NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Canada

  • MIL-OSI: QXO Launches $11 Billion Tender Offer to Acquire Beacon Roofing Supply for $124.25 Per Share in Cash

    Source: GlobeNewswire (MIL-OSI)

    GREENWICH, Conn., Jan. 27, 2025 (GLOBE NEWSWIRE) — QXO, Inc. (NYSE: QXO) today announced that it is commencing an all-cash tender offer to acquire all outstanding shares of Beacon Roofing Supply, Inc. (Nasdaq: BECN) for $124.25 per share. This price implies a 37% premium above Beacon’s 90-day unaffected volume-weighted average price of $91.02 per share as of November 15, 2024. The total transaction enterprise value is approximately $11 billion.

    QXO intends to complete the acquisition quickly after the tender offer expires in 20 business days, subject to the terms of the offer. The proposed transaction is not subject to any contingencies related to financing or due diligence. QXO expects that the waiting periods under the Hart-Scott-Rodino Act and the Canadian Competition Act will have expired or been waived by the time the tender offer expires.

    Brad Jacobs, chairman and chief executive officer of QXO, said, “Our compelling offer would get cash into the hands of Beacon shareholders immediately at a significant premium to the unaffected share price. We believe that Beacon would be a strong fit for QXO and a key part of our plan to become a forward-looking leader in building products distribution.”

    In addition, QXO reiterates that it intends to pursue all options to complete a transaction, including nominating directors for election at Beacon’s Annual Meeting.

    Secured Financing in Place
    QXO has secured full financing commitments from Goldman Sachs, Morgan Stanley, Citi, Credit Agricole, Wells Fargo and Mizuho. The proceeds from the financing commitments, together with QXO’s cash on hand, will be sufficient to pay 100% of the purchase consideration, any required refinancing of Beacon’s debt, and associated transaction fees and expenses.

    Terms
    The offer and withdrawal rights are scheduled to expire at 12:00 midnight, New York City time, at the end of February 24, 2025, unless the offer is extended. The full terms, conditions and other details of the tender offer are set forth in the offering documents that QXO is filing today with the Securities and Exchange Commission (the “SEC”).

    Morgan Stanley & Co. LLC is acting as lead financial advisor to QXO, and Paul, Weiss, Rifkind, Wharton & Garrison LLP is acting as legal counsel.

    About QXO

    QXO provides technology solutions, primarily to clients in the manufacturing, distribution and service sectors. The company provides consulting and professional services, including specialized programming, training and technical support, and develops proprietary software. As a value-added reseller of business application software, QXO offers solutions for accounting, financial reporting, enterprise resource planning, warehouse management systems, customer relationship management, business intelligence and other applications. QXO plans to become a tech-forward leader in the $800 billion building products distribution industry. The company is targeting tens of billions of dollars of annual revenue in the next decade through accretive acquisitions and organic growth. Visit QXO.com for more information.

    Forward-Looking Statements

    This communication contains forward-looking statements. Statements that are not historical facts, including statements about beliefs, expectations, targets, goals, regulatory approval timing and nominating directors are forward-looking statements. These statements are based on plans, estimates, expectations and/or goals at the time the statements are made, and readers should not place undue reliance on them. In some cases, readers can identify forward-looking statements by the use of forward-looking terms such as “may,” “will,” “should,” “expect,” “opportunity,” “intend,” “plan,” “anticipate,” “believe,” “estimate,” “predict,” “potential,” “target,” “goal,” or “continue,” or the negative of these terms or other comparable terms. Forward-looking statements involve inherent risks and uncertainties and readers are cautioned that a number of important factors could cause actual results to differ materially from those contained in any such forward-looking statements. Such factors include but are not limited to: the ultimate outcome of any possible transaction between QXO and Beacon, including the possibility that the parties will not agree to pursue a business combination transaction or that the terms of any definitive agreement will be materially different from those proposed; uncertainties as to whether Beacon will cooperate with QXO regarding the proposed transaction; the ultimate result should QXO commence a proxy contest for election of directors to Beacon’s board of directors; QXO’s ability to consummate the proposed transaction with Beacon; the conditions to the completion of the proposed transaction, including the receipt of any required shareholder approvals and any required regulatory approvals; QXO’s ability to finance the proposed transaction; the substantial indebtedness QXO expects to incur in connection with the proposed transaction and the need to generate sufficient cash flows to service and repay such debt; the possibility that operating costs, customer loss and business disruption (including, without limitation, difficulties in maintaining relationships with employees, customers or suppliers) may be greater than expected following the proposed transaction or the public announcement of the proposed transaction; QXO’s ability to retain certain key employees; and general economic conditions that are less favorable than expected. QXO cautions that forward-looking statements should not be relied on as predictions of future events, and these statements are not guarantees of performance or results. Forward-looking statements herein speak only as of the date each statement is made. QXO does not assume any obligation to update any of these statements in light of new information or future events, except to the extent required by applicable law.

    Important Additional Information and Where to Find It

    This communication is for informational purposes only and does not constitute a recommendation, an offer to purchase or a solicitation of an offer to sell Beacon securities. QXO and Queen MergerCo, Inc. (the “Purchaser”) filed a Tender Offer Statement on Schedule TO with the SEC on January 27, 2025, and Beacon will file a Solicitation/Recommendation Statement on Schedule 14D-9 with respect to the tender offer with the SEC. Investors and security holders are urged to carefully read the Tender Offer Statement (including the Offer to Purchase, the related Letter of Transmittal and certain other tender offer documents, as each may be amended or supplemented from time to time), and the Solicitation/Recommendation Statement when available, as these materials contain important information that investors and security holders should consider before making any decision regarding tendering their common stock, including the terms and conditions of the tender offer. The Tender Offer Statement, Offer to Purchase, Solicitation/Recommendation Statement and related materials are filed with the SEC, and investors and security holders may obtain a free copy of these materials and other documents filed by QXO and Beacon with the SEC at the website maintained by the SEC at www.sec.gov. In addition, the Tender Offer Statement and other documents that QXO and the Purchaser file with the SEC will be made available to all investors and security holders of Beacon free of charge from the information agent for the tender offer: Innisfree M&A Incorporated, 501 Madison Avenue, 20th Floor, New York, NY 10022, toll-free telephone: +1 (888) 750-5834.

    QXO and the other participants intend to file a preliminary proxy statement and accompanying WHITE universal proxy card with the SEC to be used to solicit proxies for, among other matters, the election of its slate of director nominees at the 2025 annual meeting of stockholders of Beacon. QXO strongly advises all stockholders of Beacon to read the preliminary proxy statement, any amendments or supplements to such proxy statement, and other proxy materials filed by QXO with the SEC as they become available because they will contain important information. Such proxy materials will be available at no charge on the SEC’s website at www.sec.gov and at QXO’s website at investors.qxo.com. In addition, the participants in this proxy solicitation will provide copies of the proxy statement, and other relevant documents, without charge, when available, upon request. Requests for copies should be directed to the participants’ proxy solicitor.

    Certain Information Concerning the Participants

    The participants in the proxy solicitation are anticipated to be QXO, Brad Jacobs, Ihsan Essaid, Matt Fassler, Mark Manduca and individuals nominated by QXO (the “QXO Nominees”). QXO expects to determine and announce the QXO Nominees prior to the nomination deadline for the 2025 annual meeting of stockholders of Beacon. As of the date of this communication, other than 100 shares of common stock of Beacon beneficially owned by QXO, none of the participants that have been identified has any direct or indirect interest, by security holdings or otherwise, in Beacon.

    Media Contacts

    Joe Checkler
    joe.checkler@qxo.com
    203-609-9650

    Steve Lipin / Lauren Odell
    Gladstone Place Partners
    212-230-5930

    Investor Contacts ‍

    Mark Manduca
    mark.manduca@qxo.com
    203-321-3889

    Scott Winter / Jonathan Salzberger
    Innisfree M&A Incorporated
    212-750-5833

    The MIL Network –

    January 28, 2025
  • MIL-OSI Asia-Pac: HKSAR Government sternly refute the so-called report of US Congressional-Executive Commission on China

    Source: Hong Kong Government special administrative region

         The Government of the Hong Kong Special Administrative Region (HKSAR) today (December 21) strongly disapproved of and opposed the so-called “2024 Annual Report” issued by the United States (US) Congressional-Executive Commission on China (CECC), which made malicious smearing remarks against multiple areas in the HKSAR.     An HKSAR Government spokesperson said, “The HKSAR Government strongly disapproves and opposes the CECC’s repeated tactics to interfere in the affairs of the HKSAR through the so-called annual report, and make slandering remarks against Hong Kong, where ‘one country, two systems’ is successfully implemented. The US is once again making unfounded and fact-twisting remarks. Such attempt to undermine the prosperity and stability of Hong Kong and interfere in Hong Kong’s law-based governance is smack of despicable political manipulation with ill intentions.”     The spokesperson said, “The CECC openly clamour for so-called ‘sanctions’ with an aim to intimidate HKSAR officials who resolutely safeguard national security. The HKSAR Government strongly condemns its political grandstanding rife with ill intentions, which have been seen through by all. The HKSAR despises the so-called ‘sanctions’ and will not be intimidated by such a despicable behaviour. The HKSAR will resolutely continue to discharge the duty of safeguarding national security.”     The spokesperson reiterated, “The HKSAR Government steadfastly safeguards national sovereignty, security and development interests, and fully and faithfully lives up to the highest principle of ‘one country, two systems’. The HKSAR Government strongly demands the US to immediately stop acting against the international law and basic norms of international relations and interfering in China’s internal affairs and Hong Kong affairs.”     Regarding the slandering remarks against the HKSAR in the US’ so-called report, the Government sternly refuted them in the ensuing paragraphs.Safeguarding National Security           The HKSAR Government spokesperson said, “The HKSAR Government strongly opposes the absurd and untrue content regarding legislation safeguarding national security in the HKSAR contained in the US’ so-called report. In accordance with international law and international practice based on the Charter of the United Nations, safeguarding national security is an inherent right of all sovereign states. Many common law jurisdictions, including the US, the United Kingdom, Australia and Canada, have enacted multiple pieces of legislation and implemented measures to safeguard national security.”     The HKSAR Government spokesperson stressed that, “The so-called report by the US completely ignores the severe national security threats posed by the riots and the Hong Kong version of ‘color revolution’ in 2019, and neglected the fact that the implementation of the National Security Law has enabled the livelihood and economic activities of the Hong Kong community, and the business environment as well, to return to normalcy. This is a clear demonstration of hypocrisy with double standards. In fact, security and development work together like the two wings of a bird. Development requires a safe social environment. In March 2024, the HKSAR fulfilled the constitutional responsibility and historic mission of enacting local legislation for Article 23 of the Basic Law. The newly enacted Safeguarding National Security Ordinance (SNSO) achieves convergence, compatibility and complementarity with the Hong Kong National Security Law (HKNSL). Together they form a comprehensive legal system and enforcement mechanism for safeguarding national security. Now, Hong Kong can finally advance from stability to prosperity following the transition from chaos to order. The US must immediately recognise the fact that the Hong Kong National Security Law and other relevant legislation have restored normalcy to the lives and economic activities of Hong Kong residents and the business environment.     “As the HKSAR Government has emphasised time and again that the laws safeguarding national security in the HKSAR are precisely for safeguarding national sovereignty, unity and territorial integrity; and ensuring the full and faithful implementation of the principle of ‘one country, two systems’ under which the people of Hong Kong administer Hong Kong with a high degree of autonomy. It also better safeguards the fundamental rights and freedoms of the residents of the HKSAR and other people, including those doing business, in the city. The relevant laws have set out clear definitions and criminal elements which will not affect regular exchanges between Hong Kong residents and people here for business with foreign countries.     “Extraterritorial effect for the offences endangering national security under the HKNSL and the SNSO fully aligns with the principles of international law, international practice and common practice adopted in various countries and regions. It is both necessary and legitimate, and is also in line with those of other countries and regions around the world (including the US, the United Kingdom, Australia, Canada and member states of the European Union). The Police have the responsibility to pursue those who are suspected of committing offences endangering national security outside Hong Kong.     “Smearing remarks in the US’ so-called report pinpointing at custodial and rehabilitation work of the HKSAR was untrue, misleading, irresponsible and absurd. The HKSAR Government solemnly points out that the Correctional Services Department (CSD) is committed to ensuring that the custodial environment is secure, safe, humane, appropriate and healthy, and have put in place established mechanism to ensure the rights of persons-in-custody (PICs) are protected, including arrangement of regular inspection of independent visitors, namely Justices of the Peace. The CSD performs its duties in accordance with law and regulations in managing all PICs, regardless of their background.”Safeguarding Due Administration of Justice and Rule of Law          The spokesperson said, “That Hong Kong is a society underpinned by the rule of law and has always adhered to the principle that laws must be obeyed and lawbreakers held accountable is well recognised by international communities. The Basic Law clearly stipulates that the Judiciary shall exercise judicial power independently in accordance with the law, free from any interference. As guaranteed by the Basic Law and the Hong Kong Bill of Rights, everyone charged with a criminal offence has the right to a fair hearing. The Department of Justice of the HKSAR, by virtue of Article 63 of the Basic Law, shall control criminal prosecutions and make independent prosecutorial decisions based on an objective assessment of all admissible evidence and applicable laws. The courts decide cases strictly in accordance with the evidence and all applicable laws. Cases will never be handled any differently owing to the profession, political beliefs or background of the persons involved. The prosecution has the burden to prove beyond reasonable doubt the commission of an offence before a defendant may be convicted by the court.”Safeguarding Rights and Freedoms          The HKSAR Government spokesperson said, “The HKSAR Government steadfastly safeguards the rights and freedoms enjoyed by Hong Kong people as protected under the law. Since Hong Kong’s return to the motherland, human rights in the city have always been robustly guaranteed constitutionally by both the Constitution and the Basic Law. The HKNSL and the SNSO also clearly stipulate that human rights shall be respected and protected in safeguarding national security in the HKSAR, and that the rights and freedoms, including the freedoms of speech, of the press, of publication, of association, of assembly, of procession and of demonstration, that Hong Kong residents enjoy under the Basic Law and the provisions of the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights as applied to Hong Kong, shall be protected in accordance with the law. Nonetheless, just as the case with other places in the world, such rights and freedoms are not absolute. The ICCPR also expressly states that some of them may be subject to restrictions as prescribed by law that are necessary for protection of national security, public safety, public order or the rights and freedoms of others, etc.”

    MIL OSI Asia Pacific News –

    January 27, 2025
  • MIL-OSI Asia-Pac: Govt rebuts US report

    Source: Hong Kong Information Services

    The Hong Kong Special Administrative Region Government today strongly disapproved of and opposed the so-called “2024 Annual Report” issued by the US Congressional-Executive Commission on China (CECC), which made malicious smearing remarks against multiple areas in the Hong Kong SAR.

    In a statement, the Hong Kong SAR Government said it disapproves of the CECC’s repeated tactics to interfere in the affairs of Hong Kong through the so-called annual report, and for making slandering remarks against the city, where “one country, two systems” is successfully implemented.

    The US is once again making unfounded and fact-twisting remarks, the Hong Kong SAR Government specified, adding that such attempt to undermine the prosperity and stability of Hong Kong and interfere in its law-based governance is smack of despicable political manipulation with ill intentions.

    “The CECC openly clamours for so-called ‘sanctions’ with an aim to intimidate Hong Kong SAR officials who resolutely safeguard national security. The Hong Kong SAR Government strongly condemns its political grandstanding rife with ill intentions, which have been seen through by all.

    “The Hong Kong SAR despises the so-called ‘sanctions’ and will not be intimidated by such a despicable behaviour. It will resolutely continue to discharge the duty of safeguarding national security.

    “The Hong Kong SAR Government reiterates that it steadfastly safeguards national sovereignty, security and development interests, and fully and faithfully lives up to the highest principle of “one country, two systems”.

    It added that it strongly demands the US to immediately stop acting against the international law and basic norms of international relations and interfering in China’s internal affairs and Hong Kong affairs.

    The Hong Kong SAR Government sternly refuted the slandering remarks against the Hong Kong SAR in the US’ so-called report citing three aspects that include safeguarding national security, safeguarding the due administration of justice and rule of law, and safeguarding rights and freedoms.

    It stated that it strongly opposes the absurd and untrue content regarding legislation safeguarding national security in Hong Kong contained in the report.

    In accordance with international law and international practice based on the Charter of the United Nations, safeguarding national security is an inherent right of all sovereign states. Many common law jurisdictions, including the US, the UK, Australia and Canada, have enacted multiple pieces of legislation and implemented measures to safeguard national security.

    The US’ report completely ignored the severe national security threats posed by the riots and the Hong Kong version of “colour revolution” in 2019, and neglected that the implementation of the National Security Law has enabled the livelihood and economic activities of the community and the business environment to return to normalcy, the Hong Kong SAR Government pointed out.

    “This is a clear demonstration of hypocrisy with double standards. In fact, security and development work together like the two wings of a bird. Development requires a safe social environment.

    “The Hong Kong SAR has fulfilled the constitutional responsibility and historic mission of enacting local legislation for Article 23 of the Basic Law. The newly enacted Safeguarding National Security Ordinance (SNSO) achieves convergence, compatibility and complementarity with the Hong Kong National Security Law (HKNSL).”

    Together the SNSO and HKNSL form a comprehensive legal system and enforcement mechanism for safeguarding national security. Hong Kong can finally advance from stability to prosperity following the transition from chaos to order, the Hong Kong SAR Government said.

    It added that extraterritorial effect for the offences endangering national security under the HKNSL and the SNSO fully aligns with the principles of international law, international practice and common practice adopted in various countries and regions.

    “It is both necessary and legitimate, and is also in line with those of other countries and regions around the world including the US, the UK, Australia, Canada and member states of the EU. Police have the responsibility to pursue those who are suspected of committing offences endangering national security outside Hong Kong.”

    Smearing remarks in the US’ report pinpointing custodial and rehabilitation work of Hong Kong is untrue, misleading, irresponsible and absurd, the Hong Kong SAR Government emphasised, noting that the Correctional Services Department (CSD) is committed to ensuring the custodial environment is secure, safe, humane, appropriate and healthy, and has put in place an established mechanism to ensure the rights of persons-in-custody (PICs) are protected.

    Such rights include regular inspection of independent visitors, namely Justices of the Peace. The CSD performs its duties in accordance with the law and regulations in managing all PICs, regardless of their background, it added.

    As regard the administration of justice, Hong Kong is a society underpinned by the rule of law and has always adhered to the principle that laws must be obeyed and lawbreakers held accountable, which is well recognised by international communities, the Hong Kong SAR Government noted.

    Apart from stressing that the Basic Law clearly stipulates the Judiciary shall exercise judicial power independently in accordance with the law, free from any interference, it specified that everyone charged with a criminal offence has the right to a fair hearing as guaranteed by the Basic Law and the Hong Kong Bill of Rights.

    The Department of Justice, by virtue of Article 63 of the Basic Law, shall control criminal prosecutions and make independent prosecutorial decisions based on an objective assessment of all admissible evidence and applicable laws, the Hong Kong SAR Government said.

    The courts decide cases strictly in accordance with the evidence and all applicable laws. Cases will never be handled any differently owing to the profession, political beliefs or background of the persons involved, and the prosecution has the burden to prove beyond reasonable doubt the commission of an offence before a defendant may be convicted by the court, it explained.

    Regarding rights and freedoms, the Hong Kong SAR Government made it clear that it steadfastly safeguards the rights and freedoms enjoyed by its people as protected under the law, noting that human rights in Hong Kong have always been robustly guaranteed constitutionally by both the Constitution and the Basic Law since its return to the motherland.

    The HKNSL and the SNSO clearly stipulate that human rights shall be respected and protected in safeguarding national security in Hong Kong, and the rights and freedoms that Hong Kong residents enjoy under the Basic Law and the provisions of the International Covenant on Civil & Political Rights (ICCPR) and the International Covenant on Economic, Social & Cultural Rights as applied to Hong Kong, shall be protected in accordance with the law.

    The Hong Kong SAR Government indicated that such rights and freedoms include the freedoms of speech, of the press, of publication, of association, of assembly, of procession and of demonstration.

    As is the case with other places in the world, such rights and freedoms are not absolute. The ICCPR expressly states that some of them may be subject to restrictions as prescribed by law that are necessary for protection of national security, public safety, public order or the rights and freedoms of others, etc, the Hong Kong SAR Government added.

    MIL OSI Asia Pacific News –

    January 27, 2025
  • MIL-OSI Security: Enfield — RCMP investigates serious crash on Hwy. 102

    Source: Royal Canadian Mounted Police

    RCMP Halifax Regional Detachment is investigating a serious single-vehicle crash that occurred in Enfield.

    Yesterday, at approximately 11:20 a.m., RCMP Halifax Regional Detachment, fire services, and EHS, responded to a report of a single-vehicle crash on Hwy. 102 between exit 6 and 7. RCMP officers learned that a Toyota Rav4 was travelling north when it left the roadway and came to rest in the ditch.

    The driver and lone occupant, a 20-year-old Halifax man, suffered life-threatening injuries. He was transported to hospital by LifeFlight.

    An RCMP collision reconstructionist attended the scene and the investigation is ongoing.

    The highway was closed several hours but has since reopened.

    File #: 24-173076

    MIL Security OSI –

    January 27, 2025
  • MIL-OSI Canada: Prime Minister announces new Chief Government Whip

    Source: Government of Canada – Prime Minister

    The Prime Minister, Justin Trudeau, today announced that the Honourable Mona Fortier, Member of Parliament for Ottawa—Vanier, will serve as Chief Government Whip.

    Mona Fortier previously served as Deputy Government Whip. First elected in 2017, and re-elected twice, she has held various Cabinet positions, including President of the Treasury Board and Minister of Middle Class Prosperity and Associate Minister of Finance. Before entering politics, she worked as Chief Director of Communications and Market Development at Collège La Cité and managed her own strategic communications-consulting firm. Her community involvement has earned her various recognitions, including a Queen Elizabeth II Diamond Jubilee Medal.

    As Chief Government Whip, Ms. Fortier will work as part of a diverse team to deliver real, positive change for Canadians, including making life more affordable, growing the economy, and creating good middle-class jobs.

    Quote

    “Mona Fortier is an experienced leader with a keen understanding of the issues that matter most to Canadians and the values that guide our work in their service. I know she will continue to be a great asset in this new role, as we work together to build a better Canada for everyone.”

    Quick Fact

    • Each recognized party in the Parliament of Canada has a whip. Among other duties, the whips ensure that enough Members are in the chamber for debates and votes, determine which committees Members will sit on, and assign offices and seats in the House of Commons. Whips also work with Members to ensure the smooth functioning of Parliament, Members’ offices, and service to constituents.

    MIL OSI Canada News –

    January 27, 2025
  • MIL-OSI China: Death anniv of Canadian surgeon Norman Bethune commemorated in China

    Source: China State Council Information Office 2

    A commemoration event was held in north China’s Hebei Province on Saturday to honor Canadian surgeon Norman Bethune for his selflessness and spirit of internationalism.
    Titled “Memories Through Time and Space,” the event was hosted by the North China Military Martyrs Cemetery in the provincial capital Shijiazhuang.
    Around 100 people, including soldiers, students and individuals from various walks of life, attended the event.
    This year marks the 85th death anniversary of Bethune, who died of blood poisoning at the age of 49 on Nov. 12, 1939 in China while aiding the Chinese people in their fight against Japanese aggression. His remains were relocated to the cemetery in 1953.
    The commemoration began at 10 a.m., with participants bowing before the surgeon’s tomb and presenting flower baskets.
    “My father met Norman Bethune in Spain during his recovery from battle injuries. Influenced by him, my father aspired to come to China, where he met my mother and later had me,” said Michael Crook, chairman of the International Committee for the Promotion of Chinese Industrial Cooperatives.
    His parents, David and Isabel Crook, played an important role in training a large number of foreign-language professionals for China.
    “The spirit of Bethune has not faded with time; instead, it has been widely inherited and carried forward in both China and Canada,” said Hu Jinqiang, director of the North China Military Martyrs Cemetery.
    Hu noted that today Bethune is not just a name but a symbol of internationalism, humanism and selfless dedication. “We commemorate him to inspire more people to remember history and carry forward his spirit.”

    MIL OSI China News –

    January 27, 2025
  • MIL-OSI Global: Women having surgery to treat pelvic organ prolapse don’t always need a hysterectomy

    Source: The Conversation – Canada – By Erin A. Brennand, Gynecologist & Associate Professor, Cumming School of Medicine, University of Calgary

    For decades, the standard surgical approach for treating pelvic organ prolapse has generally included a hysterectomy, or removal of the uterus. (Shutterstock)

    Pelvic organ prolapse (POP) affects up to half of all women during their lifetime, and one in eight will have surgery to treat it by the age of 85. Yet, despite how common POP is, the public’s awareness and understanding of this condition remains limited.

    Most people are unfamiliar with POP until they are personally affected, and even then, are often unaware of the different surgical options available to manage it. Our team of medical professionals and health researchers aims to change this.

    POP occurs when pelvic organs, like the uterus, vagina, bladder or bowel, shift downward and sag into, or even through, the vaginal canal. This condition can lead to a range of physical symptoms, with pelvic pressure, urinary incontinence and a vaginal bulge being some of the most common complaints.

    POP can be physically uncomfortable and disruptive to a woman’s quality of life, and the emotional and social impact can be profound. Many affected women report lowered self-esteem, avoidance of intimacy, and heightened anxiety or depression due to the persistent, painful and often stigmatized nature of the condition.

    Hysterectomy is the default

    For decades, the standard surgical approach for treating POP has generally included a hysterectomy, or removal of the uterus. In many cases, the uterus itself is not part of the prolapse, but removing it allows surgeons to access pelvic ligaments and tissues for securing the vaginal walls. Almost one in three Canadian women aged 60 and older have had their uterus removed to treat a number of gynecologic conditions, including POP.

    POP can be physically uncomfortable and disruptive to a woman’s quality of life, and the emotional and social impact can be profound.
    (Shutterstock)

    This surgery is deeply embedded in medical practice with the long-standing belief that removing the uterus is necessary to achieve durable repair of POP, and that the surgery has minimal impact on women’s overall health.

    Newer evidence, including recent systematic reviews, questions whether hysterectomy is the only effective approach for treating POP in women. Studies have shown that uterine-preserving procedures carry lower surgical risks compared to hysterectomy surgeries, while providing similar effectiveness in reducing prolapse symptoms.

    Adding to this body of evidence, our team of urogynecologists and health researchers developed the Hysterectomy vs. Uterine Preserving Prolapse Surgery (HUPPS) study to generate real-world evidence about outcomes after POP surgery.

    Over three years, we enrolled 321 women with POP affecting the top of their vagina who lived in Calgary and surrounding areas of Alberta. Importantly, each woman was free to consider minimally invasive hysterectomy or uterine-preserving POP surgery, based on their own values, preferences and consideration of the evidence. Almost half (47 per cent) chose the uterine-preserving route, which demonstrated substantial interest among Canadian women to keep their uterus when given the option.

    However, in many hospitals in Canada, hysterectomy remains the primary approach for surgical treatment of POP, partly due to historical and educational clinical practices.

    Surgical outcomes

    At one year post-surgery, we found that 17.2 per cent of women who received a hysterectomy surgery experienced recurrence of POP, compared to only 7.5 per cent of women who received a uterine-preserving (UP) surgery. We then statistically accounted for patient differences such as age, body weight and the initial severity of their POP, and found that women who had uterine-preserving surgery indeed experienced approximately half the risk of POP recurrence than the women who had a hysterectomy.

    Our data also showed other benefits of uterine-preserving surgery, including shorter operating time, shorter hospital stay, less post-operative opioid pain relief and fewer complications overall.

    Why preserve the uterus?

    Some women want to avoid hysterectomy due to personal or cultural beliefs about removing their uterus, while others are concerned about the potential long-term effects on their health.
    (Shutterstock)

    Emerging research suggests there can be long-term effects of hysterectomy. For example, hysterectomy may be associated with elevated risk of chronic health issues such as cardiovascular disease and neurological disorders. These risks are higher for people who undergo hysterectomy at younger ages.

    However, there can be instances where patients may want to consider hysterectomy as part of their POP repair. These include a history of repeated abnormal pap smears signalling a higher risk of developing cervical cancer in the future, or in cases where it is strongly recommended to them by a surgeon, such as when precancerous cells have been determined by a biopsy of the uterus.

    For people without these conditions, there is no medical need to remove the uterus.

    However, the historical hysterectomy-based approach to POP assumes that all women want the same approach to their POP treatment. However, during the past five years, our team has noticed growing inquiries from patients around keeping their uterus, and questions about the risks and benefits of a hysterectomy.

    Some women want to avoid hysterectomy due to personal or cultural beliefs about removing their uterus, while others are concerned about the potential long-term effects on their health. The International Urogynecological Association has a helpful pamphlet with more information on this topic.

    The importance of patient-centred care

    Our research findings, combined with growing evidence on surgical treatment of POP, encourage an essential shift in the field of gynecological surgery towards an approach that offers all women a greater sense of autonomy.

    The HUPPS study demonstrates that when people are presented with evidence-based information on the risks and benefits, they can choose the option that aligns with their personal values and long-term health goals and still achieve a good surgical outcome.

    For women in Canada who are affected by POP, this means ensuring that two options are offered and accessible to them: both hysterectomy and uterine-preserving surgeries. If we can achieve a permanent shift in the medical landscape towards more informed, personalized and patient-centred care, it will change women’s lives for the better.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    – ref. Women having surgery to treat pelvic organ prolapse don’t always need a hysterectomy – https://theconversation.com/women-having-surgery-to-treat-pelvic-organ-prolapse-dont-always-need-a-hysterectomy-241755

    MIL OSI – Global Reports –

    January 27, 2025
  • MIL-OSI Global: The year ahead in the Middle East: A weakened Iran has big implications for China

    Source: The Conversation – Canada – By Daniel Lincoln, Policy Research Analyst, Geopolitics, The China Institute, University of Alberta

    Iran’s diminished status in the Middle East means China will likely be compelled to develop stronger ties with other nations in the region, including Saudi Arabia. (Shutterstock)

    The wheels of history have been turning rapidly in the Middle East over the last year.

    For a significant period of time, Iran’s status as a rising power within the region has been regarded as a consistent reality in assessing Middle Eastern geopolitics. But events since the Oct. 7, 2023 attack by Hamas on Israel have seen Iran’s position in the region erode substantially. The balance of power in the Middle East has consequently been irreversibly altered.

    A key pillar supporting Iran’s previously powerful status in the Middle East has been its cultivation of the “Axis of Resistance,” a group of Iranian allies across the region that acted together against Israeli and American interests.

    The members of the axis, in addition to Iran itself, include Hamas, Hezbollah, Iraqi Shiite militias, the Houthis and Bashar al-Assad’s regime in Syria.




    Read more:
    Assad’s fall in Syria will further weaken Hezbollah and curtails Tehran’s ‘Iranization’ of region


    Axis decimation

    Israel’s relentless war in retaliation for the Oct. 7 attack has seen several of the most important members of the axis severely diminished, if not entirely decimated.

    Both Hezbollah and Hamas have been humiliated through the destruction of their respective leaderships, and their operational capacities have been reduced significantly.

    The largest blow to Iran’s proxy network was arguably the recent ousting of Syria’s Assad, ending a decades-long regime that was regarded by top Iranian strategists as Iran’s most important regional ally.

    The adverse consequences of these developments for Iran’s grand strategy raises questions of how a significantly weakened Iran will affect the world at large, especially in terms of its impact on great power politics in the Middle East.

    This undoubtedly represents a welcome development in the United States given the long-standing animosity towards post-1979 Iran among the American foreign policy establishment. But China is likely to have a more nuanced outlook predicated upon its commitment to pragmatic foreign policy maneuvering in accomplishing its top global objectives.

    China’s engagement with Iran

    As China has grown richer and more powerful in recent decades, it’s turned its attention to increasing its diplomatic clout and economic presence throughout the world. Every region of the planet has been affected by this development, but the Middle East achieved a spot of particular importance for China.

    The Chinese government’s motivation to deeply engage in the Middle East has been — and continues to be — driven by several key considerations: the Middle East’s status as a powerhouse of oil production, its strategic geographic location bridging east and west, and its status as a long-standing pillar of American foreign policy.

    China has fostered bilateral partnerships across the entire Middle East, but one of its longest regional relationships has been with Iran. In Iran, Chinese authorities saw a country that provided it with an opportunity to help it achieve China’s main objectives in the region.

    Post-1979, Iran was inherently anti-American, which meant that China was more likely to be warmly received by Tehran, especially when compared to other regional powers like Saudi Arabia that had relatively warm relations with the U.S.

    Perhaps most importantly, Iran could be depended on — to an extent — to stymie American interests in the Middle East given its status as a rising regional power.

    This is not to say that Iran became a Chinese client state, but rather that China could provide diplomatic and economic support to Iran as the Iranians used their power to act disruptively in a region of great strategic importance to the U.S.

    China’s future moves

    Given the motivations underlying deep Chinese-Iranian ties historically, it’s clear that the evaporation of Iran’s clout will likely greatly alter the character of their relationship moving forward.

    In a nutshell, a significant portion of Iran’s appeal to Chinese policymakers has disappeared with the near annihilation of its regional network. This will likely encourage China to seek deeper ties with other Middle Eastern heavyweights, like Saudi Arabia and the United Arab Emirates, in accomplishing its goals in the Middle East — chief among them, increasing its regional influence at the expense of the U.S.

    But it’s also unlikely China will entirely abandon Iran. While it may focus its most concerted efforts on developing deeper ties with other Middle Eastern countries instead of Iran, China would likely be hesitant to see Iran become even further isolated and therefore more predisposed to behaving aggressively.

    China was one of the main behind-the-scenes mediators of the 2015 Iran nuclear deal because it wanted regional tensions to dissipate via Iran’s abandonment of its nuclear program.

    Now that Iran is weakened, it has essentially been boxed into a corner, and has two main options moving forward: either it achieves a rapprochement with the West, or it reinvigorates its nuclear program and acts more aggressively.

    While Iran’s ultra-conservative factions that control the levers of power in the country may be tempted to take a more aggressive path, it is very possible China will attempt to use its substantial economic leverage over Iran to encourage them to pursue the rapprochement option.

    That’s because the Chinese need the Middle East as a source of petroleum to fuel their economy, and because China doesn’t want to be viewed by the West as an implicit accomplice to a bellicose and destabilizing Iran.

    China a moderating influence?

    On the contrary, China is currently attempting to repair relations with many western countries given the importance of the West’s markets to China’s ailing economy.

    In fact, China may wish to play a role in inducing Iran to strike a deal with the West in the near future, given that it would show the incoming Donald Trump administration — which is notoriously hawkish on China — that it can be trusted and worked with constructively.

    At the end of the day, China will seek the path that minimizes the likelihood of full-blown conflict in the Middle East given the importance of the region to the Chinese economy. The country has a strategic opportunity to signal trustworthiness and dependability to the West by working to prevent Iran from choosing a more aggressive path.

    Daniel Lincoln does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. The year ahead in the Middle East: A weakened Iran has big implications for China – https://theconversation.com/the-year-ahead-in-the-middle-east-a-weakened-iran-has-big-implications-for-china-245649

    MIL OSI – Global Reports –

    January 27, 2025
  • MIL-OSI Global: Businesses must stop caving to political pressure and abandoning their EDI commitments

    Source: The Conversation – Canada – By Simon Blanchette, Lecturer, Desautels Faculty of Management, McGill University

    EDI is good for business and good business: it is both the ethical choice and the smart business decision.
    (Shutterstock)

    Over the past year, several major corporations have scaled back their equity, diversity and inclusion (EDI) initiatives amid shifting political pressures. Walmart is one of the latest major corporations to reduce its EDI programs following conservative backlash and U.S. President-elect Donald Trump’s re-election.

    Ford Motor Company, Lowe’s and Nissan have all announced plans to change their diversity, equity and inclusion (DEI) policies. In the entertainment sector, Hollywood’s commitment to EDI has waned, with several studios and networks reducing or eliminating diversity programs.

    This growing trend reflects a broader corporate retreat from EDI commitments, as businesses navigate the complexities of the current political landscape. So far, many have chosen to respond by negating their commitment to inclusion and diversity.

    Given the close economic and cultural ties between the United States and Canada, this troubling shift could spill over into Canada. It would undermine years of progress towards achieving genuine workplace equity. Ultimately, no one will benefit in the long run — not even the people opposed to it — as they will miss out on the benefits of a more inclusive and diverse workforce.

    Walmart: From EDI commitment to rollback

    As the largest private employer in the world with over two million employees, Walmart has long been at the centre of debates about labour practices, workplace diversity and corporate responsibility.

    For years, the company championed EDI principles. In 2019, Walmart made a public commitment to boost diversity, pledging to increase the percentage of women and racialized people in managerial roles.

    Walmart also introduced initiatives to support underrepresented groups in the workforce, including diversity and inclusion training, the Women’s Resource Community, the OneTen Coalition program and partnerships to recruit people with disabilities.




    Read more:
    Employers miss out on talent by overlooking workers living with disabilities


    Walmart also tracked workforce representation by gender and ethnicity. Its 2023 report revealed that 20 per cent of promotions from hourly to management position were Black and racialized women. Over 86,000 employees completed race and inclusion training, and nearly 800 participated in Walmart’s Culture, Diversity, Equity and Inclusion Institute.

    However, amid a political climate marked by renewed attacks on corporate diversity initiatives and so-called “wokeness,” Walmart started rolling back its EDI policies and diversity training programs.

    For instance, the company has decided not to extend its racial equity centre, a five-year initiative that was launched in 2020. Additionally, it will discontinue the use of terms such as “LatinX” and “DEI” in official communications, opting instead to use the word “belonging.” But who truly belongs if, at the same time, they are cancelling EDI initiatives?

    Understand what EDI means

    This rollback of EDI initiatives reflects a growing trend within big business to selectively adopt social justice agendas when they are advantageous, then scale them back when the political climate changes. This “diversitywashing” mirrors greenwashing where companies claim to support social or environmental causes but retreat when faced with political or public pressure.

    At its core, EDI is about ensuring that all employees, customers and stakeholders have equitable access to work opportunities, regardless of race, gender, sexual orientation, disability or socio-economic background.

    EDI policies and practices are essential for supporting equity-deserving groups — such as women, Black and racialized people, Indigenous Peoples, people with disabilities and 2SLGBTQ+ communities — who have historically faced systemic barriers to opportunity.

    Arguing for a meritocracy without first establishing equity is like trying to lift a sloped playing field instead of leveling it, while ignoring that one side is a mountain and the other is a canyon. It leaves existing barriers and inequities intact on the road to merit, telling people that hard work alone will lead to rewards, while ignoring that they need to work that much harder to achieve the same.

    The idea that we must create an even playing field first should not be controversial, and yet it is.

    The fear that EDI programs compromise competency is both common and unfounded; embracing diversity is about dismantling barriers that have unfairly limited opportunities for talented individuals, not lowering standards.

    EDI is about ensuring that all employees, customers and stakeholders have equitable access to work opportunities.
    (Shutterstock)

    Why corporations must commit to EDI

    EDI initiatives should never be reduced to political tools or marketing gimmicks. The true purpose of these policies is to foster an environment where people of all backgrounds can thrive.

    Organizations greatly benefit from the creativity, problem-solving and innovation that come with diversity.

    When corporations roll back these initiatives in response to political pressures, it signals to the world their commitment to EDI was merely a strategic move to improve their brand image during a period when social justice was a trending topic.

    This can damage a corporation’s reputation in the eyes of both employees and consumers, particularly those from equity-deserving groups who expect representation, as well as those who value diversity and inclusivity.




    Read more:
    How equity, diversity and inclusion policies are becoming a tool for capitalism


    It is essential for large corporations to recognize that adopting EDI policies is not just a moral imperative, but also a sound business strategy. The data is clear: diverse companies perform better, including from a profitability standpoint.

    Diversity related advantages create a competitive edge that drives growth. A McKinsey report revealed that companies with more diverse executive teams were 36 per cent more likely to have above-average profitability. Giving that up is simply bad business.

    As both a scholar and a practising strategy and organizational change consultant, I have never encountered a well-designed and effectively implemented EDI program that did not yield positive results for the organization.

    EDI is good for business and good business: it is both the ethical choice and the smart business decision.

    Walking the talk

    The way forward is clear: corporations, especially large ones, must make a genuine commitment to EDI — not just because it is the morally right thing to do, but because it is the key to long-term business success. Diversity fosters innovation, and innovation drives profitability.

    However, for employees of diverse backgrounds to truly thrive in their workplaces, organizations must go beyond surface-level representation and tokenism. They must build inclusive workplaces where diversity is genuinely respected, supported and embraced unconditionally and independent of political trends.

    By doing so, companies will not only contribute to a more equitable society, but also position themselves for success in an increasingly diverse global marketplace. Achieving this requires leaders who are courageous and prioritize long-term strategic goals over short-term political gains.

    Leading through fear is not leadership; it reflects a failure in strategic foresight. Talent is the defining competitive advantage of this century, and business leaders cannot afford to waste it.

    Simon Blanchette does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Businesses must stop caving to political pressure and abandoning their EDI commitments – https://theconversation.com/businesses-must-stop-caving-to-political-pressure-and-abandoning-their-edi-commitments-245450

    MIL OSI – Global Reports –

    January 27, 2025
  • MIL-OSI Global: Australia is banning social media for teens. Should Canada do the same?

    Source: The Conversation – Canada – By Christopher Dietzel, Postdoctoral fellow, the DIGS Lab, Concordia University

    Australia is the first country to implement a nationwide ban of social media for teens, but other measures have been enacted or are being considered here in Canada. (Shutterstock)

    The Australian government recently passed legislation that bans social media for anyone under 16. Prime Minister Anthony Albanese hailed the legislation for putting “the onus on social media platforms — not young people or their parents” — for protecting youth from online harms.

    Australia is the first country in the world to pass a nationwide ban of social media for teens, set to take effect in a year. But other measures have been enacted or considered here in Canada and elsewhere.

    In the United States, it will be illegal for children under 14 in Florida to have social media accounts starting Jan. 1, 2025.

    Beginning in 2024, Québec began banning cellphones in classrooms. This fall, with the start of the 2024–2025 academic year, Ontario also began banning cell phones in schools. This follows a lawsuit filed by four school boards in Ontario against social media companies for disrupting youth learning.

    Québec is reportedly considering a social media ban — following Australia’s lead — that would limit social media use for teens under 16. Provincial governments recognize that social media and cellphones can be problematic for youth, and they’re not waiting on the federal government to take action.

    Prime Minister Justin Trudeau recently announced that the proposed Online Harms Act (Bill C-63), originally introduced in February 2024, will be separated into two bills. The idea is to pass the part of the bill focused on child protection to address problems like sextortion, image-based sexual abuse, revenge porn and other forms of online sexual violence.

    Since the Online Harms Act is still being debated, MPs in Canada may look to other countries, like Australia, for guidance on protecting youth from these online harms.

    A CBC news report on Australia’s social media ban and the potential for a similar ban in Canada.

    Youth and online harms

    Some people in Canada approve of Australia’s social media ban and see it as a potential solution, including some teens. This idea has received a lot of traction in public discourse too, including with the book The Anxious Generation that argues social media should be banned until age 16.

    Many of us may recall the stories of Rehtaeh Parsons, Amanda Todd and more recently a boy in British Columbia who died by suicide after being cyberbullied and sextorted.

    Some studies have shown that social media use is related to anxiety and depression among adolescents. Bans or regulations raise important questions about how we, as a society, should respond to social media use among youth and deal with online harms.

    Challenges with bans

    We are a team of researchers who study technology-facilitated sexual violence among youth aged 13–18 in Canada. We have conducted 26 focus groups with 149 youth from across the country, and launched a nationally representative survey of around 1,000 youth to learn about their experiences with online harms, what they know about the law and which resources work — and which ones don’t.

    Our initial findings show that youth experience a range of harms as they use digital platforms and social media. We also found that algorithms are fueling harms. Youth have emphasized they want tailored supports and resources to help them have safe, healthy and enjoyable experiences with technology.

    A full ban of social media is not realistic, in part because social media companies have no idea how to implement it. Some ideas are to use facial recognition technology or check someone’s age using credit cards. Another idea is to upload government IDs to third-party platforms for age verification.

    However a ban is implemented, it will almost certainly gather more user data, which raises questions about youth data privacy and security. These measures may also drive youth towards other platforms that are less regulated, such as on the dark web. This could actually make it harder to protect youth from online harms.

    Bans also don’t actually solve the problem. For example, abstinence-based interventions don’t work when it comes to sex education. It is unlikely that an abstinence-based approach would work with social media.

    Technology is increasingly integrated into our daily lives, and youth need to learn how to have healthy and responsible online interactions.
    (Shutterstock)

    Furthermore, technology is increasingly integrated into our daily lives, and youth need to be taught about healthy and responsible online interactions.

    Youth are learning how to become digital citizens. Kicking the problem down the road until they’re 16 or older will postpone the consequences, not solve them. This could cause more harm than a ban intends to solve.

    A ban also frees social media companies, governments and parents from any accountability. Rather than meaningfully addressing the harmful content and their impacts, a ban removes any and all responsibility from the people and institutions whose job it is to protect youth.

    Holistic interventions

    Technology companies need to develop their products with kids in mind, rather than prioritizing their profits and putting child safety and health second. Kids need guidance and support, and a ban does nothing to remove harmful content or resolve its negative impacts.

    Rather than bans, we suggest implementing holistic interventions that emphasize digital citizenship and youth rights and responsibilities so people of all ages learn how to have safe and healthy interactions with technology. This requires a consolidated effort across various sectors of society, including schools, community organizations and, importantly, both tech companies and government agencies.

    While there are resources available for educators, parents and youth about how to have safe and healthy online interactions, we need to act now.

    Rather than resorting to blanket bans, we should prioritize comprehensive societal changes that address the root causes of these harms. By doing so, we can promote youth safety and help our communities confront online harms.

    Christopher Dietzel receives funding from Le Fonds de recherche du Québec – Société et culture (FRQSC).

    Kaitlynn Mendes receives funding from SSHRC and the Canada Research Chairs Program.

    – ref. Australia is banning social media for teens. Should Canada do the same? – https://theconversation.com/australia-is-banning-social-media-for-teens-should-canada-do-the-same-245932

    MIL OSI – Global Reports –

    January 27, 2025
  • MIL-OSI Security: Whitehorse — Ongoing police incident occurring in the Porter Creek subdivision area

    Source: Royal Canadian Mounted Police

    Please be advised there is an ongoing incident occurring in the Porter Creek subdivision area. Police are asking that Tamarack Street residents to stay inside and shelter in place. Do not travel in the area of Hickory and Tamarack Streets. Updates will be provided as available.

    MIL Security OSI –

    January 27, 2025
  • MIL-OSI Security: Lower Post, B.C. — Watson Lake RCMP and BC Coroners Service investigating a death

    Source: Royal Canadian Mounted Police

    The Watson Lake RCMP is investigating the death of a man in Lower Post, British Columbia.

    On October 28, 2024, at approximately 10:30 am Watson lake RCMP were notified that a body had been located on the bank of the Liard River in Lower Post. Initial investigation suggests the man may have been there for some time.

    RCMP are working with the BC Coroners Service to determine the identity of the deceased.

    Police ask that if anyone has information in the community, to please contact Watson Lake RCMP Detachment at 867-536-5555.

    Any media questions regarding the investigation can be directed to the BC Coroners Service.

    MIL Security OSI –

    January 27, 2025
  • MIL-OSI China: China issues decision on countermeasures on Canadian institutions, personnel

    Source: China State Council Information Office

    Chinese Foreign Ministry has issued a decision to take countermeasures against certain Canadian institutions and personnel.

    The decision was issued on Dec. 21, 2024 as a decree of the Ministry of Foreign Affairs of the People’s Republic of China No. 15, effective as of the same date.

    In accordance with Articles 3, 4, 5, 6, 9 and 15 of the Law of the People’s Republic of China on Countering Foreign Sanctions, China has decided to take countermeasures against certain Canadian institutions and personnel, according to the decree.

    The movable and immovable properties, and other kinds of assets within China, belonging to the “Uyghur Rights Advocacy Project” and “Canada-Tibet Committee” are to be frozen, and all organizations and individuals within China will be prohibited from engaging in transactions, cooperation and other activities with them.

    In addition, relevant personnel of the “Uyghur Rights Advocacy Project” and “Canada-Tibet Committee” will have their movable and immovable properties, and other kinds of assets within China, frozen. All organizations and individuals within China shall be prohibited from engaging in transaction, cooperation and other activities with them. They shall be denied visas or entry into China (including Hong Kong and Macao).

    MIL OSI China News –

    January 27, 2025
  • MIL-OSI Canada: Government of Yukon secures increase to its borrowing limit

    Source: Government of Canada regional news

    The Government of Canada has agreed to increase the Government of Yukon’s borrowing limit from $800 million to $1.2 billion, providing the territory with greater financial flexibility and long-term financial sustainability.

    The Yukon is a growing and dynamic territory, with an increasing population, expanding communities and increasing demands for essential services. The Government of Yukon needs the flexibility provided by borrowing to support the sustainable development and growth that Yukoners require.

    To date, the government has operated under a strong financial plan that did not require significant borrowing. Recent unforeseen challenges – such as urgent environmental responses, pressures on the health care system and the continued need to address issues related to climate change – have highlighted the value of increased flexibility to manage cashflows throughout the year and of using tools beyond the government’s line of credit.

    Borrowing remains one of the tools available to the government to help meet immediate financial obligations while having the flexibility to continue to invest in essential infrastructure and services that benefit the entire Yukon and address critical responses that are becoming more common.

    The Yukon remains in a strong financial position, having recently reaffirmed its “AA Stable” credit rating from S&P Global Ratings and maintaining a low net debt-to-GDP ratio, which is among the lowest in Canada.
     

    MIL OSI Canada News –

    January 27, 2025
  • MIL-OSI: Falcon Oil & Gas Ltd. – Drilling completed on the second well in the Shenandoah South Pilot Project, Shenandoah S2-4H

    Source: GlobeNewswire (MIL-OSI)

    Falcon Oil & Gas Ltd.
    (“Falcon” or “Company”)

    Drilling completed on the second well in the Shenandoah South Pilot Project, Shenandoah S2-4H

    23 December 2024 – Falcon Oil & Gas Ltd. (TSXV: FO, AIM: FOG) is pleased to announce that the Shenandoah S2-4H (“SS4H”) horizontal well was successfully drilled, cased and cemented to a measured depth of 6,452 metres (21,169 feet) in exploration permit 98 in the Beetaloo Sub-basin, Northern Territory, Australia with Falcon Oil & Gas Australia Limited’s (“Falcon Australia”) joint venture partner, Tamboran (B2) Pty Limited (“Tamboran B2”).

    Data from the SS4H well has indicated strong gas shows and a continuation of the high-quality shale and rock properties observed in the Shenandoah South 1H and Shenandoah South 2H (“SS2H ST1”) locations with no faulting observed along the entire 3,048-metre (10,000 foot) lateral section.

    The Liberty Energy (NYSE: LBRT) stimulation equipment and sand has been mobilized to location ahead of the stimulation campaign, which is planned to commence in early 1Q 2025, with IP30 flow test from both SS2H ST1 and SS4H expected to be released in 1Q 2025.

    Philip O’Quigley, CEO of Falcon commented:
    “The completion of the SS4H well is another milestone in the development of the Beetaloo Sub-basin and we will look forward to the upcoming stimulation campaign and updating the market as operations progress.”

                                                    Ends.

    CONTACT DETAILS:

    Falcon Oil & Gas Ltd.          +353 1 676 8702
    Philip O’Quigley, CEO +353 87 814 7042
    Anne Flynn, CFO +353 1 676 9162
     
    Cavendish Capital Markets Limited (NOMAD & Broker)
    Neil McDonald / Adam Rae +44 131 220 9771
       

    This announcement has been reviewed by Dr. Gábor Bada, Falcon Oil & Gas Ltd’s Technical Advisor. Dr. Bada obtained his geology degree at the Eötvös L. University in Budapest, Hungary and his PhD at the Vrije Universiteit Amsterdam, the Netherlands. He is a member of AAPG.

    About Falcon Oil & Gas Ltd.

    Falcon Oil & Gas Ltd is an international oil & gas company engaged in the exploration and development of unconventional oil and gas assets, with the current portfolio focused in Australia. Falcon Oil & Gas Ltd is incorporated in British Columbia, Canada and headquartered in Dublin, Ireland.

    Falcon Oil & Gas Australia Limited is a c. 98% subsidiary of Falcon Oil & Gas Ltd.

    For further information on Falcon Oil & Gas Ltd. Please visit www.falconoilandgas.com

    About Beetaloo Joint Venture (EP 76, 98 and 117)

    Company Interest
    Falcon Oil & Gas Australia Limited (Falcon Australia) 22.5%
    Tamboran (B2) Pty Limited 77.5%
    Total 100.0%

    Shenandoah South Pilot Project -2 Drilling Space Units – 46,080 acres1

    Company Interest
    Falcon Oil & Gas Australia Limited (Falcon Australia) 5.0%
    Tamboran (B2) Pty Limited 95.0%
    Total 100.0%

    1Subject to the completion of the SS2H ST1 and SS4H wells on the Shenandoah South pad 2.

    About Tamboran (B2) Pty Limited
    Tamboran (B1) Pty Limited (“Tamboran B1”) is the 100% holder of Tamboran (B2) Pty Limited, with Tamboran B1 being a 50:50 joint venture between Tamboran Resources Corporation and Daly Waters Energy, LP.

    Tamboran Resources Corporation, is a natural gas company listed on the NYSE (TBN) and ASX (TBN). Tamboran is focused on playing a constructive role in the global energy transition towards a lower carbon future, by developing the significant low CO2 gas resource within the Beetaloo Basin through cutting-edge drilling and completion design technology as well as management’s experience in successfully commercialising unconventional shale in North America.

    Bryan Sheffield of Daly Waters Energy, LP is a highly successful investor and has made significant returns in the US unconventional energy sector in the past. He was Founder of Parsley Energy Inc. (“PE”), an independent unconventional oil and gas producer in the Permian Basin, Texas and previously served as its Chairman and CEO. PE was acquired for over US$7 billion by Pioneer Natural Resources Company.

    Advisory regarding forward-looking statements
    Certain information in this press release may constitute forward-looking information. Any statements that are contained in this news release that are not statements of historical fact may be deemed to be forward-looking information. Forward-looking information typically contains statements with words such as “may”, “will”, “should”, “expect”, “intend”, “plan”, “anticipate”, “believe”, “estimate”, “projects”, “dependent”, “consider” “potential”, “scheduled”, “forecast”, “outlook”, “budget”, “hope”, “suggest”, “support” “planned”, “approximately”, “potential” or the negative of those terms or similar words suggesting future outcomes. In particular, forward-looking information in this press release includes, but is not limited to, information relating to the drilling the SS4H well to a total measured depth of 6,452 metres, the indication of strong gas shows and a continuation of the high-quality shale and rock properties observed in the Shenandoah South 1H and SS2H ST1 locations, stimulation planned to commence in early 1Q 2025 with IP30 flow test from both SS2H ST1 and SS4H expected to be released in 1Q 2025.

    This information is based on current expectations that are subject to significant risks and uncertainties that are difficult to predict. The risks, assumptions and other factors that could influence actual results include risks associated with fluctuations in market prices for shale gas; risks related to the exploration, development and production of shale gas reserves; general economic, market and business conditions; substantial capital requirements; uncertainties inherent in estimating quantities of reserves and resources; extent of, and cost of compliance with, government laws and regulations and the effect of changes in such laws and regulations; the need to obtain regulatory approvals before development commences; environmental risks and hazards and the cost of compliance with environmental regulations; aboriginal claims; inherent risks and hazards with operations such as mechanical or pipe failure, cratering and other dangerous conditions; potential cost overruns, drilling wells is speculative, often involving significant costs that may be more than estimated and may not result in any discoveries; variations in foreign exchange rates; competition for capital, equipment, new leases, pipeline capacity and skilled personnel; the failure of the holder of licenses, leases and permits to meet requirements of such; changes in royalty regimes; failure to accurately estimate abandonment and reclamation costs; inaccurate estimates and assumptions by management and their joint venture partners; effectiveness of internal controls; the potential lack of available drilling equipment; failure to obtain or keep key personnel; title deficiencies; geo-political risks; and risk of litigation.

    Readers are cautioned that the foregoing list of important factors is not exhaustive and that these factors and risks are difficult to predict. Actual results might differ materially from results suggested in any forward-looking statements. Falcon assumes no obligation to update the forward-looking statements, or to update the reasons why actual results could differ from those reflected in the forward-looking statements unless and until required by securities laws applicable to Falcon. Additional information identifying risks and uncertainties is contained in Falcon’s filings with the Canadian securities regulators, which filings are available at www.sedarplus.com, including under “Risk Factors” in the Annual Information Form.

    Any references in this news release to initial production rates are useful in confirming the presence of hydrocarbons; however, such rates are not determinative of the rates at which such wells will continue production and decline thereafter and are not necessarily indicative of long-term performance or ultimate recovery. While encouraging, readers are cautioned not to place reliance on such rates in calculating the aggregate production for Falcon. Such rates are based on field estimates and may be based on limited data available at this time.

    Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    The MIL Network –

    January 27, 2025
  • MIL-OSI: Financing facility update

    Source: GlobeNewswire (MIL-OSI)

    23 December 2024

    ICG Enterprise Trust announces increased credit facility

    ICG Enterprise Trust plc (‘ICGT’) has increased the size of its revolving credit facility (‘RCF’) from €240m to €300m to accommodate portfolio growth. This change was effective from 20 December 2024.

    There are no other changes to the terms previously disclosed on 1 June 2023 and 5 June 2024.

    At 13 December 2024, ICGT had total available liquidity of £84m (31 July 2024: £126m). This comprised £8m cash and £76m (€92m) undrawn RCF. Pro forma for the increase announced today, ICGT would have had total available liquidity of £134m.

    Enquiries

    Analyst / Investor enquiries                                                                                                
    Chris Hunt, Head of Corporate Development and Shareholder Relations
    +44 (0) 20 3545 2000

    Media                                                                                                                    
    Clare Glynn, Corporate Communications, ICG                                                    
    +44 (0) 20 3545 1395

    Website                                                                                 
    www.icg-enterprise.co.uk

    About ICG Enterprise Trust

    ICG Enterprise Trust is a leading listed private equity investor focused on creating long-term growth by delivering consistently strong returns through selectively investing in profitable, cash-generative private companies, primarily in Europe and the US, while offering the added benefit to shareholders of daily liquidity.

    We invest in companies directly as well as through funds managed by Intermediate Capital Group plc (‘ICG’) and other leading private equity managers who focus on creating long-term value and building sustainable growth through active management and strategic change.

    Disclaimer

    The information contained herein does not constitute an offer to sell, or the solicitation of an offer to acquire or subscribe for, any securities in any jurisdiction where such an offer or solicitation is unlawful or would impose any unfulfilled registration, qualification, publication or approval requirements on ICG Enterprise Trust PLC (the “Company”) or its affiliates or agents. Equity securities in the Company have not been and will not be registered under the applicable securities laws of the United States, Australia, Canada, Japan or South Africa (each an “Excluded Jurisdiction”). The equity securities in the Company referred to herein and on the pages that follow may not be offered or sold within an Excluded Jurisdiction, or to any U.S. person (“U.S. Person”) as defined in Regulation S under the U.S. Securities Act of 1933, as amended (the “U.S. Securities Act”), or to any national, resident or citizen of an Excluded Jurisdiction.

    The information on the pages herein may contain forward looking statements. Any statement other than a statement of historical fact is a forward looking statement. Actual results may differ materially from those expressed or implied by any forward looking statement. The Company does not undertake any obligation to update or revise any forward looking statements. You should not place undue reliance on any forward looking statement, which speaks only as of the date of its issuance.

    The MIL Network –

    January 27, 2025
  • MIL-OSI: Falcon Oil & Gas Ltd. – Change of Auditors

    Source: GlobeNewswire (MIL-OSI)

    FALCON OIL & GAS LTD.

    (“Falcon”)

    Change of Auditors

    23 December 2024 – Falcon Oil & Gas Ltd. (TSXV: FO, AIM: FOG) announces that BDO Canada LLP has been appointed as Falcon’s new auditor, replacing BDO LLP in the UK.

    Ends.

    CONTACT DETAILS:

    Falcon Oil & Gas Ltd.          +353 1 676 8702
    Philip O’Quigley, CEO +353 87 814 7042
    Anne Flynn, CFO +353 1 676 9162
     
    Cavendish Capital Markets Limited (NOMAD & Broker)
    Neil McDonald / Adam Rae +44 131 220 9771

    About Falcon Oil & Gas Ltd.

    Falcon Oil & Gas Ltd is an international oil & gas company engaged in the exploration and development of unconventional oil and gas assets, with the current portfolio focused in Australia. Falcon Oil & Gas Ltd is incorporated in British Columbia, Canada and headquartered in Dublin, Ireland.

    For further information on Falcon Oil & Gas Ltd. please visit www.falconoilandgas.com

    Certain information in this press release may constitute forward-looking information. This information is based on current expectations that are subject to significant risks and uncertainties that are difficult to predict. Actual results might differ materially from results suggested in any forward-looking statements. Falcon assumes no obligation to update the forward-looking statements, or to update the reasons why actual results could differ from those reflected in the forward looking-statements unless and until required by securities laws applicable to Falcon. Additional information identifying risks and uncertainties is contained in Falcon’s filings with the Canadian securities regulators, which filings are available at www.sedarplus.ca

    Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    The MIL Network –

    January 27, 2025
  • MIL-OSI Economics: Cloud Atlas seen using a new tool in its attacks

    Source: Securelist – Kaspersky

    Headline: Cloud Atlas seen using a new tool in its attacks

    Introduction

    Known since 2014, Cloud Atlas targets Eastern Europe and Central Asia. We’re shedding light on a previously undocumented toolset, which the group used heavily in 2024. Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code. See below for the infection pattern.

    Typical Cloud Atlas infection pattern

    When opened, the document downloads a malicious template formatted as an RTF file from a remote server controlled by the attackers. It contains a formula editor exploit that downloads and runs an HTML Application (HTA) file hosted on the same C2 server. The RTF and HTA downloads are restricted to certain time slots and victim IP addresses: requests are only allowed from target regions.

    The malicious HTA file extracts and writes several files to disk that are parts of the VBShower backdoor. VBShower then downloads and installs another backdoor: PowerShower. This infection scheme was originally described back in 2019 and has changed only slightly from year to year.

    Previously, Cloud Atlas employed PowerShower to download and run an executable file: a DLL library. This DLL would then fetch additional executable modules (plug-ins) from the C2 server and execute these in memory. Among these plug-ins was one specifically designed to exfiltrate files with extensions of interest to the attackers: DOC, DOCX, XLS, XLSX, PDF, RTF, JPG and JPEG. The plugins were downloaded and their output was uploaded via the WebDAV protocol over public cloud services. Interestingly, after a plug-in was successfully downloaded, the DLL would delete the file from the cloud.

    The VBCloud backdoor now replicates the executable file’s original capabilities, such as downloading and executing malicious plug-ins, communicating with a cloud server, and performing other tasks. We first detected attacks using this implant in August of last year. Since then, we’ve observed numerous variations of the backdoor which have helped it to stay under the radar. This new campaign loads VBCloud via VBShower, which also downloads the PowerShower module. PowerShower probes the local network and facilitates further infiltration, while VBCloud collects information about the system and steals files. Below, we use a sample seen in September 2024 as a case study to examine each stage of a Cloud Atlas attack that employs the new toolkit.

    Technical details

    HTA

    The exploit downloads the HTA file via the RTF template and runs it. It leverages the alternate data streams (NTFS ADS) feature to extract and create several files at %APPDATA%RoamingMicrosoftWindows. These files make up the VBShower backdoor.

    Sample HTA content

    Below are the VBShower components loaded by the HTA dropper.

    File name Description
    AppCache028732611605321388.log:AppCache02873261160532138892.vbs VBShower Launcher (copy)
    AppCache028732611605321388.log:AppCache028732611605321388.vbs VBShower Launcher
    AppCache028732611605321388.log:AppCache028732611605321388.dat Encrypted VBShower backdoor
    AppCache028732611605321388.log:AppCache0287326116053213889292.vbs VBShower Cleaner

    After the download is complete, the malware adds a registry key to auto-run the VBShower Launcher script.

    “SoftwareMicrosoftWindowsCurrentVersionRun”,“dmwappushservice”,“wscript /B “%APPDATA%Roaming

    MicrosoftWindowsAppCache028732611605321388.log:AppCache028732611605321388.vbs“

    The backdoor also launches further scripts: VBShower Launcher (copy) and VBShower Cleaner.

    wscript /B “%APPDATA%Roaming

    MicrosoftWindowsAppCache028732611605321388.log:AppCache02873261160532138892.vbs

    wscript /B “%APPDATA%Roaming

    MicrosoftWindowsAppCache028732611605321388.log:AppCache0287326116053213889292.vbs

    The attackers create custom HTA files for each victim, so the names of the scripts and registry keys are mostly unique. For example, we have seen intertwine used as a name template, while the file names themselves looked as follows.

    • “intertwine.ini:intertwineing.vbs”;
    • “intertwine.ini:intertwineinit.vbs”;
    • “intertwine.ini:intertwine.vbs”;
    • “intertwine.ini:intertwine.con”.

    VBShower

    VBShower::Launcher

    This script acts as a loader, responsible for reading and decrypting the contents of AppCache028732611605321388.log:AppCache028732611605321388.dat, before using the Execute() function to pass control to that file.

    Sample VBShower Launcher content

    VBShower::Cleaner

    This script is designed to clear the contents of all files inside the LocalMicrosoftWindowsTemporary Internet FilesContent.Word folder by opening each in write mode. While the files persist, their contents are erased. This is how the Trojan covers its tracks, removing malicious documents and templates it downloaded from the web during the attack.

    The script uses the same method to erase both its own contents and the contents of the VBShower Launcher copy, which is used solely for the malware’s first run.

    Sample VBShower Cleaner content

    VBShower::Backdoor

    The backdoor’s payload is contained encrypted within a DAT file.

    Encrypted VBShower backdoor

    VBShower::Launcher goes through several stages to decrypt the backdoor.

    First decrypted layer of VBShower Backdoor

    Fully decrypted and deobfuscated VBShower Backdoor content

    The VBShower backdoor then runs in memory, subsequently performing several operations in a loop.

    • Check for the autorun registry key and restore it if missing.
    • Attempt to download additional encrypted VB scripts from the C2 server and run these. If the downloaded data is larger than 1 MB, the module saves the script to disk inside alternate data streams (NTFS ADS) and runs it with the help of the “wscript” utility. Otherwise, it runs the script in the current context.
    • If an alternate data stream contains a TMP file, the backdoor sends it to the C2 server with a POST request. The additional scripts downloaded from the C2 use the TMP file to store their output.

    VBShower::Payload

    We were able to detect and analyze a number of scripts downloaded and executed by the VBShower backdoor.

    VBShower::Payload (1)

    The first script we found does the following.

    • Gets the domain, username and computer.
    • Gets the names and values of the registry keys in the SOFTWAREMicrosoftWindowsCurrentVersionRun branch.
    • Gets information about the file names and sizes in the following folders:
      • %AppData%;
      • %AllUsersProfile%;
      • %AllUsersProfile%Canon;
      • %AllUsersProfile%Intel;
      • %AllUsersProfile%Control;
      • %AllUsersProfile%libs;
      • %AllUsersProfile%Adobe;
      • %AllUsersProfile%Yandex;
      • %AllUsersProfile%Firefox;
      • %AllUsersProfile%Edge;
      • %AllUsersProfile%Chrome;
      • %AllUsersProfile%avp.
    • Gets the names of running processes, their start dates and the commands that started them.
    • Gets a list of scheduler tasks by running cmd.exe /c schtasks /query /v /fo LIST.

    All data collected this way is saved in a TMP alternate data stream and forwarded to the C2 server by the VBShower::Backdoor component.

    The paths listed above (%AllUsersProfile%) are used for installing the VBCloud backdoor. The steps performed by the script are most likely needed to check if the backdoor is present and installed correctly.

    Decrypted and deobfuscated contents of script 1

    VBShower::Payload (2)

    The second script reboots the system.

    Decrypted and deobfuscated contents of script 2

    VBShower::Payload (3)

    A further script downloads a ZIP archive, extracts it into the %TMP% directory, and collects the names and sizes of downloaded files to then send an extraction report to the C2. This is done to verify that the files were received and unpacked.

    Decrypted and deobfuscated contents of script 3

    VBShower::Payload (4) and (5)

    VBShower downloads two similar scripts that are designed for installing the VBCloud and PowerShower backdoors. These scripts first download an archive from a hardcoded link and then unpack it into the %ALLUSERSPROFILE% folder. In the case of VBCloud, the script changes the extension of the unpacked file from TXT to VBS and creates a scheduler task to run VBCloud. In the case of PowerShower, the extension of the unpacked file is changed from TXT to PS1, whereupon the script adds the file to the Run registry branch.

    Unlike VBShower’s own scripts, downloadable scripts with a payload are present on disk as files, rather than hidden inside alternate data streams.

    Besides installing backdoors, these scripts build a report that consists of the names of running processes, their start dates and the commands that started them, registry keys and values in the Run branch, and a list of files and directories at the path where the archive was unpacked. This report is then sent to the C2 server.

    Decrypted and deobfuscated contents of the scripts for downloading and installing VBCloud and PowerShower

    PowerShower

    PowerShower is nearly identical to VBShower in terms of functionality.

    Sample PowerShower script installed with VBShower

    PowerShower downloads additional PowerShell scripts from the C2 and executes these. If the downloaded data begins with the character “P”, PowerShower interprets the data as a ZIP archive, rather than a PowerShell script, and saves the archive to disk as “%TMP%Firefox.zip”. PowerShower does not unpack the archive, serving as a downloader only.

    Decoded PowerShower script

    The downloaded PowerShell scripts run in memory, without being saved to disk. Most of the scripts save their output to sapp.xtx, which PowerShower then sends as a report to the C2.

    The PowerShower scripts use the same C2 domains as VBShower.

    PowerShower::Payload (1)

    The script gets a list of local groups and their members on remote computers via Active Directory Service Interfaces (ADSI). The script is most often used on domain controllers.

    Sample script to get a local groups and members list, downloaded and executed by PowerShower

    PowerShower::Payload (2)

    Script for dictionary attacks on user accounts.

    Sample password bruteforcing script, downloaded and executed by PowerShower

    PowerShower::Payload (3)

    The script unpacks the Firefox.zip archive previously downloaded by the PowerShower backdoor, and executes the keb.ps1 script contained in the archive as a separate PowerShell process with a hidden window. The keb.ps1 script belongs to the popular PowerSploit framework for penetration testing and kicks off a Kerberoasting attack.

    Sample script that launches a Kerberoasting attack, downloaded and executed by PowerShower

    PowerShower::Payload (4)

    This script gets a list of administrator groups.

    Sample script to get a list of administrator groups, downloaded and executed by PowerShower

    PowerShower::Payload (5)

    This script gets a list of domain controllers.

    Sample script to get a list of domain controllers, downloaded and executed by PowerShower

    PowerShower::Payload (6)

    This script gets information about files inside the ProgramData directory.

    Sample script to get information about files inside the ProgramData directory, downloaded and executed by PowerShower

    PowerShower::Payload (7)

    This script gets the account policy and password policy settings on the local computer.

    Sample script to get policy settings, downloaded and executed by PowerShower

    PowerShower::Payload:: Inveigh

    We also observed the use of PowerShell Inveigh, a machine-in-the-middle attack utility used in penetration testing. Inveigh is used for data packet spoofing attacks, and collecting hashes and credentials both by intercepting packets and by using protocol-specific sockets.

    The Inveigh script is extracted from the ZIP archive downloaded by PowerShower and runs as described under PowerShower::Payload (3).

    Sample Inveigh script, downloaded and executed by PowerShower

    VBCloud

    As described above, VBCloud is installed via VBShower. We found the following module installation paths.

    1

    2

    3

    4

    5

    6

    7

    8

    9

    C:ProgramDataavpavp_upd.vbs

    C:ProgramDataAdobeAdobeLog.vbs

    C:ProgramDataAdobemanager.vbs

    C:ProgramDataAdobesysman.vbs

    C:ProgramDataAdobenews_adobe.vbs

    C:ProgramDataAdobeupgrade.vbs

    C:ProgramDataEdgeSrvMngrUpd.vbs

    C:ProgramDataEdgeintelog.vbs

    C:ProgramDataChromeChromeSys.vbs

    Sample VBCloud main module paths

    The core functionality of the VBCloud module duplicates that of VBShower: both download and run PowerShell scripts with a payload, and then send the output to the C2. Unlike VBShower, however, VBCloud uses public cloud storage as the C2.

    Sample VBCloud script

    The VBCloud script does not contain any loops, and it is designed to execute only once. However, it gets triggered by a scheduled task every time the user logs into the system, which means it will run frequently. We’ve also seen variants of the backdoor that executed their core functionality in a loop with a thirty-minute delay between repetitions. These variants ran the script once via the Run registry branch when the system booted up for the first time after being infected.

    Decrypted and deobfuscated VBCloud script

    VBCloud does the following:

    • Check the availability of the kim.nl.tab.digital WebDav server by sending an HTTP MKCOL request to create the directories named “kmsobuqjquut” and “rwqdmpaohxns” with the credentials hardcoded in the script. If the server is unavailable, the script switches to the backup address “webdav.mydrive.ch”.
    • If the WebDav server is available, create a file in the “kmsobuqjquut” directory on that server via an HTTP PUT The file name follows the pattern ddmmyy_HHMMSS, and the extension is randomly selected from among TXT, RTF, DOC, PPT, MDS, PNG and JPEG. We have seen files named “070824_001919.txt” and “250724_002919.doc”. Files like these contain the username and MAC addresses of network adapters, effectively confirming that the script is active on the infected system.
    • The Trojan then attempts to download one of three files from the “rwqdmpaohxns” directory: “criclyqnduv.txt”, “jhflenoqelp.txt” or “avnwiabihik.txt”. If VBCloud successfully downloads the file, it immediately deletes it from the cloud with an HTTP DELETE request, and then executes it in the current process via the Execute() function after decrypting the contents. As in the case of PowerShower, the payload can be made up of various scripts.

    VBCloud::Payload (1)

    This script is designed to send information about disks to the C2.

    VBCloud::Payload (2)

    This script is designed to exfiltrate files and documents. It iterates through local drives and removable media in search of files with the extensions DOC, DOCX, XLS, XLSX, PDF, TXT, RTF and RAR. The script checks the size of any files it finds to match this condition and collects those between 1000 and 3,000,000 bytes to exfiltrate. The files must have been modified no more than 72 hours before the current date. The script then copies matching files to a ZIP archive it creates, named “mapping.zip”. It also adds a file with metadata such as the created time, modified time, last opened time, and full path to the file. Upon exceeding 4,000,000 bytes, an archive is uploaded to cloud storage and deleted from the system. It is replaced with a new one, and the file harvesting process continues. The archive is uploaded in RC4-encrypted form, with a name that follows the template “%d_13134” and one of the following extensions chosen at random: MP3, AAC, MP2, FLAC, WAV, ALAC, MQA, OGG, DSD, WMA, and MP4.

    Part of the file exfiltration script

    VBCloud::Payload (3)

    This script gets various system information such as the OS version, RAM size, manufacturer, computer name, username and domain name.

    VBCloud::Payload (4)

    Script to exfiltrate Telegram files:

    • The file D877F783D5D3EF8Cs contains the user ID and encryption key used for interaction between the desktop client and Telegram servers.
    • The file key_datas contains local encryption keys.

    Part of the file exfiltration script

    Geography of attacked users

    Several dozen users were attacked in 2024, 82% of these in Russia. Isolated attacks were recorded in Belarus, Canada, Moldova, Israel, Kyrgyzstan, Vietnam and Turkey.

    Conclusion

    We continue to monitor activity linked to Cloud Atlas. In a new campaign that began in August 2023, the attackers made changes to their familiar toolkit. This time, instead of an executable library to load malware modules, the group relied on the VBShower backdoor as the loader. Besides, they are now using a new module in their attacks: VBCloud. This collects and uploads system information and other data. These actions employ a variety of PowerShell scripts that enable the attackers to perform a range of tasks on the victim’s system. VBCloud uses public cloud storage as a C2 server.

    The infection chain consists of several stages and ultimately aims to steal data from victims’ devices. We’ve observed that, similar to past Cloud Atlas campaigns, phishing emails continue to be the initial access point. This underscores the still-pressing need for organizations to strengthen their infrastructure defenses and improve employee awareness to ward off these kinds of attacks.

    Indicators of compromise

    HTA file download domains
    content-protect[.]net
    control-issue[.]net
    office-confirm[.]com
    onesoftware[.]info
    serverop-parametrs[.]com
    web-privacy[.]net
    net-plugin[.]org
    triger-working[.]com

    VBShower C2
    yandesks[.]net
    yandisk[.]info
    mirconnect[.]info
    sber-cloud[.]info
    gosportal[.]net
    riamir[.]net
    web-wathapp[.]com

    PowerShower C2
    yandisk[.]info
    yandesktop[.]com
    web-wathapp[.]com

    Cloud repositories used ​by VBCloud
    webdav.opendrive.com
    webdav.mydrive.ch
    webdav.yandex.ru
    kim.nl.tab.digital

    HTA MD5
    9D3557CC5C444FE5D73E4C7FE1872414
    CBA05E11CB9D1D71F0FA70ECD1AF2480
    CBFB691E95EE34A324F94ED1FF91BC23
    2D24044C0A5B9EBE4E01DED2BFC2B3A4
    88BE01F8C4A9F335D33FA7C384CA4666
    A30319545FDA9E2DA0532746C09130EB

    PowerShower MD5
    15FD46AC775A30B1963281A037A771B1
    31B01387CA60A1771349653A3C6AD8CA
    389BC3B9417D893F3324221141EDEA00

    VBShower::Launcher MD5
    AA8DA99D5623FAFED356A14E59ACBB90
    016B6A035B44C1AD10D070ABCDFE2F66
    160A65E830EB97AAE6E1305019213558
    184CF8660AF7538CD1CD2559A10B6622
    1AF1F9434E4623B7046CF6360E0A520E
    1BFB9CBA8AA23A401925D356B2F6E7ED
    21585D5881CC11ED1F615FDB2D7ACC11
    242E86E658FE6AB6E4C81B68162B3001
    2FE7E75BC599B1C68B87CF2A3E7AA51F
    36DD0FBD19899F0B23ADE5A1DE3C2FEC
    389F6E6FD9DCC84C6E944DC387087A56
    3A54ACD967DD104522BA7D66F4D86544
    3F12BF4A8D82654861B5B5993C012BFA
    49F8ED13A8A13799A34CC999B195BF16
    4B96DC735B622A94D3C74C0BE9858853
    F45008BF1889A8655D32A0EB93B8ACDD

    VBCloud MD5
    0139F32A523D453BC338A67CA45C224D
    01DB58A1D0EC85ADC13290A6290AD9D6
    0F37E1298E4C82098DC9318C7E65F9D2
    6FCEE9878216019C8DFA887075C5E68E
    D445D443ACE329FB244EDC3E5146313B
    F3F28018FB5108B516D802A038F90BDE

    MIL OSI Economics –

    January 27, 2025
  • MIL-OSI Global: Repression of climate and environmental protest is intensifying across the world

    Source: The Conversation – UK – By Oscar Berglund, Senior Lecturer in International Public and Social Policy, University of Bristol

    Climate and environmental protest is being criminalised and repressed around the world. The criminalisation of such protest has received a lot of attention in certain countries, including the UK and Australia. But there have not been any attempts to capture the global trend – until now.

    We recently published a report, with three University of Bristol colleagues, which shows this repression is indeed a global trend – and that it is becoming more difficult around the world to stand up for climate justice.

    This criminalisation and repression spans the global north and south, and includes more and less democratic countries. It does, however, take different forms.

    Our report distinguishes between climate and environmental protest. The latter are campaigns against specific environmentally destructive projects – most commonly oil and gas extraction and pipelines, deforestation, dam building and mining. They take place all around the world.

    Climate protests are aimed at mitigating climate change by decreasing carbon emissions, and tend to make bigger policy or political demands (“cut global emissions now” rather than “don’t build this power plant”). They often take place in urban areas and are more common in the global north.

    Four ways to repress activism

    The intensifying criminalisation and repression is taking four main forms.

    1. Anti-protest laws are introduced

    Anti-protest laws may give the police more powers to stop protest, introduce new criminal offences, increase sentence lengths for existing offences, or give policy impunity when harming protesters. In the 14 countries we looked at, we found 22 such pieces of legislation introduced since 2019.

    2. Protest is criminalised through prosecution and courts

    This can mean using laws against climate and environmental activists that were designed to be used against terrorism or organised crime. In Germany, members of Letzte Generation (Last Generation), a direct action group in the mould of Just Stop Oil, were charged in May 2024 with “forming a criminal organisation”. This section of the law is typically used against mafia organisations and had never been applied to a non-violent group.

    In the Philippines, anti-terrorism laws have been used against environmentalists who have found themselves unable to return to their home islands.

    Criminalising protest can also mean lowering the threshold for prosecution, preventing climate activists from mentioning climate change in court, and changing other court processes to make guilty verdicts more likely. Another example is injunctions that can be taken out by corporations against activists who protest against them.

    3. Harsher policing

    This stretches from stopping and searching to surveillance, arrests, violence, infiltration and threatening activists. The policing of activists is carried out not just by state actors like police and armed forces, but also private actors including private security, organised crime and corporations.

    In Germany, regional police have been accused of collaborating with an energy giant (and its private fire brigade) to evict coal mine protesters, while private security was used extensively in policing anti-mining activists in Peru.

    4. Killings and disappearances

    Lastly, in the most extreme cases, environmental activists are murdered. This is an extension of the trend for harsher policing, as it typically follows threats by the same range of actors. We used data from the NGO Global Witness to show this is increasingly common in countries including Brazil, Philippines, Peru and India. In Brazil, most murders are carried out by organised crime groups while in Peru, it is the police force.

    Protests are increasing

    To look more closely at the global picture of climate and environmental protest – and the repression of it – we used the Armed Conflicts Location Event database. This showed us that climate protests increased dramatically in 2018-2019 and have not declined since. They make up on average about 4% of all protest in the 81 countries that had more than 1,000 protests recorded in the 2012-2023 period:

    Climate protests increased sharply in the late 2010s in the 14 countries studied. (Data is smoothed over five months; number of protests is per country per month.)
    Berglund et al; Data: ACLED, CC BY-SA

    This second graph shows that environmental protest has increased more gradually:

    Environmental protests in the same 14 countries.
    Data: ACLED, CC BY-SA

    We used this data to see what kind of repression activists face. By looking for keywords in the reporting of protest events, we found that on average 3% of climate and environmental protests face police violence, and 6.3% involve arrests. But behind these averages are large differences in the nature of protest and its policing.

    A combination of the presence of protest groups like Extinction Rebellion, who often actively seek arrests, and police forces that are more likely to make arrests, mean countries such as Australia and the UK have very high levels of arrest. Some 20% of Australian climate and environmental protests involve arrests, against 17% in the UK – with the highest in the world being Canada on 27%.

    Meanwhile, police violence is high in countries such as Peru (6.5%) and Uganda (4.4%). France stands out as a European country with relatively high levels of police violence (3.2%) and low levels of arrests (also 3.2%).

    In summary, while criminalisation and repression does not look the same across the world, there are remarkable similarities. It is increasing in a lot of countries, it involves both state and corporate actors, and it takes many forms.

    This repression is taking place in a context where states are not taking adequate action on climate change. By criminalising activists, states depoliticise them. This conceals the fact these activists are ultimately right about the state of the climate and environment – and the lack of positive government action in these areas.

    Oscar Berglund is a member of the Green Party. The report this article is based on was written with Christina Pantazis, Chris Rossdale and Roxana Pessoa Cavalcanti.

    Tie Franco Brotto does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Repression of climate and environmental protest is intensifying across the world – https://theconversation.com/repression-of-climate-and-environmental-protest-is-intensifying-across-the-world-246379

    MIL OSI – Global Reports –

    January 27, 2025
  • MIL-OSI: Partners Value Investments L.P. Announces Renewal of Normal Course Issuer Bids

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, Dec. 23, 2024 (GLOBE NEWSWIRE) — Partners Value Investments L.P. (the “Partnership”) (TSX VENTURE: PVF) announced today that it has received approval from the TSX Venture Exchange (the “Exchange”) to renew its normal course issuer bids to purchase up to 3,521,732 of its non‐voting equity limited partnership units (the “Equity LP Units”), representing approximately 5% of its currently outstanding Equity LP Units; and to purchase up to 938,226 of its non‐voting Class A preferred limited partnership units, Series 1 (the “Preferred LP Units”), representing approximately 5% of its currently outstanding Preferred LP Units (collectively, the “Bids”). The period of the Bids will be effective from January 3, 2025 to January 2, 2026, or such earlier date that the Partnership completes its purchases.

    Purchases by the Partnership pursuant to the Bids will be made by its broker, RBC Capital Markets, through the facilities of the Exchange, other designated exchanges and alternative trading systems in Canada. The price which the Partnership will pay for any Equity LP Units and Preferred LP Units purchased will be the market price of the Equity LP Units and Preferred LP Units at the time of acquisition. Any Equity LP Units and/or Preferred LP Units acquired through the Bids will be cancelled. As of December 13, 2024, there were 70,434,631 Equity LP Units outstanding and 18,764,512 Preferred LP Units outstanding.

    Of the 3,533,556 Equity LP units and 938,350 Preferred LP Units approved for purchase under the Partnership’s prior normal course issuer bids that commenced on January 3, 2024 and will be expiring on January 2, 2025, the Partnership purchased 278,324 Equity LP Units at an average price of $102.02 and did not make any purchase of Preferred LP Units through the facilities of the Exchange, other designated exchanges or an alternative trading system in Canada.

    The Partnership believes that, from time to time, the market price of its securities may not adequately reflect their value. In such circumstances, the Partnership believes the purchase of its outstanding securities may represent an appropriate and desirable use of its available funds. All Equity LP Units and Preferred LP Units acquired by the Partnership under the Bids will be cancelled.

    In connection with the Bids, the Partnership entered into an automatic purchase plan with its designated broker, RBC Capital Markets. The automatic purchase plan will allow for the purchase of Equity LP Units and Preferred LP Units when the Partnership would not ordinarily be active in the market due to its own internal trading blackout periods, insider trading rules or otherwise. Outside of these periods, Equity LP Units and Preferred LP Units will be repurchased in accordance with management’s discretion and in compliance with applicable law.

    For further information, contact Investor Relations at ir@pvii.ca or 416-643-7621.

    Note: This news release contains “forward-looking information” within the meaning of Canadian provincial securities laws and “forward-looking statements” within the meaning of applicable Canadian securities regulations. Expressions which are predictions of or indicate future events, trends or prospects and which do not relate to historical matters identify forward- looking information and forward-looking statements.

    Although the Partnership believes that its anticipated future results, performance or achievements expressed or implied by the forward-looking statements and information are based upon reasonable assumptions and expectations, the reader should not place undue reliance on forward-looking statements and information because they involve known and unknown risks, uncertainties and other factors, many of which are beyond its control, which may cause the actual results, performance or achievements of the Partnership to differ materially from anticipated future results, performance or achievement expressed or implied by such forward-looking statements and information.

    Factors that could cause actual results to differ materially from those contemplated or implied by forward-looking statements and information include, but are not limited to: the financial performance of Brookfield Corporation and Brookfield Asset Management Ltd., the impact or unanticipated impact of general economic, political and market factors; the behavior of financial markets, including fluctuations in interest and foreign exchanges rates; global equity and capital markets and the availability of equity and debt financing and refinancing within these markets; strategic actions including dispositions; changes in accounting policies and methods used to report financial condition (including uncertainties associated with critical accounting assumptions and estimates); the effect of applying future accounting changes; business competition; operational and reputational risks; technological change; changes in government regulation and legislation; changes in tax laws, catastrophic events, such as earthquakes, hurricanes, or pandemics/epidemics; the possible impact of international conflicts and other developments including terrorist acts; and other risks and factors detailed from time to time in the Partnership’s documents filed with the securities regulators in Canada.

    The Partnership cautions that the foregoing list of important factors that may affect future results is not exhaustive. When relying on the Partnership’s forward-looking statements and information, investors and others should carefully consider the foregoing factors and other uncertainties and potential events. Except as required by law, the Partnership undertakes no obligation to publicly update or revise any forward-looking statements and information, whether written or oral, that may be as a result of new information, future events or otherwise.

    The MIL Network –

    January 27, 2025
  • MIL-OSI: Boralex adds another 97 MW in its expanding UK portfolio

    Source: GlobeNewswire (MIL-OSI)

    EDINBURGH, United Kingdom, Dec. 23, 2024 (GLOBE NEWSWIRE) — Boralex Inc. (“Boralex” or the “Company”) (TSX: BLX) is pleased to announce that it has entered into a joint venture for the development, construction and operation of the proposed 145MW Clashindarroch Wind Farm Extension and adjacent 50MW Battery Energy Storage System (BESS), for a total capacity of 195MW. The project is located near Dufftown in Moray, Scotland. Boralex has been developing this project for a number of years on behalf of Clashindarroch Wind Farm Extension Ltd.

    Esbjorn Wilmar, Country Director of Boralex in the United Kingdom said: “We are delighted to have become co-owners of this exciting project. We already have extensive experience in the area through the initial development of the 177MW Dorenell Wind Farm. We now look forward to taking Clashindarroch Wind Farm Extension through the remaining stages of development.”

    Nicolas Wolff, Executive Vice President and General Manager of Boralex in Europe said: “This latest achievement by our UK team will enable us to accelerate the deployment of our Strategic Plan. Through this joint venture, we are adding to our already solid portfolio, supported by our organic developments and the recent acquisition of the 50MW Sallachy wind project.”

    Today’s announcement comes at a pivotal moment in the UK. Earlier in the month, the UK government unveiled its Clean Power Action Plan, setting out how it wants to achieve its grid decarbonisation targets by 2030. This plan, seen as a landmark for the clean energy sector, aims to unlock £40 billion annually from the private sector for investments in infrastructure and renewable energy. It also states that onshore wind capacity should be almost doubled to meet the decarbonisation target, from 14GW installed today to 27GW by 2030.

    The Company submitted a Section 36 application to the Scottish Government. The application is currently under consideration by the Government’s Energy Consents Unit (ECU). The Clashindarroch Wind Farm Extension application consists of up to 22 wind turbines each with an installed capacity of up to 6.6MW, as well as a battery storage facility of up to 50MW.

    On this transaction, CMS acted as Boralex’s legal advisers.

    About Boralex

    At Boralex, we have been providing affordable renewable energy accessible to everyone for over 30 years. As a leader in the Canadian market and France’s largest independent producer of onshore wind power, we also have facilities in the United States and development projects in the United Kingdom. Over the past five years, our installed capacity has more than doubled to over 3.1 GW. We are developing a portfolio of more than 7.2 GW in wind, solar projects and storage projects, guided by our values and our corporate social responsibility (CSR) approach. Through profitable and sustainable growth, Boralex is actively participating in the fight against global warming. Thanks to our fearlessness, our discipline, our expertise and our diversity, we continue to be an industry leader. Boralex’s shares are listed on the Toronto Stock Exchange under the ticker symbol BLX.

    For more information, visit boralex.com or sedarplus.com. Follow us on Facebook, LinkedIn and Instagram.

    For more information

    MEDIA  INVESTOR RELATIONS 
    Camille Laventure 
    Senior Advisor, Public Affairs and External Communications
    Boralex Inc. 

    438-883-8580 
    camille.laventure@boralex.com  

    Stéphane Milot 
    Vice President, Investor Relations 

    Boralex Inc. 

    514-213-1045 
    stephane.milot@boralex.com  

    Source: Boralex Inc.        

    The MIL Network –

    January 27, 2025
  • MIL-OSI: Revolutionize Your Crypto Trades: BexBack Offers Double Deposit Bonus and 100x Leverage Crypto Trading No KYC

    Source: GlobeNewswire (MIL-OSI)

    HONG KONG, Dec. 23, 2024 (GLOBE NEWSWIRE) — As Bitcoin’s price recently surged past the $100,000 milestone only to dip below this critical level, market volatility has reached new highs. Analysts predict that Bitcoin may be entering a prolonged phase of high volatility. In such a dynamic environment, holding spot positions alone may no longer yield consistent short-term profits. To empower traders in seizing these market opportunities, BexBack Exchange has launched a suite of enticing offers:

    • 100% Deposit Bonus
    • $50 Welcome Bonus for New Users
    • Up to 100x Leverage for Cryptocurrency Trading

    These offers create unmatched profit potential for crypto investors while providing an edge in navigating volatile markets.

    What Is 100x Leverage and How Does It Work?

    100x leverage allows traders to amplify their positions with minimal capital. For instance:

    • If Bitcoin is priced at $90,000 and a trader opens a long contract with 1 BTC, using 100x leverage equates to a transaction value of 100 BTC.
    • If the price increases to $99,000 the next day, the profit will be calculated as:
      (99,000 – 90,000) * 100 BTC / 90,000 = 10 BTC, resulting in a remarkable 1000% yield.

    When combined with BexBack’s 100% deposit bonus, the potential profit can double, offering even higher returns.

    Note: While leveraged trading magnifies profits, it also increases liquidation risks.

    How Does the 100% Deposit Bonus Work?

    BexBack’s deposit bonus is designed to enhance traders’ potential. While the bonus cannot be withdrawn directly, it can be used to open larger positions or as extra margin during significant market fluctuations, effectively reducing the risk of liquidation.

    About BexBack

    BexBack is a leading cryptocurrency derivatives platform offering 100x leverage on BTC, ETH, ADA, SOL, and XRP futures contracts. Headquartered in Hong Kong with offices in Singapore, Japan, the United States, the United Kingdom, and Argentina, BexBack holds a US MSB (Money Services Business) license and is trusted by over 100,000 traders worldwide, including users from the United States, Canada, Europe and beyond.

    Key features include:

    • No KYC Requirement: Trade instantly without cumbersome identity verification.
    • 100% Deposit Bonus: Double your funds and amplify your profits.
    • High-Leverage Trading: Maximize capital efficiency with up to 100x leverage.
    • Demo Account: Practice risk-free trading with 10 BTC in virtual funds.
    • Comprehensive Trading Options: Enjoy feature-rich trading on both Web and mobile platforms.
    • Convenient Operations: Experience no slippage, no spread, and fast, accurate trade execution.
    • 24/7 Global Support: Benefit from around-the-clock customer service.
    • Lucrative Affiliate Rewards: Earn up to 50% commission as a promoter.

    Take Action Now—Don’t Miss This Opportunity!

    If you missed the previous crypto bull run, now is your chance to capitalize on the market’s momentum. With BexBack’s 100x leverage, 100% deposit bonus, and $50 bonus for new users (available upon completing one trade within a week of registration), traders can position themselves for success in the next bull run.

    Sign up on www.bexback.com today, claim your exclusive bonus, and start accumulating more BTC!

    Media Contact
    Business Team
    Email: business@bexback.com
    Website: www.bexback.com

    Contact:
    Amanda
    business@bexback.com

    Disclaimer: This content is provided by BexBack. The statements, views and opinions expressed in this column are solely those of the content provider. The information provided in this press release is not a solicitation for investment, nor is it intended as investment advice, financial advice, or trading advice. It is strongly recommended you practice due diligence, including consultation with a professional financial advisor, before investing in or trading cryptocurrency and securities. Please conduct your own research and invest at your own risk.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7ff2bd9f-7765-448d-b96a-401885758143

    https://www.globenewswire.com/NewsRoom/AttachmentNg/3e87d43e-f245-47bb-a008-1b08b56e0a6b

    https://www.globenewswire.com/NewsRoom/AttachmentNg/12135f1b-04cc-403c-a06a-57694a16c7fb

    https://www.globenewswire.com/NewsRoom/AttachmentNg/84e6fc2d-66a7-4f13-9b88-b95baf95b6ad

    The MIL Network –

    January 27, 2025
  • MIL-OSI: Matador Adds Bitcoin to its Balance Sheet

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, Dec. 23, 2024 (GLOBE NEWSWIRE) — Matador Technologies Inc. (“Matador” or the “Company”) (TSXV: MATA) is proud to announce that its Board of Directors has unanimously approved adding Bitcoin and USD-denominated assets to its corporate treasury as part of its long-term capital preservation strategy.

    The Board has identified risks associated with its current treasury, which is primarily denominated in Canadian dollars. Canada’s reliance on oil exports and its rising national debt raise concerns about potential devaluation and loss of purchasing power for Canadian denominated assets. To address these risks, the Board has approved adding Bitcoin and USD-denominated assets to its corporate treasury.1

    Matador plans to front-load an initial allocation of $4.5 million into Bitcoin in the month of December 2024 and will continue to explore additional purchases at the board level via measured buying programs.

    Additionally, Matador plans to move the majority of its cash balance sheet from CAD to USD. The decision reflects Matador’s belief in Bitcoin’s role as a store of value asset that mitigates the downside risk of currency debasement. This move follows global trends, as institutional adoption of Bitcoin grows among corporations seeking alternatives to bonds and depreciating currencies.2

    “Matador’s Board and management believe in using Bitcoin to future-proof our treasury,” Sunny Ray, President of Matador, added. “This step also supports our mission to explore using Bitcoin as a platform for our gold-based products.”

    This move will continue to support the development and launch of Matador’s digital gold platform, which is a technology-based system that enables users to own, trade, and store digital representations of gold, backed by physical reserves with the physical gold being held at the Royal Canadian Mint. These holdings are expected to underpin the company’s product development efforts and reinforce confidence in the Company’s treasury management strategy. After an initial review of alternative platforms, including Ethereum and Solana, the Board believes that Bitcoin stands apart in its ability to deliver the security, stability, and trustworthiness required for a digital gold asset platform. Bitcoin’s deep liquidity and widespread institutional adoption further support the belief that Bitcoin is the ideal foundation for Matador’s vision of a trustworthy, digital gold platform.3

    “For Matador’s focus on creating a product that exemplifies trust, permanence, and value, we expect Bitcoin to be the platform of choice,” said Deven Soni, CEO and Chairman of Matador.

    The Board will further evaluate its technology platform alternatives in the near future, with the objective of making a decision on which technology platform will underpin its digital gold product in Q1 2025. Once a decision has been made, Matador intends on launching its digital gold product to a limited audience.

    Matador will continue to update shareholders regarding its treasury execution and custody strategy in the coming weeks.

    About Matador Technologies Inc.

    Matador Technologies Inc. is a digital gold platform leveraging blockchain technology to digitize real-world assets like gold. Focused on building innovative financial solutions, Matador is at the forefront of integrating blockchain technology to preserve and grow value. It’s digital gold platform aims to democratize the gold buying experience, combining the best of modern technology and time-proven assets, to create an app that will allow users to buy, sell, and store gold 24/7, with the added security and flexibility of an encrypted mobile application.

    Contact Information:

    Sunny Ray
    President
    sunny@matador.network
    647-932-2668

    Cautionary Statement Regarding Forward-Looking Information

    NEITHER THE TSX VENTURE EXCHANGE NOR ITS REGULATION SERVICES PROVIDER (AS THAT TERM IS DEFINED IN THE POLICIES OF THE TSX VENTURE EXCHANGE) ACCEPTS RESPONSIBILITY FOR THE ADEQUACY OR ACCURACY OF THIS RELEASE.

    This news release does not constitute an offer to sell or the solicitation of an offer to buy any securities in any jurisdiction.

    Forward Looking Statements – Certain information set forth in this news release may contain forward-looking statements that involve substantial known and unknown risks and uncertainties, including risks associated with the implementation of the Company’s treasury management strategy and the launch of its mobile application as currently proposed or at all. These forward-looking statements are subject to numerous risks and uncertainties, certain of which are beyond the control of the Company, including with respect to the potential acquisition of Bitcoin and/or US dollars, the pricing of such acquisitions and the timing of future operations. Readers are cautioned that the assumptions used in the preparation of such information, although considered reasonable at the time of preparation, may prove to be imprecise and, as such, undue reliance should not be placed on forward-looking statements.

    _________________________
    1 https://www.ceicdata.com/en/indicator/canada/crude-oil-exports?utm_source=chatgpt.com, https://www.reuters.com/world/americas/canada-overshoots-deficit-target-by-c20-billion-finance-minister-resigns-2024-12-16/?utm_source=chatgpt.com.
    2 https://kensoninvestments.com/knowledge-centre/bitcoin-and-institutional-adoption-trends-and-strategic-insights/?utm_source=chatgpt.com, https://www.reuters.com/markets/us/blackrock-recommends-bitcoin-portfolio-weighting-up-2-interested-investors-2024-12-12/, https://www.forbes.com/sites/digital-assets/2024/12/08/us-treasury-names-bitcoin-digital-gold-after-price-explosion/, https://www.finivi.com/bitcoin-mainstream-blackrocks-pivotal-role-institutional-adoption/, https://www.fidelitydigitalassets.com/research-and-insights/institutional-adoption-digital-assets.
    3 https://coinmarketcap.com/currencies/bitcoin/.

    The MIL Network –

    January 27, 2025
  • MIL-OSI Security: Elmsdale — Crash leads to arrest in connection to stolen vehicle

    Source: Royal Canadian Mounted Police

    December 20, 2024, Elmsdale PEI – A single-vehicle crash in Elmsdale yesterday afternoon led to the arrest of a 22-year-old man in connection to a stolen vehicle.

    Yesterday at 1:00 p.m., West Prince RCMP responded to a report of a single-vehicle crash involving a car and a telephone pole in Elmsdale. Police learned that the vehicle had been stolen, and the lone occupant fled on foot. Police located him a short distance away. He was treated for minor injuries and arrested. He was released on conditions and will appear in Summerside Provincial Court on February 5th at 9:30 to answer to charges in connection to this incident.

    MIL Security OSI –

    January 27, 2025
  • MIL-OSI Security: United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

    Source: United States Attorneys General

    Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

    Note: A copy of the superseding criminal complaint can be found here.

    A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

    In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

    “The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

    “The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

    “The arrest of alleged developer Ratislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

    “The criminal complaint alleges that Rotislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

    “As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

    According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

    LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

    As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

    The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

    Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

    In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

    The LockBit Investigation

    The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

    The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

    • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
    • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
    • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    The U.S. Department of State’s TOC Rewards Program is offering rewards of:

    Information is accepted through the FBI tip website at tips.fbi.gov.

    Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

    Victim Assistance

    LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

    LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

    The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

    Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

    The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

    Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI –

    January 27, 2025
  • MIL-OSI United Kingdom: Joint statement on Afghanistan

    Source: United Kingdom – Executive Government & Departments

    Joint statement on the situation in Afghanistan following a G7+ meeting in Geneva

    Special Envoys and Representatives for Afghanistan of Canada, the European Union, France, Germany, Italy, Japan, Norway, the Republic of Korea, Switzerland, Türkiye, the United Kingdom, and the United States met in Geneva on December 16, 2024 to discuss the situation in Afghanistan. Deputy Special Representative for Afghanistan in the United Nations Assistance Mission in Afghanistan (UNAMA), Special Rapporteur on the situation of human rights, Representatives of the World Bank (WB) and of the Organisation of Islamic Cooperation (OIC) also participated in the meeting as observers.

    The Special Envoys and Representatives for Afghanistan:

    1. Expressed grave concern over the Taliban’s decisions in December 2024 to ban women and girls from attending public and private medical training institutions; and expressed concern that this new ban will have devastating consequences for all Afghans, especially mothers and infants – both born and unborn, both boys and girls – and will further destabilize an already fragile healthcare system. These decisions, which come on the back of the Taliban’s “Law on the Promotion of Virtue and the Prevention of Vice” announced in August 2024, expand upon the already over 80 repressive, discriminatory edicts aimed at excluding Afghan women and girls from education, public and economic life. We call for the immediate reversal of these unacceptable practices and policies.

    2. Noted with grave concern recent terrorist attacks in Kabul and the region, as well as the continuing threat terrorism poses to security and stability in Afghanistan; and acknowledged the Taliban actions to tackle terrorist threats from ISIS-K, while recalling the need for the Taliban to pursue actions to tackle terrorist threats, in accordance with Resolution 2593 of the United Nations Security Council and underscoring that some terrorist groups still reside safely inside Afghanistan and are able to plan and carry-out internal and cross-border terrorist strikes.

    3. Underscored that achieving long-term stability in Afghanistan requires a credible and inclusive national dialogue leading to a constitutional order with a representative and inclusive political system, as well as accountable political leaders and the State of Afghanistan meeting its international obligations.

    4. Emphasized the need for implementation of UN Security Council Resolution 2721 (2023), which took positive note of the UN’s independent assessment prepared pursuant to UNSCR 2679 (2023), encouraged member states and all other relevant stakeholders to consider implementation of its recommendations and requested the UN Secretary General to appoint a Special Envoy for Afghanistan to take forward a process between Afghan stakeholders and the international community for long term peace and stability in Afghanistan.

    5. Commended the work of the United Nations, including the UN-led Doha Process, and recognized the important and specific work of UNAMA, UN agencies present in the country, the World Bank, the Asian Development Bank and the many international and local NGOs and other humanitarian actors that continue to support the people of Afghanistan through ongoing social and humanitarian crisis.

    6. Reaffirmed that international NGOs are indispensable to humanitarian work in Afghanistan; and reinforced the importance of a united humanitarian response that includes representation from UN agencies, international and national NGOs, and other humanitarian actors.

    7. Highlighted the necessity to continue helping Afghans who are suffering in the ongoing humanitarian crisis with appropriate consideration for vulnerable populations, including women and women-led households, children and members of ethnic and religious minority communities.

    8. Looked forward to deepening engagement with neighbouring countries and other countries of the region on a joint response to the developing situation in Afghanistan, including countering potential threats such as terrorism and illegal migration to regional security and stability emanating from Afghanistan; commended the efforts of Muslim-majority countries and the OIC in engaging with the Taliban on women’s and girls’ rights and welcomed the leadership they have demonstrated on issues such as access to education and encouraged them to continue their active engagement on these and related issues.

    9. Expressed their appreciation to Switzerland for organizing these consultations and hosting the meeting; and looked forward to this Group of Special Envoys and Representatives meeting again in the near future.

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 20 December 2024

    MIL OSI United Kingdom –

    January 27, 2025
  • MIL-OSI Security: Berwick — Valley Integrated Street Crime Enforcement Unit charges four people with firearm and drug offences

    Source: Royal Canadian Mounted Police

    The Valley Integrated Street Crime Enforcement Unit (VISCEU) has charged four people with drug offences after a search warrant was executed at a home in South Berwick.

    On December 6, VISCEU with the assistance of Kings District RCMP, Kentville Police and the Criminal Intelligence Service Nova Scotia (CISNS) executed a search warrant at a home on Buchanan Rd., as part of an ongoing drug trafficking investigation.

    At the home, police safely arrested four people then located and seized a quantity of cocaine, methamphetamine, scales, cellphones, firearms, cash and stolen property.

    Scott Graham, 51, of Berwick; Jessie Jones, 35, of Waterville; and Theresa Atwell, 59, and Josh Jackson, 33, both from Cambridge, have been charged with:

    • Unauthorized Possession of Firearm (2 counts)
    • Possession of Firearm Knowing its Possession is Unauthorized (2 counts)
    • Careless Use of Firearm (2 counts)
    • Possession of Property Obtained by Crime (over $5,000)
    • Possession for Purpose of Trafficking (3 counts)

    Atwell was also charged with Possession Contrary to Order, and Jackson was also charged with Failure to Comply with Probation Order.

    All four were released by the Court on conditions and are scheduled to appear in Kentville Provincial Court on February 11 at 9:30 a.m.

    Nova Scotians are encouraged to contact their nearest RCMP detachment or local police to report crime, including the illegal sale of drugs, in their communities. Anonymous tips can be made by calling Nova Scotia Crime Stoppers, toll-free, at 1-800-222-TIPS (8477), submitting a secure web tip at www.crimestoppers.ns.ca, or using the P3 Tips app.

    Note: The Valley Integrated Street Crime Enforcement Unit is comprised of members of the Kings District RCMP and the Kentville Police Service.

    File # 2024-1779565

    MIL Security OSI –

    January 27, 2025
  • MIL-OSI Canada: Premier’s statement on Yalda

    Source: Government of Canada regional news

    (flickr.com)

    Premier David Eby has issued the following statement on Yalda:

    “Winter solstice, also the longest night of the year, is a time for people from Afghan, Azeri, Iranian, Kurdish, Tajik and Uzbek communities in British Columbia and around the world to celebrate Yalda.

    “Friends and family will gather to ward off darkness while welcoming a new day and the beginning of longer daylight. They will tell stories and recite poetry, while sharing foods such as watermelon and pomegranate, the red signifying the colour of a new dawn. It is a time to celebrate the triumph of light over darkness, and the hopefulness of brighter days ahead.

    “It is also a time to cherish our loved ones and celebrate hope and optimism.

    “I wish all those celebrating Yalda a wonderful evening of joy.

    “Shab-e Yalda Mobarak!”

    Media Contacts

    Office of the Premier

    Media Relations
    premier.media@gov.bc.ca

    https://news.gov.bc.ca/31821

    MIL OSI Canada News –

    January 27, 2025
  • MIL-OSI Canada: Government of Yukon launches eighth intake of Housing Initiatives Fund

    Source: Government of Canada regional news

    Government of Yukon launches eighth intake of Housing Initiatives Fund
    jlutz
    December 17, 2024 – 3:47 pm

    The Government of Yukon has opened applications for the eighth intake of the Housing Initiatives Fund. With a commitment of up to $4 million for two different funding streams, this initiative aims to support the development of new affordable housing units across the territory.

    The Housing Initiatives Fund supports shovel-ready, partner-led projects with funding to accelerate the delivery of quality, affordable housing for Yukoners. Projects must exceed the National Building Code energy efficiency standards by 25 per cent, ensure that 20 per cent of units in multi-unit buildings are built to accessibility standards and remain affordable (below median market rental rates) for at least 20 years. Additionally, projects must create a minimum of four affordable units in Whitehorse or one unit in rural communities.

    Through the program’s year-round project concepts stream, proponents can access up to $20,000 to support the development of affordable housing project proposals and other pre-development activities.

    The deadline for the eighth intake of shovel-ready project proposals is March 15, 2025. Applications for project concept funding are accepted year-round.

    Since 2018, the Government of Yukon has committed more than $35 million to support projects that will create 931 new units across the territory, including 827 that will remain affordable for 20 years. By supporting private developers alongside partners like the Northern Community Land Trust Society, Da Daghay Development Corporation, Normandy Living, Boreal Commons, Opportunities Yukon and the Safe at Home Society, it has created economic opportunities, strengthened communities and addressed the Yukon’s diverse housing needs.

    The Housing Initiatives Fund helps Yukoners play a key role in creating affordable housing solutions within their own communities. By supporting the development of more affordable rental properties and new homes, this program directly improves the lives of individuals and families across the territory. As the eighth annual intake opens, the Housing Initiatives Fund continues to be a vital resource in easing the housing pressures that impact so many Yukoners.

    Premier and Minister responsible for Yukon Housing Corporation Ranj Pillai

    Quick facts
    • Proponents must be Yukon residents (with proof of residency) or registered Yukon businesses. 

    • Eligible applicants include community housing providers, First Nations governments and development corporations, municipalities and private sector organizations or individuals, committed to completing shovel-ready projects within two years.

    • Shovel-ready construction projects may be eligible for up to $100,000 per unit, with a maximum of $1 million per project. 

    • Additional consideration will be given to projects that address diverse housing needs in the Yukon, including housing for seniors, tenants earning below Yukon Housing Corporation’s household income limits, individuals experiencing homelessness, youth aged 18 to 25 and First Nations-led initiatives.

    • Funding can be combined with other Yukon Housing Corporation programs, such as the Municipal Matching Rental Construction Program and the Developer Build Loan Program, as well as federal funding initiatives.

    Media contact

    Laura Seeley
    Cabinet Communications
    867-332-7627
    laura.seeley@yukon.ca 

    Kim Sheridan
    Communications, Yukon Housing Corporation
    867-667-8818
    kim.sheridan@yukon.ca 

    News release #:
    Related information:
    Apply for funding for housing initiatives
    Yukon Housing Corporation

    MIL OSI Canada News –

    January 27, 2025
  • MIL-OSI Canada: Statement from Premier Pillai on the Council of Federation Fall 2024 meeting

    Source: Government of Canada regional news

    Statement from Premier Pillai on the Council of Federation Fall 2024 meeting
    zaburke
    December 18, 2024 – 1:19 pm

    Premier Ranj Pillai has issued the following statement:

    “This week, I had the privilege to join Premiers for the Council of the Federation Fall 2024 meeting in Toronto. We discussed key priorities for the coming year, uniting our voices on issues that matter to all Canadians, including Canada-U.S. relations, health care and energy security.

    “Canada-U.S. relations were a central focus of our discussions. For the Yukon, this means continuing to strengthen our relationship with Alaska, which benefits both sides of the border. Premiers are committed to working hard to avoid any potential U.S. tariffs and agreed on the need to accelerate achieving the NATO defence spending target of two per cent of gross domestic product (GDP). Arctic security was also highlighted in these discussions, and I look forward to raising our interests during the Premiers’ mission to Washington, D.C. in February 2025.

    “For Yukoners, improving health care is a top priority. Our government is working to address the health workforce shortage by supporting recruitment and retention efforts. I know that Minister of Health and Social Services, Tracy-Anne McPhee, along with many health system partners, highlighted our progress in the first annual report on the Health Human Resources Strategy. Premiers continue to stress the need for more resources to tackle the Substance Use Health Emergency, which continues to deeply impact communities across the territory. Faster access to prescription medicines was also an important part of the Premiers’ discussion, and I look forward to seeing progress on this file, led by our respective health ministers.

    “Energy security was another major topic of discussion. As emerging technologies create new opportunities, we must work together to ensure energy is reliable, affordable, and sustainably produced. Critical minerals and energy corridors will play a crucial role in securing Canada’s future prosperity.

    “In addition to the Council of the Federation meeting, I was honoured to once again join Premier of Nunavut P.J. Akeeagok and Premier of the Northwest Territories R.J. Simpson to discuss northern priorities on the national stage. Arctic security, infrastructure and critical minerals were at the top of the agenda. We emphasized the need for more federal investment in these areas to address the unique challenges faced by northern communities. The North must have a seat at the table when it comes to decisions that impact our future. I would like to thank Premier P.J. Akeeagok for his work as chair over the past year and look forward to hosting the 2025 Northern Premiers’ Forum as incoming chair.

    “Attending the Council of Federation is an important opportunity to amplify Yukoners’ voices and advocate for the North. I am honoured to join Premiers in promoting collaboration and remaining committed to working together. I am proud of our continued partnership on these crucial issues and thank Premier Ford for hosting us in Toronto.”
     

    Media contact

    Laura Seeley
    Cabinet Communications
    867-332-7627
    laura.seeley@yukon.ca 
     

    News release #:
    Related information:
    Premiers Discuss Important Issues for Canadians
    Government of Yukon addresses Health Human Resources challenges
    Statement from Premier Pillai on meeting with northern Premiers

    MIL OSI Canada News –

    January 27, 2025
←Previous Page
1 … 316 317 318 319 320 … 410
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress