection 960-50(6) of the ITAA 1997
    • TR 2007/5 Income tax: functional currency – when is an amount not in the ‘applicable functional currency’? paragraphs 110 and 153.

    Exchange rate applicable at the time of the CGT event

    Amounts which are relevant for working out the capital gain or capital loss (capital proceeds or market value of other property) on the happening of a CGT event, are translated into the applicable functional currency at the exchange rate applicable at the time of the CGT event.

    See details in:

    Amount of capital gain or capital loss calculated in the applicable functional currency

    This amount is translated into the Australian currency at the exchange rate applicable at the time of CGT event.

    See details in:

    • table item 5 in subsection 960-50(6) of the ITAA 1997
    • TR 2007/5 Income tax: functional currency – when is an amount not in the ‘applicable functional currency’?

    Reporting during the year

    Business activity statements

    When completing a business activity statement (BAS):

    1. calculate your instalment income in the applicable functional currency
    2. translate your instalment income into Australian dollars at the appropriate rate
    3. complete label T1 of the BAS accordingly.

    Company tax return

    The functional currency rules allow some taxpayers to choose to work out their taxable income or tax loss by using a non-A$ currency as their applicable functional currency (FC).

    All amounts disclosed on the company tax return must be disclosed in A$.

    When a label amount is accounted for in a non-A$ FC, that sum should be translated into A$ using the same functional currency translation rate (shown at label 8N Functional currency translation rate of the company tax return) used to translate the taxable income or tax loss figure.

    The following amounts are always accounted for in A$, and not in the FC:

    • Label 7 J Franking credits
    • Label 7 C Australian franking credits from a New Zealand Company.

    The following amounts do not need to be translated into A$ before completion of the return:

    • Label 7 R Tax losses deducted
    • Label 7 S Tax losses transferred in.

    Tax losses are allowable deductions from taxable income. If you carry forward losses, you should account for and claim them in your FC. Report any losses used during the income year at label 7R by translating the value of the loss used into A$ at the FC translation rate.

    As mentioned above, label 8N is where you show the exchange rate used to translate the FC taxable income figure (and many other figures on the company tax return) into A$.

    At label 8N, show the translation rate the company used to translate the taxable income figure from the FC into A$. The translation rate is the amount the FC amount is divided by to get an equivalent amount of A$. That is, the number of non-A$ currency units that equal one A$ rounded to 4 significant figures – see Examples for labels 8N and 8O.

    Label 😯 – functional currency chosen

    Label 😯 is where you show your chosen FC using the 3-letter code from the international standard ISO 4217 – ‘Currency codes’. See the list of Currency codes for label 😯.

    Labels 8N and 😯 must be completed by:

    • Australian resident taxpayers who use FC to work out their taxable income or tax loss
    • foreign residents carrying on an activity or business at, or through, an Australian permanent establishment, who use FC to work out their taxable income or tax loss.

    You should not complete labels 8N and 😯 if you are an Australian resident taxpayer using FC only to work out the attributable income of a controlled foreign company (CFC) or transferor trust.

    The following are examples of correctly completed labels 8N and 8O. The exchange rates used are from 26 September 2003.

    Examples for labels 8N and 😯

    Applicable FC

    Label N

    Label O

    US Dollar

    .6695

    USD

    Yen

    77.18

    JPY

    New Zealand Dollar

    1.1385

    NZD

    Won

    785.8

    KRW

    Rupiah

    5679

    IDR

    As mentioned previously, if you choose to use FC, you should account for the value of any carry-forward losses using that FC.

    The value of those tax losses and net capital losses carried forward to later income years should be reported in A$ at ‘Losses information’ – labels 13U and 13V – on the company tax return.

    Calculation statement

    The calculation statement on the company tax return shows you how to work out the amount of tax payable or refundable. It starts with the ‘Taxable income’ figure at label A. This figure should have been worked out earlier, using the applicable FC and then translated into A$.

    Other figures in the calculation statement are either of the following:

    • A$ amounts, such as pay as you go (PAYG) instalments raised
    • amounts translated into A$ previously, such as any foreign income tax offset.

    Currency codes for label 😯

    These currency codes are from international standard ISO 4217 – Currency codes.

    A–F, G–K, L–P, Q–U, V–Z

    A

    • Afghan Afghani – AFN
    • Albanian Lek – ALL
    • Algerian Dinar – DZD
    • Angolan Kwanza – AOA
    • Argentine Peso – ARS
    • Armenian Dram – AMD
    • Aruban Guilder – AWG
    • Azerbaijani Manat – AZN

    B

    • Bahamian Dollar – BSD
    • Bahraini Dinar – BHD
    • Bangladeshi Taka – BDT
    • Barbados Dollar – BBD
    • Belarusian Ruble – BYN
    • Belize Dollar – BZD
    • Bermudian Dollar – BMD
    • Bhutanese Ngultrum – BTN
    • Bolivian Boliviano – BOB
    • Bosnia & Herzegovina Convertible Marks – BAM
    • Botswanan Pula – BWP
    • Brazilian Real – BRL
    • British Pound – GBP
    • Brunei Dollar – BND
    • Bulgarian Lev – BGN
    • Burundi Franc – BIF

    C

    • Cambodian Riel – KHR
    • Canadian Dollar – CAD
    • Cabo Verde Escudo – CVE
    • Cayman Islands Dollar – KYD
    • CFA Franc BCEAO – XOF
    • CFA Franc BEAC – XAF
    • CFP Franc – XPF
    • Chilean Peso – CLP
    • Chinese Yuan Renminbi – CNY
    • Colombian Peso – COP
    • Comorian Franc – KMF
    • Congolese Franc – CDF
    • Costa Rican Colon – CRC
    • Cuban Peso – CUP
    • Czech Koruna – CZK

    D

    • Danish Krone – DKK
    • Djibouti Franc – DJF
    • Dominican Peso – DOP

    E

    • East Caribbean Dollar – XCD
    • Egyptian Pound – EGP
    • El Salvador Colon – SVC
    • Eritrean Nakfa – ERN
    • Ethiopian Birr – ETB
    • Euro – EUR

    F

    • Falkland Islands Pound – FKP
    • Fijian Dollar – FJD

    G

    • Gambian Dalasi – GMD
    • Georgian Lari – GEL
    • Ghanaian Cedi – GHS
    • Gibraltar Pound – GIP
    • Guatemalan Quetzal – GTQ
    • Guernsey Pound Sterling – GBP
    • Guinean Franc – GNF
    • Guyanese Dollar – GYD

    H

    • Haitian Gourde – HTG
    • Honduran Lempira – HNL
    • Hong Kong Dollar – HKD
    • Hungarian Forint – HUF

    I

    • Icelandic Krona – ISK
    • Indian Rupee – INR
    • Indonesian Rupiah – IDR
    • Iranian Rial – IRR
    • Iraqi Dinar – IQD
    • Isle of Man Pound Sterling – GBP
    • Israeli New Sheqel – ILS

    J

    • Jamaican Dollar – JMD
    • Japanese Yen – JPY
    • Jersey Pound Sterling – GBP
    • Jordanian Dinar – JOD

    K

    • Kazakhstani Tenge – KZT
    • Kenyan Shilling – KES
    • Kuwaiti Dinar – KWD
    • Kyrgystani Som – KGS

    L

    • Laotian Kip – LAK
    • Latvia Euro – EUR
    • Lebanese Pound – LBP
    • Lesotho Loti – LSL
    • Liberian Dollar – LRD
    • Libyan Dinar – LYD
    • Lithuania Euro – EUR

    M

    • Macanese Pataca – MOP
    • Macedonia Denar – MKD
    • Malagasy Ariary – MGA
    • Malawian Kwacha – MWK
    • Malaysian Ringgit – MYR
    • Maldivian Rufiyaa – MVR
    • Mauritanian Ouguiya – MRU
    • Mauritius Rupee – MUR
    • Mexican Peso – MXN
    • Moldovan Leu – MDL
    • Mongolian Tugrik – MNT
    • Moroccan Dirham – MAD
    • Mozambique Metical – MZN
    • Myanmar Kyat – MMK

    N

    • Namibia Dollar – NAD
    • Nepalese Rupee – NPR
    • Netherlands Antillean Guilder – ANG
    • New Zealand Dollar – NZD
    • Nicaraguan Cordoba Oro – NIO
    • Nigerian Naira – NGN
    • North Korean Won – KPW
    • Norwegian Krone – NOK

    O

    • Omani Rial – OMR
    • Other – OTH

    P

    • Pakistani Rupee – PKR
    • Panamanian Balboa – PAB
    • Papuan Kina – PGK
    • Paraguayan Guarani – PYG
    • Peruvian Nuevo Sol – PEN
    • Philippine Peso – PHP
    • Polish Zloty – PLN
    • Pound Sterling – GBP

    Q

    • Qatari Rial – QAR

    R

    • Romanian New Leu – RON
    • Russian Ruble – RUB
    • Rwandan Franc – RWF

    S

    • Saint Helena Pound – SHP
    • Samoan Tala – WST
    • Sao Tome and Principe Dobra – STN
    • Saudi Riyal – SAR
    • Serbian Dinar – RSD
    • Seychelles Rupee – SCR
    • Sierra Leonean Leone – SLE
    • Singapore Dollar – SGD
    • Solomon Islands Dollar – SBD
    • Somali Shilling – SOS
    • South African Rand – ZAR
    • South Korean Won – KRW
    • South Sudanese Pound – SSP
    • Sri Lankan Rupee – LKR
    • Sudanese Pound – SDG
    • Surinam Dollar – SRD
    • Eswatini Lilangeni – SZL
    • Swedish Krona – SEK
    • Swiss Franc – CHF
    • Syrian Pound – SYP

    T

    • Taiwanese New Dollar – TWD
    • Tajikistani Somoni – TJS
    • Tanzanian Shilling – TZS
    • Thai Baht – THB
    • Tongan Pa’anga – TOP
    • Trinidad and Tobago Dollar – TTD
    • Tunisian Dinar – TND
    • Turkish Lira – TRY
    • Turkmenistan New Manat – TMT
    • Tuvalu Australian Dollar – AUD

    U

    • UAE Dirham – AED
    • Ugandan Shilling – UGX
    • Ukrainian Hryvnia – UAH
    • Uruguayan Peso – UYU
    • US Dollar – USD
    • Uzbekistan Sum – UZS

    V

    • Vanuatuan Vatu – VUV
    • Venezuelan Bolivar Soberano – VES
    • Vietnamese Dong – VND

    Y

    • Yemeni Rial – YER

    Z

    • Zambian Kwacha – ZMW
    • Zimbabwe Gold – ZWG

    MIL OSI News

  • MIL-OSI Security: Distributor of ANOM Hardened Encrypted Devices Sentenced to 63 Months in Prison for Racketeering Conspiracy

    Source: US FBI

    SAN DIEGO – Osemah Elhassen of Sydney, Australia, was sentenced in federal court today to 63 months in prison for participating in a worldwide conspiracy to distribute hardened encrypted communication devices to criminal syndicates to facilitate drug trafficking and other crimes.

    Elhassen was one of 17 defendants indicted in San Diego in 2021 in connection with Operation Trojan Shield, an international law enforcement effort in which the FBI secretly operated an encrypted messaging network used by criminals, leading to the arrests of hundreds worldwide.

    According to court records, the platform was known as ANOM. While ANOM’s criminal users unknowingly communicated on the system operated by the FBI, agents catalogued more than 27 million messages between users around the world whose criminal discussions were covertly obtained and reviewed by the FBI. The platform was taken down in June 2021. Please see Operation Trojan Shield in 2021.

    Elhassen pleaded guilty in May 2024 to Count 1 of a superseding indictment charging him and the others with a racketeering conspiracy in connection with the ANOM enterprise. A citizen of Australia, Elhassen was a Colombia-based distributor of ANOM devices who was also directly involved in drug trafficking and money laundering.

    Elhassen admitted that around November 2019, he became a member of the ANOM enterprise. According to his plea agreement, he admitted to helping accomplish the illegal objectives of that enterprise, including drug trafficking, money laundering, and obstruction of justice offenses. To that end, Elhassen distributed ANOM devices to criminal end-users for over a year and a half, and in doing so, facilitated the importation, exportation, and distribution of at least 15 kilograms of cocaine and the laundering of proceeds from the enterprise’s illegal activities.

    According to the government’s sentencing filings, Elhassen’s ANOM messages show significant distribution of ANOM devices in Colombia and other places. His messages also show that Elhassen participated in providing ANOM device support and arranging subscription renewals, among other sales and price-setting activity.

    Elhassen was arrested in Colombia in June 2021 and was extradited to the Southern District of California in May 2023. He pleaded guilty in May 2024.

    “Despite use of sophisticated technology and extreme measures to conceal the criminal enterprise, Mr. Elhassen could not thwart federal investigators,” said U.S. Attorney Tara McGrath. “The sentence today demonstrates that even those who go to the greatest lengths to hide will be held to account.”

    “Evidence collected during Operation Trojan Shield showed that distributors of ANOM devices, like Mr. Elhassen, were not merely providing a messaging service but enabling and facilitating Transnational Criminal Organizations,” said FBI San Diego Special Agent in Charge, Stacey Moy. “Today’s sentence should send a strong message to the users and distributors of these types of devices. The FBI will continue to collaborate with domestic and international partners on new and innovative strategies to combat the ever-evolving threat posed by transnational criminal organizations.”

    This case is being prosecuted by Assistant U.S. Attorneys Joshua C. Mellor, Mikaela L. Weber, and Peter S. Horn. The Justice Department’s Office of International Affairs and the Narcotic and Dangerous Drug Section’s Judicial Attaché Office in Bogota provided significant assistance in securing the arrest and extradition of Elhassen. The United States also thanks Colombian law enforcement authorities for their valuable assistance.

    Three other defendants in this case have pleaded guilty, including Dragan Nikitovic, aka Dr. Djek; Edwin Harmendra Kumar, aka Edwin Harmendra Valentine; and Miwand Zakhimi, aka Maiwand Zakhimi. They are scheduled to be sentenced in December 2024 and January 2025. A trial for four other defendants is scheduled for March 10, 2025. Eight other defendants in the case are yet to be extradited to the United States, and one is a fugitive.

    For further information on investigations and prosecutions of encrypted communication providers, see https://www.justice.gov/usao-sdca/pr/fbi-s-encrypted-phone-platform-infiltrated-hundreds-criminal-syndicates-result-massive (ANOM), https://www.justice.gov/usao-sdca/pr/sky-global-executive-and-associate-indicted-providing-encrypted-communication-devices (Sky Global), and https://www.justice.gov/usao-sdca/pr/chief-executive-communications-company-sentenced-prison-providing-encryption-services (Phantom Secure).

    Operation Trojan Shield is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

    DEFENDANT                                               Case Number 21cr1623-JLS-17                                   

    Osemah Elhassen                                            Age: 51                                   Sydney, Australia

    SUMMARY OF CHARGES

    Count 1:  Racketeering Conspiracy – Title 18, U.S.C., Section 1962(d)

    Maximum penalty: Twenty years in prison, and fine of up to $250,000 or twice the gain or loss

    INVESTIGATING AGENCIES

    Federal Bureau of Investigation

    Drug Enforcement Administration

    United States Marshals Service

    Department of Justice, Office of International Affairs

    Australian Federal Police

    Swedish Police Authority

    Lithuanian Criminal Police Bureau

    National Police of the Netherlands

    EUROPOL                                                          

    MIL Security OSI

  • MIL-OSI: Invalda INVL dividend payment procedure for the year 2024

    Source: GlobeNewswire (MIL-OSI)

    On 30 April 2025 the General Shareholders Meeting of Invalda INVL (identification code 121304349, address Gyneju str. 14, Vilnius, Lithuania) decided to allocate EUR 1.25 dividend per share.

    Dividends will be paid to the shareholders who were shareholders of Invalda INVL at the end of the tenth business day following the day of the General Shareholders Meeting that adopted a decision on dividend payment, i.e. on 15 May 2025.

    From 23 May 2025 the dividends will be paid in the following order:
    – to the shareholders, whose Invalda INVL shares are accounted by a financial brokerage company or credit institutions, which provide securities accounting services, the amount of dividend, after deduction of Personal or Corporate withholding income tax applicable by the laws of Lithuania, will be transferred to the shareholders’ account held with a respective financial brokerage company or credit institution;
    – to the shareholders whose Invalda INVL shares on behalf of the company are accounted by the authorised custodian AB Artea Bank, the dividend amount, after deduction of Personal or Corporate withholding income tax applicable by the laws of Lithuania, will be transferred to the shareholders’ account with Lithuanian commercial bank as indicated by the shareholders (requests for transfer of dividends to the account specified by the shareholder can be submitted to the nearest customer service department of AB Artea Bank).

    Dividend taxation procedure for the year 2024:
    – dividends paid to natural persons–residents of the Republic of Lithuania and natural persons–residents of foreign countries are subject to withholding Personal income tax of 15%;
    – dividends paid to legal entities of the Republic of Lithuania and legal entities–residents of foreign countries are subject to withholding Corporate income tax of 16%, unless otherwise provided for by the laws.

    The person authorized to provide additional information is:
    Raimondas Rajeckas, CFO of Invalda INVL
    raimondas@invaldainvl.com

    The MIL Network

  • MIL-OSI Russia: Cargo flight connects Urumqi and Tallinn

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 22 (Xinhua) — A cargo flight linking the cities of Urumqi and Tallinn opened on Wednesday, the Tianshan news portal reported.

    The plane carrying 51 tons of parcels departed that day from Tianshan Airport in Urumqi, the capital of the Xinjiang Uyghur Autonomous Region, and after a stop in Uzbekistan will arrive in the capital of Estonia in about 11 hours.

    According to the plan, the Urumqi-Tallinn flight will be operated once a week.

    The plane will deliver mainly clothing and other consumer goods sold through cross-border e-commerce to Estonia.

    The launch of the new air route has filled a gap in air cargo transportation between Xinjiang and the Baltics, which will stimulate the export of textiles, clothing, electronics and other competitive goods made in China.

    Currently, cargo flights connect Urumqi with 20 foreign cities, including 12 European ones. -0-

    MIL OSI Russia News

  • MIL-OSI China: Q&A: What to know about China’s visa-free policies

    Source: People’s Republic of China – State Council News

    BEIJING, May 21 — China’s visa-exemption policies have boosted inbound travel. Since the start of this year, “China Travel” has kept trending. On Wednesday, the Consular Department of the Ministry of Foreign Affairs of China released a list of frequently asked questions about these policies.

    Q: Who does the visa waiver apply to?

    A: Nationals of 43 countries including Brunei, France, Germany, Italy, Spain, Holland, Malaysia, Switzerland, Ireland, Hungary, Austria, Belgium, Luxembourg, New Zealand, Australia, Poland, Portugal, Greece, Cyprus, Slovenia, Slovakia, Norway, Finland, Denmark, Iceland, Andorra, Monaco, Liechtenstein, the Republic of Korea, Bulgaria, Romania, Croatia, Montenegro, North Macedonia, Malta, Estonia, Latvia, Japan, Brazil, Argentina, Chile, Peru and Uruguay (Brazil, Argentina, Chile, Peru and Uruguay take effect from June 1, 2025) holding valid ordinary passports can be exempted from visa requirement if entering China for the purpose of business, tourism, family or friend visits, exchange and transit. They can stay in China for no more than 30 days without a visa.

    Q: Do foreign nationals eligible for a visa waiver need to make declarations to Chinese embassies and consulates in advance?

    A: Foreign nationals eligible for a visa waiver do not need to declare in advance to Chinese embassies and consulates before entering China without a visa.

    Q: Will the purpose of the intended stay in China be examined by Chinese border inspection authorities when entering China? How will it be done? Are other documents needed for entering China in addition to a passport?

    A: Foreign nationals traveling for purposes of business, tourism, family or friend visits, exchange and transit that meet the visa waiver requirements, can be allowed to enter China without a visa upon examination and approval in accordance with the law by border inspection authorities. Entry into China shall be denied by border inspection authorities in accordance with the law to foreign nationals who travel for purposes that do not meet the visa waiver requirements or who are not allowed to enter China in accordance with laws and regulations. It is recommended to take documents such as invitation letters, air tickets and reservations of accommodation as proof corresponding to the purposes of entry into China. Visa waiver does not apply to those who come to China for work, study, journalistic or similar purposes.

    Q: Is there any additional requirement for minors eligible for a visa waiver?

    A: Visa waiver requirements for minors are the same as for adults.

    Q: Are there any requirements regarding the type and validity of entry documents?

    A: For foreign nationals, an ordinary passport valid for at least the duration of the intended stay in China is needed. Holders of travel documents or temporary or emergency documents other than ordinary passports are not allowed to enter China without a visa.

    Q: How to calculate the duration of stay of 30 days?

    A: The duration of stay without a visa is calculated from the day after entry and lasts continuously for 30 calendar days.

    Q: Does the visa waiver apply to foreign nationals who travel from a third country?

    A: Eligible foreign nationals can depart for China from any country or region.

    Q: Does the visa waiver apply to foreign nationals who travel via modes of transport other than aviation?

    A: The visa waiver applies to all travelers coming to China through any sea, road and airport open to foreign nationals — except where laws, regulations or bilateral arrangements specify otherwise. For arrivals in China by way of private transport, certain procedures for entry and exit of means of transport shall be processed in accordance with relevant laws and regulations of China.

    Q: Does the visa waiver apply to tour groups?

    A: The visa waiver applies to eligible foreign nationals either in tour groups or as individuals.

    Q: If the length of intended stay exceeds 30 days, can the visa waiver be extended?

    A: Foreign nationals planning to stay in China for over 30 days shall apply for visas corresponding to their purposes of stay in advance at Chinese embassies or consulates. If they have to stay longer than 30 days for appropriate and sufficient reasons after entering China without a visa, they shall apply for stay permits to the exit and entry administrations of public security authorities of China.

    Q: Does the visa waiver allow multiple entries? Is there any requirement on the length of intervals between each entry, or any restriction on the number of entries without a visa or total days of stay?

    A: Foreign nationals eligible for the visa waiver can enter China without a visa multiple times. Currently, there is no restriction on the number of entries or total days of stay, but those who enjoy visa-free travel to China shall not engage in activities inconsistent with their purpose of entry.

    MIL OSI China News

  • MIL-OSI USA: Senate Passes Durbin’s Bipartisan Resolution Honoring The Four American Service Members Who Died In Lithuania

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin
    May 21, 2025
    The resolution recognizes the soldiers’ service and sacrifice to our nation and NATO allies
    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Co-Chair of the Senate Baltic Freedom Caucus, today commended the unanimous Senate passage of his bipartisan resolution honoring the four American soldiers—including one Illinoisan—who were stationed in Lithuania and tragically died in March while on a mission to recover a vehicle immobilized during a training exercise. The soldiers include Staff Sergeant Jose Dueñez Jr. from Joliet, Illinois; Staff Sergeant Edvin F. Franco; Staff Sergeant Troy S. Knutson-Collins; and Private First-Class Dante D. Taitano—all part of the 1st Armored Brigade, 3rd Infantry Division.
    “Last night, the Senate honored the brave American service members, including Staff Sergeant Jose Dueñez Jr. from Joliet, Illinois, who tragically died during a mission in Lithuania earlier this year.  It was a mission fraught with extreme danger and challenges, and this resolution reminds us of the daily service and sacrifice of our military members,” Durbin said.  “The resolution also expresses our gratitude to our Lithuanian ally—who dropped everything and faced great odds to help us recover their bodies and bring these fallen soldiers home—a reminder of the common defense underlying our alliance.”
    On April 3, thousands of Lithuanians took to the streets in Vilnius—including the Lithuanian President—to pay their respects to our fallen American soldiers. The resolution also reaffirms the importance of the NATO alliance and the need to support our Baltic allies.
    Durbin spoke about the four American soldiers and his resolution on the Senate floor last month.
    Text of the resolution can be found here.
    Joining Durbin in sponsoring the resolution are U.S. Senators Chuck Grassley (R-IA), Chuck Schumer (D-NY), Mitch McConnell (R-KY), Jeanne Shaheen (D-NH), Tammy Duckworth (D-IL), Chris Coons (D-DE), Adam Schiff (D-CA), Gary Peters (D-MI), Elissa Slotkin (D-MI), and Alex Padilla (D-CA).
    -30-

    MIL OSI USA News

  • MIL-OSI USA: Russian GRU Targeting Western Logistics Entities and Technology Companies

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL OSI USA News -

  • MIL-OSI Russia: Xinjiang launches first direct cargo air route to Baltic region

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    URUMQI, May 21 (Xinhua) — A cargo plane carrying 51 tonnes of e-commerce goods took off from northwest China’s Xinjiang Uygur Autonomous Region on Wednesday and arrived in Estonia’s capital Tallinn, marking the launch of the first direct cargo air route from Xinjiang to the Baltic region.

    The new route will be operated once a week by a Boeing 767 cargo aircraft, with a one-way flight time of approximately 11 hours. Compared with conventional aircraft, this aircraft offers 30 percent more cargo capacity, primarily transporting light industry products such as clothing and daily necessities, effectively reducing logistics costs.

    According to Feng Liang, general manager of Xinjiang Wanshengtong Supply Chain Management Co, Ltd., the air route will provide Chinese merchants with the opportunity to directly interact with e-commerce platforms in Northern Europe and help improve the shopping experience of consumers in the region.

    To date, 20 international cargo air routes have been launched from Xinjiang’s capital Urumqi to 20 cities, including 12 routes covering key hubs in Northern, Eastern and Western Europe.

    From January to April 2025, the customs office of Urumqi Diwopu International Airport handled 1,584 cargo flights, a whopping 1,157.1 percent increase year-on-year, and the cargo turnover of this airport reached 26,000 tons, an increase of 522.2 percent compared with the same period last year.

    The regular operation of multiple international air cargo routes will help Xinjiang-based cross-border e-commerce companies expand their presence in overseas markets, boosting exports of textiles, electronics and other competitive products and promoting the quality and efficiency of trade among Belt and Road Initiative participants, said Zhao Beijing, an official with Diwopu Customs. –0–

    MIL OSI Russia News

  • MIL-OSI: KGN Cloud Launches Intelligent Cloud Mining Platform AI Reshapes Crypto Landscape

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) —

    Following never-before-seen crypto rises, KGN Cloud, the innovative digital mining venture of KGN Investing Limited, has rolled out an AI-integrated, ready framework for legislation and an environment-friendly cloud mining platform. Major nations are speeding up their regulatory frameworks for digital assets ,when Bitcoin is already above $80,000, and KGN Cloud, now made available to individuals and businesses, facilitates the mining of top cryptocurrencies without owning physical rigs or dealing with complicated setups.

    New users get an automatic bonus of $100 after registration, which they can use to start mining in minutes.

    “The alignment of AI, energy sustainability, and global regulatory convergence has created a perfect milieu for intelligent mining,” said Rachel M. Jones, Chief Product Officer, KGN Cloud. “This is a platform we created to bring everyone—from the freshers in crypto to hedge funds—a trusted entry point into blockchain mining.”

    Crypto’s Historic 2025 Rally: The Numbers Behind the Boom

    Bitcoin hit $80,000 on May 10th, 2025, according to CoinMetrics and Messari, as a result of a combination of spot ETF approvals in the US, Hong Kong, and the UAE, as well as increasing interest for Ethereum Layer 2 solutions and institutional DeFi.

    Key market trends fueling demand for mining:

    • Spot Bitcoin ETF inflows exceeded $14B in April 2025 alone
    • Ethereum (ETH) surged 30% in Q2 as staking rewards hit record highs
    • Solana (SOL) and Avalanche (AVAX) are seeing adoption across real-world asset (RWA) tokenization
    • Global mining hash rate hit a new high of 660 EH/s post-halving, pushing smaller miners toward cloud-based options

    As a result, cloud mining is seeing an unprecedented surge in demand.

    Enter KGN Cloud: Mining Powered by AI, Sustainability, and Simplicity

    Traditionally, mining is beset with the barriers of hardware costs, inefficient use of energy, and absence of technical expertise; KGN Cloud deals with all these issues. There will be no capital costs because the platform will allow on-demand, Web-based access to the mining of Bitcoin, Ethereum, and other proof-of-work coins, using AI-enabled optimization—all this from anywhere with an Internet connection.

    Platform Highlights:

    • AI Predictive Allocation: Algorithmic intelligence predicts block difficulty shifts and reallocates hash power accordingly
    • Green Mining Infrastructure: Partnerships with hydro and solar-powered data centers in Canada, Norway, and Iceland
    • Zero Maintenance: KGN handles all technical configurations, upgrades, and storage
    • 24/7 Dashboard Access: Monitor earnings, switch coins, and reinvest profits instantly
    • Daily Payouts in BTC/ETH/USDT: Users can withdraw earnings anytime

    Real-Time Plan Examples (as of May 2025):

    • Starter AI Plan – $300, 3-day contract, return: ~$330
    • Optimized Yield Plan – $1,200, 5-day contract, return: ~$1,350
    • AI Green Plan – $5,000, 10-day contract, return: ~$6,050
    • Institutional Pro Plan – $10,000, 14-day contract, return: ~$12,800

    All plans include automated reinvestment options and 100% uptime guarantees.

    Crypto Goes Green: Cloud Mining’s Carbon Pivot

    The recently released G20 Digital Finance Taskforce aims to ensure that by 2026, 80% of all crypto mining operations will be tasked to meet net-zero emissions goals in key jurisdictions such as the EU, UAE, and Canada.

    In anticipation of said regulatory shift, KGN Cloud was built with low-emission data centers using renewable energy integrations. It is one of the few platforms already poised for full ESG compliance.

    “Regulatory alignment isn’t a threat—it’s the future…Our eco-first mining platform helps investors stay ahead of compliance curves without compromising on profitability,” stated Jones.

    AI + Crypto: From Trend to Necessity

    AI is no longer a buzzword—it’s defining the mining landscape in 2025. KGN Cloud’s proprietary AI engine analyzes:

    • Real-time token volatility
    • Network congestion
    • Global mining pool saturation
    • Gas fees and reward difficulty across BTC, ETH, LTC, etc.

    With the above input arriving every couple of hours, KGN Cloud reestablishes its mining focus, thereby maximizing yields for its users even when the market conditions are hostile.

    Referral Ecosystem: Earn More by Sharing

    In an effort to encourage community growth, KGN Cloud is running a Referral Earnings Program whereby users earn a commission of 5%-7% on each mining contract purchased through their link.

    Top affiliates are given access to exclusive “Pro Contracts,” which include advanced features like auto-compounding strategies and enhanced daily rewards.

    New Markets, New Users: Global Access & Regulation-Ready

    Currently functional in over 160 nations, KGN Cloud also runs its exclusive infrastructure through regulation-friendly hubs including Switzerland, Singapore, and Estonia.

    The said platform conforms to the FATF travel rule standard; UK financial oversight requirements; and the data protections of GDPR.

    “This is what KGN Cloud is for-the globe,” Jones said. “If you’re in Tokyo, you’re in Dubai, you’re in São Paulo-you’re mining securely, legally, and profitably.”

    What’s Ahead for KGN Cloud in 2025?

    KGN Cloud has announced several upcoming product expansions:

    • L2 Mining Pools: Coming Q3, users will be able to mine tokens on Ethereum Layer 2 solutions like Base and Arbitrum
    • Mobile App Launch: A native iOS and Android app is slated for June 2025
    • KGN Tokenized Contracts: Smart contract-based mining with yield-trading will launch via Polygon later this year
    • Enterprise Mining APIs: For hedge funds, DeFi projects, and NFT games needing scalable backend compute power

    Join the Future of AI-Powered Crypto Mining

    Defunct incorporates the aspect of being an old treasure; however, KGN Cloud is mocking the defunct aspect with accessible means of engagement that are compliant and sharp in terms of crypto. With a bulk of retail and institutional investors seeking reasonably easy reach to yield, KGN Cloud indeed opens the gates to the trust formerly established to secure the future of digital finance.

    Register now to receive your $100 bonus and start mining instantly. Start Mining Smarter

    Join thousands earning from digital assets without the complexity.
    Sign up at: https://www.kgncloud.com 

     Support: info@kgncloud.com

    MEDIA Contact:
    Name: Joy  Bennett
    Position: Manager
    City: London
    Country: United Kingdom

    Attachment

    The MIL Network

  • MIL-OSI China: MOFA sincerely appreciates international support for Taiwan’s bid to participate in WHO and WHA

    Source: Republic of Taiwan – Ministry of Foreign Affairs

    May 19, 2025  

    No. 163  

    The 78th World Health Assembly (WHA) is opening in Geneva on May 19. Following proactive efforts by the Ministry of Foreign Affairs (MOFA) and related overseas missions, Taiwan’s bid to participate in the WHA has received staunch and concrete support from the Group of Seven (G7), the executive and legislative branches of government of more than 50 countries, the European Union, the European Parliament, and representative offices of like-minded nations in Taiwan. MOFA expresses sincere appreciation for this support.

     

    Eleven of Taiwan’s diplomatic allies, as members of the World Health Organization (WHO), submitted a proposal to the WHO Secretariat to invite Taiwan to participate in the WHA as an observer, requesting that the proposal be included as a supplementary item on this year’s WHA agenda. Saint Lucia Prime Minister Philip J. Pierre personally wrote a letter urging WHO Director-General Tedros Adhanom Ghebreyesus to invite Taiwan to attend the WHA. The parliaments of Guatemala, Palau, and Saint Christopher and Nevis adopted resolutions backing Taiwan.

     

    The magnitude of support for Taiwan from like-minded countries has continued to grow. The current US administration has publicly endorsed Taiwan’s international participation more than 10 times. This includes a joint statement issued at the US-Japan leaders’ summit by President Donald Trump and Prime Minister Shigeru Ishiba in February, which for the first time contained text advocating Taiwan’s meaningful involvement in international organizations. US Secretary of State Marco Rubio reaffirmed firm US support for Taiwan’s international participation during his congressional confirmation hearing as well as in interviews and joint statements issued at two meetings with the foreign ministers of Japan and the Republic of Korea. The United States twice spoke up for Taiwan at the WHO Executive Board session held in February. In April, it publicly refuted China’s misuse of United Nations General Assembly (UNGA) Resolution 2758 at the UN Security Council for the first time, reiterating that the resolution did not preclude Taiwan’s participation in the UN system or other multilateral fora. In terms of US congressional support, the House of Representatives passed the Taiwan International Solidarity Act without opposition on May 5. The act urged the US government to resist China’s efforts to suppress Taiwan through mischaracterization of UNGA Resolution 2758. In addition, nine US state legislatures approved resolutions backing Taiwan’s involvement in international organizations.

     

    Furthermore, in a joint statement issued following a meeting in March, the G7 foreign ministers reaffirmed support for Taiwan’s meaningful participation in international organizations. On May 15, the European Union expressed a similar stance and recognized the extraordinary contributions Taiwan can make through its digital healthcare capabilities. In February, the European Parliament overwhelmingly adopted a resolution on the implementation of the EU Common Foreign and Security Policy, which backed Taiwan’s meaningful participation in relevant world bodies. 

    High-ranking European officials who publicly spoke up for Taiwan included Italian Deputy Prime Minister and Minister of Foreign Affairs Antonio Tajani, Irish Deputy Prime Minister and Minister for Foreign Affairs and Trade Simon Harris, Australian Minister for Foreign Affairs Penny Wong, Swedish Minister for Foreign Affairs Maria Malmer Stenergard, and Swedish Minister for Social Affairs and Public Health Jakob Forssmed. A total of 534 members of the European Parliament and 29 national parliaments across Europe cosigned a letter of the Formosa Club reaffirming support for Taiwan. The World Medical Association and other professional groups endorsed Taiwan’s participation in WHO and the WHA as they had done in the past.

     

    MOFA thanks the representative offices in Taiwan of the United Kingdom, France, Australia, Canada, the Czech Republic, Germany, Japan, and Lithuania for issuing a joint statement for the fifth year prior to the WHA affirming the immense benefits that Taiwan could bring to WHA discussions. The statement also emphasized that there was no legitimate reason for Taiwan’s exclusion from the WHA and that Taiwan’s absence would undermine the spirit of inclusive global public health cooperation and safety that WHO’s founding documents called for.

     

    MOFA points out that these positive developments fully demonstrate that China’s unreasonable obstruction of Taiwan’s participation in WHO has gained little traction or support among nations worldwide. MOFA reiterates that UNGA Resolution 2758 and WHA Resolution 25.1 make no mention of Taiwan, have nothing to do with Taiwan, and therefore cannot be cited as a legal basis for precluding Taiwan from participating in WHO or other international organizations or multilateral mechanisms or fora. MOFA asks that the WHO Secretariat listen closely to member countries, stop further condoning political manipulation by China, and instead work to realize WHO’s goals of “Leaving No One Behind” and “One World for Health” so as to fulfill its responsibility to maintain and improve the health and well-being of all people. MOFA also asks that Taiwan be allowed full and unobstructed participation in all WHO meetings, mechanisms, and activities, including the WHA. (E)

    MIL OSI China News

  • MIL-OSI Asia-Pac: MOFA sincerely appreciates international support for Taiwan’s bid to participate in WHO and WHA

    Source: Republic of China Taiwan

    May 19, 2025  
    No. 163  

    The 78th World Health Assembly (WHA) is opening in Geneva on May 19. Following proactive efforts by the Ministry of Foreign Affairs (MOFA) and related overseas missions, Taiwan’s bid to participate in the WHA has received staunch and concrete support from the Group of Seven (G7), the executive and legislative branches of government of more than 50 countries, the European Union, the European Parliament, and representative offices of like-minded nations in Taiwan. MOFA expresses sincere appreciation for this support.
     
    Eleven of Taiwan’s diplomatic allies, as members of the World Health Organization (WHO), submitted a proposal to the WHO Secretariat to invite Taiwan to participate in the WHA as an observer, requesting that the proposal be included as a supplementary item on this year’s WHA agenda. Saint Lucia Prime Minister Philip J. Pierre personally wrote a letter urging WHO Director-General Tedros Adhanom Ghebreyesus to invite Taiwan to attend the WHA. The parliaments of Guatemala, Palau, and Saint Christopher and Nevis adopted resolutions backing Taiwan.
     
    The magnitude of support for Taiwan from like-minded countries has continued to grow. The current US administration has publicly endorsed Taiwan’s international participation more than 10 times. This includes a joint statement issued at the US-Japan leaders’ summit by President Donald Trump and Prime Minister Shigeru Ishiba in February, which for the first time contained text advocating Taiwan’s meaningful involvement in international organizations. US Secretary of State Marco Rubio reaffirmed firm US support for Taiwan’s international participation during his congressional confirmation hearing as well as in interviews and joint statements issued at two meetings with the foreign ministers of Japan and the Republic of Korea. The United States twice spoke up for Taiwan at the WHO Executive Board session held in February. In April, it publicly refuted China’s misuse of United Nations General Assembly (UNGA) Resolution 2758 at the UN Security Council for the first time, reiterating that the resolution did not preclude Taiwan’s participation in the UN system or other multilateral fora. In terms of US congressional support, the House of Representatives passed the Taiwan International Solidarity Act without opposition on May 5. The act urged the US government to resist China’s efforts to suppress Taiwan through mischaracterization of UNGA Resolution 2758. In addition, nine US state legislatures approved resolutions backing Taiwan’s involvement in international organizations.
     
    Furthermore, in a joint statement issued following a meeting in March, the G7 foreign ministers reaffirmed support for Taiwan’s meaningful participation in international organizations. On May 15, the European Union expressed a similar stance and recognized the extraordinary contributions Taiwan can make through its digital healthcare capabilities. In February, the European Parliament overwhelmingly adopted a resolution on the implementation of the EU Common Foreign and Security Policy, which backed Taiwan’s meaningful participation in relevant world bodies. 
    High-ranking European officials who publicly spoke up for Taiwan included Italian Deputy Prime Minister and Minister of Foreign Affairs Antonio Tajani, Irish Deputy Prime Minister and Minister for Foreign Affairs and Trade Simon Harris, Australian Minister for Foreign Affairs Penny Wong, Swedish Minister for Foreign Affairs Maria Malmer Stenergard, and Swedish Minister for Social Affairs and Public Health Jakob Forssmed. A total of 534 members of the European Parliament and 29 national parliaments across Europe cosigned a letter of the Formosa Club reaffirming support for Taiwan. The World Medical Association and other professional groups endorsed Taiwan’s participation in WHO and the WHA as they had done in the past.
     
    MOFA thanks the representative offices in Taiwan of the United Kingdom, France, Australia, Canada, the Czech Republic, Germany, Japan, and Lithuania for issuing a joint statement for the fifth year prior to the WHA affirming the immense benefits that Taiwan could bring to WHA discussions. The statement also emphasized that there was no legitimate reason for Taiwan’s exclusion from the WHA and that Taiwan’s absence would undermine the spirit of inclusive global public health cooperation and safety that WHO’s founding documents called for.
     
    MOFA points out that these positive developments fully demonstrate that China’s unreasonable obstruction of Taiwan’s participation in WHO has gained little traction or support among nations worldwide. MOFA reiterates that UNGA Resolution 2758 and WHA Resolution 25.1 make no mention of Taiwan, have nothing to do with Taiwan, and therefore cannot be cited as a legal basis for precluding Taiwan from participating in WHO or other international organizations or multilateral mechanisms or fora. MOFA asks that the WHO Secretariat listen closely to member countries, stop further condoning political manipulation by China, and instead work to realize WHO’s goals of “Leaving No One Behind” and “One World for Health” so as to fulfill its responsibility to maintain and improve the health and well-being of all people. MOFA also asks that Taiwan be allowed full and unobstructed participation in all WHO meetings, mechanisms, and activities, including the WHA. (E)

    MIL OSI Asia Pacific News

  • MIL-OSI Security: NATO Secretary General commends Czechia’s commitment to a stronger, fairer and more lethal Alliance

    Source: NATO

    NATO Secretary General Mark Rutte welcomed Czech President Petr Pavel to NATO Headquarters on Wednesday (21 May 2025) to discuss preparations for the upcoming NATO Summit in The Hague.

    The Secretary General praised Czechia as a strong and reliable Ally, highlighting its defence investment and support to Ukraine. “You spend more than 2% of GDP on defence, and I welcome the commitment you’ve already made to increase defence spending to 3% in the coming years,” said Mr Rutte.

    Czechia plays an important role in NATO’s deterrence and defence, contributing to Forward Land Forces in Slovakia, Latvia and Lithuania. This year, Czechia will also deploy combat aircraft to Iceland in support of NATO’s air policing mission.

    The Secretary General commended Czechia’s substantial support to Ukraine, including over 1.3 billion euros in military assistance. He welcomed the success of the Czech-led ammunition initiative, which has helped deliver over 3 million rounds of large-calibre ammunition to Ukraine, including 1.5 million in 2024 alone. Mr Rutte also underlined Czechia’s growing role in NATO’s long-term support to Ukraine, including contributions to NATO’s Security Assistance and Training command (NSATU) in Wiesbaden and the deployment of 20 personnel to NSATU’s Logistics Enabling Nodes this July.

    Looking ahead to the NATO Summit in The Hague, Secretary General Rutte stressed the importance of strengthening NATO’s deterrence and defence even further, increasing defence spending, and building a stronger and more innovative transatlantic defence industry. “We will need to do much more, and this will remain our focus as we prepare for The Hague Summit,” he said. “We have a lot of work to do. And I know I can count on Czechia’s continued commitment and leadership.”

    MIL Security OSI

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI: BTCC Exchange Appoints Dan Liu as CEO Ahead of 14th Anniversary Milestone

    Source: GlobeNewswire (MIL-OSI)

    VILNIUS, Lithuania, May 21, 2025 (GLOBE NEWSWIRE) — BTCC, one of the world’s longest-serving cryptocurrency exchanges, today announces the appointment of Dan Liu as its new Chief Executive Officer. Liu, who previously served as Chief Research Officer at BTCC, brings extensive expertise in both traditional finance and cryptocurrency markets to his new role.

    As BTCC approaches its 14th anniversary in June, Dan Liu’s appointment as CEO marks a new chapter for the exchange. Under his leadership, BTCC aims to build upon its legacy as the world’s most established crypto exchange while pursuing sustainable growth. This vision will carry BTCC confidently into the future, elevating the platform beyond traditional security to drive meaningful industry evolution.

    From Research Visionary to CEO

    Since joining BTCC in 2019, Liu has been instrumental in the exchange’s rapid growth and innovation in the cryptocurrency space. As a dynamic young leader, he previously served as Chief Research Officer at the exchange. With his strategic vision over the years, BTCC expanded its services to users from over 160 countries and significantly enhanced its product offerings in both futures and spot trading markets while maintaining high security standards.

    Liu’s forward-thinking approach to market dynamics has made him a sought-after and respected voice in the cryptocurrency space, with regular features in prominent crypto media outlets including Cointelegraph, Markets Insider, and Japanese publication Monthly Digital Assets.

    “I am deeply honored to lead BTCC Exchange at such a pivotal time for both our platform and the broader cryptocurrency ecosystem,” said Liu. “My crypto journey began back in 2013, and that early passion has only grown stronger over the years. As we celebrate our 14th anniversary this year, I’m excited to combine my background in traditional finance with my love for blockchain innovation. We remain committed to bridging these two worlds, continuing to build trust within the community while accelerating our global expansion.”

    Building on Legacy, Focused on Future

    Since joining BTCC in 2019, Liu has guided the exchange through various market conditions while driving innovation and growth. His leadership has positioned BTCC as an industry pioneer across multiple market cycles.

    One of Liu’s most notable contributions was leading the launch of Tokenized Futures, an innovative financial product rarely seen in the industry. This bold step bridged the gap between traditional finance and blockchain technology and positioned BTCC as a forward-thinking exchange.

    Additionally, under Liu’s strategic guidance, BTCC launched its highly successful Copy Trading feature, which has received exceptional user engagement and positive feedback. This feature provides an accessible entry point for those exploring cryptocurrency markets, aligning perfectly with BTCC’s mission of making digital asset trading more inclusive.

    With his academic background in conventional markets, Liu brings valuable analytical skills to the evolving cryptocurrency space. His leadership represents a new approach where trust, transparency, and blockchain technology work together.

    Looking ahead, Liu’s focus is on global expansion while navigating increasingly diverse regulatory standards across markets. “One of my most important missions is educating the general public about cryptocurrency and making trading accessible to everyday users,” Liu explains. To support this vision, he plans to deepen BTCC’s community connections by attending global industry events and creating direct dialogue with users and partners across different markets—insights that will help shape the platform’s future and inform regional strategies.

    Under Liu’s leadership, BTCC Exchange is poised to continue its legacy as one of the most trusted, secure, and innovative cryptocurrency exchanges globally.

    About BTCC

    Founded in 2011, BTCC is one of the world’s longest-serving cryptocurrency exchanges, offering secure and user-friendly trading services to millions of users globally. With a commitment to security, innovation, and community building, BTCC continues to be a trusted platform in the evolving cryptocurrency landscape.

    Website: https://www.btcc.com/en-US

    X: https://x.com/BTCCexchange

    Contact: press@btcc.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/d56fc540-d6fd-4c6f-ae1a-a3ea93410608

    The MIL Network

  • MIL-OSI United Kingdom: Environment Agency secures over £526K in Proceeds of Crime case

    Source: United Kingdom – Executive Government & Departments

    News story

    Environment Agency secures over £526K in Proceeds of Crime case

    An illegal enterprise in catalytic converters has brought confiscation orders for £526,215.04, at a Proceeds of Crime Award hearing.

    Converters

    The case led by the Environment Agency was concluded at Lincoln Crown Court on Friday 16 May 2025.

    The ruling was made against Long Sutton-based Platinum Group Metals Recycling Ltd and director Edvars Stancik.

    Recorder John Hardy KC ruled that Stancik, 30, had made a benefit of £4,312,925.70 from his criminal activity while his company made a benefit of £4,344,827.60.

    The court heard assets of £495,280.88 were available from the company made up of cash in a bank account and seized catalytic converters.

    Stancik’s only asset was £30,934.16 from equity in a house he sold before his trial, the court was told.

    Recorder Hardy ordered those amounts to be confiscated and ruled that £100,111.65 should be paid to the Environment Agency to cover costs.

    At a previous hearing (4 September 2024), the company and Stancik were found guilty of running an illegal waste site at Long Sutton.

    The court heard that, between December 2019 and September 2021, Stancik, 30, acted as a director of the company and traded in catalytic convertors on a colossal scale. 

    A jury heard that neither Stancik nor his company had obtained an environmental permit before buying and selling thousands of catalytic converters.

    Stancik stored the devices in containers in Long Sutton and were stored in an irresponsible manner giving rise to health risks.

    A warrant for the arrest of Stancik, who is believed to be living in Lithuania, has been issued.  He has been given 3 months to pay or face 5 years in jail.

    The Environment Agency continues to investigate ways of retrieving further proceeds.

    Peter Stark, Environment Agency Enforcement Team Leader, said:

    “Waste criminals should be aware how seriously we take their offending, including the benefit they obtain from their illegal activities.

    “Offenders won’t get away with concealing information or their assets, and due to the EA’s hard work, justice has been served.

    “Waste crime can be a blight on the environment, communities and to legitimate businesses.

    “We will continue to work with professional partners like Lincolnshire Police in this case to prevent, disrupt, investigate, and stop waste offending.

    “If anyone suspects that a company or its directors are doing something wrong, contact our 24/7 hotline on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”

    The charges:

    Platinum Group Metals Recycling Ltd.

    • Operating a regulated facility, namely a waste operation, otherwise than in accordance with an environmental permit, contrary to Regulation 12(1)(a) and 38(1)(a) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at St Thomas Court, Long Sutton).

    • Operating a regulated facility, namely a waste operation, otherwise than in accordance with an environmental permit, contrary to Regulation 12(1)(a) and 38(1)(a) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at Lime Walk, Long Sutton)

    • Keeping controlled waste contrary to section 33(1)(c) and (6) of the Environmental Protection Act 1990.) (Relating to the site at St Thomas Court, Long Sutton)

    • Keeping controlled waste contrary to section 33(1)(c) and (6) of the Environmental Protection Act 1990. (Relating to the site at Lime Walk, Long Sutton)

    Edvars Stancik

    • Causing a company to operate a regulated facility otherwise in accordance with an environmental permit contrary to Regulation 12(1)(a) and 38(1)(a) by virtue of Regulation 41(1) and 41(3) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at St Thomas Court, Long Sutton)

    • Causing a company to operate a regulated facility otherwise in accordance with an environmental permit contrary to Regulation 12(1)(a) and 38(1)(a) by virtue of Regulation 41(1) and 41(3) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at Lime Walk, Long Sutton)

    • Causing a company to commit an offence, contrary to section 33(1)(c), 33(6) by virtue of s157(1) of the Environmental Protection Act 1990. (Relating to the site at St Thomas Court, Long Sutton)

    • Causing a company to commit an offence, contrary to section 33(1)(c), 33(6) by virtue of s157(1) of the Environmental Protection Act 1990. (Relating to the site at Lime Walk, Long Sutton)

    Background Information

    Catalytic converters are components in car exhausts.  They contain small amounts of precious metals contained within a metal case making them valuable.

    However, catalytic converters also contain carcinogenic fibres which, if ingested, can cause serious and irreversible lung disease. 

    The dangerous fibres can attach to shoes and clothing and be transported from one place to another.

     It is therefore extremely important that catalytic converters are handled only under the strict conditions of an environmental permit, supervised by the Environment Agency.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Europe: EUROPE/LATVIA – New Director of the Pontifical Mission Societies appointed

    Source: Agenzia Fides – MIL OSI

    Wednesday, 21 May 2025

    Vatican City (Agenzia Fides) – On April 10, 2025, Cardinal Luis Antonio G. Tagle, Pro-Prefect of the Dicastery for Evangelization (Section for First Evangelization and New Particular Churches), appointed, Rev. Jēkabs Rodions Doļa, of the Diocese of Rēzekne-Aglona, director of the Pontifical Mission Societies in Latvia.The new director is 36 years old and has been ordained a priest for 10 years. He obtained a Doctorate from the Pontifical Gregorian University in Rome. He is parish priest in two parishes in Ludza and Rudēni and Dean of the Deanery of Ludza. He is postulator of the cause of Beatification and Canonization of the diocesan priest Vladislavs Litaunieks.Finally he leads pilgrimages to Rome, the Holy Land and Turkey. (EG) (Agenzia Fides, 21/5/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI: Bitcoin Buys a View: Trump Tower Dubai Embraces Cryptocurrency Payments via Deus X Pay

    Source: GlobeNewswire (MIL-OSI)

    VILNIUS, Lithuania, May 21, 2025 (GLOBE NEWSWIRE) — Deus X Pay, a licensed institutional stablecoin payment solution setting new standards across the luxury sectors, is now enabling crypto payments for property purchases at the new Trump Tower Dubai, the first Trump International Hotel to be built in the Middle East.

    The new $1 billion Trump Tower Dubai, unveiled through partnership with London-listed Dar Global, marks a breakthrough in global luxury real estate. Eric Trump, Executive Vice President of the Trump Organisation and son of US President Donald Trump, has recently announced that Bitcoin and other digital currencies will be accepted for condo sales.

    Ziad El Chaar, CEO of Dar Global, said the Trump Tower Dubai is among the most ambitious Trump-branded residential towers globally, reflecting the project’s magnitude, stature, and symbolic significance in the region and internationally.

    Trump previously told Gulf Business that Dubai is where luxury real estate and financial innovation intersect, and projects like Trump Tower Dubai are leading the way. By embracing technologies like stablecoins, buyers gain a faster, cheaper and more transparent way to secure exclusive, high-end properties while reshaping how luxury transactions are conducted.

    Deus X Pay, a licensed Virtual Asset Service Provider (VASP) in Lithuania, offers institutional stablecoin payment solutions, enabling luxury sectors such as real estate, aviation and yachting to capitalise on this new era of finance. Deus X Pay CEO, Richard Crook, highlights that Dubai has created an environment where stablecoins can flourish as a practical, secure tool for international transactions (with Crypto Watch reporting that crypto adoption in the UAE is expected to surge 210% in 2025), giving premium buyers faster, frictionless access to high-value assets.

    “Dubai’s forward-thinking stance has unlocked a whole new economy, and the gold standard for transactions of high-value assets. International buyers seek faster settlements, fewer cross-border complications and seamless access to premium developments. This project is a defining moment — not just for Deus X Pay, but for the global real estate sector. We are thrilled to deliver the regulated rails that make it possible for premium property buyers to transact instantly, compliantly and without the traditional delays or friction.”

    The Trump Tower Dubai, an 80-story architectural icon, offers the highest international standards for ultra-high-net-worth travellers and long-stay residents. The exclusive building boasts 2-3 bedroom apartments and 4-bedroom penthouses valued at over AED 73 million, the highest outdoor swimming pool in the world, and has views of the world’s tallest building, the Burj Khalifa.

    This new skyscraper is part of an expanding trend across private aviation, superyachts, and luxury collectables as high-end sectors embrace digital assets as a payment option to future-proof legacy industries.

    For media enquiries, contact:
    Sarah Tran
    Head of Marketing
    media@deusxpay.com

    About Deus X Pay
    Deus X Pay is a regulated provider of institutional stablecoin payment solutions, revolutionising the authorisation, clearing, and settlement of cryptocurrency payments. We enhance global payment options for institutions, businesses, and corporations by seamlessly merging traditional finance with advanced digital payment infrastructure, enabling faster, more cost-effective, and secure transactions.

    Fully compliant and regulated as a Virtual Asset Service Provider, Deus X Pay operates under a license in Lithuania, supervised by the Financial Crime Investigation Service (FNTT), the Czech Republic, supervised by the Financial Analytical Office (FAU), and in Canada, supervised by the Financial Transactions and Reports Analysis Centre of Canada (FINTRAC).

    As a part of the innovative crypto investment firm Deus X Capital, we equip organisations with state-of-the-art financial tools aimed at fostering growth and success in today’s dynamic market.

    Disclaimer: This is a paid post and is provided by Deus X Pay. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/4da4d9a6-74af-4322-b030-f4ed0f09eb4f

    The MIL Network

  • MIL-OSI China: Taklimakan Rally kicks off in Aksu, Xinjiang

    Source: People’s Republic of China – State Council News

    The 2025 Taklimakan Rally roared to life on Tuesday in Aksu Prefecture, northwestern China’s Xinjiang Uygur Autonomous Region.

    This year’s Taklimakan Rally features 23 motorcycles and 105 vehicles, with racers set to tackle extreme heat and complex topography over approximately 5,200 kilometers, including 2,350 kilometers of timed special stages across deserts and Gobi plains, before concluding on June 1 in Makit County.

    Participants wait for setting off during the starting ceremony of the 2025 Taklimakan Rally in Aksu, northwest China’s Xinjiang Uygur Autonomous Region, May 20, 2025. (Xinhua/Hu Xingyu)

    The Taklimakan Rally, often dubbed “China’s Dakar,” is widely regarded as the country’s most challenging cross-country rally. Since its inaugural event in 2005, the race has continued to evolve. This year, it introduced a new energy vehicle category for the first time, with ten vehicles competing in the debut class.

    Defending champion Han Wei remains a favorite in the car category, while veterans such as Sun Ping and Fan Gaoxiang are also strong contenders for the title. Chinese film stars Wu Jing and Han Dongjun are expected to draw attention in their rally debuts.

    Among international competitors, female racer Aliyyah Koloc expressed excitement ahead of her first race in China.

    “I’m feeling very excited to compete in this rally,” said the 20-year-old. “It’s been very hot these days, and maybe it won’t cool down during the two weeks, but I think I’ve prepared physically and mentally.”

    The motorcycle category is expected to be fiercely competitive. Lithuania’s Arunas Gelazninkas and Czech rider Martin Michek, both seasoned Dakar veterans, are among the favorites representing the strong Red Camel Motorbike Team. Young Chinese rider Fang Xiangliang will also challenge his teammates for the title.

    MIL OSI China News