Category: Central Asia

  • MIL-OSI USA: NASA to Provide Coverage of Progress 91 Launch, Space Station Docking

    Source: NASA

    NASA will provide live launch and docking coverage of a Roscosmos cargo spacecraft delivering approximately three tons of food, fuel, and supplies for the crew aboard the International Space Station.
    The unpiloted Roscosmos Progress 91 spacecraft is scheduled to launch at 4:24 p.m. EST, Thursday, Feb. 27 (2:24 a.m. Baikonur time, Friday, Feb. 28), on a Soyuz rocket from the Baikonur Cosmodrome in Kazakhstan.
    Live launch coverage will begin at 4 p.m. on NASA+. Learn how to watch NASA content through a variety of platforms, including social media.
    After a two-day in-orbit journey to the station, the spacecraft will dock autonomously to the aft port of the Zvezda service module at 6:03 p.m. Saturday, March 1. NASA’s rendezvous and docking coverage will begin at 5:15 p.m. on NASA+.
    The Progress 91 spacecraft will remain docked to the space station for approximately six months before departing for re-entry into Earth’s atmosphere to dispose of trash loaded by the crew.
    The International Space Station is a convergence of science, technology, and human innovation that enables research not possible on Earth. For more than 24 years, NASA has supported a continuous U.S. human presence aboard the orbiting laboratory, through which astronauts have learned to live and work in space for extended periods of time. The space station is a springboard for developing a low Earth economy and NASA’s next great leaps in exploration, including missions to the Moon under Artemis and, ultimately, human exploration of Mars.
    Get breaking news, images and features from the space station on Instagram, Facebook, and X.
    Learn more about the International Space Station, its research, and its crew, at:
    https://www.nasa.gov/station
    -end-
    Claire O’SheaHeadquarters, Washington202-358-1100claire.a.o’shea@nasa.gov
    Sandra JonesJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov

    MIL OSI USA News

  • MIL-OSI Russia: Alexander Novak met with the President of Kazakhstan Kassym-Jomart Tokayev in Astana

    Translartion. Region: Russians Fedetion –

    Source: Government of the Russian Federation – An important disclaimer is at the bottom of this article.

    Deputy Prime Minister of Russia Alexander Novak met with President of Kazakhstan Kassym-Jomart Tokayev in Astana.

    The parties discussed the interaction between Russia and Kazakhstan in the energy sector, and also considered issues of further strengthening bilateral trade and economic cooperation. Alexander Novak conveyed greetings from Russian President Vladimir Putin to Kassym-Jomart Tokayev, noting the high level of dialogue and cooperation between the countries. The President of Kazakhstan emphasized the friendly, good-neighborly and allied nature of interstate relations between Kazakhstan and Russia.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI China: New air route links China’s Xinjiang, Kuala Lumpur

    Source: People’s Republic of China – State Council News

    URUMQI, Feb. 25 — A new air route linking Urumqi, capital of northwest China’s Xinjiang Uygur Autonomous Region, and Kuala Lumpur, capital of Malaysia, via the southern Chinese city of Guangzhou, has been launched.

    The maiden flight left Urumqi Diwopu International Airport on Monday morning, marking the first regular passenger service from Xinjiang to Kuala Lumpur, according to the airport.

    The new route reduces the one-way travel time from Urumqi to Kuala Lumpur to eight hours, offering passengers a more diverse, convenient and efficient travel option, and further boosting cultural and people-to-people exchanges and economic ties between China and Malaysia, said the airport.

    To date, Urumqi Diwopu International Airport has international passenger routes to 23 regions in 20 countries, including Kazakhstan and Kyrgyzstan.

    Xinjiang’s tourism revenue jumped by 21 percent to over 359 billion yuan (about 50.05 billion U.S. dollars) last year with more than 300 million tourist visits received.

    Since November 2023, China has continuously adjusted and optimized its visa-free transit policy to boost openness and people-to-people exchanges. Last year, over 20.1 million foreign visitors entered China under the visa exemption policy, marking a year-on-year increase of 113.5 percent in eligible transit visa-exemption travelers.

    MIL OSI China News

  • MIL-OSI United Nations: UNECE launches the 2025 UN Global Survey on digital and sustainable trade facilitation jointly with UN Regional Commissions and UNCTAD

    Source: United Nations Economic Commission for Europe

    UNECE has launched the Sixth UN Global Survey on Digital and Sustainable Trade Facilitation 2025, jointly with the other four United Nations Regional Commissions and United Nations Trade and Development (UNCTAD).

    The 2025 UN Global Survey consists of 62 measures, including new measures on ‘Trade Facilitation for E-Commerce’ and ‘Green Trade Facilitation’. Aside from measures supporting the implementation of the World Trade Organization Trade Facilitation Agreement (WTO TFA), the survey also covers the implementation of cutting-edge paperless and cross-border trade facilitation measures, as well as measures supporting more inclusive and sustainable trade, thus moving forward towards a “WTO TFA+” implementation.  

    The preliminary results of the 2025 Survey are expected to be published in July at untfsurvey.org, followed by the production of a Global and Regional Reports. The Survey aims to provide insightful information to support countries and policy makers to harness trade as a key means of implementation of the 2030 Agenda for Sustainable Development.  

    Furthermore, by presenting an overview of the progress on digital and sustainable trade facilitation, the Survey also supports countries in:  

    • Better inform the accession process for UNECE member States to the WTO. For instance, the UNECE Regional Report 2024 included a spotlight section which highlighted the progress of the trade facilitation implementation in Azerbaijan, Turkmenistan and Uzbekistan in the context of their accession process to the WTO. 

    The UNECE Regional Report 2024, based on the results of the 2023 UN Global Survey, revealed that the performance on trade facilitation of the 48 UNECE member States, who participated in the survey, has improved by 5% compared to the 2021 Survey results, with the implementation rate of trade facilitation measures rising from 76% in 2021 to almost 81% in 2023.  

    Among all UN Regional Commissions, UNECE had an overall higher implementation rate compared to the average results globally, with measures on “Transparency” at the highest implementation rate of 96%, followed by “Formalities” at 87%. On the implementation rates for digital trade facilitation measures in the UNECE region, the average rate for “Paperless trade” reached 82%, with the rate for “Cross-border paperless trade” being relatively lower, at 56%. 

    The report findings also offer clear directions for the future, highlighting the importance of actively engaging UNECE member States and partner international organizations in fast-tracking the implementation of trade facilitation measures. In light of the current challenges facing international trade, increased cooperation between governments and international organizations is critical.  

    Governments, specialized agencies, intergovernmental organizations can contribute to developing UN/CEFACT additional standards and accelerating the implementation of trade facilitation measures, particularly those leveraging digital technologies that contribute to climate-smart trade while reducing trade costs and streaming trade-related procedures.  

    UNECE calls upon all relevant actors and donors to further contribute to the substantive work of the UN/CEFACT in the development and update of its policy instruments and tools, including recommendations, standards and guideline materials, as well as continue to provide additional support and funding resources related to the capacity building and technical assistance activities in its 17 programme countries for the implementation of those UN/CEFACT recommendations and enhancement of the progress on trade facilitation in the region. 

    The Survey is an initiative under the Joint UNRECs Approach to Trade Facilitation, agreed by the Executive Secretaries of the five UN Regional Commissions. The approach was designed to enable the Regional Commissions to present a joint view on key trade facilitation issues, particularly from the regional and interregional level, and to enhance the effectiveness of technical assistance and capacity building initiatives. 

    As the international focal point for trade facilitation recommendations and standards, UNECE develops instruments to reduce, harmonize and digitalize procedures in international trade. The Survey also provides an opportunity to monitor the uptake and impact of such solutions for economic cooperation and integration, both in the region and globally. 

    If you are an expert in trade facilitation for your country and would like to participate in the Survey, click here for the questionnaire and more details about the methodology of the Survey. For more information, please directly contact Ms. Jie Wei.  

    MIL OSI United Nations News

  • MIL-OSI Economics: Development Asia: Expanding Access to Housing in Uzbekistan through Market Reforms

    Source: Asia Development Bank

    Through the Mortgage Market Sector Development Program, ADB is providing a $50-million policy-based loan to support mortgage market reforms that will economize the government’s housing subsidy and policy framework and create a conducive environment and infrastructure for market-based mortgage lending. It is also providing a $300-million financial intermediation loan to finance the country’s new mortgage refinancing company that enables domestic commercial banks to provide residential mortgage and housing improvement loans. A technical assistance grant of $800,000 supports the implementation of the program.

    Strengthening the policy, regulatory, and legal framework. Findings from a review of the policy, regulatory, and legal framework for the mortgage finance sector and housing market assessment formed the basis for the design of the program. The study recommended that subsidy arrangements be revised to ensure that higher subsidies are provided to lower income households and regressive subsidies are changed.

    Improving the housing strategy and subsidy framework. ADB provided the Ministry of Economy and Finance recommendations on revising the housing finance and subsidy approach as a result of which the government adopted series of changes to enable gradual transformation of state housing programs toward a market-based principles and improving the subsidy targeting.

    Establishing and operationalizing a wholesale mortgage refinance company. The government established the Uzbekistan Mortgage Refinancing Company with ADB support and equity investment from government and commercial banks. It provides banks with access to local currency long-term funding. The company prefinances and refinances eligible mortgage loans and housing improvement loans issued by participating banks at an interest rate close to market rates.

    To support operationalization of the company, the project tapped the Frankfurt School of Finance & Management and its consulting team of experts, most of them active and retired CEOs and board chairpersons of international and national mortgage refinance corporations including from Armenia, France, Malaysia, and Pakistan. The team prepared the company’s business plan, human resources plan, legal framework, institutional arrangement, internal policies and procedures, list of products and services, and risk management plan. The government believed that the first CEO of the mortgage refinancing company was of utmost importance to building everyone’s confidence in this new institution and was directly involved in vetting and hiring the CEO.

    Expanding and improving data collection. The project supported work on improving housing statistics, introducing a housing price index in Uzbekistan, and developing a mortgage market database and website. International experts provided in-person and on-line training to ministries, banks, and other stakeholders. A new system was introduced to collect housing sector data (i.e., mortgage loans by type, terms, program and other categories) through updates to the annual statistical reporting forms for commercial banks. The collected data is also shared with the Ministry of Finance.

    MIL OSI Economics

  • MIL-OSI China: Silk Road-themed art exhibition opens in Istanbul

    Source: China State Council Information Office 3

    An international art exhibition opened in Türkiye’s Istanbul on Monday, highlighting the cultural connections among China, Türkiye, and other nations along the Silk Road.

    The opening took place in the Maltepe district of Istanbul, attracting a varied audience that included university students, scholars, diplomats from the Chinese consulate in Istanbul, and representatives from the Maltepe Municipality.

    The exhibition showcased nearly 100 exceptional works of art from 34 artists from China, Türkiye, Russia, Iran, and Uzbekistan.

    It also presented a diverse array of artistic expressions, including calligraphy, painting, sculpture, and carpet art, showcasing the rich cultural heritage of participating nations.

    MIL OSI China News

  • MIL-OSI Global: Francis − a pope who has cared deeply for the poor and opened up the Catholic Church

    Source: The Conversation – USA – By Mathew Schmalz, Professor of Religious Studies, College of the Holy Cross

    Pope Francis during the Palm Sunday Mass at St. Peter’s Square on April 2, 2023, in Vatican City. Antonio Masiello/Getty Images

    Pope Francis, who remains in critical condition and hospitalized as he battles pneumonia in both lungs, was elected pope on March 13, 2013, after the surprise resignation of Benedict XVI.

    Prior to becoming pope, he was Jorge Mario Bergoglio, archbishop of Buenos Aires, and was the first person from the Americas to be elected to the papacy. He was also the first pope to choose Francis as his name, thus honoring St. Francis of Assisi, a 13th-century mystic whose love for nature and the poor have inspired Catholics and non-Catholics alike.

    Pope Francis chose not to wear the elaborate clothing, like red shoes or silk vestments, associated with other popes. As a scholar of global Catholicism, however, I would argue that the changes Francis brought to the papacy were more than skin deep. He opened the church to the outside world in ways none of his predecessors had done before.

    Care for the marginalized

    Pope Francis reached out personally to the poor. For example, he turned a Vatican plaza into a refuge for the homeless, whom he called “nobles of the street.”

    The Argentinian Jorge Mario Bergoglio, ordained for the Jesuits in 1969 at the Theological Faculty of San Miguel.
    Jesuit General Curia via Getty Images

    He washed the feet of migrants and prisoners during the traditional foot-washing ceremony on the Thursday before Easter. In an unprecedented act for a pope, he also washed the feet of non-Christians.

    He encouraged a more welcoming attitude toward gay and lesbian Catholics and invited transgender people to meet with him at the Vatican.

    On other contentious issues, Francis reaffirmed official Catholic positions. He labeled homosexual behavior a “sin,” although he also stated that it should not be considered a crime. Francis criticized gender theory for “blurring” differences between men and women.

    While he maintained the church’s position that all priests should be male, he made far-reaching changes that opened various leadership roles to women. Francis was the first pope to appoint a woman to head an administrative office at the Vatican. Also for the first time, women were included in the 70-member body that selects bishops and the 15-member council that oversees Vatican finances. Shortly before his death, he appointed an Italian nun, Sister Raffaella Petrini, as President of the Vatican City.

    Pope Francis in St. Peter’s Square on April 18, 2022.
    Stefano Spaziani/Mondadori Portfolio via Getty Images

    Not shy of controversy

    Some of Francis’ positions led to opposition in some Catholic circles.

    One such issue was related to Francis’ embrace of religious diversity. Delivering an address at the Seventh Congress of Leaders of World and Traditional Religions in Kazakhstan in 2022, he said that members of the world’s different religions were “children of the same heaven.”

    While in Morocco, he spoke out against conversion as a mission, saying to the Catholic community that they should live “in brotherhood with other faiths.” To some of his critics, however, such statements undermined the unique truth of Christianity.

    During his tenure, the pope called for “synodality,” a more democratic approach to decision making. For example, synod meetings in November 2023 included laypeople and women as voting members. But the synod was resisted by some bishops who feared it would lessen the importance of priests as teachers and leaders.

    In a significant move that will influence the choosing of his successor, Pope Francis appointed more cardinals from the Global South. But not all Catholic leaders in the Global South followed his lead on doctrine. For example, African bishops publicly criticized Pope Francis’ December 2023 ruling that allowed blessings of individuals in same sex couples.

    His most controversial move was limiting the celebration of the Mass in the older form that uses Latin. This reversed a decision made by Benedict XVI that allowed the Latin Mass to be more widely practiced.

    Traditionalists argued that the Latin Mass was an important – and beautiful – part of the Catholic tradition. But Francis believed that it had divided Catholics into separate groups who worshiped differently.

    This concern for Catholic unity also led him to discipline two American critics of his reforms, Bishop Joseph Strickland of Tyler, Texas, and Cardinal Raymond Burke. Most significantly, Carlo Maria Viganò, the former Vatican ambassador, or nuncio, to the United States was excommunicated during Francis’ tenure for promoting “schism.”

    In the last days of his pontificate, Pope Francis also criticized the Trump administration’s efforts to deport migrants. In a letter to US Bishops, he recalled that Jesus, Mary and Joseph had been emigrants and refugees in Egypt. Pope Francis also argued that migrants who enter a country illegally should not be treated as criminals because they are in need and have dignity as human beings.

    Writings on ‘the common good’

    In his official papal letters, called encyclicals, Francis echoed his public actions by emphasizing the “common good,” or the rights and responsibilities necessary for human flourishing.

    Pope Francis washes the foot of a man during the foot-washing ritual at a refugee center outside of Rome on March 24, 2016.
    L’Osservatore Romano/Pool Photo via AP

    His first encyclical in 2013, Lumen Fidei, or “The Light of Faith,” sets out to show how faith can unite people everywhere.

    In his next encyclical, Laudato Si’, or “Praise Be to You,” Francis addressed the environmental crisis, including pollution and climate change. He also called attention to unequal distribution of wealth and called for an “integral ecology” that respects both human beings and the environment.

    His third encyclical in 2020, Fratelli Tutti, or “Brothers All,” criticized a “throwaway culture” that discards human beings, especially the poor, the unborn and the elderly. In a significant act for the head of the Catholic Church, Francis concluded by speaking of non-Catholics who have inspired him: Martin Luther King Jr., Desmond Tutu and Mahatma Gandhi.

    In his last encyclical, Dilexit Nos, or “He Loved Us,” he reflected on God’s Love through meditating on the symbol of the Sacred Heart that depicts flames of love coming from Jesus’ wounded heart that was pierced during the crucifixion.

    Francis also proclaimed a special “year of mercy” in 2015-16. The pope consistently argued for a culture of mercy that reflects the love of Jesus Christ, calling him “the face of God’s mercy.”

    A historic papacy

    Francis’ papacy has been historic. He embraced the marginalized in ways that no pope had done before. He not only deepened the Catholic Church’s commitment to the poor in its religious life but also expanded who is included in its decision making.

    The pope did have his critics who thought he went too far, too fast. And whether his reforms take root depends on his successor. Among many things, Francis will be remembered for how his pontificate represented a shift in power in the Catholic Church away from Western Europe to the Global South, where the majority of Catholics now live.

    Mathew Schmalz is Roman Catholic and a political independent.

    ref. Francis − a pope who has cared deeply for the poor and opened up the Catholic Church – https://theconversation.com/francis-a-pope-who-has-cared-deeply-for-the-poor-and-opened-up-the-catholic-church-164362

    MIL OSI – Global Reports

  • MIL-OSI Asia-Pac: CENTRE FOR UN PEACEKEEPING HOSTS ‘CONFERENCE ON WOMEN PEACEKEEPERS FROM GLOBAL SOUTH’ AT MANEKSHAW CENTRE IN NEW DELHI

    Source: Government of India (2)

    Posted On: 24 FEB 2025 5:01PM by PIB Delhi

    Indian Army, through the Centre for United Nations Peacekeeping (CUNPK), India, is hosting a two-day conference titled ‘Conference on Women Peacekeepers from the Global South’ at the Manekshaw Centre, New Delhi, on 24-25 February 2025. This conference, being organised by the Ministry of External Affairs in collaboration with the Ministry of Defence, has brought together women peacekeepers from 35 nations to explore the evolving role of women in peacekeeping operations and discuss strategies to enhance their participation in these crucial missions.

    The conference aims to strengthen the role of women in UN peacekeeping by fostering dialogue, sharing experiences, and improving collaboration among the nations of the Global South.

    On the inaugural day, the participants had the honour of calling on Smt Draupadi Murmu, the Hon’ble President of India, at Rashtrapati Bhawan. This was followed by a keynote address by Shri S Jaishankar, External Affairs Minister.

    In his opening remarks, Lt Gen NS Raja Subramani, Vice Chief of Army Staff (VCOAS), expressed deep appreciation for the women peacekeepers’ exceptional service and commitment to global peace and security. He said, “the Women Peacekeepers have broken the stereotypes, shattered barriers, and rose above challenges to become leaders and protectors of their nation and also in the communities, where they have been engaged in for peacekeeping”. He further said that, “As a key partner in Global South, India brings forth a wealth of experience, resources and expertise to the table, contributing to the collective effort of developing nations”, adding, “We, as representatives of Global South, stand together in strength, resilience and unwavering commitment to global peace”.

    In his address, Lt Gen Rakesh Kapoor, Deputy Chief of Army Staff (IS&C), highlighted that International Humanitarian Law is facing a lot of challenges, making task of peacekeepers ever more challenging. He also acknowledged that Women Peacekeepers with their presence, are the role models of women empowerment and encourage women of host nation to contribute towards upliftment of their society.

    On the inaugural day of the conference, following sessions were conducted:

    • Session 1- Addressing Sexual Exploitation and Abuse: This session was moderated by Mr Christian Saunders, UN Special Coordinator, with participation by Maj Radhika Sen, UN Military Gender Advocate of the Year 2023, Maj Hind Jirari (Morocco) and Col Simone PC Antunes (Brazil). The session focused on mechanisms for preventing, reporting, and addressing cases of sexual exploitation and abuse in peacekeeping environments. Participants explored best practices, accountability measures, and the role of leadership in promoting a culture of zero tolerance for misconduct.

     

    • Session 2- Technology in Peacekeeping: Can We Do Better?: The second session was moderated by Ms Debjani Ghosh, Distinguished Fellow,  Niti Aayog and Former President NASSCOM. Lt Gen Sadhna Nair, DGMS (Army) and Brig Munesh Tamang, Former Sector Commander, UNMISS were the distinguished participants in the session. As technology continues to transform peacekeeping, this session examined how tools such as surveillance drones, AI-powered data analysis, and real-time communication systems can improve operational effectiveness and enhance mission capabilities. Experts discussed the challenges of integrating technology into peacekeeping and how nations in the Global South can leverage these advancements to strengthen their security efforts.

    Shri Sanjay Seth, Hon’ble Raksha Rajya Mantri, will attend the final day of the conference. The concluding sessions will cover the following topics:

    • Session 3 – Role of Women Peacekeepers. The Session will witness participation by Dr Kiran Bedi, IPS (Retd), Former Lt Governor, Puducherry, Lt Col Neha Khajuria, Pol CUPNK, Lt Col Ayishetu Sandow (Ghana) and Lt Col Sulochana Poudel (Nepal).

     

    • Session 4 – Opportunities for Collaboration in Training and Capacity Building in the Global South. The speakers for this session would include, Lt Gen MP Singh, Director General Staff Duties, Col Samar Raghav, Centre for UN Peacekeeping, Col Phoung Thi Minh Nyugen (Vietnam) and Col Dilya Akhmetova (Kazakhstan).

     

    • Session 5 – Promoting Regional Cooperation in Peacekeeping: The Global South Context. The concluding session will witness participation by Mr Jean-Pierre Lacroix, USG DPO, Mr Tshering W Sherpa, JS (UNP), MEA, Brig Joyce C Sitienei (Kenya) and Ms Alesi Dau (Fiji).

    This conference reaffirms India’s leadership in promoting inclusive and effective peacekeeping operations, underscoring the nation’s commitment to gender equality and the vital role women play in global security and peace efforts. Through collaborative discussions and actionable strategies, the conference will enhance the understanding of the role of women peacekeepers and increase their impact on future missions.

    _____________________________________________________________

    SC

    (Release ID: 2105783) Visitor Counter : 36

    MIL OSI Asia Pacific News

  • MIL-OSI USA: Prolific Alien Smuggler Extradited from Mexico to the United States in Joint Task Force Alpha Investigation

    Source: US State of Vermont

    Extensive coordination and cooperation efforts between U.S. and Mexican law enforcement authorities culminated in the extradition of an alleged alien smuggler who operated in Mexicali on the U.S.-Mexico border for several years as part of an international alien smuggling conspiracy.

    Raul Saucedo-Huipio, 49, was arrested in Mexico on March 2, 2023, pursuant to a U.S. request for his extradition, and was surrendered by Mexico to U.S. authorities on Feb. 21 to face charges previously filed in the District of Arizona. Saucedo-Huipio made his initial appearance on Feb. 21 in the Southern District of California. His co-conspirator, Ofelia Hernandez-Salas, 62, was extradited to the United States from Mexico in 2023 and pleaded guilty on Dec. 18, 2024, to conspiracy to bring an alien to the United States and substantive counts of bringing an alien to the United States.

    According to court documents, Saucedo-Huipio conspired with other smugglers, including Hernandez-Salas, to facilitate the travel of large numbers of migrants into the United States from and through Bangladesh, Yemen, Pakistan, Eritrea, India, the United Arab Emirates, Uzbekistan, Russia, Egypt, Brazil, Peru, Ecuador, Colombia, Costa Rica, Nicaragua, El Salvador, Honduras, Guatemala, and Mexico. Saucedo-Huipio and Hernandez-Salas allegedly charged the migrants as much as tens of thousands of dollars to make the journey and directed the migrants where to unlawfully cross the border into the United States, including by providing them with a ladder to climb over the border fence. Saucedo-Huipio and co-conspirators also allegedly robbed the migrants of money and personal belongings while armed with guns and knives.

    In June 2023, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed corresponding sanctions on this transnational criminal organization.

    Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division, Acting U.S. Attorney Rachel C. Hernandez for the District of Arizona, and U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Arizona Special Agent in Charge Francisco B. Burrola, made the announcement.

    ICE HSI Yuma is investigating the case with assistance from U.S. Border Patrol, Customs and Border Protection (CBP); U.S. Immigration and Customs Enforcement’s Enforcement and Removal Operations; FBI; and the U.S. Marshals Service, working in concert with ICE HSI Tijuana, INTERPOL, and the HSI Human Smuggling Unit in Washington, D.C. HSI also received substantial assistance from CBP’s National Targeting Center/Counter Network Division and OFAC.

    Trial Attorney Alexandra Skinnion of the Criminal Division’s Human Rights and Special Prosecutions Section (HRSP) and Assistant U.S. Attorney Stuart J. Zander for the District of Arizona are prosecuting the case.

    The Justice Department’s Office of International Affairs (OIA) provided significant assistance in securing the defendant’s arrest and extradition from Mexico. The Justice Department thanks its Mexican law enforcement partners, who were instrumental in arresting Saucedo-Huipio, and the Mexican Attorney General’s Office and the Mexican Foreign Ministry for making the extradition possible.

    The indictments against Raul Saucedo-Huipio and Hernandez-Salas, and their subsequent arrests and extraditions, were coordinated through Joint Task Force Alpha (JTFA). JTFA was created in partnership with the Department of Homeland Security (DHS) to strengthen the Justice Department’s efforts to combat the rise in prolific and dangerous smuggling emanating from Central America and impacting our border communities. JTFA’s goal is to disrupt and dismantle human smuggling and trafficking networks operating in El Salvador, Guatemala, Honduras, and Mexico, with a focus on networks that endanger, abuse, or exploit migrants, present national security risks, or engage in other types of transnational organized crime. The initiative was expanded to Colombia and Panama to combat human smuggling in the Darién in June 2024. JTFA comprises detailees from U.S. Attorneys’ Offices along the southwest border, including the Southern District of California, the District of Arizona, the District of New Mexico, and the Western and Southern Districts of Texas. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by HRSP and supported by the Office of Prosecutorial Development, Assistance and Training; the Narcotic and Dangerous Drug Section; the Money Laundering and Asset Recovery Section; the Office of Enforcement Operations; OIA; and the Violent Crime and Racketeering Section. JTFA also relies on substantial law enforcement investment from DHS, FBI, the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in over 355 domestic and international arrests of leaders, organizers, and significant facilitators of human smuggling; more than 300 U.S. convictions; more than 245 significant jail sentences imposed; and forfeitures of substantial assets.

    This investigation is also supported by the Extraterritorial Criminal Travel Strike Force (ECT) program, a partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks or raise grave humanitarian concerns. ECT has dedicated investigative, intelligence, and prosecutorial resources. ECT also coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Prolific Alien Smuggler Extradited from Mexico to the United States in Joint Task Force Alpha Investigation

    Source: United States Attorneys General 1

    Extensive coordination and cooperation efforts between U.S. and Mexican law enforcement authorities culminated in the extradition of an alleged alien smuggler who operated in Mexicali on the U.S.-Mexico border for several years as part of an international alien smuggling conspiracy.

    Raul Saucedo-Huipio, 49, was arrested in Mexico on March 2, 2023, pursuant to a U.S. request for his extradition, and was surrendered by Mexico to U.S. authorities on Feb. 21 to face charges previously filed in the District of Arizona. Saucedo-Huipio made his initial appearance on Feb. 21 in the Southern District of California. His co-conspirator, Ofelia Hernandez-Salas, 62, was extradited to the United States from Mexico in 2023 and pleaded guilty on Dec. 18, 2024, to conspiracy to bring an alien to the United States and substantive counts of bringing an alien to the United States.

    According to court documents, Saucedo-Huipio conspired with other smugglers, including Hernandez-Salas, to facilitate the travel of large numbers of migrants into the United States from and through Bangladesh, Yemen, Pakistan, Eritrea, India, the United Arab Emirates, Uzbekistan, Russia, Egypt, Brazil, Peru, Ecuador, Colombia, Costa Rica, Nicaragua, El Salvador, Honduras, Guatemala, and Mexico. Saucedo-Huipio and Hernandez-Salas allegedly charged the migrants as much as tens of thousands of dollars to make the journey and directed the migrants where to unlawfully cross the border into the United States, including by providing them with a ladder to climb over the border fence. Saucedo-Huipio and co-conspirators also allegedly robbed the migrants of money and personal belongings while armed with guns and knives.

    In June 2023, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed corresponding sanctions on this transnational criminal organization.

    Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division, Acting U.S. Attorney Rachel C. Hernandez for the District of Arizona, and U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Arizona Special Agent in Charge Francisco B. Burrola, made the announcement.

    ICE HSI Yuma is investigating the case with assistance from U.S. Border Patrol, Customs and Border Protection (CBP); U.S. Immigration and Customs Enforcement’s Enforcement and Removal Operations; FBI; and the U.S. Marshals Service, working in concert with ICE HSI Tijuana, INTERPOL, and the HSI Human Smuggling Unit in Washington, D.C. HSI also received substantial assistance from CBP’s National Targeting Center/Counter Network Division and OFAC.

    Trial Attorney Alexandra Skinnion of the Criminal Division’s Human Rights and Special Prosecutions Section (HRSP) and Assistant U.S. Attorney Stuart J. Zander for the District of Arizona are prosecuting the case.

    The Justice Department’s Office of International Affairs (OIA) provided significant assistance in securing the defendant’s arrest and extradition from Mexico. The Justice Department thanks its Mexican law enforcement partners, who were instrumental in arresting Saucedo-Huipio, and the Mexican Attorney General’s Office and the Mexican Foreign Ministry for making the extradition possible.

    The indictments against Raul Saucedo-Huipio and Hernandez-Salas, and their subsequent arrests and extraditions, were coordinated through Joint Task Force Alpha (JTFA). JTFA was created in partnership with the Department of Homeland Security (DHS) to strengthen the Justice Department’s efforts to combat the rise in prolific and dangerous smuggling emanating from Central America and impacting our border communities. JTFA’s goal is to disrupt and dismantle human smuggling and trafficking networks operating in El Salvador, Guatemala, Honduras, and Mexico, with a focus on networks that endanger, abuse, or exploit migrants, present national security risks, or engage in other types of transnational organized crime. The initiative was expanded to Colombia and Panama to combat human smuggling in the Darién in June 2024. JTFA comprises detailees from U.S. Attorneys’ Offices along the southwest border, including the Southern District of California, the District of Arizona, the District of New Mexico, and the Western and Southern Districts of Texas. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by HRSP and supported by the Office of Prosecutorial Development, Assistance and Training; the Narcotic and Dangerous Drug Section; the Money Laundering and Asset Recovery Section; the Office of Enforcement Operations; OIA; and the Violent Crime and Racketeering Section. JTFA also relies on substantial law enforcement investment from DHS, FBI, the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in over 355 domestic and international arrests of leaders, organizers, and significant facilitators of human smuggling; more than 300 U.S. convictions; more than 245 significant jail sentences imposed; and forfeitures of substantial assets.

    This investigation is also supported by the Extraterritorial Criminal Travel Strike Force (ECT) program, a partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks or raise grave humanitarian concerns. ECT has dedicated investigative, intelligence, and prosecutorial resources. ECT also coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Global: Sanctions rarely achieve their goals – here’s why they failed in Russia and Myanmar

    Source: The Conversation – UK – By Sergey Sosnovskikh, Lecturer in International Business, Manchester Metropolitan University

    Sanctions are, according to research, effective less than 10% of the time if success is defined as the complete compliance of a sanctioned regime with the imposed external pressure. Taking a more lenient view, which includes partial concessions or negotiated settlements, the success rate rises to 35% at most.

    The idea that sanctions can completely restrict trade to sanctioned countries is largely flawed. Iranian residents, for example, can still access many western products despite sanctions through intermediaries in countries like Turkey and the Gulf states.

    To better understand why sanctions fail, consider the cases of Russia and Myanmar. The sanctions imposed on Russia following its full-scale invasion of Ukraine in 2022 have undoubtedly caused some economic disruption, including inflation, labour shortages and a devaluation of the Russian rouble. But they have had a limited impact overall.

    In April 2024, the International Monetary Fund predicted that Russia’s economy would grow faster than all of the world’s advanced economies that year, including the US.

    Many countries have not participated in the west’s sanctions regime, which has created enforcement gaps. These gaps have largely enabled Russia to maintain access to sanctioned goods and continue its economic activities.

    In January 2023, a US thinktank called Silverado reported that some former Soviet states had increased their “transshipment” of goods produced by multinational firms that no longer export to Russia directly.

    Transshipment is a process where cargo is unloaded from one vessel and reloaded into another while in transit. Armenia and Uzbekistan, as well as China and Turkey, are the countries commonly used as “transshipment points” to Russia.

    Indeed, research of our own into how sanctioned goods continue to reach Russia reveals that companies often reroute their supply chains through politically allied intermediary nations. These rerouted imports can, however, drive up product prices for ordinary citizens.

    Stacks of containers at a port in St Petersburg, Russia.
    Andrey Mihaylov / Shutterstock

    Russia has also reduced its dependency on imports by increasing production in sectors such as agriculture and manufacturing. In August 2023, for example, India and Russia signed the biggest ever grain deal between the two countries.

    And the Russian government implemented fiscal and monetary measures, including currency controls and subsidies, to stabilise the economy and support key industries.

    Russia’s large, diverse economy and abundant natural resources make it more resilient to sanctions compared to some smaller and less diversified nations. Much of the world is reliant on Russian gas and, since the imposition of western sanctions, countries like China and India have increased the amount they buy.

    Even the EU is still spending billions of US dollars on Russian gas. In the first 15 days of 2025, after an agreement allowing Russia to pump gas to the EU via pipelines running across Ukraine ended, the EU’s 27 countries imported Russian gas at a record rate.

    Sanctioning Myanmar’s military

    Targeted western sanctions have tried to undermine the financial interests of Myanmar’s military junta, which has been battling armed opposition to its rule since a coup in 2021. But these sanctions have only been partially effective, too.

    China, India, Japan and neighbouring south-east Asian countries continue to engage in business with Myanmar. In Myanmar’s lucrative gas export sector, the vacuum left by departing western companies has been swiftly filled by Asian partners. This has ensured the junta’s income streams remain largely intact.

    Brands that have ostensibly exited the market due to sanctions or activist pressure also remain accessible through the country’s porous border trade. And there have been cases where a significant delay between a company’s declared exit and its actual departure inadvertently allowed operations to continue as usual for some time.

    In 2024, we conducted a study with our colleague Anna Grosman, an expert on innovation and entrepreneurship at Loughborough University, on multinational firms operating in Myanmar. Our findings highlight the dilemma foreign businesses face in sanctioned countries over whether to stay or leave.

    This decision is shaped by formal pressure, such as home and host government restrictions. For instance, a multinational firm’s home government may penalise companies that continue to operate in a sanctioned country, while the host government may impose policies or financial barriers to prevent or delay their exit.

    However, informal pressure from activists, diaspora groups and international advocacy organisations also plays a role. Staying can help businesses avoid financial losses and the complexities of exit, but it also exposes them to reputational damage and ethical dilemmas.

    Western sanctions on Myanmar’s military regime have been ineffective, too.
    R. Bociaga / Shutterstock

    Some of the junta’s financial channels, such as revenue from the jade mining industry, are out of reach for sanctions. In 2021, the US treasury department sanctioned Myanmar’s state-owned gemstone company, Myanmar Gem Enterprise, describing it as “a key economic resource” for the military.

    However, sanctions on Myanmar Gem Enterprise have not been completely effective. Myanmar’s gemstone mining industry is mostly an informal sector, with data on mining income and distribution underreported and opaque. Continued revenue from this sector will almost certainly have further cushioned the impact of western sanctions.

    The sanctions have only partially stopped the flow of income to the junta. But they have contributed to the hardships facing ordinary citizens. Myanmar’s currency has cratered, while imported goods including pharmaceuticals and fuel are in short supply. Power outages are now common and there are soaring levels of unemployment.

    Some western governments have now imposed sanctions on state-owned banks in Myanmar in an attempt to stop revenue from reaching the junta. This move will only worsen the situation facing Myanmar’s people.

    Sanctions drive nations towards building domestic industries to replace imported goods and strengthening alliances with supportive countries. Far from achieving their intended political objectives, sanctions can exacerbate an already volatile geopolitical landscape, while driving up prices for ordinary people.

    But at the same time, governments and businesses have a duty to exit a country when they are no long able to adhere to their own human rights commitments.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Sanctions rarely achieve their goals – here’s why they failed in Russia and Myanmar – https://theconversation.com/sanctions-rarely-achieve-their-goals-heres-why-they-failed-in-russia-and-myanmar-244975

    MIL OSI – Global Reports

  • MIL-OSI United Kingdom: UK announces largest sanctions package against Russia since 2022

    Source: United Kingdom – Executive Government & Departments

    Press release

    UK announces largest sanctions package against Russia since 2022

    Three years on from President Putin’s full-scale invasion of Ukraine, the UK has today imposed over 100 new sanctions directly targeting those who continue to aid the invasion.

    • 107 new sanctions announced as UK unleashes our largest sanctions package since the early days of the invasion. 

    • Milestone package targets Russian military supply chains, revenues fuelling Putin’s illegal war, and Kleptocrats driving profits for the Kremlin. 

    • Strengthening Ukraine’s hand will help to build a secure and prosperous Europe and UK – a foundation of the government’s Plan for Change.

    Today’s measures will target funds going into Putin’s war chest and propping up Russia’s kleptocratic system.   

    As the Prime Minister said last week, we are facing a once in a generation moment for the collective security of our continent.  The UK is working with our Allies to put Ukraine in the best position to achieve peace through strength. Today’s action is a further step towards this.  

    The sanctions will also target Russia’s military machine, entities in third countries who support it and the fragile supply networks that it relies on.   

    Targets include:  

    • Producers and suppliers of machine tools, electronics and dual-use goods for Russia’s military, including microprocessors used in weapons systems. These are based in a range of third countries including Central Asian states, Turkey, Thailand, India and China, which is the largest supplier of critical goods for Russia’s military.  

    • North Korean Defence Minister No Kwang Chol and other North Korean generals and senior officials complicit in deploying over 11,000 DPRK forces to Russia. Putin is using DPRK forces as cannon fodder; DPRK has suffered over 4,000 casualties.  

    • 13 Russian targets, including LLC Grant-Trade, its owner Marat Mustafaev and his sister Dinara Mustafaeva, who have used the company to funnel advanced European technology into Russia to support its illegal war.  

    For the first time, we are also using new powers to target foreign financial institutions supporting Russia’s war machine.  We are sanctioning the Kyrgyzstan-based OJSC Keremet Bank, disrupting Russia’s use of the international financial system to support its war efforts.

    Foreign Secretary, David Lammy said:

    Today’s action, the largest in almost three years, underscores the UK’s commitment to Ukraine.    

    Every military supply line disrupted, every rouble blocked, and every enabler of Putin’s aggression exposed is a step towards a just and lasting peace, and towards security and prosperity in the UK as a part of this government’s Plan for Change. 

    Lasting peace will only be achieved through strength. That is why we are focused on putting Ukraine in the strongest possible position.      

    As the world marks the grim milestone of Putin’s full-scale invasion entering its fourth year, we cannot and will not turn our backs on Ukraine in their fight for our shared security.

    Keeping the country safe is the Government’s first priority and an integral part of the Prime Minister’s Plan for Change. Sanctions against Russia’s military machine and the revenues fuelling it will improve the chances of a just and lasting peace in Ukraine, which will benefit security and prosperity in the UK.  

    The new sanctions will put further pressure on Putin’s energy revenues, the most vital source of funding for his illegal invasion. They include specification of another 40 ‘shadow fleet’ ships carrying Russian oil. These vessels have collectively carried more than $5 billion worth of Russian oil and oil products in the last six months alone. The specifications bring the total number of oil tankers sanctioned by the UK to 133 – the highest of any nation in Europe.  

    Finally, we are sanctioning 14 ‘New Kleptocrats’, some of whom are fronting up strategic sectors of Russia’s economy.  Among them are Roman Trotsenko, one of the wealthiest men in Russia, worth £2.2 billion.  

    After three years of the full-scale invasion, Ukrainians continue to defend their country and way of life with ingenuity and courage. They have shown that with the right support they can defend themselves against Russian aggression. Today’s action will strengthen Ukraine’s hand at a critical time in their fight for our shared security.

    Background

    Updates to this page

    Published 24 February 2025

    MIL OSI United Kingdom

  • MIL-OSI Europe: OCEANIA/AUSTRALIA – The first intercontinental meeting of the Pontifical Mission Societies in Asia and Oceania is currently taking place in Sydney

    Source: Agenzia Fides – MIL OSI

    Sydney (Agenzia Fides) – For the first time, representatives of the National Directions of the Pontifical Mission Societies in Asia and Oceania are meeting for an intercontinental meeting. The meeting, which is currently taking place in Sydney, will continue until Sunday.The National Directors, who represent more than 20 countries on both continents, including Bangladesh, Cambodia and Laos, Indonesia, Kazakhstan, Korea, Lebanon, New Zealand, the Pacific Islands, Pakistan, the Philippines, Sri Lanka, East Timor, Vietnam, Papua New Guinea and the Solomon Islands, will focus on the importance of collaboration in relation to the urgencies and hopes that characterize missionary work in the various local situations.The leitmotif of the five days is Pope Francis’ invitation to be “missionaries of hope among the peoples” (see Message for World Mission Sunday 2025). The participants of the meeting sent a message of solidarity in prayer to the Bishop of Rome, who is currently being treated for bilateral pneumonia at Gemelli Hospital in Rome.”The Pontifical Mission Societies in Australia ‘Catholic Mission’ is privileged to host the intercontinental meeting of the National Directors for Asia and Oceania,” said Father Brian Lucas. “Australia has very strong relations with our immediate neighbours, including the support of a regional office in Phnom Penh, and this opportunity for personal exchange provides an excellent basis for cooperation.”The aim is to join forces and find solutions together to respond to local challenges, said the organizers of the meeting, which, in addition to offering training courses (including one on the theme of the Jubilee Year “Pilgrims of Hope”), also offered the opportunity to meet with representatives of the Australian Church, including Archbishop Charles Balvo, Apostolic Nuncio in Australia, and Vincent Long Van Nguyen OFM, Bishop of the Diocese of Parramatta. In addition, the National Directors of the Pontifical Mission Societies from Asia and Oceania also met with Ms. Kelly Paget, Chancellor of the Diocese of Broken Bay, who had taken part in the World Synod on Synodality in Rome.”We are trying these days to unite as two regions. Of course, we have different problems, challenges and hopes, and that is what we are discussing here. Our hope is to speak with a united voice and work together for the mission of the Church throughout the world and to bring about concrete change,” said Father Michael Cheng Chai, National Director of the Pontifical Mission Societies in New Zealand. (EG) (Agenzia Fides, 22/2/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI United Nations: Committee on the Elimination of Discrimination against Women Closes Ninetieth Session in Geneva

    Source: United Nations – Geneva

    The Committee on the Elimination of Discrimination against Women today closed its ninetieth session after adopting concluding observations on the reports of Belarus, Belize, Congo, Liechtenstein, Luxembourg, Nepal and Sri Lanka, and on the exceptional report of the Democratic Republic of the Congo on conflict-related sexual violence in its eastern provinces.

    The concluding observations adopted by the Committee on the countries under review will soon be available on the session’s webpage.

    In concluding remarks, Committee Chairperson Nahla Haidar said that during the challenging ninetieth session, in addition to holding dialogues with States parties, the Committee had held informal meetings with non-governmental organizations from most of the State parties reviewed and with four national human rights institutions. It was grateful to these organizations and to United Nations entities for providing it with detailed information.

    Ms. Haidar said the highlight of the session was the half-day of general discussion on gender stereotypes on 17 February, which was attended by 46 States parties and 17 non-governmental organizations. The discussions highlighted the fact that gender stereotypes were underlying causes of gender-based violence against women and posed significant barriers to women’s access to political life, education, employment and leadership positions. They marked a crucial step in developing a general recommendation to guide States parties on eliminating stereotypes.

    During the session, Ms. Haidar said, the Committee made important progress in rationalising and harmonising its working methods with those of other treaty bodies, including through changes to rationalise working groups, increase the number of lists of issues prior to reporting to be adopted over the coming two years, and to systematically raise male succession to the throne in dialogues and concluding observations, where relevant.

    Ms. Haidar welcomed the progress achieved by the Working Group on gender-based violence against women on its draft working paper on online and tech-facilitated gender-based violence against women. She also commended the convening of an illustrious group of experts and private sector representatives to discuss best practices in digital innovation and mitigation of gender gaps during the Committee’s public meeting with the Working Group on business and human rights, and further welcomed the endorsement of the Committee’s contribution to the 2025 High-Level Political Forum on Sustainable Development.

    Ms. Haidar said the Committee had adopted five follow-up assessments and prepared four final decisions on individual communications. It also adopted the report of Inquiry 2014/2 concerning large-scale abductions of women and girls by insurgents and other armed groups, which would be published after the expiry of the six-month period for the State party concerned to submit observations.

    During the session, Ms. Haidar said, the Committee also held informal meetings with the United Nations Special Rapporteur on climate change, the Committee on the Rights of the Child, the Committee on Economic, Social and Cultural Rights and the World Health Organization.

    In closing, Ms. Haidar thanked all those who contributed to the session, including new Committee Experts Hamida Al-Shukairi (Oman), Violet Eudine Barriteau (Barbados), Nada Moustafa Fathi Draz (Egypt), Mu Hong (China), Madina Jarbussynova (Kazakhstan), Jelena Pia-Comella (Andorra), Erika Schläppi (Switzerland), and Patsilí Toledo Vasquez (Chile), as well as other Committee members, the Committee secretariat and United Nations staff. Though not an easy task, she said, the Committee had successfully delivered on its mandate to protect and promote women’s rights and gender equality.

    At the beginning of the meeting, Committee Rapporteur Brenda Akia presented the draft report of the session, which contained the draft report of the Working Group of the Whole and the provisional agenda for the Committee’s ninety-first session. The Committee then adopted the report ad referendum.

    The Committee on the Elimination of Discrimination against Women is provisionally scheduled to hold its ninety-first session from 16 June to 4 July 2025, in which it will review the reports of Afghanistan, Botswana, Chad, Mexico, Monaco, San Marino and Thailand.

    In addition, from 7 to 11 April in Suva, Fiji, the Committee will hold a technical cooperation session to review the reports of Fiji, Solomon Islands and Tuvalu and engage with Pacific States that are not yet parties to the Convention.

    ___________

    CEDAW.25.053E

    Produced by the United Nations Information Service in Geneva for use of the information media; not an official record.

    English and French versions of our releases are different as they are the product of two separate coverage teams that work independently.

    MIL OSI United Nations News

  • MIL-OSI Europe: OSCE workshop enhances protection of soft targets, public events, in Kyrgyzstan

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: OSCE workshop enhances protection of soft targets, public events, in Kyrgyzstan

    Participants in a workshop on protecting soft targets, such as public events, from terrorist attacks in Bishkek, 18 February 2024. (OSCE) Photo details

    Protecting soft targets, such as public events, from terrorist attacks was the focus of an OSCE workshop held in Bishkek, Kyrgyzstan, from 18 to 20 February. The event, bringing together 30 government officials, was organized by the OSCE Transnational Threats Department and the OSCE Programme Office in Bishkek. 
    “Project PROTECT offers us a unique opportunity to engage in tabletop exercises and share international perspectives on vulnerable targets protection. By learning together, we create a powerful synergy—gaining new skills, exchanging lessons, and strengthening our global approach,” highlighted Adylbek Kadyraliev, Deputy Director of the Anti-Terrorism Center of the State Committee for National Security of the Kyrgyz Republic.
    Participants discussed pre-event security planning tasks notably the delineation of roles and responsibilities between private and public stakeholders, assessing risk, managing traffic and ensuring human rights and privacy considerations. This theoretical knowledge was then tested in a full-day scenario-based exercise which encouraged rapid, practical and co-ordinated decision-making by participants.
    “The protection of soft targets is a cornerstone of comprehensive security strategies. By addressing vulnerabilities in these high-risk areas, authorities not only reduce the likelihood of destructive attacks, but also contribute to building public trust and maintaining social and economic stability,”  said Ambassador Alexey Rogov, Head of the OSCE Programme Office in Bishkek, in his opening remarks.
    Participants included experts and practitioners from the State Committee for National Security, Ministry of Interior, Ministry of Defence, Ministry of Education, Osh City Hall, Ministry of Internal Affairs, Prosecutor General’s office, Ministry of Culture, Bishkek City Hall and Ministry of Health of the Kyrgyz Republic as well as from the United Nations Office of Counter-Terrorism.
    This workshop is part of Project PROTECT, which enhances national approaches to protecting vulnerable targets from terrorist threats and other hazards in a manner that integrates compliance with human rights. The event was organized with the OSCE Programme Office in Bishkek and funded partly by Germany.

    MIL OSI Europe News

  • MIL-OSI China: Confucius Institute builds cultural bridge between China, Uzbekistan

    Source: China State Council Information Office 3

    On the premises of Tashkent State University of Oriental Studies is a unique “cultural bridge” connecting China and Uzbekistan — the Confucius Institute.

    The institute has been operating for more than 20 years, significantly contributing to strengthening the friendship between the two countries.

    It not only teaches the Chinese language but also promotes Chinese culture, said Gao Hongzhen, the Chinese director of the institute.

    Both children and adults study in the institute, with courses covering the Chinese language as well as traditional arts such as calligraphy and Chinese dance.

    Saodat Nasirova, the Uzbek director of the institute, said that the institute serves as a driving force in promoting knowledge about China in Uzbekistan and throughout the Central Asian region.

    Students gain in-depth knowledge of the Chinese language and culture, with many graduates returning to express their gratitude to the teachers.

    “This institute is a cherished educational place for students,” said Nasirova.

    Teachers at the institute employ innovative technologies such as virtual reality and artificial intelligence to enhance engagement and learning effectiveness.

    Wang Liyuan, a teacher, said that teaching is not just about imparting knowledge but also about inspiring dreams. Zhu Zhuxin, another teacher, uses game-based methods for children and focuses on practical communication skills for adults.

    The teachers played a key role in fostering interest in the Chinese language and culture, said Gulnoza Khodjaeva, a student at the institute.

    She regularly attends classes and actively participates in cultural events. “I not only discovered the beauty of Chinese characters but also felt how language serves as a bridge between different cultures,” she said. 

    MIL OSI China News

  • MIL-OSI China: Direct road transport service launched between China, Turkmenistan

    Source: People’s Republic of China – State Council News

    ZHENGZHOU, Feb. 20 — A truck bearing TIR signs on Thursday departed from an international road transport assembly center in Zhengzhou, the capital of central China’s Henan Province, bound for Ashgabat, the capital of Turkmenistan, embarking on the first journey of a new direct road transport service between the two countries.

    TIR, an abbreviation for Transports Internationaux Routiers, or International Road Transport, is an international customs transit system that saves time and costs for transport operators and customs authorities moving goods across borders.

    “The batch of cargo — mainly office supplies — will pass through the Horgos border port in China’s Xinjiang, after which it will transit through Kazakhstan and Uzbekistan,” said Wang Ti, deputy general manager of Zhengzhou Hongyi Transport Co., Ltd.

    A single trip on the Zhengzhou-Ashgabat TIR transport service takes nine days, covering about 6,000 kilometers. It saves approximately 35 percent of transport costs when compared to air freight services, and half the time when compared to rail transport services.

    Located in the Zhengzhou Airport Economic Zone, the International Road Transportation Henan Assembly Center is the first such center located in an inland region of China. It includes a TIR certificate issuance office and an international road transport vehicle inspection center, allowing companies to apply for international road transport documents and handle annual reviews.

    Li Zhen, deputy director of the Zhengzhou Airport Economic Zone’s management committee, said that the center has launched 18 TIR transport routes to and from nine countries, including Russia, Uzbekistan, Azerbaijan and Georgia.

    According to customs data, Zhengzhou Customs has overseen 458 TIR transport vehicle trips over the past two years, with a total throughput value exceeding 420 million yuan (about 57.9 million U.S. dollars). Approximately 1,200 trade companies have used the service to transport goods falling under more than 500 categories, ranging from automotive parts to food products.

    “Though it is an inland province without border or sea ports, Henan has built international logistics channels via TIR road transport, air freight and China-Europe freight train services to become a new pathway in the central China region,” said Ouyang Liangyuan, deputy director of Xinzheng Customs, which is administrated by Zhengzhou Customs.

    MIL OSI China News

  • MIL-OSI United Nations: Eighteenth International Capacity-Building Seminar on Trade and Transport Facilitation

    Source: United Nations Economic Commission for Europe

    This event is organized in collaboration between the United Nations Economic Commission for Europe (UNECE), the Government of Turkmenistan, and other partners. It is part of the work plan of the SPECA Chairmanship of Turkmenistan in 2025 and part of the implementation of the SPECA “Roadmap for the digitalization of multimodal data and document exchange along the Trans-Caspian transport corridor, using United Nations legal instruments and standards”. It focuses on the port-to-port data exchange across the Caspian Sea.

    MIL OSI United Nations News

  • MIL-OSI United Nations: States Parties to Treaty on Prohibition of Nuclear Weapons to Hold Third Meeting at Headquarters, 3-7 March

    Source: United Nations General Assembly and Security Council

    NEW YORK, 20 February (Office for Disarmament Affairs) — The third Meeting of States Parties to the Treaty on the Prohibition of Nuclear Weapons will be held at the United Nations Headquarters from 3 to 7 March.  Ambassador Akan Rakhmetullin (Kazakhstan) was elected as President.

    The Treaty was adopted on 7 July 2017 at the United Nations and entered into force on 22 January 2021.  It was the first multilateral nuclear disarmament treaty to be negotiated in more than two decades.  United Nations Secretary-General António Guterres has called the Treaty “an important step towards the goal of a world free of nuclear weapons and a strong demonstration of support for multilateral approaches to nuclear disarmament”.

    The third Meeting of States Parties will hold a thematic debate on the risks for humanity of nuclear conflict and its devastating humanitarian consequences.  States parties will also consider the status and operation of the Treaty, addressing issues related to universality; the total elimination of nuclear weapons; victim assistance, environmental remediation and international cooperation and assistance; and security concerns.  Other topics to be considered include scientific and technical advice for the effective implementation of the Treaty, the complementarity of the Treaty with the existing nuclear disarmament and non-proliferation regime and implementing the gender provisions of the Treaty.

    The Meeting is expected to adopt a political declaration.

    The period since the conclusion of the first Meeting of States Parties in April 2022 saw the appointment of a Scientific Advisory Group, which presented its report (document TPNW/MSP/2023/8) at the second Meeting of States Parties.  Since the second Meeting of States Parties in December 2023, five additional States have become parties to the Treaty.

    The Treaty contains, inter alia, a comprehensive set of prohibitions on participating in any nuclear weapon-related activities.  This includes undertakings not to develop, test, produce, acquire, possess, stockpile, use or threaten to use nuclear weapons.  The Treaty also prohibits the deployment of nuclear weapons on national territory, as well as the provision of assistance to any State in the conduct of prohibited activities.

    The Treaty requires States parties to assist individuals affected by the use or testing of nuclear weapons, as well as to take environmental remediation measures in areas under their jurisdiction or control that have been contaminated due to the testing or use of nuclear weapons.  States parties are required to cooperate with one another to facilitate the Treaty’s implementation.

    To date, 73 States have ratified or acceded to the Treaty and 94 have signed it.

    Media Contacts for the Third Meeting of States Parties to the Treaty on the Prohibition of Nuclear Weapons

    United Nations Office for Disarmament Affairs, UN Secretariat, S-30FW, email:  tpnw@un.org.

    MIL OSI United Nations News

  • MIL-OSI Russia: Take part in the ESU Olympiad and get admitted to a master’s degree program on a budget

    Translartion. Region: Russians Fedetion –

    Source: State University of Management – Official website of the State –

    The State University of Management invites you to take part in the II Eurasian Olympiad – the international student Olympiad of the Eurasian Network University.

    SUM is a member of the Eurasian Network University and a co-organizer of the ESU Olympiad. It should be noted that it is held in Russian in an online format by participating universities with the support of the Ministry of Science and Higher Education of Russia, as well as the Eurasian Economic Commission (EEC).

    This year the Olympiad is held in the form of a personal championship in 5 profiles:

    Economics and Management; International Relations and Humanities; Information and Computer Sciences; Biomedicine and Cognitive Sciences; Engineering and Future Technologies.

    Students and graduates of Russian and foreign universities who are receiving or already have higher education (bachelor’s or specialist’s degree level) and who are citizens of member countries and observer states of the Eurasian Economic Union can take part:

    Russian Federation; Republic of Belarus; Republic of Kazakhstan; Republic of Armenia; Kyrgyz Republic; Republic of Moldova; Republic of Uzbekistan; Republic of Cuba; Islamic Republic of Iran.

    Registration and portfolio submission are available until March 16 on the official website of the Olympiad. The winners of the selection round will be invited to online interviews, which will be held from March 24 to 30.

    Winners and prize winners of the main track of the Olympiad (except for citizens of the Russian Federation) have the opportunity to enroll in budget places in master’s programs of Russian universities participating in the ESU in areas of training in accordance with the declared profile of the Olympiad.

    Citizens of the Russian Federation and other EAEU countries, including observer countries, can take part in the international track of the Olympiad, the winners and prize winners of which will qualify for benefits and preferences provided by Russian and foreign universities of the ESU for the development of student exchanges, summer schools, scientific and educational cooperation and dual degree programs.

    Subscribe to the TG channel “Our GUU” Date of publication: 02/20/2025

    II Евразийской олимпиаде – международной студенческой олимпиаде Евразийского сетевого университета….” data-yashareImage=”https://guu.ru/wp-content/uploads/7ioj804y4G4.jpg” data-yashareLink=”https://guu.ru/%d0%bf%d1%80%d0%b8%d0%bc%d0%b8-%d1%83%d1%87%d0%b0%d1%81%d1%82%d0%b8%d0%b5-%d0%b2-%d0%be%d0%bb%d0%b8%d0%bc%d0%bf%d0%b8%d0%b0%d0%b4%d0%b5-%d0%b5%d1%81%d1%83-%d0%b8-%d0%bf%d0%be%d1%81%d1%82%d1%83%d0%bf/”>

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI United Kingdom: International Day for Commemorating Air Crash Victims and their Families 2025

    Source: United Kingdom – Executive Government & Departments

    AAIB remembers all those affected by air accidents

    Thursday, 20th February 2025 is the International Day Commemorating Air Crash Victims and Their Families.

    Recent events in the USA, South Korea, Brazil and Kazakhstan remind us of the impact these events have on the loved ones of those involved.

    Our dedicated team remains committed to conducting thorough and independent investigations, working to improve aviation safety and prevent future accidents.

    We acknowledge the profound impact these events have on families and will continue to ensure they are treated with respect and are kept informed throughout our investigation process.

    Updates to this page

    Published 19 February 2025

    MIL OSI United Kingdom

  • MIL-OSI: Condor Well in Uzbekistan Flows at 1,300 boepd After Workover Operation

    Source: GlobeNewswire (MIL-OSI)

    CALGARY, Alberta, Feb. 19, 2025 (GLOBE NEWSWIRE) — Condor Energies Inc. (“Condor” or the “Company”) (TSX: CDR), a Canadian based energy transition company is pleased to provide an update on the eight gas fields production enhancement project it operates in Uzbekistan.

    On a recent workover operation, a potential gas pay section was identified using advanced cased-hole logging tools and reprocessed existing 3-D seismic data which provided significant formation imaging improvements. Prior to the workover, the well had watered out and was not producing. After perforating 23 meters of this newly identified 60-meter interval, the well began flowing at over 1,100 boepd based on a 24-hour production test and has increased to 1,300 boepd during the past 5 days as the completion fluid has now been recovered.

    At least five additional well candidates have been identified with similar geologic characteristics using a combination of legacy data and reprocessed 3-D seismic data. Over the coming weeks, these wells will be evaluated to identify potential pay intervals and perforated accordingly. The Company is currently operating two workover rigs and a wireline unit. A third workover rig and second wireline unit with advanced evaluation tools from a North American based services provider is mobilizing to Uzbekistan.

    Average production for the fourth quarter of 2024 was 10,510 boepd, up 5% from the third quarter of 2024 and yielded Q4 sales revenues of CA$20.9 million. Production was hampered in the latter part of December 2024 and January 2025 mainly from natural decline rates, as the two workover rigs focused on evaluating shallower Cretaceous-aged, stacked channel sands that had not previously been penetrated on the fields. Despite gas flowing to surface, wellhead pressures were not sufficient to match the existing flowline gathering system pressures. This was likely due in part to having limited zonal isolation to prevent water flows and also not having perforating charges that fully penetrated through two existing casing strings to provide unimpeded access to these gas reservoirs. Given that gas presence was confirmed at surface, Condor will further evaluate these Cretaceous channel sands as part of its 2025 infill well drilling campaign. Both workover rigs have now resumed work on Carbonate formation intervals and production for the past 5 days has averaged 11,455 boepd as newly perforated Carbonate zones begin flowing.

    Don Streu, President and CEO of Condor commented: “The material production gains from the ongoing workover program and facility enhancements highlights the capital efficiencies realized from our production enhancement approach. We are continuing to execute our production growth plans in 2025 by adding a third workover rig, drilling a four well vertical and horizontal infill program, continued artificial lift and in-field water separation installations, expanded regions of 3D seismic reprocessing, and field compression. The collaborative working relationship with the national company, JSC “Uzbekneftegaz (“UNG”) and national technical institutes has been instrumental in these early successes.”

    ABOUT CONDOR ENERGIES INC

    Condor Energies Inc is a TSX-listed energy transition company that is uniquely positioned on the doorstep of European and Asian markets with three distinct first-mover initiatives: increasing natural gas and condensate production from its existing fields in Uzbekistan; an ongoing project to construct and operate Central Asia’s first LNG ‘lower carbon fuel’ diesel substitution facility in Kazakhstan; and a separate initiative to develop and produce critical minerals from brines in Kazakhstan. Condor has already built a strong foundation for reserves, production and cashflow growth while also striving to minimize its environmental footprint.

    FORWARD-LOOKING STATEMENTS

    Certain statements in this news release constitute forward-looking statements under applicable securities legislation. Such statements are generally identifiable by the terminology used, such as “anticipate”, “appear”, “believe”, “intend”, “expect”, “plan”, “estimate”, “budget”, “outlook”, “scheduled”, “may”, “will”, “should”, “could”, “would”, “in the process of” or other similar wording. Forward-looking information in this news release includes, but is not limited to, information concerning: the timing and ability to complete workovers on the next five well candidates and have them produce at commercial gas rates; the timing and ability to mobilize a third workover rig and second wireline unit; the timing and ability to access and evaluate future Cretaceous channel sands; the timing and ability to execute the 2025 work plan, including adding a third workover rig, drilling a four well vertical and horizontal infill program, continued artificial lift and in-field water separation installations, expanded regions of 3D seismic reprocessing, and field compression; and the timing and ability to maintain a collaborative working relationship with UNG and national technical institutes.

    ABBREVIATIONS

    The following is a summary of abbreviations used in this news release:

    boepd barrels of oil equivalent per day*
    CA$ Canadian dollar
    MM million
       

    * Barrels of oil equivalent (“boe”) are derived by converting gas to oil in the ratio of six thousand standard cubic feet (“Mscf”) of gas to one barrel of oil based on an energy conversion method primarily applicable at the burner tip and does not represent a value equivalency at the wellhead. Given the value ratio based on the current price of crude oil as compared to natural gas is significantly different from the energy equivalency of 6 Mscf to 1 barrel, utilizing a conversion ratio at 6 Mscf to 1 barrel may be misleading as an indication of value, particularly if used in isolation.

    The TSX does not accept responsibility for the adequacy or accuracy of this news release.

    For further information, please contact Don Streu, President and CEO or Sandy Quilty, Vice President of Finance and CFO at 403-201-9694.

    The MIL Network

  • MIL-OSI Economics: ADB Supports Digital Transformation of Uzbekistan’s Water Sector

    Source: Asia Development Bank

    MANILA, PHILIPPINES (19 February 2025) — The Asian Development Bank (ADB) approved a $125 million loan to support the Government of Uzbekistan in modernizing water management, improving water security, and increasing access to safe and reliable water in the country. 

    The Climate-Smart Water Management Improvement Project will improve asset management and sustainability of service delivery, while strengthening the institutional capacity of the country’s national water utility. This will help decision making and enhance water management and energy-use efficiency, contributing to climate change mitigation efforts.

    “Uzbekistan’s water resources are under acute threat from climate change and inefficient usage,” said ADB Country Director for Uzbekistan Kanokpan Lao-Araya. “ADB’s project introduces smart water management systems to improve water usage, reduce energy consumption, and increase operational efficiency to lower Uzbekistan’s carbon footprint.” 

    The project will support the Joint Stock Company Uzsuvtaminot (the national water utility) and its regional branches in completing the installation of an ongoing nationwide bulk flow metering and telemetry system on the main water resource’s locations. The project will also carry out an asset inventory and prepare onsite geographic mapping for all existing water supply and wastewater infrastructure, including about 4 million customer connections. 

    An integrated package of climate-smart, IT-based utility management systems will be launched, including relevant training for the national water utility staff. The project will also improve customer centers by providing new financial management software that will lead to transparent financial statements based on international standards. 

    The project will promote transformative digital solutions and technologies to decrease operational expenditure, increase workforce efficiency, and enhance customer engagement and satisfaction.

    This year marks the 30th anniversary of the partnership between ADB and the Republic of Uzbekistan. Since the Republic of Uzbekistan joined ADB in 1995, the bank has committed public sector loans, grants, and technical assistance totaling $14.3 billion to the country.

    ADB is committed to achieving a prosperous, inclusive, resilient, and sustainable Asia and the Pacific, while sustaining its efforts to eradicate extreme poverty. Established in 1966, it is owned by 69 members—49 from the region.

    MIL OSI Economics

  • MIL-OSI United Nations: Human Rights Council to Hold its Fifty-Eighth Regular Session from 24 February to 4 April 2025

    Source: United Nations – Geneva

    The United Nations Human Rights Council will hold its fifty-eighth regular session from 24 February to 4 April 2025 at the Palais des Nations in Geneva, starting with its high-level segment from 24 to 26 February, when dignitaries representing more than 100 Member States will address the Council.

    The session will open at 9 a.m. on Monday, 24 February under the Presidency of Ambassador Jürg Lauber of Switzerland. Delivering statements at the opening will be the Secretary-General of the United Nations, António Guterres; the President of the United Nations General Assembly , Philemon Yang; the United Nations High Commissioner for Human Rights, Volker Türk; as well as the Chief of the Federal Department of Foreign Affairs of Switzerland, Ignazio Cassis. The Council will be meeting in room XX of the Palais des Nations.

    On Monday, 3 March, the Council is scheduled to hear a global update by the High Commissioner for Human Rights on the situation of human rights around the world. The general debate on his global update will start following his presentation of a number of country-specific reports and updates.

    During the session, the Council will hold 30 interactive dialogues with the High Commissioner, his Office and designated experts, with Special Procedure mandate holders and investigative mechanisms, and with Special Representatives of the Secretary-General. The Council will also hold five enhanced interactive dialogues and one high-level dialogue, as well as nine general debates.

    The Council will also hold the annual high-level panel discussion on human rights mainstreaming with a focus on the thirtieth anniversary of the Beijing Declaration and Platform for Action; the biennial high-level panel on the death penalty ; panel discussions on early warning and genocide, HIV response and leaving no one behind, and on rights to work and to social security ; the annual interactive debate on the rights of persons with disabilities; the annual discussion on the rights of the child; and a commemoration of the International Day for the Elimination of Racial Discrimination.

    The Council will examine the situation of human rights in a number of countries under its various agenda items, including the situation in the occupied Palestinian territory, Eritrea, Sudan, South Sudan, Nicaragua, Afghanistan and Myanmar under agenda item two; in Iran, Syria, Venezuela, Ukraine, Belarus, the Democratic People’s Republic of Korea, and Myanmar under agenda item four; and in Mali, Haiti, Ukraine, the Democratic Republic of the Congo, South Sudan and Central African Republic under agenda item 10.

    The final outcomes of the Universal Periodic Review of 14 States will also be considered, namely those of Norway, Albania, Democratic Republic of the Congo, Côte d’Ivoire, Portugal, Bhutan, Dominica, Democratic People’s Republic of Korea, Brunei Darussalam, Costa Rica, Equatorial Guinea, Ethiopia, Qatar and Nicaragua. 

    Towards the end of the session, the Council will appoint three new members of the Expert Mechanism on the Rights of Indigenous Peoples.

    A detailed agenda and further information on the fifty-eighth session can be found on the session’s webpage . Reports to be presented are available here. 

    First Week of the Session 

    The fifty-eighth regular session will open at 9 a.m. on Monday, 24 February with a short opening meeting, followed by the start of the high-level segment, which will continue until 26 February, and during which the Council will hear addresses by more than 100 dignitaries. Intervening during the high-level segment will be the annual high-level panel discussion on human rights mainstreaming in the afternoon of 24 February and the biennial high-level panel on the death penalty in the morning of Tuesday, 25 February. The general segment will follow the conclusion of the high-level segment in the afternoon of Wednesday, 26 February.

    On Thursday, 27 February, the Council will hold an interactive dialogue on the High Commissioner’s report on the occupied Palestinian territory, including East Jerusalem, and the obligation to ensure accountability and justice, followed by enhanced interactive dialogues on the situation of human rights in Eritrea and on the High Commissioner’s report on Sudan, with the assistance of the designated Expert. Friday, 28 February, will see the conclusion of the discussion on Sudan, followed by an enhanced interactive dialogue on the report of the Commission on Human Rights in South Sudan. This will be followed by three interactive dialogues, the first on the report of the Group of Human Rights Experts on Nicaragua, the second with the Special Rapporteur on the situation of human rights in Afghanistan, and the third on the High Commissioner’s oral update on Myanmar.

    Second Week of the Session 

    At the beginning of the second week, on the morning of Monday, 3 March, the Council will hear the High Commissioner’s global update, then conclude the interactive dialogue on the High Commissioner’s oral update on Myanmar. This will be followed by the presentation of reports on the activities of the Office of the High Commissioner in Colombia, Guatemala and Honduras, and of another report on Cyprus, and oral updates on Sri Lanka and Nicaragua. The Council will then begin the general debate under agenda item two, namely the annual report of the High Commissioner for Human Rights and reports of the Office of the High Commissioner and the Secretary-General, which will conclude on Tuesday, 4 March. The Council will subsequently begin its considerations under agenda item three on the promotion and protection of all human rights, holding interactive dialogues with the Special Rapporteur on torture and other cruel, inhuman or degrading treatment or punishment and with the Special Rapporteur on freedom of religion or belief.

    On the morning of Wednesday, 5 March, the Council will hold a panel on early warning and genocide prevention, then conclude its interactive dialogue with the Special Rapporteur on freedom of religion or belief. This will be followed by an enhanced interactive dialogue on the report of the Office of the High Commissioner on transitional justice. Another panel will be held on Thursday, 6 March on HIV response and leaving no one behind, in addition to two interactive dialogues with the Special Rapporteur on the situation of human rights defenders and the Special Rapporteur in the field of cultural rights. A third panel will be held in the morning of Friday, 7 March on rights to work and to social security, followed by two interactive dialogues with the Special Rapporteur on the right to adequate housing and the Independent Expert on the rights of persons with albinism.

    Third Week of the Session 

    The Council will start its third week on Monday, 10 March with a focus on disability, beginning with an interactive dialogue with the Special Rapporteur on the rights of persons with disabilities, to be followed by the annual debate on the rights of persons with disabilities. The day will conclude with an interactive dialogue with the Independent Expert on foreign debt, which will continue in the morning of Tuesday, 11 March. Two more interactive dialogues will also be held on Tuesday with the Special Rapporteur on the right to food and the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism.

    Wednesday, 12 March will see a further three interactive dialogues with the Special Rapporteur on the right to privacy, and the Special Representatives of the Secretary-General on violence against children and on children and armed conflict, the latter of which will conclude on Thursday, 13 March. The focus on children will continue on Thursday, with the Council also holding its annual discussion on the rights of the child, the theme of which will be early childhood development, and starting an interactive dialogue with the Special Rapporteur on the sale of children, which will conclude on Friday, 14 March.

    On Friday, an interactive dialogue with the Special Rapporteur on the human right to a healthy environment will precede the presentation of reports by the open-ended intergovernmental working group on transnational corporations and other business enterprises with respect to human rights, the Secretary-General, the High Commissioner and his Office, followed by the start of the general debate on agenda item three.

    Fourth Week of the Session

    The first day of the Council’s fourth week, Monday 17 March, will be devoted to concluding the general debate on agenda item three. From Tuesday, 18 March, consideration of agenda item four, human rights situations that require the Council’s attention, will begin. First on the schedule is a joint interactive dialogue with the Special Rapporteur and the independent international fact-finding mission on the situation of human rights in Iran, followed by interactive dialogues with the independent international commission of inquiry on Syria, the fact-finding mission on Venezuela and the independent international commission of inquiry on Ukraine.

    On Wednesday, 19 March, after the conclusion of the dialogue with the commission of inquiry on Ukraine, three more separate interactive dialogues will be held with the group of independent experts on the situation of human rights in Belarus and with the Special Rapporteurs on the situation of human rights in the Democratic People’s Republic of Korea and in Myanmar.

    Thursday, 20 March, will see the Council hear the presentation of the High Commissioner’s report on the Democratic People’s Republic of Korea and his oral update of the situation of human rights in Venezuela. This will be followed by the general debate on agenda item four, which will conclude on the morning of Friday, 21 March. On Friday, the Council will also hold an interactive dialogue with the Special Rapporteur on minority issues, before beginning considerations under agenda item five on human rights bodies and mechanisms. After hearing the presentation of reports by the Forum on Minority Issues, the Social Forum, and the Special Procedures of the Council, it will commence the general debate on agenda item five.

    Fifth Week of the Session 

    The Council will start its fifth week on Monday, 24 March with its consideration under agenda item six of the final outcomes of the Universal Periodic Reviews of 14 States: Norway, Albania, Democratic Republic of the Congo, Côte d’Ivoire, Portugal, Bhutan, Dominica, Democratic People’s Republic of Korea, Brunei Darussalam, Costa Rica, Equatorial Guinea, Ethiopia, Qatar and Nicaragua. This consideration will continue through to the morning of Wednesday, 26 March, after which the Council will hold a general debate on agenda item six. This will be followed by the presentation of the reports of the High Commissioner and the Secretary-General under agenda item seven, namely the human rights situation in Palestine and other occupied Arab territories, and the general debate on this agenda item. The general debate under agenda item eight – follow-up and implementation of the Vienna Declaration and Programme of Action – is also scheduled to commence on Wednesday afternoon.

    Ending racism will be the Council’s theme for Thursday, 27 March. After concluding the debate under agenda item eight, it will hear the presentation of the report of the intergovernmental working group on the effective implementation of the Durban Declaration and Programme of Action, then hold its general debate on agenda item nine, namely racism, racial discrimination, xenophobia and related forms of intolerance, follow-up to and implementation of the Durban Declaration and Programme of Action. From 2:30 to 4:30 p.m., the Council will also hold a meeting in commemoration of the International Day for the Elimination of Racial Discrimination.

    Friday, 28 March will begin with the conclusion of the debate under agenda item nine, followed by three interactive dialogues conducted under agenda item 10 on technical assistance and capacity-building. The first dialogue will be with the Independent Expert on the situation of human rights in Mali; the second on the High Commissioner’s report on the situation of human rights in Haiti, with the participation of the Independent Expert on the subject; and the third on the High Commissioner’s oral update on the situation of human rights in Ukraine.

    Sixth Week of the Session 

    Monday, 31 March is a United Nations holiday. On Tuesday, 1 April, the Council will hold an enhanced interactive dialogue on oral updates by the High Commissioner and by the team of international experts on the Democratic Republic of the Congo, followed by an interactive dialogue on the report of the Office of the High Commissioner on technical assistance and capacity building for South Sudan and a high-level dialogue on the Central African Republic. At the end of the day, the Council will hear the annual presentation of the High Commissioner on technical cooperation and his oral update on Georgia, and the presentation of the report of the Board of Trustees of the Voluntary Fund for Technical Cooperation, followed by the general debate on agenda item 10.

    The general debate will conclude on Wednesday, 2 April, and the Council will then start to act on draft decisions and resolutions, appoint three new members of the Expert Mechanism on the Rights of Indigenous Peoples, and adopt the report of the fifty-eighth regular session, before closing the session on Friday, 4 April.

    The Human Rights Council 

    The Human Rights Council is an inter-governmental body within the United Nations system, made up of 47 States, which is responsible for strengthening the promotion and protection of human rights around the globe. The Council was created by the United Nations General Assembly on 15 March 2006 with the main purpose of addressing situations of human rights violations and making recommendations on them.

    The composition of the Human Rights Council at its fifty-eighth session is as follows: Albania (2026); Algeria (2025); Bangladesh (2025); Belgium (2025); Benin (2027); Bolivia (2027); Brazil (2026); Bulgaria (2026); Burundi (2026); Chile (2025); China (2026); Colombia (2027); Costa Rica (2025); Côte d’Ivoire (2026); Cuba (2026); Cyprus (2027); Czechia (2027); Democratic Republic of the Congo (2027); Dominican Republic (2026); Ethiopia (2027); France (2026); Gambia (2027); Georgia (2025); Germany (2025); Ghana (2026); Iceland (2027); Indonesia (2026); Japan (2026); Kenya (2027); Kuwait (2026); Kyrgyzstan (2025); Malawi (2026); Maldives (2025); Marshall Islands (2027); Mexico (2027); Morocco (2025); Netherlands (2026); North Macedonia (2027); Qatar (2027); Republic of Korea (2027); Romania (2025); South Africa (2025); Spain (2027); Sudan (2025); Switzerland (2027); Thailand (2027); and Viet Nam (2025).

    The term of membership of each State expires in the year indicated in parentheses.

    The President of the Human Rights Council in 2025 is Jürg Lauber (Switzerland). The four Vice-Presidents are Tareq Md Ariful Islam (Bangladesh), Razvan Rusu (Romania), Paul Empole Losoko Efambe (Democratic Republic of the Congo) and a fourth Vice-President to be elected later from the Group of Latin American and Caribbean States. Mr. Efambe will also serve as Rapporteur of the Geneva-based body.

    The dates and venue of the fifty-eighth session are subject to change.

    Information on the fifty-eighth session can be found here , including the annotated agenda and the reports to be presented.

    For further information, please contact Pascal Sim (simp@un.org), Matthew Brown (matthew.brown@un.org) or David Díaz Martín (David.diazmartin@un.org)

    ___________

    Produced by the United Nations Information Service in Geneva for use of the media; 
    not an official record. English and French versions of our releases are different as they are the product of two separate coverage teams that work independently.

     

    HRC.25.001E

    MIL OSI United Nations News

  • MIL-OSI USA: NASA Sets Briefings for Next International Space Station Crew Missions

    Source: NASA

    NASA and its partners will discuss the upcoming Expedition 73 mission aboard the International Space Station during a pair of news conferences on Monday, Feb. 24, from the agency’s Johnson Space Center in Houston.
    Mission leadership will participate in an overview news conference at 2 p.m. EST live on NASA+, covering preparations for NASA’s SpaceX Crew-10 launch in March and the agency’s crew member rotation launch on Soyuz in April. Learn how to watch NASA content through a variety of platforms, including social media.
    NASA also will host a crew news conference at 4 p.m. and provide coverage on NASA+, followed by individual crew member interviews beginning at 5 p.m. This is the final media opportunity with Crew-10 before the crew members travel to NASA’s Kennedy Space Center in Florida for launch.
    The Crew-10 mission, targeted to launch Wednesday, March 12, will carry NASA astronauts Anne McClain and Nichole Ayers, JAXA (Japan Aerospace Exploration Agency) astronaut Takuya Onishi, and Roscosmos cosmonaut Kirill Peskov to the orbiting laboratory.
    NASA astronaut Jonny Kim, scheduled to launch to the space station on the Soyuz MS-27 spacecraft no earlier than April 8, also will participate in the crew briefing and interviews. Kim will be available again on Tuesday, March 18, for limited virtual interviews prior to launch. NASA will provide additional details on that opportunity when available.
    For the Crew-10 mission, a SpaceX Falcon 9 rocket and Dragon spacecraft will launch from Launch Complex 39A at NASA Kennedy. The three-person crew of Soyuz MS-27, including Kim and Roscosmos cosmonauts Sergey Ryzhikov and Alexey Zubritsky, will launch from the Baikonur Cosmodrome in Kazakhstan.
    United States-based media seeking to attend in person must contact the NASA Johnson newsroom no later than 5 p.m. on Friday, Feb. 21, at 281-483-5111 or at jsccommu@mail.nasa.gov. U.S. and international media interested in participating by phone must contact NASA Johnson by 9:45 a.m. the day of the event.
    U.S. and international media seeking remote interviews with the crew must submit requests to the NASA Johnson newsroom by 5 p.m. on Feb. 21. A copy of NASA’s media accreditation policy is available online.
    Briefing participants include (all times Eastern and subject to change based on real-time operations):
    2 p.m.: Expedition 73 Overview News Conference

    Ken Bowersox, associate administrator, Space Operations Mission Directorate at NASA Headquarters in Washington

    Steve Stich, manager, NASA’s Commercial Crew Program, NASA Kennedy
    Bill Spetch, operations integration manager, NASA’s International Space Station Program, NASA Johnson
    William Gerstenmaier, vice president, Build & Flight Reliability, SpaceX
    Mayumi Matsuura, vice president and director general, Human Spaceflight Technology Directorate, JAXA

    4 p.m.: Expedition 73 Crew News Conference

    Jonny Kim, Soyuz MS-27 flight engineer, NASA
    Anne McClain, Crew-10 spacecraft commander, NASA
    Nichole Ayers, Crew-10 pilot, NASA
    Takuya Onishi, Crew-10 mission specialist, JAXA
    Kirill Peskov, Crew-10 mission specialist, Roscosmos

    5 p.m.: Crew Individual Interview Opportunities

    Crew-10 members and Kim available for a limited number of interviews

    Kim is making his first spaceflight after selection as part of the 2017 NASA astronaut class. A native of Los Angeles, Kim is a U.S. Navy lieutenant commander and dual designated naval aviator and flight surgeon. Kim also served as an enlisted Navy SEAL. He holds a bachelor’s degree in Mathematics from the University of San Diego and a medical degree from Harvard Medical School in Boston. He completed his internship with the Harvard Affiliated Emergency Medicine Residency at Massachusetts General Hospital and Brigham and Women’s Hospital. After completing the initial astronaut candidate training, Kim supported mission and crew operations in various roles, including the Expedition 65 lead operations officer, T-38 operations liaison, and space station capcom chief engineer. Follow @jonnykimusa on X and @jonnykimusa on Instagram.
    Selected by NASA as an astronaut in 2013, this will be McClain’s second spaceflight. A colonel in the U.S. Army, she earned her bachelor’s degree in Mechanical Engineering from the U.S. Military Academy at West Point, New York, and holds master’s degrees in Aerospace Engineering, International Security, and Strategic Studies. The Spokane, Washington, native was an instructor pilot in the OH-58D Kiowa Warrior helicopter and is a graduate of the U.S. Naval Test Pilot School in Patuxent River, Maryland. McClain has more than 2,300 flight hours in 24 rotary and fixed-wing aircraft, including more than 800 in combat, and was a member of the U.S. Women’s National Rugby Team. On her first spaceflight, McClain spent 204 days as a flight engineer during Expeditions 58 and 59, and completed two spacewalks, totaling 13 hours and 8 minutes. Since then, she has served in various roles, including branch chief and space station assistant to the chief of NASA’s Astronaut Office. Follow @astroannimal on X and @astro_annimal on Instagram.
    The Crew-10 mission will be the first spaceflight for Ayers, who was selected as a NASA astronaut in 2021. Ayers is a major in the U.S. Air Force and the first member of NASA’s 2021 astronaut class named to a crew. The Colorado native graduated from the Air Force Academy in Colorado Springs with a bachelor’s degree in Mathematics and a minor in Russian, where she was a member of the academy’s varsity volleyball team. She later earned a master’s in Computational and Applied Mathematics from Rice University in Houston. Ayers served as an instructor pilot and mission commander in the T-38 ADAIR and F-22 Raptor, leading multinational and multiservice missions worldwide. She has more than 1,400 total flight hours, including more than 200 in combat. Follow @astro_ayers on X and @astro_ayers on Instagram.
    With 113 days in space, this mission also will mark Onishi’s second trip to the space station. After being selected as an astronaut by JAXA in 2009, he flew as a flight engineer for Expeditions 48 and 49, becoming the first Japanese astronaut to robotically capture the Cygnus spacecraft. He also constructed a new experimental environment aboard Kibo, the station’s Japanese experiment module. After his first spaceflight, Onishi became certified as a JAXA flight director, leading the team responsible for operating Kibo from JAXA Mission Control in Tsukuba, Japan. He holds a bachelor’s degree in Aeronautics and Astronautics from the University of Tokyo, and was a pilot for All Nippon Airways, flying more than 3,700 flight hours in the Boeing 767. Follow astro_onishi on X.
    The Crew-10 mission will also be Peskov’s first spaceflight. Before his selection as a cosmonaut in 2018, he earned a degree in Engineering from the Ulyanovsk Civil Aviation School and was a co-pilot on the Boeing 757 and 767 aircraft for airlines Nordwind and Ikar. Assigned as a test cosmonaut in 2020, he has additional experience in skydiving, zero-gravity training, scuba diving, and wilderness survival.
    Learn more about how NASA innovates for the benefit of humanity through NASA’s Commercial Crew Program at:
    https://www.nasa.gov/commercialcrew
    -end-
    Joshua Finch / Jimi RussellHeadquarters, Washington202-358-1100joshua.a.finch@nasa.gov / james.j.russell@nasa.gov
    Kenna Pell / Sandra JonesJohnson Space Center, Houston281-483-5111kenna.m.pell@nasa.gov / sandra.p.jones@nasa.gov

    MIL OSI USA News

  • MIL-OSI Europe: OSCE Supports Medical Training for Border Service Personnel in Kyrgyzstan

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: OSCE Supports Medical Training for Border Service Personnel in Kyrgyzstan

    Participants of the specialized Train-the-Trainer (ToT) programme aimed at strengthening the medical response capabilities of the Border Service. Osh, Kyrgyzstan. (OSCE) Photo details

    Bishkek, 31 January 2025 – The OSCE Programme Office in Bishkek has implemented a specialized Train-the-Trainer (ToT) programme aimed at strengthening the medical response capabilities of the Border Service of the State Committee for National Security of the Kyrgyz Republic.
    From 27 to 31 January 2025, nine selected lecturers, instructors, and medical professionals participated in the training at the Border Service Training Centre in Osh. The training developed by Lazarus Ltd, a UK-based company, was designed in line with International Mine Action Standards (IMAS) “Basic Care Provider” requirements and tailored to local conditions.
    The ToT programme focused on theoretical and practical training. Participants gained expertise in training methodologies, fostering an engaging learning environment, and instructional skills. The hands-on sessions included the use of training dummies, wound simulators, and scenario-based exercises to enhance their ability to train Border Service personnel effectively.
    This programme follows an initial needs assessment conducted by Lazarus Training in September 2024 and the basic and intermediate-level medical training delivered in November–December 2024, in which 30 personnel completed the basic training and 15 completed the intermediate training. The final stage will involve the procurement of training equipment to further enhance the Border Service’s medical training capacity. The newly trained trainers will now continue conducting medical trainings within the Border Service, further reinforcing the sustainability of the programme.
    Through this initiative, the OSCE continues to support regional security and capacity-building efforts, ensuring that Border Service personnel are equipped with the skills necessary to respond effectively to medical emergencies.
    The initiative is implemented within the framework of the extrabudgetary project “Reducing risk of illicit small arms and light weapons, ammunition and explosives proliferation across border of Kyrgyz Republic,” funded by the US, Germany, Norway, UK, and supported by Austria and Poland.

    MIL OSI Europe News

  • MIL-OSI Economics: Spam and phishing in 2024

    Source: Securelist – Kaspersky

    Headline: Spam and phishing in 2024

    The year in figures

    • 27% of all emails sent worldwide and 48.57% of all emails sent in the Russian web segment were spam
    • 18% of all spam emails were sent from Russia
    • Kaspersky Mail Anti-Virus blocked 125,521,794 malicious email attachments
    • Our Anti-Phishing system thwarted 893,216,170 attempts to follow phishing links
    • Chat Protection in Kaspersky mobile solutions prevented more than 60,000 redirects via phishing links from Telegram

    Phishing and scams in 2024

    Phishing for travelers

    In 2024, cybercriminals targeted travel enthusiasts using fake hotel and airline booking websites. In one simple scheme, a fraudulent site asked users to enter their login credentials to complete their booking — these credentials ended up in criminal hands. Sometimes, the fake login form appeared under multiple brand names at once (for example, both Booking and Airbnb).

    Another scheme involved a more sophisticated fake site, where users could even select the purpose of their trip (business or leisure). To complete the booking, the scammers requested bank card details, claiming that a certain sum would be temporarily blocked on the account to verify the card’s authenticity. Legitimate booking services regularly request payment details, so the victim may not suspect anything in this case. To rush users into entering their data carelessly, on the phishing page, the scammers displayed warnings about dwindling accommodation availability and an imminent payment deadline for the booking. If the victim entered their data, the funds were not frozen but went straight into the criminals’ pockets.

    Cyberthreats in the travel sector affected not only tourists but also employees of travel agencies. By gaining access to a corporate account, criminals could conduct financial transactions on behalf of employees and gain access to large customer databases.

    Fake accommodation sites often sent messages to property owners, telling them to log in to “manage their property.” This scheme targeted people renting out their homes through online booking platforms.

    Other scam pages featured surveys, offering respondents gifts or prize draws for participating. In this case, victims risked both their credentials and their money. Such fake giveaways are a classic scam tactic. They are often timed to coincide with a significant date for the travel industry or a specific company. For example, the screenshot below shows an offer to take part in a giveaway of airline tickets to celebrate Ryanair’s birthday.

    After completing the survey, users may be asked to share the offer with a certain number of contacts, and then pay a small fee to receive the expensive gift. Of course, these prizes are non-existent.

    Trapped in social networks

    To steal credentials for social media and messenger accounts, scammers used another classic technique: asking users to verify themselves. In one scheme, the victim was redirected to a website that completely replicated WhatsApp’s design. The user entered their phone number and login code, handing their credentials straight over to the cybercriminals.

    Beyond verification scams, fraudsters also lured victims with attractive offers. For example, in the screenshot below, the victim is promised free Instagram followers.

    Some cybercriminals also used the promise of adult content to lure victims into entering their credentials in a fake authorization form.

    Other scammers took advantage of Facebook and Instagram being owned by the same company. On a fraudulent page, they claimed to offer a service that allowed users to find Instagram profiles by entering their Facebook login and password.

    Some scams offered users a surprise “gift” — a free Telegram Premium subscription. To enable the messenger’s premium features, the victim only had to enter their phone number and a one-time code on a fraudulent website.

    Some fake social media and messenger pages were designed not to steal login credentials but to install malware on victims’ devices. Taking advantage of the popularity of Facebook Lite for Android, scammers offered users a “more advanced official version”, claiming it had extra features missing in the original app. However, instead of an upgraded app, users downloaded malware onto their devices.

    Similarly, installing a supposedly free Telegram client with an activated Premium subscription often led to downloading malware.

    Social media business services were increasingly used as a pretext for credential theft, as they play a key role in developing and promoting businesses and are directly linked to financial operations. Cybercriminals tricked Telegram channel owners into logging in to a phishing platform imitating the official Telegram Ads tool, thereby stealing their Telegram credentials. To make the scam more convincing, the attackers detailed how Telegram advertising works and promised millions of ad views per month.

    TikTok users have also been targeted. TikTok Shop allows sellers to list curated products—items featured in videos—for potential buyers to find and purchase. Scammers created fake TikTok Shop pages to steal seller credentials, potentially leading to both reputational and financial damage.

    In another case, fraudsters informed Facebook fan page owners of unusual activity in their accounts. Potential victims were prompted to check their profile by entering their login credentials into a phishing form.

    Cryptocurrency: don’t mistake scams for real deals

    One of last year’s most sensational stories was the cryptocurrency game Hamster Kombat. This clicker game, simulating the creation of a crypto exchange in a gamified format, quickly attracted a massive audience. Players eagerly awaited the moment when the in-game coins could be exchanged for real virtual currency. But while the official listing was delayed, the fraudulent schemes wasted no time.

    Fraudsters claimed to offer cash-out services for in-game coins by converting them into rubles. To withdraw money, criminals claimed, users just had to log in through a fake Telegram page.

    The growing anticipation for the new cryptocurrency’s market launch was frequently exploited by cybercriminals to steal seed phrases from crypto wallets. Scammers announced an early token sale, requiring users to log in through a fake page to participate. Of course, there was no mention of such promotions on official resources.

    The popularity of Hamster Kombat was also abused in scam schemes. For example, users were offered access to a crypto wallet supposedly containing a significant sum in virtual coins. To claim it, the unsuspecting victims had to share information about the “opportunity” with a certain number of contacts in messaging apps. Having made their potential victim an accomplice in spreading false information, the scammers demanded a small commission for the withdrawal and disappeared with the stolen money.

    A more elaborate scam also aimed to trick users into paying a “commission”, but with a slightly different approach. First, visitors to the page were asked to register to learn about some new activity related to Hamster Kombat.

    Once registered, they were suddenly informed of having won a large amount of the HMSTR cryptocurrency supposedly as part of an experiment conducted on the platform. Exploiting uncertainty around the token’s listing, scammers urged victims to bypass the official trading launch and exchange their in-game currency for Bitcoin immediately.

    To make it more convincing, the page displayed an exchange rate at which the “prize” would be converted.

    However, after clicking the “Exchange coins” button, users were prompted to pay a commission for the service.

    Everyone who paid this fee lost their money and received no Bitcoin.

    Phishing attacks also targeted TON wallet users. In this case, scammers lured victims with promises of bonuses, requiring them to link their crypto wallets on fraudulent websites.

    TON cryptocurrency was also used as bait in scam schemes. In a classic scenario, users were promised a quick way to earn digital currency. Fraudsters advertised a cloud mining service that allegedly generated high profits without any effort. After registering, unsuspecting users could monitor their “earnings” but had to pay a commission in cryptocurrency to withdraw funds.

    Another “profitable” crypto scam resembled a Ponzi scheme: victims were required to recruit at least five new participants into the program—without receiving any money, of course. The scam site mimicked an online earning platform.

    Visitors were instructed to install Telegram and use an unofficial bot to activate a crypto wallet where profits would supposedly be deposited.

    According to the instructions, users then had to buy Toncoin and register in the program through a referral link from another participant. The scam worked by enticing people to make a small investment in the hopes of making big profits—the victims used their own funds to purchase the cryptocurrency for registration. But as with any pyramid scheme, only those at the top profited, while everyone else was left with nothing but empty dreams.

    All or nothing: multipurpose phishing

    Victims of phishing frequently included bank clients and users of government service portals. In such schemes, users first received a notification that they needed to update their account credentials. Cybercriminals used various communication channels to contact their victims: email, text messages, and chats in messaging apps. The victims were then led to fake sites where they were asked to provide their personal data. First, they entered their personal login credentials on the organization’s website.

    Next, they were prompted to provide their email account credentials. The scammers also attempted to collect identity document details and other data, including the bank card PIN code.

    Additionally, these phishing forms requested answers to security questions commonly used for additional verification in banking transactions.

    This way, the cybercriminals gained full access to the victim’s account. Even the PIN code could be useful for the scammers in gaining access to the account. Security questions served as an extra safeguard for fraudsters in case the bank’s security service detected suspicious activity.

    False idols

    Phishing schemes also exploited the images of real people. For example, users browsing YouTube could stumble upon ad videos of celebrities announcing giveaways for their fans. Clicking the link in such a video led users to a page containing a post supposedly from the celebrity’s social media account, explaining how to claim the prize. However, when attempting to collect the “winnings”, visitors were asked to pay a small commission—insignificant compared to the value of the “gift.” Needless to say, those who paid the fee lost their money. The prize never existed, and the video was nothing more than a deepfake.

    Spam in 2024

    Scams

    Token giveaway scam

    Throughout the year, we frequently encountered emails announcing fake cryptocurrency airdrops, allegedly from teams of well-known crypto projects. The recipients, referred to as the platform’s “most valuable users,” were invited to participate in an “exclusive” event as a thank you for their loyalty and exceptional engagement.

    New users unfamiliar with cryptocurrency were lured in with a unique opportunity to take part in the token giveaway and win a large sum—all they had to do was register on the platform, which was, of course, fake.

    Scammers in 2024 closely monitored cryptocurrency market news. For example, in the spring, ahead of Notcoin’s upcoming listing, scam messages appeared featuring countdown timers, urging potential victims to participate in an airdrop allegedly arranged just for them.

    Scam emails also targeted users of the cryptocurrency game Hamster Kombat, popular among Russian-speakers. Players eagerly awaited the HMSTR token listing, which was repeatedly postponed—a delay that scammers were quick to exploit. In the fall of 2024, they began sending emails pretending to be from the Hamster Kombat team, promising generous cash prizes if victims clicked a link to a fake game site.

    Similar offers were distributed via a fraudulent website mimicking a major cryptocurrency exchange. In both cases, to claim the coveted tokens, victims had to link their cryptocurrency wallets.

    “Nigerian” scam

    In 2024, the Nigerian scam remained popular among spammers. Furthermore, fraudsters used both time-tested and trending themes to deceive victims. Cybercriminals employed various tricks and manipulations to engage with email recipients, with the ultimate goal of extracting money.

    Most often, users were lured into classic schemes: fraudsters posed as terminally ill wealthy individuals seeking a worthy heir, lottery winners eager to share their prize, or investors offering opportunities in a promising business. Sometimes, to evade suspicion, scammers “rescued” their victims from other fraudsters and offered to compensate them for any financial losses. For example, in the summer of 2024, we came across an interesting case where an alleged victim of crypto fraud suggested that fellow sufferers contact a group of noble hackers for help recovering lost cryptocurrency.

    Some scam offers were quite unexpected, as they didn’t promise vast riches, and, therefore, might not attract such a wide audience. In mid-to-late 2024, we saw scam emails claiming to be looking for new owners for pianos due to relocation or the previous owner’s passing.

    We also encountered even more creative scam narratives. For example, an email allegedly sent from a secret society of Illuminati promising to share their wealth, power and fame if the recipients agree to join their grand brotherhood.

    Other “Nigerian” scam emails capitalized on current news events. Thus, the most talked-about event of 2024, the US presidential election, significantly influenced the types of scams we saw. For example, one scam email claimed that the recipients were incredibly lucky to be eligible to receive millions of dollars from Donald Trump’s foundation.

    Scam in the Russian segment

    Last year, the Russian segment of the internet was not spared from mass scam mailings. We frequently encountered schemes mimicking investment projects of major banks, promising users easy earnings and bonuses. Fraudsters also sent out emails with promotional offers from home appliance and electronics stores. Customers were informed of huge discounts on sales that were supposedly about to end.

    The links in such emails led to fraudulent websites that looked identical to legitimate online stores but stood out with extremely low prices. After paying for their desired items, customers lost their money, as orders were never actually placed.

    Beyond electronics, scammers also offered other discounted products. In one such campaign, users received an email advertising a sneaker store selling popular models at affordable prices.

    Judging by the technical headers of the emails, both the sneaker store and electronics store promotions were sent by the same fraudsters.

    Additionally, we came across emails offering recipients to apply for debit or credit cards under favorable conditions. Unlike the electronics and shoe sale scams, these messages were legitimate referral programs from major banks, which enterprising spammers tried to monetize. Technically, such emails are not scams, as their links lead to real banking websites, and recipients do not face any risks. However, senders profit from registrations via the referral program. Nevertheless, we do not recommend clicking links from unknown senders, as seemingly harmless emails from a referral platform could be phishing or scam messages.

    Password-protected archives

    In 2024, there was an increase in emails distributing password-protected archives containing malicious content. Sometimes, these files were included not as attachments but via download links, which also required a password. Presumably, this was the attackers’ attempt to bypass email security filters. Typically, the archive password was mentioned in the email text, and sometimes in the attachment’s filename. Notably, fraudsters often disguised malicious archives or links as files with other extensions, such as PDF, XLS, or DOC.

    Since April 2024, we have been recording similar distributions of files with the double extension .PDF.RAR, targeting employees of Russian companies in the government, financial, manufacturing, and energy sectors.

    We assume that these messages were sent from compromised email accounts of the recipients’ business partners. Some emails contained real correspondence, to which attackers replied with an email containing the malware. All the emails we examined in this campaign were unique. The attackers likely crafted messages to closely mimic the style of the compromised business partner.

    Similar messages containing malicious files were also found in other languages. However, unlike campaigns targeting Russian-speaking users, these had more general themes—attachments were disguised as invoices, commercial offers, supply orders, tender schedules, court notices, and other documents.

    Pre-trial claims and lawsuits

    Last year, attackers frequently threatened legal action to convince victims to click dangerous links or open malicious attachments. These messages primarily targeted Russian companies but were also observed in other languages. Typically, fraudsters posed as business partners, demanding debt repayment; otherwise, they “would be forced to take the matter to arbitration court.” In one such campaign, pre-trial claims in attachments were .DOC files containing VBA scripts. These scripts established connections with command servers and downloaded, saved, and executed malicious files on the victim’s device. Kaspersky’s products detect this payload with the verdict HEUR:Trojan-Downloader.MSOffice.Sload.gen.

    In some cases, cybercriminals gave no reason for their legal threats but instead attempted to shock victims with an already “filed” lawsuit to pressure them into opening the attachment. Of course, it contained malware.

    Emails with malicious SVG files

    According to our observations, the past year saw a rise in the distribution of malicious SVG files. Disguised as harmless images, these files contained scripts that downloaded and installed additional malware on the victim’s device. (Our solutions detect these scripts as Trojan.Script.Agent.sy and Trojan.Script.Agent.qe.) The emails we encountered were written in Spanish and posed as fake legal case notifications and court summons. The text included a password for opening the attached file.

    Threats to businesses

    Fake deals

    A special category of emails that users complained about in 2024 was requests for quotation from suspicious senders. These emails were sent either from free email addresses or recently created domains. Attackers signed the emails with the names of large companies, included links to their websites, and sometimes even used official company logos. These emails followed a uniform template: the “buyers” briefly introduced themselves, expressed interest in the recipient’s products, and requested a catalog or price list. Interestingly, the fraudsters did not seem to care about the type of goods involved.

    If the recipient responded, events could unfold in two ways. In some cases, after receiving a reply to the initial seemingly legitimate request, the fraudsters sent malicious attachments or links in the next email.

    In another scenario, the “buyers” engaged in further correspondence with their “potential partner”—the victim—discussing details and insisting on their conditions, including post-payment and requiring the seller to cover customs duties. This meant that the supplier bore all the risks of delivery and could lose their goods without receiving any payment.

    Facebook

    In the spring of 2024, we discovered an interesting phishing email scheme that leveraged legitimate Facebook notifications. The service sent entirely legitimate emails to users mentioned in threatening posts. The attackers used compromised Facebook accounts, renamed to “24 Hours Left To Request Review. See Why,” and changed the profile picture to an icon featuring an orange exclamation mark.

    Then, the fraudsters created posts on these pages tagging the business accounts of potential victims. The tagged users received notifications from the alarmingly-named pages.

    These posts contained more details than the emails: victims were warned about an impending account ban due to a complaint from another user. To dispute the ban for violating service terms, the recipient of the “notification” was required to follow a phishing link from the post—leading to a fake site with Meta logos that requested Facebook login credentials.

    We also found phishing emails containing legitimate Facebook links in October 2024, but this time without using the platform’s infrastructure. These emails contained notifications of lawsuits for copyright infringement and the removal of unlawful posts from the recipient’s profile. The target was warned that their personal and business pages would be blocked within 24 hours, pressuring them to take hasty and careless action.

    However, they were immediately offered the chance to appeal by contacting the “Appeal Support Center.” The link in the email led to a phishing site disguised as Meta’s support service, where the victim was also asked to enter their profile password. To make the phishing link more convincing, a legitimate mechanism for redirecting users to external Facebook resources was used.

    At the end of 2024, we noticed an email campaign targeting companies promoting their business pages on Facebook. These emails mimicked official Meta for Business notifications and threatened to block the user’s account and business page for violating the platform’s rules and community policies.

    To dispute these accusations, the fraudsters urged the profile owners to click a link to contact “Facebook support” in a legitimate messenger. However, in reality, the victim was communicating with the owner of a fan page called “Content Moderation Center,” imitating an official support service employee. The scam could have been identified by the “Fan Page” label in the chat, though it was easy to miss.

    News agenda

    In 2024, scammers continued to exploit news agenda in spam campaigns.

    During the UEFA Euro 2024 football championship in Germany, emails began to appear offering merchandise with UEFA EURO 2024 logos.

    After Pavel Durov’s arrest in Paris, we noticed English-language messages calling for donations to supposedly fund his legal defense.

    In the fall of last year, a scam campaign began circulating, offering not-yet-released MacBook Pro M4 devices at low prices or even for free. The links in these emails led to fake websites imitating major marketplaces.

    Before Black Friday, we recorded a surge in spam offering exclusive discounts. The links in these messages lured victims to sites disguised as marketplaces, electronics stores, and financial institutions.

    B2B spam campaigns

    Online promotion services

    One of the most common categories of spam email in 2024, complained of frequently by our corporate clients, was commercial offers for online promotion. Users were offered services such as creating or redesigning websites, setting up SEO tools, and purchasing databases with potential client contacts and other information. Other advertised services included guest post placement with backlinks to the client’s site, writing positive reviews, removing negative reviews, and creating personalized email campaigns. While these messages are not malicious or fraudulent, they are mass-distributed and unsolicited, causing inconvenience to users. The popularity of this type of spam is likely driven by the development of digital marketing tools and the search for new clients for small- and medium-sized businesses amid growing online competition.

    Buying likes and followers on social media

    We also frequently encountered business offers for the online promotion of company accounts on social media. Spammers sell fake likes and followers. They often pose as employees of real social media marketing firms, claiming to be industry leaders. At the end of their emails, the spammers included a link to a marketing platform and payment options for their services. One such campaign, which we observed throughout the past year and is still active, stood out due to the variety of languages used in the emails and the diversity of domain names. With these tactics, the spammers aimed to reach a global audience.

    AI in B2B emails

    The growing popularity of neural networks has led companies to actively integrate AI into their business processes. We assume that clients of such organizations, in turn, are drawn to service offers that incorporate neural networks. As a natural consequence of this trend, AI-driven solutions began appearing in spam campaigns advertising online marketing services.

    Spammers emphasized using AI, particularly ChatGPT, to perform various business tasks. We identified the following themes in these emails:

    • Attracting website traffic
    • Creating advanced lead generation strategies
    • Developing unique approaches tailored to a brand’s identity
    • Producing and publishing content
    • Launching personalized multi-channel marketing campaigns
    • Creating custom videos for YouTube channels

    Other topics also appeared in spam emails, but they all shared the same goal—enhancing business processes and attracting potential clients.

    Another particularly popular category of spam related to neural networks was advertising online events. Last year, we encountered numerous examples of emails promoting webinars about the promising capabilities and practical applications of AI in business operations.

    Targeted phishing in 2024

    In 2024, two main trends were observed in targeted phishing:

    1. Notifications on behalf of a company’s HR department. Employees were asked to fill out or sign a document, such as a vacation schedule, accessible via a link in an email. Sometimes, instead of routine requests, attackers resorted to more extravagant tactics—such as inviting employees to check if they were on a list of staff to be dismissed.

    Phishing email from HR

    In all these cases, the common factor was that clicking the link led the employee to a phishing login page instead of the actual corporate portal. Most often, attackers targeted Microsoft accounts, though some phishing forms mimicked internal corporate resources.

    Fake login form

    1. Emails from a seller to a buyer, or vice versa. One common scheme involved a buyer or seller asking the victim to review an offer or respond to questions about product delivery and required specifications. These emails contained attached documents that actually concealed phishing links.

    Example of a phishing email from a seller

    When attempting to open the attachment, the user was redirected to a phishing page. As in the previous case, these fake forms harvested Microsoft credentials and corporate account logins.

    Fake password entry form

    Statistics: phishing

    The number of phishing attacks in 2024 increased compared to the previous year. Kaspersky solutions blocked 893,216,170 attempts to follow phishing links—26% more than in 2023.

    Number of Anti-Phishing triggerings, 2024 (download)

    Map of phishing attacks

    Users from Peru (19.06%) encountered phishing most often. Greece (18.21%) ranked second, followed by Vietnam (17.53%) and Madagascar (17.17%). They are closely followed by Ecuador (16.90%), Lesotho (16.87%) and Somalia (16.70%). The final places in the TOP 10 are occupied by Brunei (16.55%), Tunisia (16.51%) and Kenya (16.38%).

    Country/territory Share of attacked users*
    Peru 19.06
    Greece 18.21
    Vietnam 17.53
    Madagascar 17.17
    Ecuador 16.90
    Lesotho 16.87
    Somalia 16.70
    Brunei 16.55
    Tunisia 16.51
    Kenya 16.38

    * Share of users who encountered phishing out of the total number of Kaspersky users in the country/territory, 2024

    Top-level domains

    The most common domain zone hosting phishing sites remains the COM zone (29.78%)—its popularity has increased one and a half times compared to 2023. In second place is the XYZ domain (7.10%), which ranked fifth last year, followed by TOP (6.97%), which retained its position in the top ten. Next, with a slight margin from each other, are the ONLINE (4.25%) and SITE (3.87%) domain zones, where phishing sites were less actively hosted last year. The Russian RU domain (2.23%) and the global NET domain (2.02%) are in sixth and seventh place, respectively. Following them are CLICK (1.41%) and INFO (1.35%)—the year before, these zones were not frequently used. Closing the top ten is another national domain: UK, with a share of 1.33%.

    Most frequent top-level domains for phishing pages, 2024 (download)

    Organizations targeted by phishing attacks

    The rating of organizations targeted by phishers is based on the detections of the deterministic component in the Anti-Phishing system on user computers. The component detects all pages with phishing content that the user has tried to open by following a link in an email message or on the web, as long as links to these pages are present in the Kaspersky database.

    In 2024, the highest number of attempts to access phishing links blocked by Kaspersky solutions was associated with pages imitating various web services (15.75%), surpassing global internet portals (13.88%), which held the top position in 2023. The third and fourth positions in last year’s top ten also swapped places: banks moved ahead (12.86%), overtaking online stores at 11.52%. Attackers were also interested in social media (8.35%) and messengers (7.98%): attacks targeting them strengthened their positions in the ranking. For websites imitating delivery services, we observed a decline in phishing activity (6.55%), while the share of payment systems remained unchanged at 5.82%. Also included in the list of the most frequently targeted organizations were online games (5.31%) and blogs (3.75%).

    Distribution of organizations targeted by phishers, by category, 2024 (download)

    Statistics: spam

    Share of spam in email traffic

    In 2024, spam emails accounted for 47.27% of the total global email traffic, an increase of 1.27 p.p. compared to the previous year. The lowest spam levels were recorded in October and November, with average shares dropping to 45.33% and 45.20%, respectively. In December, we observed a seemingly slight upward trend in junk emails, resulting in the fourth quarter of the year being the calmest. Spam activity peaked in the summer, with the highest number of emails recorded in June (49.52%) and July (49.27%).

    Share of spam in global email traffic, 2024 (download)

    In the Russian internet segment, the average spam share exceeded the global figure, reaching 48.57%, which is 1.98 p.p. higher than in 2023. As in the rest of the world, spammers were least active at the end of the year: in the fourth quarter, 45.14% of emails were spam. However, unlike global trends, in Runet, we recorded four months during which the spam share exceeded half of all traffic: March (51.01%), June (51.53%), July (51.02%), and September (51.25%). These figures identified the third quarter as the most active, with a share of 50.46%. December was the calmest month, and interestingly, despite spam levels being generally high or the same in Russia, the number of spam emails in December was lower than the global figure: 44.56%.

    Share of spam in Runet email traffic, 2024 (download)

    Countries and territories where spam originated

    We continue to observe an increase in the share of spam sent from Russia—from 31.45% to 36.18%. The United States and mainland China, which held second and third place last year, swapped positions, with China’s share increasing by 6 p.p. (17.11%) and the US share decreasing by 3 p.p. (8.40%). Kazakhstan, which entered the top twenty for the first time last year, rose from eighth to fourth place (3.82%), pushing Japan (2.93%) down, and causing Germany, previously in fifth place, to drop one position with a share of 2.10%. India’s share slightly decreased, but the country moved up two positions from last year to seventh place. Conversely, the amount of spam sent from Hong Kong more than doubled (1.75%), allowing this territory to take eighth place in the top twenty. Next come Brazil (1.44%) and the Netherlands (1.25%), whose shares continued to decline.

    TOP 20 countries and territories where spam originated in 2024 (download)

    Malicious email attachments

    In 2024, Kaspersky solutions detected 125,521,794 attempts to open malicious email attachments, ten million fewer than the previous year. Interestingly, one of the peaks in email antivirus detections occurred in April—in contrast to 2023, when this month had the lowest malicious activity. In January and December, we observed a relative decrease in detections, while increases were noted in spring and autumn.

    Number of email antivirus detections, 2024 (download)

    The most common malicious email attachments were Agensla stealers (6.51%), which ranked second last year. Next were Badun Trojans (4.51%), which spread in archives disguised as electronic documents. The Makoob family moved from eighth to third place (3.96%), displacing the Noon spyware (3.62%), which collects browser passwords and keystrokes. The malicious Badur PDFs, the most common attachments in 2023, dropped to fifth place with a 3.48% share, followed by phishing HTML forms from the Hoax.HTML.Phish family (2.93%). Next in line were Strab spyware Trojans (2.85%), capable of tracking keystrokes, taking screenshots, and performing other typical spyware actions. Rounding out the top ten were SAgent VBS scripts (2.75%), which were not as actively used last year, the Taskun family (2.75%), which maintained its previous share, and PDF documents containing phishing links, Hoax.PDF.Phish (2.11%).

    TOP 10 malware families distributed as email attachments, 2024 (download)

    The list of the most widespread malware reflects trends similar to the distribution of families, with a few exceptions: the Hoax.HTML.Phish variant of malicious HTML forms dropped two positions (2.20%), and instead of a specific Strab Trojan sample, the top ten included the ISO image Trojan.Win32.ISO.gen, distributed via email (1.39%).

    TOP 10 malicious programs distributed as email attachments, 2024 (download)

    Countries and territories targeted by malicious mailings

    In 2024, users in Russia continued to face malicious email attachments more frequently than other countries, although the share of email antivirus detections in this country decreased compared to last year, to 11.37%. China ranked second (10.96%), re-entering the top twenty after several years. Next came Spain (8.32%), Mexico (5.73%), and Turkey (5.05%), which dropped one position each with a slight decline in malicious attachments. Switzerland (4.82%) took sixth place, appearing in the ranking for the first time. Following them were Vietnam (3.68%), whose share declined, and the UAE (3.24%), which strengthened its position in the ranking. Also among frequent targets of malicious spam were users from Malaysia (2.99%) and Italy (2.54%).

    TOP 20 countries and territories targeted by malicious mailings, 2024 (download)

    Conclusion

    Political and economic crises will continue to provide new pretexts for fraudulent schemes. In some cases presented in the 2024 report, we can observe the “greed” of cybercriminals: the use of two different company brands on the same page; a credible fake of a resource aimed not at stealing credentials but at stealing money; comprehensive questionnaires that can lead not only to loss of access to funds but also to identity theft. Such multi-layered threats may become a new trend in phishing and scam attacks.

    We continue to observe major news events being exploited in spam campaigns that promise easy earnings and discounted goods or services. The growing user interest in artificial intelligence tools is actively being leveraged by spammers to attract an audience, and this trend will undoubtedly continue.

    MIL OSI Economics

  • MIL-OSI Economics: WTO chairpersons for 2025

    Source: World Trade Organization

    General Council

    H.E. Mr. Saqer Abdullah Almoqbel (Kingdom of Saudi Arabia)

    Dispute Settlement Body

    H.E. Ms. Clare Kelly (New Zealand)

    Trade Policy Review Body

    H.E. Mr. Asset Irgaliyev (Kazakhstan)

    Council for Trade in Goods

    H.E. Mr. Gustavo Nerio Lunazzi (Argentina)

    Council for Trade in Services

    H.E. Mr. Ram Prasad Subedi (Nepal)

    Council for Trade-Related Aspects of Intellectual Property Rights (TRIPS)

    Mme. Emmanuelle Ivanov-Durand (France)

    Committee on Trade and Development

    H.E. Dr. Mzukisi Qobo (South Africa)

    Committee on Balance-of-Payments Restrictions

    H.E. Dr. José R. Sánchez-Fung             (Dominican Republic)

    Committee on Budget, Finance and Administration

    H.E. Mrs. Carmen Heidecke (Germany)

    Committee on Trade and Environment

    H.E. Mr. Erwin Bollinger (Switzerland)

    Committee on Regional Trade Agreements

    H.E. Mr. José Valencia (Ecuador)

    Working Group on Trade, Debt and Finance

    H.E. Mr. Suon Prasith (Cambodia)

    Working Group on Trade and Transfer of Technology

    H.E. Mr. Salomon Eheth (Cameroon)

    Council for Trade in Services in Special Session

    H.E. Dr. Adamu Mohammed Abdulhamid (Nigeria)

    MIL OSI Economics

  • MIL-OSI Global: How banks, lawyers and lobbyists in the west help post-Communist kleptocrats stay rich

    Source: The Conversation – UK – By John Heathershaw, Professor in International Relations, University of Exeter

    ‘Londongrad’ is a nickname for London that encapsulates the British capital’s popularity as a haven for wealthy Russians in the post-Soviet era. Drone Motion Stock / Shutterstock

    Kleptocracy, a term derived from the Greek for “rule by thieves”, describes a system where business success and political power are inextricably entwined. Political elites exploit their position to siphon off public wealth, entrenching their power through corruption, patronage and repression.

    However, kleptocracy is not just a system of domestic corruption. It typically involves a transnational network of political elites and so-called professional enablers who work together to extract wealth and project power.

    The ability of kleptocrats to loot state resources and evade accountability depends on an ecosystem of banks, lawyers, lobbyists, intelligence agencies and PR firms that provide the financial, legal and reputational tools to legitimise stolen wealth.

    Our new book, Indulging Kleptocracy, analyses many cases of such professional enabling in the UK for elites whose wealth originates in post-Soviet countries such as Azerbaijan, Kazakhstan and Russia. We uncovered examples of this activity using in-depth case studies that drew on court documents and correspondence with the enablers themselves.

    We found that, on countless occasions, British professionals have found loopholes in the rules, defeated new measures against money laundering, exploited the lack of transparency in universities and political parties and challenged the efficiency and effectiveness of the rule of law.

    UK properties worth tens of millions of pounds have been purchased for oligarchs and kleptocrats. And London corporate intelligence firms and lawyers have acted against journalists and researchers on behalf of their post-Soviet elite clients.

    Political parties, parliamentary groups and some of Britain’s top universities have even accepted donations from individuals associated with kleptocracy. In doing so, they have indulged kleptocrats much like the Catholic church once sold indulgences – offering absolution for a price.

    These services extend the wealth, status and influence of these elites into the UK and further afield. The phenomenon of “Londongrad” – a moniker to denote the British capital’s hosting of Russian and Eurasian oligarchs – is not merely about the amount of post-Soviet money laundered there. It incorporates a much wider offering of social and reputational goods, and political and security services.

    Indulging Kleptocracy was published on February 4 by Oxford University Press.
    John Heathershaw, Tena Prelec & Tom Mayne, CC BY-NC-ND

    Sustaining kleptocracy

    Professional enablers do not simply move money, and they don’t merely supply their services. They create the structures that sustain kleptocracy, embedding it into the political and economic fabric.

    The overall picture from the nine indulgences we study in our book, from “hiding money” (banking) to “silencing critics” (defamation law), is of regulators outgunned by the private sector. The professions are driven by market incentives, but their adherence to professional ethical standards is inconsistent.

    Enablers aren’t usually accessories to crimes. They may be acting downstream from grand corruption and are typically compliant with the law. But, in most cases, they appear to be either aware of who they are acting for or wilfully unwitting. They either justify their work by convoluted arguments or simply do not carry out effective due diligence on their clients.

    With Russia’s full-scale invasion of Ukraine, the British government introduced a large number of sanctions against Russian entities. It also passed two acts of parliament in 2022 and 2023 to counter illicit financial activity from Russia. But most enabling is not currently considered criminal and cannot easily be legislated out of existence.

    The issue of indulging in kleptocracy is indicative of a general problem of self-regulation in global financial centres, tax havens and other secrecy jurisdictions that arose with the end of empires in the second half of the 20th century.

    At that time, former British colonies like the British Virgin Islands and Cyprus were looking to broaden their economies into the services sector. This coincided with the end of the Soviet empire, when the wealthy and their capital were flying out of Russia and Eurasia.

    How to indulge no more

    Stopping the indulgence of kleptocracy requires moving beyond piecemeal reforms and treating it as the organised criminal enterprise it is. We suggest designating “kleptocratic enterprises” as organised crime and thereby implicating enablers as part of criminal networks. Across the world, there needs to be transparency from charities, universities and political parties.

    There should be more protection for investigators and whistleblowers. And governments could do more to stimulate the market in for-profit asset recovery.

    In 2020, US$740 million (£598 million) of real estate was seized in Spain from Rifaat al-Assad, the uncle of Syria’s former president Bashar al-Assad. This case involved private sector expertise and followed civil society investigations.

    Without such action, the transformation to a world where kleptocratic wealth and influence sit easily within democracies will continue apace. Even the perception of a connection should be subjected to proper scrutiny: Tulip Siddiq, the UK’s Treasury minister responsible for anti-corruption, recently resigned after her family and alleged financial links to the deposed kleptocratic regime in Bangladesh were highlighted.

    These connections, which the government’s ethics watchdog found not to be in breach of the ministerial code, had been known for years before they became a story. But effective PR campaigns, clever legal arguments and complex financial structures mean that many cases of kleptocratic wealth are never exposed. It’s time to uncover what professional enablers do for kleptocrats.

    John Heathershaw receives funding from the UK’s Foreign Commonwealth and Development Office’s Anti-Corruption Evidence programme. He is affiliated with the Illicit Finance Working Group of the UK Anti-Corruption Coalition.

    Tena Prelec receives funding from the UK’s Foreign Commonwealth and Development Office’s Anti-Corruption Evidence programme. She is affiliated with the Illicit Finance Working Group of the UK Anti-Corruption Coalition

    Tom Mayne receives funding from the UK’s Foreign Commonwealth and Development Office’s Anti-Corruption Evidence programme. He is affiliated with the Illicit Finance Working Group of the UK Anti-Corruption Coalition

    ref. How banks, lawyers and lobbyists in the west help post-Communist kleptocrats stay rich – https://theconversation.com/how-banks-lawyers-and-lobbyists-in-the-west-help-post-communist-kleptocrats-stay-rich-248973

    MIL OSI – Global Reports

  • MIL-OSI Economics: StaryDobry ruins New Year’s Eve, delivering miner instead of presents

    Source: Securelist – Kaspersky

    Headline: StaryDobry ruins New Year’s Eve, delivering miner instead of presents

    Introduction

    On December 31, cybercriminals launched a mass infection campaign, aiming to exploit reduced vigilance and increased torrent traffic during the holiday season. Our telemetry detected the attack, which lasted for a month and affected individuals and businesses by distributing the XMRig cryptominer. This previously unidentified actor is targeting users worldwide—including in Russia, Brazil, Germany, Belarus and Kazakhstan—by spreading trojanized versions of popular games via torrent sites.

    In this report, we analyze how the attacker evades detection and launches a sophisticated execution chain, employing a wide range of defense evasion techniques.

    Kaspersky’s products detect this threat as Trojan.Win64.StaryDobry.*, TrojanDropper.Win64.StaryDobry.*, HEUR:Trojan.Win64.StaryDobry.gen.

    Initial infection

    On December 31, while reviewing our telemetry, we first detected this massive infection. Further investigation revealed that the campaign was initially distributed via popular torrent trackers. Trojanized versions of popular games—such as BeamNG.drive, Garry’s Mod, Dyson Sphere Program, Universe Sandbox, and Plutocracy—were designed to launch a sophisticated infection chain, ultimately deploying a miner implant. These malicious releases were created in advance and uploaded around September 2024.

    Infection timeline

    Although the malicious releases were published by different authors, they were all cracked the same way.

    Malicious torrent available for download

    Among the compromised installers are popular simulator and sandbox games that require minimal disk space. Below is the distribution of affected users by game as of January 2025:

    Infected users per game (download)

    These releases, often referred to as “repacks”, were usually distributed in an archive. Let’s now take a closer look at one of the samples. Upon unpacking the archive, we found a trojanized installer.

    Technical details

    Trojanized installer

    After launching the installer (a Windows 32-bit GUI executable), we were welcomed with a GUI screen showing three options: install the game, choose the language, or quit.

    Installer screen

    This installer was created with Inno Setup. After decompiling the installer, we examined its code and found an interesting functionality.

    Decompiled installer code

    This code is responsible for extracting the malicious files used in this attack. First, it decrypts unrar.dll using the DECR function, which is a proxy for the RARExtract function within the rar.dll library. RARExtract decrypts unrar.dll using AES encryption with a hard-coded key, clsprecompx.dll. Next, additional files from the archive are dropped into the temporary directory, and execution proceeds to the RARGetDllVersion function within unrar.dll.

    Unrar.dll dropper

    First of all, the sample runs a series of methods to check if it’s being launched in a debugging environment. These methods search for debugger and sandbox modules injected into processes, and also check the registry and filesystem for certain popular software. If such software is detected, execution immediately terminates.

    Anti-debug checks example

    If the checks are passed, the malware executes cmd.exe to register unrar.dll as a command handler with regsvr32.exe. The sample attempts to query the following list of sites to determine the user’s IP address.

    This is done to identify the infected user’s location, specifically their country. If the malware fails to detect the IP address, it defaults the country code to CNOrBY (meaning “China or Belarus”). Next, the sample sends a request to hxxps://pinokino[.]fun/donate_button/game_id=%s&donate_text=%s with the following substitutions:

    • game_id = appended with DST_xxxx, where x represents digits. This value is passed as an argument from the installer; in this campaign, we discovered the variant DST_1448;
    • donate_text = appended with the country code.

    After this generic country check, the sample collects a fingerprint of the infected machine. This fingerprint consists of various parameters, forming a unique identifier as follows:

    This fingerprint is then encoded using URL-safe Base64 to be sent successfully over the network. Next, the malware retrieves MachineGUID from HKLMSoftwareMicrosoftCryptography and calculates its SHA256 checksum. It then collects 10 characters starting from the 20th position ( SHA256(MachineGUID)[20:30]). This hexadecimal sequence is used as the filename for two newly created files: %SystemRoot%%hash%.dat and %SystemRoot%%hash%.efi. The first file contains the encoded fingerprint, while the second is an empty decoy. The creation time of the .dat file is spoofed with a random date between 01/01/2015 and 12/25/2021. This file stores the Base64-encoded fingerprint.

    After this step, unrar.dll starts preparing to drop the decrypted MTX64.exe to the disk. First, it generates a new filename for the decrypted payload. The malware searches for files in %SystemRoot% or %SystemRoot%Sysnative. If these directories are empty, the decrypted MTX64.exe is written to the disk as Windows.Graphics.ThumbnailHandler.dll. Otherwise, unrar.dll creates a new file and names it by choosing a random file from the specified directories, taking its name, trimming its extension and appending a random suffix from a predefined list. Besides suffixes, this list contains junk data, most likely added to evade signature-based detection.

    Suffix list and junk data

    For example, if the malware finds a file named msvc140.dll in %SystemRoot%, it removes the extension and appends the resulting msvc140 with handler.dll (a random suffix from the list), resulting in msvc140handler.dll. The malware then writes the decrypted payload to the newly generated file in the %SystemRoot% folder.

    After that, the sample opens the encrypted MTX64.exe and decrypts it using AES-128 with a hard-coded key, clsprecompx.dll.

    The loader also carries out resource spoofing. First of all, it scans the _res.rc file for DLL property names and values—such as CompanyName, FileVersion and so on—and creates a dictionary of (key, value) pairs. Then it takes a random DLL from the %SystemRoot% folder (exiting if nothing is found), extracts its property values using the VerQueryValueW WinAPI, and replaces the corresponding dictionary values. The resulting resources are embedded into the decrypted MTX64.exe DLL. This file is then saved under the name generated in the previous step. Finally, unrar.dll changes the creation time of the resulting DLL using the same spoofing method as for the fingerprint file.

    Spoofed resources

    The dropped DLL is installed using the following command:

    MTX64

    This DLL is based on a public project called EpubShellExtThumbnailHandler, a Windows Shell Extension Thumbnail Handler. This stage completely mimics the legitimate behavior up until the actual thumbnail handling. It gets registered as a .lnk (shortcut) file handler, so whenever a .lnk file is opened, the DLL tries to process its thumbnail. However, here the sample implements its own version of the GetThumbnail interface function, and creates a separate thread to perform its malicious activities.

    First, this thread writes the current date and month in ddmm format to the %TEMP%time_windows_com.ini file. This stage then retrieves MachineGUID from HKLMSOFTWAREMicrosoftCryptography, calculates SHA256(MachineGUID)[20 : 30], just like unrar.dll did. After that, it checks %SystemRoot% for the .dat file with this name. The presence of this file confirms that the infection is uninterrupted, prompting the DLL to extract the fingerprint and make a query to the hard-coded threat actors’ domain in the following format, where the UID is the fingerprint’s SHA256 hash.

    The server sends back a JSON that looks like {‘code’:‘reg’}. After this, the DLL makes another query to the server with an additional field, data, which is the Base64-encoded fingerprint ( uid remains the same):

    Upon receiving this request, the server also sends a JSON. The malware checks its code field, which must be equal to either 322 or 200. If it is, the sample proceeds to extract the MD5 checksum from the flmd field in the same JSON and download the next-stage payload from the following link:

    Next, the sample calculates the MD5 checksum of the received payload (a kickstarter PE file), and checks this hash against the MD5 checksum from the JSON. If they match, the malware parses the PE structure to locate the Export Address Table, retrieves the kickstarter function address, and executes it.

    Kickstarter running

    Kickstarter

    The kickstarter PE has an encrypted blob in its resources. This stage reads the blob and stores it in a C++ vector of bytes.

    Resource reading

    After that, it chooses a random name for the payload using the same method as for MTX64.exe during the execution of unrar.dll. However, there is a difference: if nothing is found in %SystemRoot% or %SystemRoot%Sysnative, it chooses Unix.Directory.IconHandler.dll as a default file name. The payload is saved to %appdataRoamingMicrosoftCredentials%InstallDate%. To locate the InstallDate directory, the DLL retrieves the system installation date from the registry subkey HKLMSOFTWAREMicrosoftWindows NTCurrentVersionInstallDate.

    Then the blob is decrypted using the CryptoPP AES-128 implementation. The key consists of the sequence of bytes from x00 to x10. The decrypted contents are written onto the disk. This executable also spoofs its resources using the same method as for MTX64.exe, after which it executes the following command:

    The first argument is the system installation date, while the second one is the path to the dropped DLL. A scheduled task to register a server with regsvr32.exe is created, using the first argument as its name, with a suppressed warning, set to trigger at 00:00. The loader sends a GET request to the hard-coded address 45.200.149[.]58/conf.txt, implicitly setting the request header to UserAgent: StupidSandwichAgentrn.
    The loader then waits for a response from the server. If the response begins with act, the sample stops execution after creating the scheduled task. If the response is noactive, meaning the targeted device has not been registered previously, the sample tries to delete itself with the following command, which clears everything in the %temp% directory:

    Cleanup

    Unix.Directory.IconHandler.dll

    Subsequently, Unix.Directory.IconHandler.dll creates a mutex named com_curruser_mttx. If this mutex has already been created, execution stops immediately. Then the DLL searches for the %TEMP%_cache.binary file. If the sample can’t find it, it downloads the binary directly from 45.200.149[.]58 using a GET 44912.f request, with the same StupidSandwichAgent User-Agent header. This file is written to the temporary directory and then decrypted using AES-128 with the same key consisting of the x00x10 byte sequence.

    The sample proceeds to open the current process, look for SeDebugPrivilege in the process token, and adjust it if applicable. We believe this is done to inject code into a newly created cmd.exe process. The author chose the easiest way possible, copying the entire open source injector, including its debug strings:

    Injector

    After injecting the code into the command interpreter, the sample enters an endless loop, continuously checking for taskmgr.exe and procmon.exe in the list of running processes. If either process is detected, the sample is shut down.

    Miner implant

    This implant is a slightly modified XMRig miner executable. Instead of parsing command-line arguments, it constructs a predefined command line.

    The last parameter is calculated from the CPU topology: the implant calls the GetSystemInfo API to check the number of processor cores. If there are fewer than 8, the miner does not start. Moreover, the attacker chose to host a mining pool server in their own infrastructure instead of using a public one.

    XMRig parses the constructed command line using its built-in functionality. The miner also creates a separate thread to check for process monitors running in the system, using the same method as in the previous stage:

    Anti-tracing

    Victims

    This campaign primarily targets regular users by distributing malicious repacks. Some organizations were also affected, but these seem to be compromised computers inside corporate infrastructures, rather than direct targets.

    Most of the infections have been observed in Russia, with additional cases in Belarus, Kazakhstan, Germany, and Brazil.

    Attribution

    There are no clear links between this campaign and any previously known crimeware actors, making attribution difficult. However, the use of Russian language in the PDB suggests the campaign may have been developed by a Russian-speaking actor.

    Conclusions

    StaryDobry tends to be a one-shot campaign. To deliver the miner implant, the actors implemented a sophisticated execution chain that exploited users seeking free games. This approach helped the threat actors make the most out of the miner implant by targeting powerful gaming machines capable of sustaining mining activity. Additionally, the attacker’s use of DoH helped conceal communication with their infrastructure, making it harder to detect and trace the campaign.

    Indicators of compromise

    File hashes

    15c0396687d4ff36657e0aa680d8ba42
    461a0e74321706f5c99b0e92548a1986
    821d29d3140dfd67fc9d1858f685e2ac
    3c4d0a4dfd53e278b3683679e0656276
    04b881d0a17b3a0b34cbdbf00ac19aa2
    5cac1df1b9477e40992f4ee3cc2b06ed

    Domains and IPs

    45.200.149[.]58
    45.200.149[.]146
    45.200.149[.]148
    hxxps://promouno[.]shop
    hxxps://pinokino[.]fun

    MIL OSI Economics