Category: China

  • MIL-OSI USA: 07.01.2025 Sen. Cruz Statement on Senate Passage of One, Big, Beautiful Bill

    US Senate News:

    Source: United States Senator for Texas Ted Cruz

    WASHINGTON, D.C. – Today, U.S. Sen. Ted Cruz (R-Texas) issued the following statement after the U.S. Senate passed the One Big Beautiful Bill (OBBB). The OBBB includes key language authored by Sen. Cruz, including Trump Accounts, the No Tax on Tips Act, and two historic school choice initiatives.
    Sen. Cruz said, “Today, we delivered on our promise to the American people to cut taxes, create jobs, support working Americans, and transformationally invest in our children.
    “For over a decade, I have led the fight in the U.S. Senate for school choice. Today, the Senate passed my legislation to provide billions of dollars in K–12 scholarships for kids across the nation. This historic investment represents the largest federal school choice program ever passed.
    “The OBBB also includes my No Tax on Tips Act to help waiters and waitresses, bartenders, taxi drivers, barbers, and hairdressers all across America. We also mandated the auction of 800 MHz of spectrum, which will enable us to beat China in the race to 6G—resulting in billions in new investments and the creation of hundreds of thousands of jobs.
    “The Senate also passed my legislation creating Trump Accounts—personal investment accounts for every child in America—which will unleash the power of compound growth and create new generations of capitalists.
    “I am also pleased to see the inclusion of our State Border Security Assistance Act, which is crucial for reimbursing the state of Texas for funds spent during the Biden administration’s illegal alien invasion.
    “I strongly urge my colleagues in the U.S. House of Representatives to put American families first and retain these vital provisions in the final version of the One Big, Beautiful Bill.”

    MIL OSI USA News

  • Wimbledon’s AI judges receive mixed reviews from players and fans

    Source: Government of India

    Source: Government of India (4)

    The All England Club’s decision to replace line judges with artificial intelligence technology at Wimbledon has received mixed reviews from players and fans alike.

    This week has marked the first time the tournament has been played without meticulously dressed judges determining whether the ball is in or out.

    The 300 line judges have been cut to 80 who are instead assisting chair umpires and interceding should the latest Hawk-Eye Electronic Line Calling (ELC) system, fail.

    The system uses AI to analyse footage from up to 18 cameras to track the progress of the ball and decide if it is in or out.

    Sally Bolton, the Chief Executive of the All England Club, said the new system was brought in to ensure the calls were accurate and not to cut costs.

    “It’s not a money-saving exercise; it’s about evolving the tournament and making sure that we’re providing the most effective possible line calling,” she said.

    World number one Jannik Sinner told a press conference after his victory over fellow Italian and close friend Luca Nardi:

    “As tennis tries to get better for the umpire it’s very difficult to see, especially when first serves are over 200km per hour, so it’s very difficult to see in a small space if they’re in or out, so for sure the technology helps, especially here on grass.”

    However, other players found problems with the technology. On Monday, China’s Yuan Yue complained that the system was too quiet for her to hear its decision.

    There were small protests outside the grounds against the technology, while some fans expressed sadness about the absence of line judges – a tradition that goes back to the 1870s – and the drama that often accompanies a player’s challenge.

    “Tennis is a physical sport, but it’s also a mental game and at a professional level I think that idea of challenging a call is really part of the game,” Jess from Oxford told Reuters.

    “As a spectator when they review the footage and everybody is clapping, and it’s the whole thing that this decision comes out and there’s uproar or whatever.

    “It’s sad that part of the atmosphere is gone, because you can’t challenge the calls now. It’s AI, it’s resolute.”

    Ivan from Northern Ireland raised concerns that the technology may have some teething problems.

    “It was strange not having a line judge. We watched a game on Court Two and a couple of times a ball from where we were sitting, which was close to the line, was out.

    “The player pointed to it and stopped and looked to the umpire, and he just ignored it, and the player accepted it. But I expected to see the replay.

    “There were a couple of other times when it was obviously out and obviously in and the replay came up. So the replays were not consistent.”

    -Reuters

  • Wimbledon’s AI judges receive mixed reviews from players and fans

    Source: Government of India

    Source: Government of India (4)

    The All England Club’s decision to replace line judges with artificial intelligence technology at Wimbledon has received mixed reviews from players and fans alike.

    This week has marked the first time the tournament has been played without meticulously dressed judges determining whether the ball is in or out.

    The 300 line judges have been cut to 80 who are instead assisting chair umpires and interceding should the latest Hawk-Eye Electronic Line Calling (ELC) system, fail.

    The system uses AI to analyse footage from up to 18 cameras to track the progress of the ball and decide if it is in or out.

    Sally Bolton, the Chief Executive of the All England Club, said the new system was brought in to ensure the calls were accurate and not to cut costs.

    “It’s not a money-saving exercise; it’s about evolving the tournament and making sure that we’re providing the most effective possible line calling,” she said.

    World number one Jannik Sinner told a press conference after his victory over fellow Italian and close friend Luca Nardi:

    “As tennis tries to get better for the umpire it’s very difficult to see, especially when first serves are over 200km per hour, so it’s very difficult to see in a small space if they’re in or out, so for sure the technology helps, especially here on grass.”

    However, other players found problems with the technology. On Monday, China’s Yuan Yue complained that the system was too quiet for her to hear its decision.

    There were small protests outside the grounds against the technology, while some fans expressed sadness about the absence of line judges – a tradition that goes back to the 1870s – and the drama that often accompanies a player’s challenge.

    “Tennis is a physical sport, but it’s also a mental game and at a professional level I think that idea of challenging a call is really part of the game,” Jess from Oxford told Reuters.

    “As a spectator when they review the footage and everybody is clapping, and it’s the whole thing that this decision comes out and there’s uproar or whatever.

    “It’s sad that part of the atmosphere is gone, because you can’t challenge the calls now. It’s AI, it’s resolute.”

    Ivan from Northern Ireland raised concerns that the technology may have some teething problems.

    “It was strange not having a line judge. We watched a game on Court Two and a couple of times a ball from where we were sitting, which was close to the line, was out.

    “The player pointed to it and stopped and looked to the umpire, and he just ignored it, and the player accepted it. But I expected to see the replay.

    “There were a couple of other times when it was obviously out and obviously in and the replay came up. So the replays were not consistent.”

    -Reuters

  • MIL-OSI USA: Cassidy Stands with President Trump, Passes One Big Beautiful Bill

    US Senate News:

    Source: United States Senator for Louisiana Bill Cassidy
    WASHINGTON – U.S. Senator Bill Cassidy, M.D. (R-LA) today released the following statement after voting to pass President Trump’s One, Big, Beautiful Bill.
    “President Trump and I want to preserve the American Dream for working and middle America,” said Dr. Cassidy. “We keep taxes low, cut taxes on tips, overtime, and Social Security, extend the Child Tax Credit, fix our broken education system, support our military, secure our border, and build a business environment that creates better paying jobs – especially in Louisiana.” 
    As chair of the U.S. Senate Health, Education, Labor, and Pensions (HELP) Committee, Cassidy led the Committee’s portion of the One Big Beautiful Bill, which fixes America’s broken higher education system and addresses the root causes of the student debt crisis.
    Cassidy pushed to secure provisions in this historic legislation that:
    Make higher education more affordable by eliminating inflationary loan programs that have resulted in higher tuition costs.   
    Prevent taxpayer-subsidized loans for degrees that leave students worse off than if they never went to college.  
    Reform the current federal student loan program that transfers debt onto the 87 percent of Americans who chose to not go to college or already paid off their loans.
    Ensure low-income Americans can access higher education by strengthening Pell Grants and addressing the program’s budget shortfall. As it currently stands, the Pell Grant program faces a mounting budget shortfall that threatens its future.  
    Expand education freedom and opportunity for students by providing a charitable donation incentive for individuals and businesses to fund scholarship awards for students to cover expenses related to K-12 public and private education. 
    Increase access to career or technical-based education for low-income students by establishing Workforce Pell Grants. This is crucial to achieving President Trump’s goal of bringing skilled jobs back to America from China and Mexico. 
    Boost U.S. manufacturing and crack down on China and other countries abusing our trade loopholes (de minimis). In 2023, Cassidy introduced similar legislation. 
    Provide beauty industry small businesses with access to the tip credit, which would create jobs.
    Eliminate the $200 tax stamp for short-barreled firearms. 
    Raise the annual cap on offshore energy revenue sharing with Gulf states from $500 million to $650 million through 2034. 
    Require the Bureau of Ocean Energy Management (BOEM) to hold no fewer than two lease sales every year for fifteen years in the Central and Western areas of the Gulf of America—something the Biden administration refused to do. 
    Invest $389 million in America’s Strategic Petroleum Reserve (SPR) to bolster U.S. energy security. 
    Unleash American energy by allowing energy companies to deduct costs, including labor and safety, associated with oil and gas exploration. 
    Expand access to direct primary care arrangements, by allowing the use of Health Savings Account (HSA) dollars to pay for such services. 
    Click here for the HELP section-by-section.
    Click here for the HELP one-pager.

    MIL OSI USA News

  • MIL-OSI Russia: The manipulations around the Dalai Lama’s reincarnation issue will be rejected by history as a political farce, and Xizang will achieve even greater prosperity – Chinese Ambassador to Russia Zhang Hanhui

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Moscow, July 1 (Xinhua) — The manipulations around the Dalai Lama’s reincarnation issue are a political farce that will be rejected by history. The Xijiang Autonomous Region, which has demonstrated tremendous success in all spheres of life, will achieve even greater prosperity and development. This opinion was expressed by Chinese Ambassador to Russia Zhang Hanhui in an opinion piece published in Rossiyskaya Gazeta on Tuesday.

    As the Chinese diplomat pointed out, the 14th Dalai Lama’s clique has recently been trying to confuse the international community, actively speculating on the topic of reincarnation and spreading absurd and false ideas, including the “independent reincarnation of the Dalai Lama” and “reincarnation in a free country.” “The manipulation of the reincarnation issue is nothing more than a political farce, which will certainly meet with decisive opposition from the broad masses of believers of Chinese Tibetan Buddhism and will inevitably be rejected by history,” Zhang Hanhui writes.

    The ambassador recalled that as a unique religious tradition of inheriting the highest spiritual rank in Chinese Tibetan Buddhism, the system of reincarnation of living Buddhas has formed a holistic and strict complex of religious rituals and historical rules over more than 700 years of its development. It includes the search for a reincarnation within China, drawing lots using a special golden urn and submitting it for approval to the central government of China. “The process of reincarnation of the Dalai Lama is clearly defined by centuries-old historical and legal norms, is deeply rooted in the legal governance of the central government of China and is in no way subject to manipulation by individuals or certain groups,” the ambassador said.

    Zhang Hanhui assured that the Chinese government pursues a policy that guarantees citizens freedom of religion. He stressed that the reincarnation of the Dalai Lama has been an exclusively internal matter of China since ancient times, in which no foreign state, external force or individual has the right to interfere. “All states have managed and manage their religious affairs on a legal basis, both in the past and present, in the East and in the West, this is an inalienable requirement of state sovereignty and government authority,” the publication says.

    This year marks the 60th anniversary of the founding of the Xizang Autonomous Region. The Chinese diplomat pointed to the great achievements in the development of all spheres of life. “Under the leadership of the Communist Party of China, Xizang has put an end to the extremely backward feudal serfdom system once and for all, achieved a historic victory in eradicating absolute poverty, and together with all the Chinese people embarked on a new path of great revival of the Chinese nation through the comprehensive promotion of Chinese modernization. Today, Xizang is confidently walking along the bright, prosperous, stable, harmonious and beautiful path of socialism,” the ambassador noted.

    Zhang Hanhui stressed that the Xizang issue is a purely internal matter for China, affects the country’s fundamental interests and is not subject to interference by any external forces. “The Chinese side opposes any attempts at separatist actions aimed at undermining the security and stability of Xizang,” he warned.

    According to the diplomat, the Chinese side highly appreciates and sincerely thanks the Russian government and people for their constant firm support on the Xizang issue and is confident that Moscow will continue to support China’s efforts to protect state sovereignty and territorial integrity, and to ensure security, stability and interethnic unity in Xizang. The Chinese diplomat invited the Russians to visit the amazing Xizang and see it with their own eyes.

    “Only by going there in person, seeing with your own eyes the vibrant modern cities of Xijiang, hearing the happy song in the new villages of Xijiang, experiencing the majestic beauty of the snow-capped mountains and sacred lakes, and feeling the unique charm of the thousand-year-old culture, can one truly appreciate the truly epochal historical transformation and achievements in Xijiang’s development, and understand why the people of all ethnic groups in Xijiang wholeheartedly support the CPC leadership,” Zhang Hanhui added, expressing confidence that Xijiang will write a new chapter of unity and progress and achieve greater prosperity and development. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: The World Bank has allocated $173.5 million to Azerbaijan for the development of renewable energy

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BAKU, July 1 (Xinhua) — The World Bank and the Government of Azerbaijan have signed a $173.5 million loan agreement to support a program to expand the use of renewable energy and strengthen energy infrastructure in Azerbaijan.

    As reported by the AZERTAC news agency, two documents were approved at the signing ceremony on Tuesday – a loan agreement between Azerenergy and the International Bank for Reconstruction and Development (IBRD), part of the World Bank Group, and a guarantee agreement between the Republic of Azerbaijan and the IBRD.

    The four-year program envisages the modernization of the Azerenergy energy system and the safe integration of new wind and solar power plants into the general energy grid. It is planned to build four high-voltage power transmission lines with a voltage of 500 and 330 kV with a total length of 341 km, as well as the purchase of transformers and equipment for the Navahi substation.

    At the signing ceremony, Azerbaijani Finance Minister Sahil Babayev said the agreement reflects the country’s strategic course for the development of sustainable and environmentally friendly energy. According to him, Azerbaijan has significant technical potential in the field of wind, solar and hydropower and aims to become not only a producer but also an exporter of green energy. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: Missile fired from Yemen intercepted over Israel – Israeli army

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    JERUSALEM, July 1 (Xinhua) — Yemen’s Houthi rebel forces fired a rocket toward Israel on Tuesday evening, triggering air raid sirens in central and southern parts of the country before the projectile was intercepted, the Israeli army said in a statement.

    “The missile, launched from Yemeni territory, was intercepted by the Israeli Air Force,” the military said, adding that alarm sirens were activated.

    There are no reports of casualties.

    The Houthis regularly attack Israel with missiles and drones, citing solidarity with Palestinians in Gaza. The rebel group says it will stop its attacks if Israel ends its offensive in the Palestinian enclave and lifts its blockade. In response, the Jewish state has launched massive airstrikes in Yemen, hitting key ports, an airport and other infrastructure. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: Russian President V. Putin held a telephone conversation with French President E. Macron

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Moscow, July 1 (Xinhua) — The Kremlin press service said Tuesday that Russian President Vladimir Putin and French President Emmanuel Macron had a telephone conversation. They discussed the situation around Ukraine, the Iranian-Israeli confrontation and the US strikes on Iran’s nuclear facilities.

    This is the first conversation between the presidents in nearly three years. The last time they spoke by phone was on September 11, 2022.

    The heads of the two states discussed in detail the situation in the Middle East in the context of the Iranian-Israeli confrontation and the American strikes on Iranian nuclear facilities. It is noted that V. Putin and E. Macron pointed out the special responsibility of Russia and France as permanent members of the UN Security Council in maintaining peace and security, including in the Middle East region, as well as in preserving the global nuclear non-proliferation regime. “In this regard, the importance of respecting Tehran’s legitimate right to develop peaceful nuclear energy and continuing to fulfill its obligations under the Treaty on the Non-Proliferation of Nuclear Weapons, including cooperation with the IAEA, was emphasized,” the statement said.

    “The leaders expressed their support for the resolution of the crisis around the Iranian nuclear program, as well as the resolution of other contradictions in the Middle East, to be achieved exclusively by political and diplomatic means. It was agreed to continue contacts for the purpose of possible coordination of positions,” the Kremlin press service added.

    Speaking about the prospects for a peaceful settlement, the Russian president confirmed the fundamental approaches to possible agreements, which should be comprehensive and long-term, provide for the elimination of the root causes of the Ukrainian crisis and be based on “new territorial realities.” –0–

    MIL OSI Russia News

  • MIL-OSI USA: Lankford Secures Major Wins for Oklahoma Families, Energy Producers, and Small Businesses in One Big Beautiful Bill

    US Senate News:

    Source: United States Senator for Oklahoma James Lankford
    WASHINGTON, DC — US Senator James Lankford (R-OK), a member of the Senate Finance and Homeland Security Committees, released the following statement after the passage of the One Big Beautiful Bill, which delivers the largest tax cut in history for hardworking Americans, secures the border, strengthens Medicaid program integrity, and rebuilds the military, all while cutting out-of-control spending.
    “This is a big, beautiful win for Oklahoma families, workers, seniors, and small businesses,” said Lankford. “This bill halts the largest tax increase in history, secures the border, and contains the most significant entitlement reform in years. I fought to make sure Oklahoma values were reflected in this package – protecting charitable giving, supporting energy jobs, and making it easier for businesses to grow and hire American workers.”
    Lankford secured key wins in the One Big Beautiful Bill to support Oklahoma families, job creators, and charitable giving.
    He secured the charitable deduction for non-itemizers, allowing couples to deduct up to $2,000 in donations. This will help more Americans support local churches, charities, and non-profits.
    Lankford also led the repeal of the Biden administration’s tax penalty on oil and gas producers by restoring key investment deductions. This will allow energy producers to reinvest, create jobs, and keep energy prices stable.
    He also worked to make full, immediate expensing permanent so businesses can deduct the full cost of equipment and technology up front. This will drive expansion, innovation, and job creation across Oklahoma. 
    Background
    Lankford has been outspoken on what it would have meant for Oklahomans if the One Big Beautiful Bill hadn’t passed the Senate and if President Trump’s 2017 Tax Cuts expire:
    A staggering 63,000 jobs were projected to be lost.
    The average Oklahoma family faced a $2,013 tax increase.
    Nearly 449,000 households would have seen their child tax credit reduced by 50%.
    Over 233,000 small business owners would have been hit with significant tax hikes.
    More than 1.5 million families would have had their standard deduction cut in half.
    To read more about how this bill helps families, seniors, the vulnerable and disabled, farmers and ranchers, small businesses, as well as strengthens our national defenses, unleashes American energy, and secures the border, see below: 
    How this bill helps families
    This bill delivers the largest tax cut in history, which will result in higher wages and higher take home pay. This is also the most substantial entitlement reform in years, which will help our safety net programs stay viable for those in need.
    The average family will save about $5,000 in additional taxes next year.
    There will be no tax on tips, an increased standard deduction for seniors, no tax on overtime, and a tax break for those who buy new cars made in America.
    This bill will also give families $2,200 per child up to 16 years old every year. It will also create a savings account for every child born between 2025 and the end of 2028 – each account would start with a $1,000 deposit that parents can invest for their kids, giving kids a financial boost from birth.
    In Oklahoma, the long-run wage increase is projected to go from $4,800 to $9,100 according to the Council of Economic Advisers.
    In Oklahoma, the take-home pay increase for a family of four is projected to go from $6,500 to $10,800 according to the Council of Economic Advisers.
    This bill also expands the adoption tax credit and indexes it for inflation. It also allows for tribal governments to decide when a child qualifies as having special needs to extra help under the credit. When adoption can cause as much as $60,000, this tax credit will make it easier for families to welcome a child in need into their lives and homes.
    Police officers, firefighters, truckers, linemen, and others who work overtime will take home an average of more than $1,300 a year because of the no tax on overtime in this bill.
    Those who buy a new American-made car will be able to write off some of the interest from their car loan, which will help families and American manufacturing.
    How this bill helps seniors
    Seniors who make less than $75,000 as an individual or a couple who makes less than $150,000 will see a $6,000 increase in their standard deduction regardless of whether they are receiving Social Security yet or not.
    How this bill helps vulnerable and disabled patients
    This bill is good news for vulnerable and disabled patients because it protects the aged, blind, and disabled from changes to Medicaid. It also blocks Biden’s nursing home staffing mandate that threatened rural care facilities, it boosts physician payments to offset cuts that the Biden administration had implemented, and it ensures continued access to care and incentivizes innovation, especially for those with rare diseases or who need access to telehealth options. It also prohibits tax dollars from going to Planned Parenthood through Medicaid.
    How this bill helps farmers and ranchers
    This bill delivers wins for rural America by expanding the farm safety net, strengthening crop insurance, and supporting agricultural trade. The bill also restores accountability in nutrition programs and ensures food assistance serves Americans in need, not illegal immigrants. 
    This bill would keep two million family farms safe from the death tax by making permanent death tax exemptions from the 2017 Trump Tax Cuts and Jobs Act.
    How this bill incentivizes giving to charity
    Sen. Lankford was proud to lead on restoring a tax deduction for non-itemizers – up to $2,000 per couple – which will help more Americans support charities, houses of worship, and non-profits, especially those that serve the most vulnerable. 
    How this bill helps energy production
    Sen. Lankford also led a repeal of the Biden administration’s unfair tax penalty on oil and gas producers by restoring key investment deductions, which will allow domestic energy producers to reinvest, create jobs, and keep energy costs stable. 
    How this bill helps businesses
    Sen. Lankford worked to make full, immediate expensing permanent, so businesses can deduct investments like equipment and technology up front, which will help fuel job creation and business expansion.
    How this bill cracks down on illegal immigration
    This bill devotes $160 billion to hire more Border Patrol Agents, more ICE officers, and to finish the border wall and invest in technology to secure the border.
    How this bill helps our air traffic control system
    The bill invests $12.5 billion to modernize America’s air traffic control system, by replacing outdated equipment, upgrading safety infrastructure, and expanding controller training so we continue to have the safest skies in the world. 
    How this bill strengthens our national defense
    This bill provides $150 billion to strengthen our military, rebuild our defense industrial base, and support border security missions. It also funds the Golden Dome initiative, boosts efforts to counter China, improves the quality of life for our servicemembers, invests in the tools needed to improve Pentagon accountability and delivers a clean audit.

    MIL OSI USA News

  • MIL-OSI United Nations: General Assembly Endorses Nice Ocean Conference Declaration, Adopts $5.38 Billion Peacekeeping Budget

    Source: United Nations 4

    The General Assembly today endorsed the political declaration of the United Nations Ocean Conference, which establishes multilateral ocean governance.  It also adopted the $5.38 billion peacekeeping budget for the year starting 1 July. 

    Titled “Our Ocean, Our Future:  United for Urgent Action” (A/79/L.97), the declaration was adopted by acclamation at the close of the Conference held earlier this month in Nice, France.  However, today’s formal endorsement by the 193-member Assembly required a recorded vote, with 162 in favour to 1 against (United States), with no abstentions.  

    Several delegations objected to the vote, with the representative of France, co-host of the Conference along with Costa Rica, highlighting its strong political declaration and robust initiatives for the future as “a victory for the ocean”.  “The ocean doesn’t know borders” and neither should “our efforts to protect it”, said Costa Rica’s delegate, noting his country’s “steadfast” commitment to protecting the oceans.  He welcomed the momentum generated at the Conference for an early entry into force of the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction (BBNJ Agreement).  He also hailed promises to accede to the World Trade Organization (WTO) agreement to end subsidies for overfishing and decisive support for a plastic pollution convention as soon as possible.

    Brazil’s representative noted that the seas are “the planet’s main climate regulator” but “are running a fever”, while Australia’s delegate saw the adoption of this text as a testament to a collective commitment to address the urgency of climate change, biodiversity loss, and ocean pollution.  The United States’ delegate said the focus on implementing Sustainable Development Goal 14 is inconsistent with its position on the 2030 Agenda for Sustainable Development.

    Iraq’s delegate, speaking for the Group of 77 and China, noted that implementing Goal 14 requires more ambitious financial action, fulfillment of commitments made through intergovernmental agreements, and increased resources for small island developing States (SIDS) and least developed countries. 

    For her part, Venezuela’s delegate noted she had joined the consensus, while reiterating that it was not a party to the United Nations Convention on the Law of the Sea, which is “not the only single legal and regulatory framework for oceans and seas” — a position echoed by representatives of Iran, Türkiye, and El Salvador.

    Meanwhile, Argentina’s representative disassociated his delegation from all paragraphs referring to the 2030 Agenda and the Pact for the Future, as well as all paragraphs contradicting the guiding principles of the protection of life, liberty, and private property. 

    The Russian Federation’s delegate disassociated from the consensus on paragraph 26 of the declaration, which emphasizes the importance of the early entry into force of the BBNJ Agreement.  The instrument would undermine the provisions of the Convention on the Law of the Sea and the Agreement on Straddling Fish Stocks, with its norms allowing for impingement on the mandates and competencies of fisheries organizations.

    Japan’s representative hailed the adoption as “not the end but just the beginning of our renewed commitment to achieving SDG 14”, while Singapore’s delegate stated that the Convention on the Law of the Sea remains the “constitution for the oceans”, calling on Member States to fully respect it. 

    $5.38 Billion Budget for Peacekeeping Operations

    Acting on the recommendations of its Fifth Committee (Administrative and Budgetary), the Assembly also allocated a budget of $5.38 billion to 11 UN peacekeeping operations, the support account for these operations, the Regional Service Centre in Entebbe, and the Logistics Base in Brindisi.  These resolutions were adopted without a vote, with the exception of the resolution on the United Nations Interim Force in Lebanon (UNIFIL) (A/C.5/79/L.36/Rev.1), which was adopted by 147 votes in favour to 3 against (Argentina, Israel, United States), with 1 abstention (Paraguay), after an oral amendment proposed by Israel was rejected by 5 votes in favour (Argentina, Canada, Israel, Paraguay, United States) to 83 against, with 57 abstentions. 

    The Assembly further adopted a draft resolution on the “Comprehensive review of the whole question of peacekeeping operations in all their aspects” (A/79/424/Add.1), which was approved and forwarded by its Fourth Committee (Special Political and Decolonization).

    Tackling Illicit Trafficking in Wildlife

    The Assembly then adopted, by 157 votes in favour to 1 against (United States), with no abstentions, a draft resolution (A/79/L.96) submitted by the representative of Germany, by which the Assembly urges Member States to reinforce their efforts and adopt effective measures, as necessary, including by using special investigative techniques, consistent with article 20 of the United Nations Convention against Transnational Organized Crime, to prevent, investigate, prosecute and punish crimes that affect the environment, such as illicit trafficking in wildlife and wildlife products, which encompasses poaching and illegal harvesting of timber, including fauna and flora as protected by the Convention on International Trade in Endangered Species of Wild Fauna and Flora.

    Speaking in explanation of position, the United States delegate noted that the text contained matters that “should be discussed in Vienna-based anti-crime fora rather than in the General Assembly”. Further, he opposed the use of the term “gender mainstreaming,” insisting on the “biological reality of sex”. For his part, Argentina’s representative dissociated his delegation from all paragraphs concerning the 2030 Agenda and those that go against the protection of life and private property, including preambular paragraphs 1, 2, 18, 34 and operative paragraph 27.

    Promoting Interreligious, Intercultural Dialogue, Tolerance in Countering Hate Speech

    The Assembly also adopted a draft resolution (A/79/L.98) on combating hate speech, introduced by Morocco, by a recorded vote of 111 in favour to 1 against (United States), with 44 abstentions.  By the text, the Assembly called upon Member States to increase understanding about the spread and impact of hate speech, while continuing to adhere to relevant international human rights law obligations, as well as relevant United Nations instruments, in particular the Rabat Plan of Action.  Further, the Assembly called upon digital technology companies and developers to continue to develop solutions and publicly communicate actions to counter potential harms, including hate speech, bias and discrimination, from artificial intelligence-enabled content, including such measures as ensuring data integrity, incorporation of safeguards into artificial intelligence model training processes, identification of artificial-intelligence-generated material, authenticity certification for content and origins, labelling, watermarking and other techniques.

    Poland’s delegate, speaking for the European Union, whose members abstained from voting, emphasized that freedom of belief and religion applies to individuals, not objects or symbols, expressing reservations about preambular paragraph 14.

    The wording of that paragraph presents “serious concerns” in terms of freedom of expression and religious pluralism, noted the representative of Costa Rica, which further emphasized that combating hate speech cannot be achieved at the expense of freedom of expression.

    Hungary’s delegate indicated she could not support operative paragraph 23, which highlights one specific group, migrants, while the representative of the United Kingdom, who also abstained, refused to consider a text criticizing religion as incitement to hatred.

    Any restriction on freedom of expression must be circumscribed by law, necessary, and proportionate, argued Switzerland’s delegate, emphasizing that human rights protect individual beings, not religions or objects.  Furthermore, defamation of religions or religious defamation are not legal concepts recognized under international law.  For all these reasons, she voiced regret over the wording of preambular paragraph 14.

    For his part, Brazil’s delegate dissociated itself from paragraphs 11, 12, and 13, given that there is no agreed definition of hate speech and that this concept could be politicized.  Canada’s representative remained committed to the principle that everyone can exercise their freedom of belief and religion without fear of violence, also welcoming the attention paid to new technologies, while voicing concern over the wording of preambular paragraph 14 on acts directed against religious symbols and holy books.

    The Wiphala for Living Well in Harmony, Balance, Complementarity with Mother Earth

    The Assembly further adopted, by a recorded vote of 139 votes in favour to 2 against (United States, Israel), with 5 abstentions (Canada, Georgia, Paraguay, Peru, Türkiye), a draft resolution (A/79/L.95) introduced by Bolivia, who noted the Wiphala is “an age-old symbol born out of the deepest roots of Indigenous Peoples,” an expression of “the seven colors of the rainbow” and living in harmony with Mother Earth.  By the text, the Assembly called upon the international community to advance in the understanding, tolerance and solidarity among all peoples and cultures, and to strengthen efforts to eradicate manifestations of racism, racial discrimination, xenophobia and related intolerance, including against Indigenous Peoples, and promote respect for the diversity of their cultural manifestations, traditions, practices and knowledge systems.

    The United States representative, speaking before the vote, noted his delegation opposed the resolution’s focus on a single Indigenous community, further stating that the symbol remains controversial.  

    Mexico’s representative voiced regret that the Wiphala is limited to Bolivia and nearby regions, while Peru’s delegate pointed out that the text does not sufficiently detail the exact cultural origin of the symbol, and that the concept does not have a defined definition in a UN context. 

    While recognizing the cultural importance of the Wiphala for certain peoples of the Andean region, Canada’s delegate considered it inappropriate for the Assembly to designate a symbol specific to a geographical area as representing all Indigenous Peoples internationally.  This choice must be made by the Indigenous Peoples themselves, not by the UN, he said.

    MIL OSI United Nations News

  • MIL-OSI Asia-Pac: SHETO celebrates 28th anniversary of establishment of HKSAR in Shanghai

    Source: Hong Kong Government special administrative region

    SHETO celebrates 28th anniversary of establishment of HKSAR in Shanghai.

    To celebrate the 28th anniversary of the establishment of the Hong Kong Special Administrative Region (HKSAR), the Hong Kong Economic and Trade Office in Shanghai (SHETO) hosted a dinner reception in Shanghai today (July 1), attended by approximately 180 representatives from Shanghai’s government departments, institutions, chambers of commerce, enterprises, and Hong Kong community groups.

    Delivering a speech at the dinner reception, the Director of the SHETO, Mrs Laura Aron, highlighted that the HKSAR Government has focused on economic development, achieving remarkable results. She encouraged citizens and enterprises in Shanghai and the East China region to continue leveraging Hong Kong’s role as a “super-connector” and “super value-adder” to explore business opportunities, invest, and pursue employment or entrepreneurship in Hong Kong. She also expressed hope for continued robust co-operation between Shanghai and Hong Kong in areas such as trade, innovation, culture, and youth development, fostering mutual benefits.

    Mrs Aron mentioned that next year will mark the 20th anniversary of the establishment of the SHETO. She expressed gratitude to the Communist Party of China Shanghai Municipal Committee and the Shanghai Municipal Government for their support for the work of the HKSAR Government and the SHETO. The SHETO will continue to facilitate Shanghai-Hong Kong co-operation and support mutual success to make greater contributions to the country’s high-quality development.

    The Deputy Commissioner of Police (Management), Mr Chan Joon-sun, who is visiting Shanghai, attended the dinner. Speaking at the dinner reception, he shared that each anniversary occasion is an opportunity to review the development and achievements of “one country, two systems”. With the introduction of the dual legislation on national security, Hong Kong has embarked on a new journey, advancing from chaos to order, and from stability to prosperity. It demonstrates the institutional advantages and strong vitality of “one Country, two systems”. The country has been providing Hong Kong with opportunities to leverage its unique advantage of having strong support from the motherland and close connection with the world, promoting two-way exchanges between the mainland and the international community.

    Hong Kong member of the Shanghai Municipal Committee of the Chinese People’s Political Consultative Conference in Shanghai and Co-Founder and Chief Executive Officer of New Frontier Group, Mr Carl Wu, also shared remarks at the dinner on Shanghai’s support for Hong Kong-invested enterprises and the exchanges between Shanghai and Hong Kong.

    The SHETO also invited emerging Hong Kong young artists to perform at the dinner reception, showcasing Hong Kong’s diverse cultural charm through a suona performance blending Chinese and Western elements. Several Hong Kong students in Shanghai were also invited to showcase their talents.

    The theme of the dinner reception was “Multifaceted Hong Kong, Infinite Possibilities”, featuring interactive exhibition areas and photo check-in points themed around nine tourism development projects recently announced by the Working Group on Developing Tourist Hotspots, alongside the giant pandas gifted by the Central Government as design ideas, offering guests an immersive, multifaceted, and engaging experience of Hong Kong.

    The SHETO, in collaboration with Invest Hong Kong, also organised a seminar entitled “Hong Kong: Enabler of Mainland Catering and Food Enterprises to Go Global” today. Insights on the competitive advantages and development opportunities of Hong Kong as a preferred place for business were shared with over 100 representatives from catering, food and other industrial sectors in the East China region. They were encouraged to set up business in and develop overseas markets through Hong Kong.

    Ends/Tuesday, July 1, 2025
    Issued at HKT 22:00

    MIL OSI Asia Pacific News

  • MIL-OSI Europe: Written question – EU competitiveness in the global technology race and the impact of excessive regulation – E-002507/2025

    Source: European Parliament

    Question for written answer  E-002507/2025
    to the Commission
    Rule 144
    Harald Vilimsky (PfE), Georg Mayer (PfE)

    The growing technological dominance of the US and China, the EU’s growing investment gap and the EU’s persistent innovation deficit despite extensive programmes raise fundamental questions about the effectiveness of the EU’s strategies for promoting technological independence.

    • 1.How does the Commission justify the billions of euro it grants in subsidies for centrally managed flagship projects, the economic impact of which often bears no relation to the public investment made?
    • 2.How does the Commission intend to ensure that, in future, technological innovation will no longer fail on account of ideological sustainability or equality objectives?
    • 3.Why is the EU still trailing behind in the development of its own cloud and data centre infrastructure, despite the fact that technological sovereignty is officially recognised as a priority?

    Submitted: 23.6.2025

    Last updated: 1 July 2025

    MIL OSI Europe News

  • MIL-OSI Russia: Hong Kong has broad prospects and a promising future – Chinese Foreign Ministry

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, July 1 (Xinhua) — With the support of the motherland, the strong guarantee of the “one country, two systems” policy, the dedication of the Hong Kong Special Administrative Region (SAR) government and the concerted efforts of all walks of life, Hong Kong enjoys broad prospects and a promising future, Chinese Foreign Ministry spokesperson Mao Ning said on Tuesday.

    The diplomat made the statement at a regular briefing, noting that over the past five years since the Law of the People’s Republic of China on Safeguarding National Security in the Hong Kong Special Administrative Region was adopted and put into effect, the local legal system has been improved, the stability and cohesion of Hong Kong society has been strengthened, and the rights and freedoms enjoyed by the people of the Hong Kong Special Administrative Region in accordance with the law have been more fully protected.

    As Mao Ning pointed out, the groundless and malicious denigration of the “one country, two systems” policy by some Western politicians and anti-China organizations, as well as their slander regarding the implementation of the rule of law in Hong Kong, completely expose their malicious intent to undermine stability in the metropolis.

    The spokesperson emphasized that Hong Kong has achieved high-quality development based on its high level of security, with its gross regional product growing for nine consecutive quarters. Hong Kong has entered the top three international financial centers in the world and regained its place in the top three in the global competitiveness ranking.

    As the world’s third-largest recipient of foreign direct investment, Hong Kong has led the world in IPO funding since the start of this year, retained its top spot in air cargo volume, ranked fourth in the International Shipping Center Development Index, and is among the top 10 in talent competitiveness. As Mao Ning noted, increasing investment in the SAR has become a priority choice for many foreign chambers of commerce.

    The data shows that Hong Kong’s economy is highly resilient and viable, and that the city’s international attractiveness is only growing, she added.

    “Today marks the 28th anniversary of Hong Kong’s return to the bosom of the motherland. We believe that with the firm support of the motherland, the reliable guarantees of the ‘one country, two systems’ policy, the dedication of the HKSAR administration and the concerted efforts of all walks of life, Hong Kong will enjoy broad prospects and a promising future,” Mao Ning concluded. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: US Senate narrowly approves ‘one big beautiful bill’

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    NEW YORK, July 1 (Xinhua) — The U.S. Senate narrowly passed Tuesday its own version of the Donald Trump administration’s tax and spending bill, also known as the “one, big, beautiful bill,” which is expected to increase the U.S. budget deficit by $3.3 trillion by 2034.

    The Republican-controlled Senate approved the bill with 51 votes in favor after a lengthy vote that began Monday morning. Fifty lawmakers voted against.

    Over the past few days, senators have been reading and debating the 940-page bill, which was introduced on June 27. –0–

    MIL OSI Russia News

  • MIL-OSI USA: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: US State of California

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Russia: Kazakhstan Plays Key Role in China-Central Asia Partnership – Chinese Consul General in Almaty

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Almaty, July 1 (Xinhua) — In an exclusive article for DKnews.kz, Chinese Consul General in Almaty Jiang Wei shared her views on the historic 2nd China-Central Asia Summit in Astana, where the leaders of the six countries opened a new page in centuries-old cooperation. She stressed that Kazakhstan continues to play a key role in deepening Central Asia’s strategic partnership with China.

    As the Consul General noted, an unprecedented level of political mutual trust has been achieved between the parties. According to her, after establishing diplomatic relations, China and the Central Asian countries have built a comprehensive strategic partnership, secured it with numerous documents within the framework of the Belt and Road initiative, and are promoting the concept of a community with a common destiny both at the bilateral and regional levels.

    The Astana Declaration became a symbol of political unity, the diplomat said, adding that in it the parties confirmed their readiness to support each other on key issues, and the declaration itself became a powerful expression of political consensus and a signal of stability in conditions of global uncertainty.

    Jiang Wei also stressed that China and Central Asian countries have achieved impressive results in practical cooperation. “The summit announced that 2025-2026 will be the Years of High-Quality Development of China-Central Asia Cooperation, focusing on six priority areas, such as unimpeded trade, industrial investment, connectivity, green resource management, agricultural modernization, and facilitating people-to-people exchanges,” the consul general noted.

    Speaking about the Action Plan for the high-quality joint construction of the Belt and Road signed by the heads of six states, she noted that this is the first time that China has signed such a document with all the countries in the border region at once.

    “The summit also decided to establish a poverty alleviation center, an educational exchange and cooperation center, a desertification control center, and a platform to create favorable conditions for trade within the China-Central Asia format. These initiatives are aimed at improving the well-being of the Central Asian population, training highly qualified specialists, managing water and natural resources, and promoting high-quality economic development. All this clearly demonstrates the deep meaning of the slogan “promoting joint modernization through high-quality development,” Jiang Wei emphasized.

    The Consul General said that the summit demonstrated a new level of good-neighborliness and friendship. Speaking about the Treaty on Eternal Good-Neighborliness, Friendship and Cooperation signed by the six parties, a document that legally enshrines the principle of eternal friendship between peoples, she said: “This agreement has become a new milestone in the history of Chinese-Central Asian relations, opening the way for cooperation for decades to come.”

    “More than 100 agreements on sister cities were signed, which forms a solid humanitarian basis for people’s diplomacy. These “bridges of friendship” contribute to the expansion of cultural and humanitarian interaction. The parties also agreed to intensify cooperation in such areas as parliamentary and inter-party ties, contacts between women and youth, the work of the media, analytical centers and public organizations,” the consul general added. “All this will become a new impetus for the dialogue of civilizations and a continuation of the thousand-year tradition of friendship between peoples,” she emphasized.

    In addition, as the diplomat reported, following the summit, more than 60 bilateral agreements were signed, covering such areas as trade, investment, science and technology, customs regulation, tourism, and the media. These agreements, in her opinion, will give a powerful impetus to further deepening ties between the parties in the “golden period.” –0–

    MIL OSI Russia News

  • MIL-OSI Security: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: United States Attorneys General 7

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Sen. Budd Votes for the One Big Beautiful Bill Act ToDeliver Historic Tax Cuts for North Carolina Families

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
    “I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd. 
    Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
    Provides Unprecedented Tax Relief for Families
    This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
    Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
    This legislation lowers taxes for seniors relying on Social Security.
    Gives Workers the Tools They Need to Advance Their Careers
    Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
    Protects North Carolina Agriculture
    Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
    This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
    Unlocks Economic Growth & American Manufacturing
    This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
    By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
    Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
    Reduces Government Spending to Preserve & Protect Government Programs
    This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
    Invests in America’s National Defense
    Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future. 
    This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base. 
    America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
    This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
    Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
    This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
    This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
    Keeps America’s Border Secure
    While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
    Ushers in Next-Generation Technologies
    This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
    This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: United States Attorneys General

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI USA: ICYMI: Bipartisan Warren, Scott (Fla.) Letter Questions Biden Defense Secretary’s Decision to Launch Lobbying Firm

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren
    July 01, 2025
    Austin publicly promised Warren in 2021 he would not become a lobbyist after leaving government service
    “When our highest-ranking government officials and military officers treat their positions as steppingstones to personal enrichment, they corrupt the very institution they swore to defend.” 
    Text of Letter (PDF)
    Washington, D.C. — U.S. Senators Elizabeth Warren (D-Mass.) and Rick Scott (R-Fla.), both members of the Senate Armed Services Committee, wrote to former Secretary of Defense Lloyd Austin seeking an explanation and further information on his recent decision to start a strategic advisory firm. Austin had publicly promised Senator Warren during his 2021 confirmation process that he would not become a lobbyist after his government service ended. 
    On June 3, 2025, Politico reported that Austin was launching Clarion Strategies, along with other former Biden defense and national security officials, to help clients “navigate geopolitical upheaval…, advancements in defense technology…, [and] global trade shifts and emerging alliances among U.S. adversaries like Russia, China, North Korea and China.” This new venture undermines his promises to Senator Warren to “ensure that the public has no reason to question my impartiality” and “[had] no intent to be a lobbyist.” 
    “The revolving door between the Pentagon and K Street has been spinning for years during both Democratic and Republican administrations. In your case, this move is particularly disappointing because you made a clear promise during your nomination hearing to uphold the public trust,” wrote the senators. 
    Austin’s pledges helped secure similar commitments from other defense nominees, including Air Force Secretary Frank Kendall, Under Secretary of Defense for Research and Engineering Heidi Shyu, and Under Secretary of the Army Gabriel Camarillo. 
    Austin appears to have found a loophole by serving as an “adviser” rather than a registered lobbyist. 
    “[That] undermines the very purpose of the promise that you made to the American people: to close the revolving door of government officials cashing in on their public service by lobbying, advising…” wrote the lawmakers.
    The senators demanded clarity on Austin’s new role by July 14, 2025, including whether he’ll register to lobby on behalf of any company; if any current or prospective clients have contracts with the Defense Department; if he’ll work on behalf of any foreign government; if he’ll recuse from any matters involving any companies he worked with as Defense Secretary; and whether any clients would benefit from his security clearance. 
    As leaders of the Senate Armed Services Subcommittee on Personnel, Senators Warren and Scott held a hearing on the dangers of the revolving door. Both have also introduced legislation to tackle the revolving door, with Senator Warren introducing the Department of Defense Ethics and Anti-Corruption Act and Senator Scott introducing the Banning Lobbying and Safeguarding Trust (BLAST) Act to ban members of Congress from lobbying.
    Senator Warren has long sought to protect servicemembers and national security by pushing defense nominees to resolve their conflicts of interest: 
    In May 2025, Senator Warren pressed Mr. Michael Obadal, nominee for Under Secretary of the Army, on his refusal to divest from major defense contractors.
    In April 2025, Senator Warren secured a commitment from Lieutenant General John D. Caine, President Trump’s nominee to be the next Chairman of the Joint Chiefs of Staff, not to work for any major defense contractors—or companies affected by his official actions—after leaving government service. 
    In March 2025, ahead of his confirmation vote, Senator Elizabeth Warren wrote to Deputy Defense Secretary Nominee Stephen Feinberg, urging him to recuse himself from all matters related to Ligado Networks, which has a pending $39 billion lawsuit against the DoD. 
    In March 2025, Senator Elizabeth Warren wrote to Mr. Emil Michael, nominee for Under Secretary of Defense for Research and Engineering, with concern over his history of inappropriate behavior at work, his attacks on journalists and public accountability, and his ties to technology companies that may seek contracts with the Department of Defense. 
    In February 2025, ahead of his confirmation hearing before the Senate Armed Services Committee, Senator Elizabeth Warren wrote to Mr. Stephen Feinberg, nominee for Deputy Secretary of the Department of Defense, pressing him to explain his “serious conflicts of interest” and his track record of mismanagement.
    In January 2025, Senator Elizabeth Warren wrote to Mr. Michael Duffey, nominee for Under Secretary of Defense for Acquisition and Sustainment of the Department of Defense, ahead of his confirmation hearing, with serious concerns about his record, which include violating the law, disregarding Congressional authority, and his involvement in Project 2025. 
    In January 2025, Senator Elizabeth Warren wrote to Mr. Pete Hegseth, nominee for Secretary of the Department of Defense, regarding his ethics conflicts ahead of the Senate’s consideration of his nomination. Mr. Hegseth’s household’s ownership of stock in several defense contractors and his unwillingness to commit to the same post-employment restrictions he previously advocated for were particularly troubling for a prospective Secretary of Defense.
    In March 2024, Senator Elizabeth Warren secured ethics commitments from Douglas Schmidt, ahead of his confirmation to be the Director of Operational Test and Evaluation (DOT&E) for the Department of Defense.
    In July 2023, Senator Elizabeth Warren secured a commitment from General Charles Q. Brown, Jr., President Biden’s nominee to be the next Chairman of the Joint Chiefs of Staff, not to become a defense industry lobbyist or receive compensation from a defense contractor for four years after leaving government service. 
    In June 2023, Senator Elizabeth Warren and representative Andy Kim reintroduced the Department of Defense Ethics and Anti-Corruption Act, to limit the influence of contractors on the military, constrain foreign influence on retired senior military officers, and assert greater transparency over contractors and their interaction with DoD.
    In July 2021, Senator Elizabeth Warren secured agreements to four-year recusals from former clients’ and employers’ party matters from then-Secretary of the Air Force Frank Kendall and then-USD(R&E) Heidi Shyu.

    MIL OSI USA News

  • MIL-OSI: Ageas completes the acquisition of Saga’s Underwriting Business

    Source: GlobeNewswire (MIL-OSI)

    Ageas announced today that all necessary regulatory approvals for the acquisition of Acromas Insurance Company Limited (AICL), Saga’s Underwriting Business, have been obtained and the transaction has been completed.

    The completion of the acquisition of AICL represents the first milestone towards the establishment of a 20-year partnership with Saga Services Limited (SSL) for the distribution of personal lines Motor and Home insurance products to Saga’s customers, as communicated on 16 December 2024 (read the press release).

    The acquisition and the distribution agreement with Saga, the UK specialist provider of products and services to people aged over 50, aligns perfectly with Ageas’s Elevate27 strategy, to capitalise on its robust Non-Life presence across Europe, while accelerating solutions targeted at an ageing population, a rapidly expanding customer segment where the Group and Ageas UK already have real strength and expertise. Furthermore, it presents Ageas with the opportunity to enhance its position as a leading personal lines insurer in the UK.

    The overall consideration for the acquisition is approximately GBP 67 million – consistent with prior communications, and to be paid out between acquisition and the operational start date of the partnership. The overall Solvency II impact, including the Affinity Partnership, remains aligned with the previously communicated – 5%.

    Ageas is a Belgian rooted listed international insurance Group with a heritage spanning of 200 years. It offers Retail and Business customers Life and Non-Life insurance products designed to suit their specific needs, today and tomorrow, and is also engaged in reinsurance activities. As one of Europe’s larger insurance companies, Ageas concentrates its activities in Europe and Asia, which together make up the major part of the global insurance market. It operates successful insurance businesses in Belgium, the UK, Portugal, Türkiye, China, Malaysia, India, Thailand, Vietnam, Laos, Cambodia, Singapore, and the Philippines through a combination of wholly owned subsidiaries and long-term partnerships with strong financial institutions and key distributors. Ageas ranks among the market leaders in the countries in which it operates. It represents a staff force of about 50,000 people and reported annual inflows of EUR 18.5 billion in 2024.

    Attachment

    The MIL Network

  • MIL-OSI: Ageas completes the acquisition of Saga’s Underwriting Business

    Source: GlobeNewswire (MIL-OSI)

    Ageas announced today that all necessary regulatory approvals for the acquisition of Acromas Insurance Company Limited (AICL), Saga’s Underwriting Business, have been obtained and the transaction has been completed.

    The completion of the acquisition of AICL represents the first milestone towards the establishment of a 20-year partnership with Saga Services Limited (SSL) for the distribution of personal lines Motor and Home insurance products to Saga’s customers, as communicated on 16 December 2024 (read the press release).

    The acquisition and the distribution agreement with Saga, the UK specialist provider of products and services to people aged over 50, aligns perfectly with Ageas’s Elevate27 strategy, to capitalise on its robust Non-Life presence across Europe, while accelerating solutions targeted at an ageing population, a rapidly expanding customer segment where the Group and Ageas UK already have real strength and expertise. Furthermore, it presents Ageas with the opportunity to enhance its position as a leading personal lines insurer in the UK.

    The overall consideration for the acquisition is approximately GBP 67 million – consistent with prior communications, and to be paid out between acquisition and the operational start date of the partnership. The overall Solvency II impact, including the Affinity Partnership, remains aligned with the previously communicated – 5%.

    Ageas is a Belgian rooted listed international insurance Group with a heritage spanning of 200 years. It offers Retail and Business customers Life and Non-Life insurance products designed to suit their specific needs, today and tomorrow, and is also engaged in reinsurance activities. As one of Europe’s larger insurance companies, Ageas concentrates its activities in Europe and Asia, which together make up the major part of the global insurance market. It operates successful insurance businesses in Belgium, the UK, Portugal, Türkiye, China, Malaysia, India, Thailand, Vietnam, Laos, Cambodia, Singapore, and the Philippines through a combination of wholly owned subsidiaries and long-term partnerships with strong financial institutions and key distributors. Ageas ranks among the market leaders in the countries in which it operates. It represents a staff force of about 50,000 people and reported annual inflows of EUR 18.5 billion in 2024.

    Attachment

    The MIL Network

  • MIL-OSI Russia: China’s international image has improved significantly in recent years and is recognized in different parts of the world – Russian expert

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Moscow, July 1 /Xinhua/ — Economic power, international activity and contribution to global development – these factors have a positive effect on China’s image on the world stage, which is recognized in various countries, Nikita Stepanov, a senior researcher at the Institute of Economics of the Russian Academy of Sciences and a member of the central board of the Russian-Chinese Friendship Society, told Xinhua in an interview.

    “China’s international image has indeed improved significantly in recent years and is worthy of recognition in various parts of the world. This is due to a combination of factors, primarily its active economic influence and the successful implementation of large-scale international projects, such as the Belt and Road Initiative. China has become an important trading partner for many countries, investing heavily in infrastructure and economic development, which has strengthened trust and respect for it on the world stage,” the expert noted.

    As N. Stepanov pointed out, today China plays a key role in the formation of inclusive economic globalization, demonstrating a development model that takes into account national characteristics and needs. The Chinese experience of sustainable growth and successful adaptation of economic reforms has become, in his opinion, an important reference point for many countries, especially for the states of the Global South and developing regions. “China has proven that it is possible to combine an open economy with active state participation, which has caused a wide response and interest in the modern world,” he believes.

    According to the Russian economist, China’s Belt and Road initiative strengthens the integration of developing countries into the global economy, stimulating infrastructure and industrial development. By promoting trade, investment and technological exchange, China acts as a stabilizing factor in maintaining the global economic order. “China not only offers alternative models, but also plays a driving role in stimulating growth and reducing the gap between developed and developing countries, maintaining balance and diversity in the global economic order,” he emphasized.

    N. Stepanov drew attention to the fact that China demonstrates a desire not only to develop the economy and infrastructure, but also to promote sustainable development and innovation at the global level. China is actively involved in reforming international institutions, stimulating their adaptation to modern challenges and the needs of different countries, especially developing ones. “Thus, China’s role in the global governance system is becoming increasingly significant, contributing to the formation of a more just and inclusive international order,” the expert noted.

    The Xinhua interlocutor emphasized that the hegemonic and intimidating behavior of the United States, which manifests itself in the abuse of tariff measures and military interventions without the sanction of the UN Security Council, raises serious concerns, undermines the international order, leads to the escalation of trade conflicts and instability in the global economy. At the same time, according to N. Stepanov, China plays an important role in maintaining the international order and developing the global governance system. “Over the past decades, it has consistently advocated respect for international law and the sovereignty of states, which contributes to strengthening multilateralism in international relations,” the economist recalled, adding that the concept of building a community with a shared future for mankind reflects China’s commitment to cooperation, mutual respect and joint development, which is important in the era of global challenges.

    According to the Russian expert, the concept of building a community of common destiny for humanity has had a significant impact on the development of world diplomacy and international relations. “This concept emphasizes the need for global cooperation and mutual respect to address common challenges — climate change, pandemics, economic instability and conflicts. It encourages the search for compromises and joint actions, emphasizing the interdependence of all countries regardless of their level of development,” he explained.

    N. Stepanov is confident that the concept of a common destiny for humanity has strengthened multipolarity in world politics, supporting the principles of justice and equality. “China is actively promoting this idea through the Belt and Road initiative, promoting economic development and infrastructure cooperation in developing countries. Thus, the concept unites the efforts of different states on the path to sustainable and inclusive development of humanity,” he said.

    In addition, cultural diplomacy, as well as the dissemination of the Chinese language and traditional culture through Confucius Institutes, play an important role in improving China’s international image, according to the expert. “This expands the positive perception of the country,” concluded N. Stepanov. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: In the 2024-2025 marketing year, Ukraine reduced the export of grain and leguminous crops by 20.5 percent.

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Kyiv, July 1 (Xinhua) — In the 2024-2025 marketing year (MY, July 1, 2024 – June 30, 2025), Ukraine exported 40.6 million tons of grain and leguminous crops, down 20.5 percent from the previous MY, according to data released Tuesday by the Ministry of Agrarian Policy and Food of Ukraine.

    The department noted that in the specified period, a decline was recorded for all major grain export items. Thus, corn supplies abroad decreased by 25.5 percent to 22 million tons, wheat – by 15.1 percent to 15.7 million tons, barley – by 8 percent to 2.3 million tons.

    The Ministry of Agrarian Policy added that, according to the results of 2024-2025 MY, flour exports from Ukraine amounted to 71.1 thousand tons, decreasing by 27.6 percent.

    In 2023-2024 MY, Ukrainian farmers supplied 51.1 million tons of grain and leguminous crops to foreign markets. –0–

    MIL OSI Russia News

  • MIL-OSI Africa: Ambassador Chen Mingjian Attended the 4th China-Tanzania Job Fair

    On June 28, Chinese Ambassador to Tanzania H.E.Chen Mingjian and Minister of Prime Minister’s Office(Labour, Youth, Employment and Persons with Disability) Hon. Ridhiwani Jakaya Kikwete attended The 4th China-Tanzania Job Fair together. Over 100 Chinese enterprises participated in the job fair, offering about 1000 job opportunities.

    Distributed by APO Group on behalf of Embassy of the People’s Republic of China in the United Republic of Tanzania.

    MIL OSI Africa

  • MIL-OSI Africa: Africa: Coalition commits to Action Plan to increase private investment mobilization for developing countries by end of 2027


    Download logo

    A coalition of governments, international development partners and private sector groups including the UN Capital Development Fund, UN Economic Commission for Africa, African Union Commission, Organisation for Economic Cooperation and Development (OECD), Global Investors for Sustainable Development (GISD) Alliance, Ministry for Foreign Affairs of Finland, Norway Ministry of Foreign Affairs (MFA) and Norad, Switzerland SECO and Convergence Blended Finance, are announcing the development of an Action Plan to increase mobilize private sector capital at scale in developing countries.

    The Action Plan, announced at the Fourth Financing for Development Conference (FFD4) in Seville, Spain, seeks to tackle poverty, economic growth and climate risks by deploying public sector resources through blended finance to mobilize private investment in underserved markets, which, over the last decade, has remained weak even as global wealth has ballooned. The Action Plan will include a dedicated Least Developed Countries (LDCs) and Africa-focused track to advance context-specific blended finance approaches and support scalable investment opportunities in key sectors.

    FFD4 is a once-in-a-decade gathering of development partners seeking to build a renewed global financing framework to urgently unlock greater volumes of capital to close the financing gap of developing countries. Government-sourced Official Development Assistance (ODA) declined last year by over 7% compared with 2023, according to the Organisation for Economic Cooperation and Development (OECD), one of the co-proposers of the Action Plan.

    “The world has the resources – the money we need – to eradicate poverty and ensure every person can live a life free from poverty. Much of those resources lie with the private sector in the world’s most developed nations and they will likely remain there until the real and perceived risks that act as a barrier to investment in underserved markets are tackled head-on,” said Pradeep Kurukulasuriya, Executive Secretary of the UN Capital Development Fund, which provides catalytic and blended finance solutions for underserved markets.

    “Blended finance models that are tailored to country needs have the potential to de-risk markets, plug the international development finance gap and transform the lives of hundreds of millions of people living in the world’s underserved markets and Least Developed Countries,” Mr Kurukulasuriya added.

    “Bridging Africa’s investment gap demands bold, coordinated action. This Action Plan marks a turning point, a practical blueprint to shift global capital toward sustainable development in countries that need it most. The UN Economic Commission for Africa is committed to ensuring that Africa is not only part of the conversation, but central to the solution” added Claver Gatete, Executive Secretary, UN Economic Commission for Africa.

    “As traditional streams of overseas development assistance dry up, more people than ever are talking about the promise of blended finance,” shared Joan Larrea, Chief Executive Office of Convergence. “At FFD4, with this joint proposal, we have made a significant step towards making that promise a reality.”

    “Norway is proud to collaborate with this global coalition on developing the Action Plan to mobilize private investment for sustainable development. Addressing the financing gaps in Least Developed Countries and underserved markets is critical to tackling poverty, hunger, and climate challenges. By leveraging blended finance and fostering innovative partnerships, we aim to contribute to transformative change and create a foundation for equitable and inclusive growth,” said Åsmund Aukrust, Norway’s Minister of Development.

    “Mobilization of private capital for financing sustainable development is an integral part of Finland’s foreign and development policy”, says Ville Tavio, Finland’s Minister for Foreign Trade and Development. “Financing for Development Conference will increase the clarity and formality of private capital mobilization as part of the financing sustainable development for the next decade. We believe that developing a common action plan and standardizing the proven blended finance models will help us scale up private capital mobilization to deliver on the commitments agreed here in Seville.”

    While global assets have doubled to $482 trillion over the last decade, private sector investment to and within low- and middle-income countries has remained stubbornly weak. Only 5% of those global assets are invested in developing countries, excluding China, according to the Financial Stability Board, an international body that monitors the global financial system. Of that 5%, only a tiny proportion reaches the most underserved markets and the world’s 44 Least Developed Countries, which are collectively home to some 880 million people.

    The world stands at a crossroads for financing sustainable development with an estimated annual financing gap of $4 trillion – up from $2.5 trillion pre-pandemic. The OECD reports that all “official development finance” activity mobilized an average of $57 billion in private investment annually over the last five years – just 1% of the $6-7 trillion needed each year if the Sustainable Development Goals (SDGs) are to be met.

    At the same time, domestic financial resources in developing countries are insufficient and cross-border private investment flows from developed to developing countries has been low over the past decade.

    Blended finance has the potential to transform private investment flows and positively contribute to the FfD4 Outcome Document mobilization objectives and to the SDGs.

    Signatories of the Joint Initiative have committed to develop an “effective, efficient, fair and practical action plan” through the remainder of 2025 and into 2026 to identify how to use a blend of public sector and philanthropic resources to mobilize and crowd-in larger amounts of private sector finance for development results at scale.

    The Action Plan will describe practical measures to mobilize private investment using standardized and replicable blended finance models tailored to country contexts, with an emphasis on alignment with national priorities and global development goals with the following measurable results:

    • At least 16 OECD DAC countries will agree to or endorse the Action Plan by March 31, 2026.

    • At least 27 African countries and 27 non-African developing countries will also endorse the Action Plan by the same date.

    • At least 16 developed and 54 developing countries will commit to implementing the plan starting June 30, 2026.

    The Action Plan is one of a series being submitted to conference organisers that seek to turn the objectives outlined in the FFD4 outcome document into a pathway for action.

    Distributed by APO Group on behalf of United Nations Economic Commission for Africa (ECA).

    MIL OSI Africa

  • MIL-OSI Russia: 3 people killed, 35 hospitalized after drone attack on Izhevsk — head of Udmurtia A. Brechalov

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Moscow, July 1 /Xinhua/ — Three people were killed and 35 others were hospitalized, including 10 in serious condition, after unmanned aerial vehicles /UAVs/ of the Armed Forces of Ukraine /AFU/ attacked an enterprise in Izhevsk, the head of Russia’s Udmurt Republic Alexander Brechalov said on Tuesday.

    “I visited the victims in the hospital – at the moment, 35 people are hospitalized, 10 of them are in serious condition. Our doctors are providing assistance to everyone – including consultations with colleagues from the federal center. To our great regret, we have 3 fatalities,” he wrote on his Telegram channel.

    According to the Russian Defense Ministry, Russian air defense forces destroyed and intercepted 60 Ukrainian UAVs over Russian regions overnight. –0–

    MIL OSI Russia News

  • MIL-OSI China: Beijing issues rainstorm alert

    Source: People’s Republic of China – State Council News

    The Beijing Meteorological Service issued a rainstorm alert at 4 p.m. Tuesday, warning of heavy rainfall across the city from Wednesday afternoon to Thursday morning.

    Torrential rain is expected in some areas, with isolated locations experiencing hourly precipitation exceeding 30 mm, the service said, adding that thunderstorms may accompany the rainfall.

    The capital has seen frequent downpours this week, with meteorologists predicting rain will remain a persistent feature over the coming days. Despite stable temperatures, high humidity levels will sustain noticeably sultry weather.

    Authorities urged the public to stay updated on forecasts, carry rain gear, and avoid sheltering near high-rise buildings or billboards. Drivers were advised to exercise caution on slippery roads and steer clear of flooded sections.

    MIL OSI China News