Category: China

  • MIL-OSI Security: Assistant Attorney General John P. Carlin Delivers Remarks at Practising Law Institute’s Coping with U.S. Export Controls and Sanctions 2015 Conference

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Thank you for that introduction, and for the opportunity to be a part of this important discussion. 

    As you all know, foreign governments and other non-state adversaries of the United States are engaged in an aggressive campaign to evade U.S. sanctions regimes and acquire sensitive U.S. technology.  In so doing, they threaten our economy, our prosperity and, most importantly, our national security.  Disrupting these national security threats is among the highest priorities of the Department of Justice, and the National Security Division. 

    But the responsibility of protecting our nation from these threats is a shared one.  Your clients – the companies you represent – and thus, you, have a critical role to play. 

    Because our companies have our nation’s crown jewels in their possession.  They house information targeted by thieves ranging from foreign powers bent on economic and military superiority, to individual criminals who know the market demand for this information, to terrorists who wish to create weapons of mass destruction. 

    Of course, companies have a responsibility to comply with the export control and sanctions regime.  We must also recognize that our companies are not immune from becoming unwitting victims of thieves and spies.  We live in an age where the threats we face are not limited to unlawful shipments and deliveries of goods.  Threats are also posed by insiders and through cyberspace.  Therefore, to protect what we value, our national assets, companies must learn how to comply with the law and how to protect themselves. 

    That is why it is good to see such a strong turnout.  Lawyers are on the front line helping clients adapt to an ever evolving export control regime.  Lawyers shape strategy – hardening collective defenses and counseling companies on best practices. 

    For example, sitting here today, you know to help your clients comply with export controls and sanctions.   Regimes designed to keep export controlled data and trade secrets out of the hands of rogue nations or terrorists.

    But have you had the chance to counsel those same clients when a cyber-hacker exfiltrated that information?  If you have not, unfortunately, it may only be a matter of time.  Cases involving the theft of export-controlled information via hacking are no longer uncommon. 

    Recently, we’ve brought cases where hackers targeted cleared U.S. defense contractors and stole massive amounts of sensitive data related to military technology, including export-controlled software.  These cases are not the first of their kind, and they will almost certainly not be the last.

    You have the power to help your clients protect themselves.  In a modern, interconnected world, there is quickly emerging a blending of practice areas.  Trade controls blends with data privacy, and export controls and sanctions trigger questions not only of compliance but of cybersecurity. 

    It is a fascinating time to be a practicing lawyer in this area, but one that brings with it grave responsibility. 

    Today, we’ll talk about a broad range of issues that go into being a modern export control practitioner. 

    National Security Division

    But first, I can explain a bit about the National Security Division of the Department of Justice. 

    The National Security Division was created in the wake of the September 11th terrorist attacks, in part in response to a specific recommendation from the WMD Commission.

    The Commission identified intelligence failures that contributed to the attacks.  It highlighted the danger of the so-called wall between foreign intelligence and law enforcement.  We needed to be able to connect the dots.  We needed to change.

    So in 2006, Congress created the National Security Division, creating the first new litigating division in the Department in almost half a century.  The National Security Division brings all of the department’s resources to bear.  We bring down the wall, uniting prosecutors and law enforcement officials with intelligence attorneys and the Intelligence Community.

    We are responsible for executing the highest priority of the Department of Justice – to protect this nation from the full range of national security threats we face.  We are proud to have this essential mission. 

    At the top of our priority list is protecting our nation from terrorist threats.  In recent days, you’ve heard everyone from the president to the attorney general and the director of the FBI speaking at length about the steps we are taking to combat that threat each and every day.

    Just yesterday, we arrested Jalil Ibn Ameer Aziz, 19, a U.S. citizen and resident of Harrisburg, Pennsylvania, on charges of conspiring to provide, and attempting to provide, material support to the Islamic State of Iraq and the Levant (ISIL).  Aziz is alleged to have served as an intermediary between ISIL supporters.  Passing location information, including maps and a phone number, to assist persons seeking to travel and travel to and wage jihad with ISIL.

    Although it may not seem so at first, fighting terrorism and preventing the illegal export of U.S. technology are interrelated goals.  Take the case of Feras Diri.  Diri is indicted in the very same district as Aziz.  We allege he was involved in a scheme to illegally export U.S. goods to Syria in violation of U.S. sanctions.  Some of these good were dual-use items.  It doesn’t take much to imagine the consequences of those items falling into the wrong hands once it reaches Syria. 

    One of the most significant national security threats we face, is the protection of our nation’s assets – including export controlled information, as well as other sensitive information that may be targeted by nation states and terrorists.  In so doing, we take an intelligence-driven, threat-based approach.

    We have an entire section devoted to this work – the Counterintelligence and Export Control Section, or simply CES.  We changed the name as part of a restructure to reflect the significance of export control and sanctions enforcement.  This year, CES also finalized a new Strategic Plan, setting forth an aggressive, comprehensive approach.  We know from experience that those seeking to do us harm will look for any available vulnerability to exploit.  They use all tools against us; it is our responsibility to do the same.  Our strategy is driven by the intelligence picture we see, which helps us prioritize and focus on the areas of most significant threat.

    Our Priorities and Our Regime

    Two of our highest priority areas involve China and WMDs.  Both are subject to export controls and regulations.

    Our economy profits from exports, and we support the flow of goods across borders.  But we must balance economic gain with the real threat to national security posed by certain technologies falling into the wrong hands. 

    That is why our export control regime is so important.  It is the best way to keep sensitive military and dual-use technologies, or even information that could be used in weapons of mass destruction, from ending up in the hands of terrorists and other adversaries.  They protect our innovation from being turned against us.

    With an ever-growing and evolving set of threats targeting our sensitive technologies and information, we must be vigilant. We must look at how transactions could make us more vulnerable, and do everything in our power to mitigate those vulnerabilities.

    Take China – despite a long-standing U.S. arms embargo, China continues to surge efforts to acquire advanced U.S. military technology.   China seeks U.S. persons with expertise to illegally provide services and know-how related to sensitive, export-controlled U.S. technology for military gain.  As an example, they targeted U.S. experts on jet engines to assist in developing Chinese-made engines.  If successful, our military edge over China is reduced; our country is put at greater risk.  Knowing what China seeks and why is essential to any sound export compliance and training program. 

    Iranian Sanctions

    Likewise, a high priority remains Iran.

    Earlier this year, the United States, Iran, the E.U. and five other nations reached a Joint Comprehensive Plan of Action (JCPOA). 

    The sanctions relief specified in the JCPOA does not go into effect until Implementation Day – which does not occur until after Iran has completed all necessary nuclear steps, as verified by the International Atomic Energy Agency.

    Even after Implementation Day, sanctions relief will not affect most laws and regulations enforced by the Department of Justice. 

    With few exceptions, U.S. or foreign persons involved in the export or re-export of U.S. goods or services to Iran remain subject to prosecution under the Iranian Transactions and Sanctions Regulations, as do U.S. persons involved in Iranian transactions.

    The only sanctions relief relates to:

    • the export, re-export, sale, lease or transfer to Iran of commercial passenger aircraft, parts and services for civil end-uses;
    • the import of Iranian-origin carpets and foodstuffs; and
    • certain transactions involving Iran by foreign entities owned or controlled by a U.S. person.

    Looking beyond the sanctions to other U.S. export regulations, the JCPOA will have no effect on the International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR).  Likewise, our commitment to prosecuting cases where defense articles on the U.S. Munitions List (USML), defense services and items subject to the EAR are exported to Iran remains as strong as ever.

    So as a practical matter, what does this mean?  Bottom line, companies and individuals, whether U.S. or foreign, need to remain vigilant when it comes to any possible commercial or financial interactions with Iran.  We will continue to investigate and, where appropriate, prosecute U.S. export control and sanctions cases involving Iran under our domestic authorities.  Because anything else is simply unacceptable. 

    The export control and sanctions regime in place exists to protect this nation from the proliferation threat.  From sensitive information and technology that could pose a grave danger in the wrong hands making its way to terrorists.  From our innovation being used to develop weapons of mass destruction or ballistic missiles. 

    Iran remains a designated state sponsor of terrorism, and we will not take our eye off of countering Iran’s efforts to support international terrorism and other destabilizing activities in the region.

    Corporate Misconduct

    U.S. companies – particularly in large international corporate structures, must understand this reality. 

    The risks – not only compliance-based risks, but security risks – must be front of mind, and we hope that as the lawyers who counsel, advise and represent these companies, you will talk frankly about them.  

    At the Department of Justice, we continue to prioritize corporate misconduct related to export control and sanctions violations.  The deputy attorney general issued guidance and directed changes to the U.S. Attorneys’ Manual to reflect the department’s sharpened focus in this area including on individual corporate defendants.

    To provide you clarity as you advise clients, we will provide guidance to make clear our current practices on voluntary self-disclosure of export and sanctions criminal violations.  We want to be transparent about our process and the factors we consider when assessing voluntary self-disclosures.  That way, the benefits for your clients are clear, and you can provide clear counsel.

    Because when a company voluntarily self-discloses export control and sanctions misconduct, fully cooperates and appropriately remediates, we will grant the company a significantly reduced penalty.  That can include a non-prosecution agreement (NPA), a reduced period of supervised compliance, a reduced fine and forfeiture and no requirement for a monitor. 

    If one or more aggravating factors are present to a substantial degree – like numerous willful shipments of defense articles to a foreign terrorist organization – a more stringent resolution might be necessary.  In all cases, however, the company that voluntary discloses will find itself in a better position one that does not.

    We are also discussing these issues with our regulatory partners to help you understand how the Department of Justice fits in to the broader regime.  The Department of Justice guidance we ultimately issue on VSDs will not supplant or supersede obligations to regulators.  Our ultimate goal is to be more transparent, so that companies will have more certainty about the benefits of self-disclosure are when dealing with prosecutors.  In the end, we think this is good for our national security mission and good for business.

    Voluntary self-disclosure is responsible.  But even if you choose not to pursue the route of voluntary self-disclosure and cooperation, your corporate clients need to remain vigilant or they may suffer serious consequences.

    Time and again, we have shown that willfully facilitating illegal transactions will not go unpunished. 

    Earlier this year, Schlumberger Oilfield Holdings Ltd. (SOHL), a wholly-owned subsidiary of Schlumberger Ltd., one of the largest oil and gas services companies in the world, pleaded guilty and agreed to pay a penalty of over $232 million for conspiring to violate the International Emergency Economic Powers Act (IEEPA) by willfully facilitating illegal transactions and engaging in trade with Iran and Sudan.

    What it ultimately came down to, was that one subsidiary failed to adequately train its employees to ensure that all U.S. persons, including non-U.S. citizens who resided in the United States, complied with Schlumberger Ltd.’s sanctions policies and compliance procedures. 

    We will not hesitate to prosecute individuals and entities that facilitate illegal transactions in violation of U.S. sanctions.     

    Vigilance is essential.  Policies and procedures are simply not enough.  They must be fully executed and reinforced.  Simply “checking the box” by implementing an export control and sanctions compliance program without the proper support or follow through will not insulate a company from prosecution.

    Another point to keep in mind is the need to know your markets and your people.  When you’re part of a large corporate family with many segments located overseas, some subject to very different export control laws in foreign countries, you have be careful to ensure that conduct illegal in the U.S. does not become practice here.  If you have doubts, check with your regulator.  Something a foreign national employee does overseas may have been entirely legal there, but once transferred here, is a crime.

    When working with your clients on these and other difficult issues, implore them to be vigilant.  These are complicated areas, and it takes sound advice and a high level of scrutiny to ensure compliance.  

    Insider Threats

    Unfortunately, compliance is only one piece of the puzzle.  Because, in addition to the compliance risks that are common in global operations, your corporate clients – and, in fact, even potentially their outside counsel –also are vulnerable to the threats from insiders and hackers. 

    Insider threats – threats from trusted employees and contractors – is now a significant problem.  And they are threat to national security when they steal sensitive export-controlled technology.

    For instance, Mozaffar Khazaee stole materials from each of three defense contractors who employed him, including materials relating to the F35 Joint Strike Fighter.  He attempted to illegally export a shipping container’s worth of those proprietary, export-controlled materials to Iran in order to gain employment there.  After pleading guilty, he received 97 months in prison. 

    Although that sentence sends a strong message to any insider who would consider violating the trust of his or her employer, deterrence alone is not enough. 

    So what can you do to address this problem?  Report incidents of suspected insider theft as soon as they are detected.  Create detailed internal training and compliance programs designed to neutralize threats before they even occur, and provide evidence of willful or knowing conduct in the event an insider is not deterred. 

    Cyber-Enabled Export Violations

    That helps with threats from within our perimeters.  But unfortunately, we also face them from outside our borders.  That is why another of our export control enforcement priorities is to combat cyber exfiltration of sensitive U.S. technologies, including ITAR-controlled technical data.

    In the digital age, foreign nations and their agents can now steal information, including export-controlled technical data and technology, without setting foot on American soil.  Left unchecked, cyber espionage can erode our strategic advantages across commercial and military spectrums.

    When possible, we will use investigations, arrests and prosecutions, to disrupt efforts to steal from you and your clients.  We will also look to use all other legally available tools to deter, like sanctions, designations, diplomacy and other tactics. 

    But your partnership is critical.  You can harden your defenses, create resilient systems, evaluate your cyber hygiene and cooperate with law enforcement when your defenses simply aren’t enough.

    That is why we at the National Security Division and others throughout the U.S. government, including the FBI, have made cooperation with the private sector a key component of our export control strategy. 

    Outreach

    We work with U.S. companies, across all industry sectors, to ensure that our national security interests are protected.  We have spent time and energy in face-to-face sit downs so that we may better understand the concerns and challenges faced by U.S. companies, share guidance and information, and be there to help with protection, detection, attribution and response.  We can warn our companies that manufacture or sell targeted U.S. parts and technology when certain bad actors are seeking the particular parts and technology they make.

    Corporate outreach helps sensitize industry to the threat and thereby maximizes the prevention of export control and sanctions violations.  We believe that through such efforts we can help stem the flow of those sensitive goods out of the U.S. to malicious end-users that would use them to threaten our national security interests and the safety of our warfighters. 

    It’s likely that many of you here today have clients that we’ve already met with recently to discuss these types of issues.  If you do not, we would certainly welcome the opportunity to do so in the future.

    Conclusion

    In conclusion, we recognize that our export control laws and sanctions regimes are complex and have a significant impact on the U.S. economy.  But they are there to protect against the many threats we face.

    And you play a critical role in that effort.  You and your clients can successfully negotiate the current export control and sanctions regimes and help keep America safe.

    Scrutinize closely each and every transaction undertaken with a foreign counterparty, whether a good or a financial transaction.

    Make sure that you understand the relevant compliance and sanctions regimes and how they apply.

    Make a voluntary self-disclosure to the National Security Division when you discover a willful violation of U.S. export control laws.

    Develop robust training and compliance programs.

    Focus not only on internal compliance, but on the threats posed by insiders and through cyberspace.

    Harden your cyber defenses.

    Develop a relationship with law enforcement, so that we may share valuable information with you to help you protect yourself, and be there to help you respond when your defense may simply not be enough.

    Profits may be the lifeblood of our corporations, but cutting corners here in the interest of the bottom line, is potentially catastrophic.  You and your clients risk enforcement actions, financial penalties and prison time.  But perhaps more significantly, doing so can provide a dangerous capability to an adversary who wishes to bring about damage, destruction or death to many.  So understanding and addressing how to comply with these regimes and neutralize these threats is not only the responsible thing to do, but the only thing to do. 

    The National Security Division will continue to approach export controls and sanctions with a broad and varied toolkit.  We will continue to vigorously pursue and prosecute those who violate our nation’s export control laws, but that is not how we define success.  Success is working with you to increase education and compliance and to prevent sensitive controlled technologies from falling into the wrong hands.  We will combat threats posed by insiders and through cyberspace.  And we will coordinate with our colleagues throughout the federal government to use an all tools approach – prosecution, listing, sanctions and other means of disruption – to combat national security threats.

    With the careful calibration of these tools and with an eye toward mitigating vulnerabilities and defending against threats, we can protect the national security while simultaneously fostering economic growth and job creation.

    Thank you for inviting me here this morning, and for your interest in these issues.

    MIL Security OSI

  • MIL-OSI Economics: IMF Executive Board Concludes 2024 Article IV Consultation with Chile

    Source: International Monetary Fund

    February 5, 2025

    Washington, DC: The Executive Board of the International Monetary Fund (IMF) concluded the Article IV consultation[1] with Chile on February 3, 2025 and endorsed the staff appraisal without a meeting on a lapse-of-time basis.[2]

    The economy’s imbalances have been largely resolved. Real GDP is expected to expand by 2.2 percent in 2024, close to its potential pace, driven by the strong mining and service exports, and 2-2.5 percent in 2025, related to an expected recovery in domestic demand. However, the recovery has been uneven across industries, with the construction sector lagging and the unemployment rate remaining high. Inflation is set to return to the 3-percent target in early 2026, after the impact of the significant increase in electricity tariffs between June 2024 and early 2025 subsides. The current account deficit has continued to narrow and is projected to reach around 2½ percent of GDP in 2024 and 2025.

    External risks and uncertainty remain elevated. The commodity price volatility linked to the economic outlook of Chile’s main trading partners and the pace of the global green transition is a key external risk. Moreover, the uncertainty surrounding monetary and fiscal policies in advanced economies could lead to tight financial conditions for longer periods of time and higher financial volatility. Domestically, concerns about crime, migration, and inequality persist; and political polarization is hindering the structural reform progress.

    Policies have supported macroeconomic stability. The Central Bank of Chile lowered the monetary policy rate by 325 basis points since January 2024 to 5 percent in December 2024. The headline fiscal deficit is projected to reach 2.7 percent of GDP in 2024 due to a notable revenue underperformance and despite significant spending restraint compared to the budget. The 2025 budget envisions a notable deficit reduction within a medium-term fiscal plan toward a broadly balanced fiscal position by 2027. By setting the neutral level of the countercyclical capital buffer at 1 percent of risk-weighted assets with a gradual and state-contingent implementation path from the current level of 0.5 percent, the Central Bank of Chile has provided banks with planning certainty for strengthening financial resilience.

    Executive Board Assessment

    The economy is broadly balanced but external risks are elevated. Chile’s macroeconomic position is sound due to its very strong fundamentals, policies, and policy frameworks. Real GDP is growing around its potential and inflation is expected to reach the 3-percent target in early 2026. The current account deficit has continued to narrow, and the 2024 external position is assessed as moderately weaker than implied by medium-term fundamentals. Public debt is still relatively low and sustainable with high probability. However, the external environment is unstable and uncertain, which calls for policies that further strengthen economic buffers to provide additional policy space for future shocks.

    Lifting Chile’s growth potential is a must to raise living standards and tackle social and fiscal pressures. Taking a consultative approach, the government is advancing several growth initiatives, including: (i) expediting investment permit applications and environmental evaluations to encourage investment, (ii) fostering the development of emerging industries, particularly those related to renewable energy to maximize the benefits from the global green transition, and (iii) facilitating R&D. Swift and consistent implementation of these initiatives is crucial, especially in rationalizing the regulatory burden and improving essential infrastructure. Additionally, better integrating women into the labor market could partially offset the unfavorable demographic trends. The proposed new development bank requires a targeted mandate, sound risk management practices, and robust corporate governance.

    The goal of a broadly balanced fiscal position by 2027 remains appropriate but has become more challenging. The authorities’ commitment to fiscal restraint by adjusting spending plans in 2024 and 2025 is welcome. To achieve a balanced fiscal position over the next three years, a gap of at least 1 percent of GDP needs to be filled. This could be achieved largely from the important tax compliance law if its implementation yields the planned additional revenue and is not used for new spending initiatives. It is therefore crucial to carefully monitor developments in tax compliance and remain flexible to adjust current spending in case revenue mobilization falls short of plans, while aiming to preserve public investment outlays in support of medium-term growth. Ensuring that any structural spending increases align with higher structural revenues is vital for fiscal sustainability, while unifying fragmented social programs could enhance access and effectiveness for the most vulnerable.

    Continuous enhancements to Chile’s already very strong fiscal framework would foster fiscal policy formulation and transparency. For instance, providing more details on debt-creating flows outside the fiscal deficit (“below-the-line” items) would strengthen the monitoring of fiscal pressures. Updating fiscal forecasting methods, in line with the government’s plans, could improve revenue projections in the context of economic and policy shifts. Adopting a medium-term strategy to rebuild the size of the Economic and Social Stabilization Fund (ESSF) would help provide resources to respond to future shocks. Finally, simplifying the presentation of the fiscal targets and budget execution in the Public Finance Report could deepen the understanding of the fiscal balance rule framework.

    A pension reform is essential to ensure adequate pensions and address the fiscal costs of population aging. Raising contribution rates and the number of contribution periods is vital for sustainably self-financing old-age pensions. The minimum guaranteed pension (PGU) has strengthened the system’s solidarity, increased replacement ratios, and reduced old-age poverty, but it also incurs high fiscal costs. With the ratio of pensioners to the working-age population set to nearly double in two decades, it is crucial to manage public spending pressures while maintaining a solid safety net. Targeting the PGU to the most vulnerable elderly, linking the retirement age to life expectancy, and implementing the proposed unemployment insurance for pension contributions could further strengthen the system.

    A cautious data dependent approach to the pace of monetary policy easing is warranted. The BCCh’s monetary policy adjustments have been in line with its inflation-targeting framework. The real monetary policy rate is close to its estimated neutral range. With near-term inflation risks tilted to the upside, future cuts to the policy rate should remain contingent on evidence that inflation is heading decisively back to its target.

    Rebuilding international reserve buffers is important for enhancing resilience. While the flexible exchange rate plays a critical role as a shock absorber, the Central Bank of Chile’s access to international liquidity can provide an additional shield against potential external shocks. This underscores the importance of incorporating a comprehensive international liquidity framework into the central bank’s longer-term financial stability strategy. The strategy and operational design should continue to follow high transparency standards, be persistent and robust to changes in external risks, and minimize distortions in the foreign exchange market.

    The financial system remains resilient despite rising vulnerabilities related to the real estate sector and lower financial market depth. The real estate sector is expected to recover modestly as long-term interest rates gradually decline, and there are several mitigants to credit risk associated with lending to this sector. Nevertheless, supervisors need to carefully monitor banks and insurers’ portfolio quality and buffers, including by closing commercial real estate data gaps and enhancing stress test models. Rebuilding the depth of local financial markets by increasing pension contributions, which would increase the pool of investable savings, is important to help reduce market volatility and sensitivity to shocks.

    Financial sector policies need to continue reinforcing resilience. The recent adoption of a positive neutral level of the counter-cyclical capital buffer with a gradual and state-contingent implementation provides banks with planning certainty. The ongoing implementation of Basel III capital and liquidity requirements needs to be completed. Prompt implementation of the Financial Market Resilience Law would enhance the BCCh’s ability to respond to financial distress situations. Other priorities continue to include adopting an industry-funded deposit insurance and a bank resolution framework, providing budget independence to the CMF, further enhancing bank corporate governance, and implementing the Consolidated Debt Registry.

    Table 1. Chile: Selected Economic Indicators, 2023-27

    GDP (2023), in trillions of pesos

    282

    Quota

    GDP (2023), in billions of U.S. dollars

    336

     

    in millions of SDRs

    1,744

    Per capita (2023), U.S. dollars

    16,815

     

    in % of total

     

    0.37

    Population (2023), in millions

    19.96

           

    Main products and exports

    Copper

           

    Key export markets

    China, U.S., Euro area

     

    Proj.

    2023

    2024

    2025

    2026

    2027

             

    Output

    (Annual percentage change, unless otherwise specified)

    Real GDP

    0.2

    2.2

    2.2

    2.3

    2.3

      Total domestic demand

    -4.2

    1.0

    2.4

    2.3

    2.3

    Consumption

    -3.9

    1.6

    1.9

    2.2

    2.1

    Fixed capital formation

    -1.1

    -1.0

    4.3

    3.4

    3.7

         Exports of goods and services

    -0.3

    5.5

    4.3

    4.7

    3.9

         Imports of goods and services

    -12.0

    1.2

    4.4

    4.3

    3.2

    Output gap (in percent)

    0.0

    -0.1

    -0.1

    0.0

    0.0

    Employment

    Unemployment rate (in percent, annual average)

    8.7

    8.5

    8.2

    8.0

    7.8

    Prices

    GDP deflator

    6.6

    6.0

    4.1

    2.9

    2.7

    Change of CPI (end of period)

    3.9

    4.5

    3.5

    3.0

    3.0

    Change of CPI (period average)

    7.6

    3.9

    4.2

    3.1

    3.0

    Public Sector Finances

    (In percent of GDP, unless otherwise specified)

    Central government revenue

    22.9

    22.1

    23.0

    23.8

    23.9

    Central government expenditure

    25.3

    24.8

    24.8

    24.7

    24.3

    Central government fiscal balance

    -2.4

    -2.7

    -1.8

    -0.8

    -0.4

    Central government structural fiscal balance 1/

    -3.4

    -3.1

    -2.1

    -1.2

    -0.5

    Central government gross debt

    39.4

    42.7

    43.7

    44.1

    43.5

    Public sector gross debt 2/

    70.2

    73.5

    74.5

    74.9

    74.4

    Balance of Payments

    Current account balance (% of GDP) 3/

    -3.5

    -2.3

    -2.5

    -2.5

    -2.7

    Foreign direct investment net flows (% of GDP) 3/

    -4.6

    -4.0

    -2.6

    -2.9

    -2.9

    Gross external debt (% of GDP) 4/

    71.1

    77.5

    76.5

    76.6

    75.7

    Sources: Central Bank of Chile, Ministry of Finance, Haver Analytics, and IMF staff calculations and projections.

    1/ The structural fiscal balance includes adjustments for output, copper prices, and lithium revenues based on IMF calculations. The lithium adjustment starts in 2022.

    2/ Includes liabilities of the central government, the Central Bank of Chile and public enterprises. Excludes Recognition Bonds.

    3/ Calculated as a share of US$ GDP.

    4/ Data from Dipres for the government and from BCCh for all other sectors. Calculated as a share of US$ GDP.

    [1] Under Article IV of the IMF’s Articles of Agreement, the IMF holds bilateral discussions with members, usually every year. A staff team visits the country, collects economic and financial information, and discusses with officials the country’s economic developments and policies. On return to headquarters, the staff prepares a report, which forms the basis for discussion by the Executive Board.

    [2] The Executive Board takes decisions under its lapse-of-time procedure when the Board agrees that a proposal can be considered without convening formal discussions.

    IMF Communications Department
    MEDIA RELATIONS

    PRESS OFFICER: Jose Luis De Haro

    Phone: +1 202 623-7100Email: MEDIA@IMF.org

    MIL OSI Economics

  • MIL-OSI Security: Acting Attorney General Matthew Whitaker Delivers Remarks at John F. Kennedy International Airport’s International Mail Distribution Center

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Thank you, Director Russo, for that kind introduction.  I especially want to thank you and your brother for following in your Dad’s footsteps and going into law enforcement.  Thank you for 23 years of service.

    I also want to thank:

    • Rich Donoghue, our U.S. Attorney for the Eastern District of New York,
    • Phil Bartlett and our postal inspectors,
    • Keith Kruskall and Michael Abraham with DEA,
    • Port Director Frank Russo,
    • Director of Operations Troy Miller, and
    • Assistant Special Agent in Charge Christopher Lau.

    Thank you all for the tour and for the briefing. 

    But most of all, thank you to our CBP, DEA, Postal Inspection Service Agents who are here for the interdiction work you do every day.

    Your work is more important than ever—because today we are facing the deadliest drug crisis in American history.  Last year 72,000 Americans lost their lives to drug overdoses.  That’s the highest drug death toll in American history.  More Americans died of drug overdoses last year than from car crashes or from AIDS at the height of the AIDS epidemic.

    Despite rising prosperity and better technology, life expectancy in the United States actually declined over the last two years in a row.  The last time that happened was 55 years ago.

    Millions of people are living with the painful consequences of a family member’s addiction or an addiction of their own.  I personally know people whose families have been torn apart by drug addiction.  These days, it is likely that most of you do, too.  We all do.

    New York has not been immune to this problem.  No one has. 

    Drug overdose deaths in New York City have gone up by 81 percent in just the last three years.

    The situation is daunting.  But law enforcement has a unique opportunity to reverse these trends.

    President Trump has a comprehensive plan to end this crisis.  The three parts of the plan are prevention, treatment, and enforcement.

    The President has improved our prevention efforts by launching a national awareness campaign about the dangers of opioid abuse—a campaign I strongly support.  In the long run, getting more and more people to reject drug abuse in the first place will stop addiction from spreading.

    The drugs on the street today are as potent and as dangerous as they have ever been.  That is because of synthetic opioids—drugs like fentanyl and carfentanil. 

    These drugs killed 20,000 Americans last year—more than any other kind of drug.  Three milligrams of fentanyl can be fatal.  That’s equivalent to a pinch of salt.

    And you don’t have to go to a street corner to buy these drugs.  With a few clicks of a button you can go online and have them shipped from overseas right to your door.  The odds are good that those packages come through this room.

    I’m told that you process more than 800,000 pieces of mail every day just at this airport, including a majority of international mail entering the United States.  I’m also told that you intercepted dozens of packages of fentanyl just in this last fiscal year.  That is incredible work and I have no doubt that it has saved lives.

    Just last month, the President signed into law major legislation that I believe will make you more effective.  Under the new law, the Postal Service must share electronic information with CBP about packages coming into the United States.  That information includes where it’s from, where it’s going, and what’s in it.  That will help law enforcement track suspicious packages, find criminals, and it will help us prove our case at trial.

    And that is critical.  You are our strong first line of defense against these drugs.  But you need a strong offense, too. 

    And that’s where we come in.

    We don’t just want to stop packages once they get here—we want to prevent them from being sent in the first place.

    By prosecuting traffickers and breaking up the supply chain, our work ultimately will make your work safer and easier.

    One of President Trump’s first Executive Orders was to the Department of Justice, telling us to dismantle the networks of transnational organized crime.  We have been faithful to that order.

    In fact, the Trump administration is the first administration to prosecute Chinese fentanyl traffickers.  We know that China is responsible for the vast majority of fentanyl in this country.

    Last October, we announced the first two indictments against Chinese nationals for trafficking synthetic drugs in the United States.  Over the summer we announced our third case—a 43-count indictment against a drug trafficking organization based in Shanghai.

    This summer I went to China and I spoke with Chinese officials about this exact problem.  I made it clear to them that we need better information from them on packages coming to this country.  Just like we want to improve our law enforcement cooperation with them, we need their cooperation on this issue, as well.  This administration is paying very close attention to this problem.

    Nevertheless, with your help, the United States is interdicting drugs coming into this country at record levels.

    In just the first three months of 2018, the DEA seized a total of more than 200 pounds of suspected fentanyl in cases from Detroit to New York to Boston.  Depending on its purity, that can be enough to kill tens of millions of people.

    In fiscal year 2017, we broke the record for fentanyl prosecutions at the federal level—and in fiscal year 2018, we broke that record again.

    Last July, the Department announced the seizure of the largest dark net marketplace in history – AlphaBay.  This site allowed you to send packages of drugs from China straight to your door.  They hosted some 220,000 drug listings and was responsible for countless synthetic opioid overdoses, including the tragic death of a 13 year old in Utah.

    Earlier this year we filed charges against a married couple who we believe were once the most prolific synthetic opioid traffickers on Alpha Bay and on the darknet in North America in general.  We also worked with our partners in Canada to help them indict a man we believe was the third most prolific darknet synthetic opioid dealer in North America.

    And we have new weapons to be even more effective in the future.  In January we began J-CODE, a new team at the FBI that focuses specifically on the threat of online opioid sales—the sales that are so often sending packages through this building.  J-CODE has already begun carrying out enforcement actions nationwide, arresting dozens of people across the country.

    And in the districts where drug deaths are the highest, we are now prosecuting synthetic opioid trafficking cases, even when the amount is small.  We have sent 10 more prosecutors to help implement this strategy in those 10 districts.  We call this effort Operation Synthetic Opioid Surge—or Operation S.O.S.

    We tried this strategy in Manatee County, Florida—which is just south of Tampa—and it worked.  This past January, they had half the number of overdose deaths as the previous January.  We want to replicate those results across the country.

    We have also sent more than 300 new federal prosecutors to our U.S. Attorneys offices across America.  This is the largest surge in prosecutors in decades.

    We have also hired more than 400 DEA task force officers this year alone.  That is a record increase.

    All of these efforts are delivering results. 

    Federal drug prosecutions overall went up by six percent over the last fiscal year, and fentanyl prosecutions have increased dramatically for two years in a row.

    Most importantly, we are seeing an impact on people’s lives.  While 2017 saw more overdose deaths than 2016, data for the last months of the year show that the increases may have finally come to an end.  Drug overdose deaths fell by two percent from September 2017 to March 2018.

    We are right to celebrate these accomplishments, but we have to acknowledge that we still have a lot more work to do—and the stakes have never been higher.

    That is why I am so glad that we have this incredible facility and the dedicated professionals who make it a success.  You are our strong first line of defense—and we appreciate you.

    And so I want each of you to know: we have your back and you have our thanks.

    MIL Security OSI

  • MIL-OSI Global: Why is Trump’s preferential treatment of Russia shifting? Because there’s nothing in it for him

    Source: The Conversation – Canada – By James Horncastle, Assistant Professor and Edward and Emily McWhinney Professor in International Relations, Simon Fraser University

    When Donald Trump assumed power in the United States for a second time, it was initially assumed that it didn’t bode well for Ukraine.

    During his first term, Trump maintained questionable connections to Russia. Furthermore, his claim that he would end the Russia-Ukraine conflict in a day — with Russia still occupying much of Ukraine — led many analysts to believe that any such policy would favour the Russians.




    Read more:
    Can Trump deliver on his promise to end Russia’s invasion of Ukraine?


    These fears, at least so far, have not come to pass. In Trump’s inaugural address, many of the items he highlighted on the campaign trail figured prominently.

    Noticeably absent, however, was Ukraine. When it comes to Trump’s “America First,” philosophy, Ukraine and Russia have seemingly lost significance.

    Strategy of distraction

    Trump, with his bombastic nature, dominates the media cycle. His proclamations, social media statements threats and insults occur with such regularity that it’s difficult for anyone to keep pace.

    Just as one news item comes into focus, a new comment or ultimatum overtakes it.

    In many ways, this works to Trump’s advantage. People can be too distracted by the latest outlandish statement to pay close attention as Trump pursues his ambitious domestic policy goals. Lost in the media turmoil of Trump’s executive orders, tariff threats and heightened deportation campaign has been a shift on Russia and Ukraine.

    Ukraine, for Trump, is a secondary concern. His priorities, first and foremost, are domestic and aimed at remaking America.

    As such, rather than being driven by any foreign policy goals, Trump’s engagement with Ukraine and Russia will be determined by how he perceives he can benefit domestically in return. His calculations, in this regard, appear to have shifted.

    Complicated relationship with Ukraine

    Trump’s relationship with Ukraine during his first term was, to put it mildly, difficult. His infatuation with Russian leader Vladimir Putin, and Russia’s open disdain for Ukraine, caused him to largely ignore the country.

    When he did pay attention to Ukraine, it was as part of an effort to acquire information to damage his presumed political rival, former president Joe Biden. This effort resulted in Trump withholding aid from Ukraine unless it acquiesced to his demands.

    Trump’s position on Ukraine, however, has shifted over time. His antagonistic relationship with President Volodymyr Zelenskyy has seemingly improved.

    While there are still tension points, most notably when Zelenskyy visited Pennsylvania during the U.S. presidential election campaign, Trump has moderated his comments on his Ukrainian counterpart. Ukraine’s purchase of American equipment and ammunition, furthermore, supports Trump’s focus on domestic production.

    Lastly, Trump has expressed interest in accessing Ukraine’s rare earth metals. China currently dominates the rare earth metal market, which puts the U.S. at a disadvantage due to the minerals’ importance for future technological innovation. That means Trump has a stake in Ukraine’s future.

    These developments don’t mean the relationship is perfect. Instead, Trump is unlikely to be a burden to Ukraine, and this development is in part due to his declining view of Putin.

    Trump/Putin relationship

    The initial assumption of many analysts when Trump came to power again was that he would immediately favour Putin. The close relationship between the two is well-documented, and has been open to considerable speculation as to why Trump courted such favour with Putin in his first term.

    Trump, however, has upped his rhetoric against Russia since assuming the presidency. First, he threatened Putin with additional economic sanctions. Second, he stated that he would like OPEC to increase oil production and therefore inhibit Russia’s war effort by undermining its primary source of revenue.

    Why the pivot? It likely goes to the core foundation of Trump’s persona: he likes winners. Regardless of the ultimate outcome of the Russia-Ukraine war, Russia and Putin have displayed considerable weakness in execution during the war. The Russian military, once feared globally, has largely proven to be a paper tiger.

    While Russia still has several advantages in the war, it is only doing so by leveraging its future. According to Trump, Russia is in “big trouble” in terms of its economic woes. Trump is not alone in this view. Analysts, as well as perhaps Putin himself, recognize the serious challenges facing the Russian economy.

    It’s not just economically that Russia has leveraged its future. To avoid straining the Russian people, Putin has reached a deal with North Korea, which is providing soldiers for the war against Ukraine.




    Read more:
    Amid the West’s wavering aid to Ukraine, North Korea backs Russia in a mutually beneficial move


    Furthermore, Russia has deepened ties with Iran in exchange for Iranian drones.

    What Putin has provided North Korea and Iran in exchange for these soldiers is unclear. That said, Russia can only provide any technological exchanges for these soldiers and drones one time, as once shared, the same technology cannot be part of other arrangements. This reality limits Russia’s influence in the years ahead.

    The new art of the deal?

    Trump, almost certainly, wants to make a peace deal on Ukraine. It would burnish his reputation as a statesman while simultaneously demonstrating American strength and influence to the world at a minimal cost to the U.S.

    The terms of that deal, however, have shifted in the face of Russian weakness.

    That’s why it’s not surprising that the mercurial Trump has pivoted his stance on Russia. Until Russia can display the strength that Trump thought it possessed, he’s unlikely to do the Russians any favours in the future.

    James Horncastle does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Why is Trump’s preferential treatment of Russia shifting? Because there’s nothing in it for him – https://theconversation.com/why-is-trumps-preferential-treatment-of-russia-shifting-because-theres-nothing-in-it-for-him-248365

    MIL OSI – Global Reports

  • MIL-OSI: Fluent, Inc. Survey Finds That Shoppers Embrace Post-Purchase Ads, Citing Personalization & Relevance as Key Benefits

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, Feb. 05, 2025 (GLOBE NEWSWIRE) — Fluent, Inc. (NASDAQ: FLNT), a leading commerce media solutions company, today released the results of a new survey revealing how post-purchase ads enhance the shopping experience, drive product discovery, and encourage repeat purchases.

    Post-purchase ads, which appear on ecommerce confirmation pages, are designed to keep shoppers engaged with personalized offers after the checkout. With responses from over 1,000 US adults, the survey explores how these ads influence consumer behavior, build loyalty, and create value for both shoppers and retailers.

    Key survey findings include:

    Enhancing the Customer Journey

    • 57% of shoppers who converted on a post-purchase offer discovered a new product or service they love.
    • 63% of those who encounter post-purchase ads after every online purchase say these ads enhance their shopping experience.

    Delivering Added Value

    • 54% of shoppers say post-purchase ads improve the shopping experience by offering useful discounts and promotions, and 62% say deals and discounts motivate them to click.

    Driving Retention & Loyalty

    • 88% of those who say post-purchase ads improve the shopping experience by offering personalized suggestions are more likely to return.

    “Retailers tell us that post-purchase ads don’t disrupt the shopping journey—they enhance it,” said Jessica Batty, SVP of Marketing at Fluent. “Consumers are looking for relevant, personalized offers, and this survey confirms that post-purchase ads drive not only product discovery but also repeat purchases and long-term loyalty. Our marketing expertise and consumer-centric approach help us work with our partners to design relevant and meaningful ads powered by Fluent’s identity graph and advanced AI-driven algorithms. Supported by 14 years of first-party data, these algorithms determine the optimal content and timing for each customer throughout the shopping journey, enhancing value for our media partners, advertisers, and consumers alike.”

    As a key component of the broader commerce media ecosystem, post-purchase advertising provides retailers with an incremental revenue stream that integrates seamlessly into the customer journey. Beyond boosting retailer monetization, these ads create high-impact ad opportunities for advertisers and deliver relevant offers to consumers while they’re in a buying mindset.

    Fluent fielded the online survey in December of 2024 among 1,003 US consumers aged 18-65 who made an online purchase in the past 30 days and recalled seeing at least one post-purchase ad. The full survey report is available for download here.

    About Fluent, Inc.

    Fluent, Inc. (NASDAQ: FLNT) is a commerce media solutions provider connecting top-tier brands with highly engaged consumers. Leveraging diverse ad inventory, robust first-party data, and proprietary machine learning, Fluent unlocks additional revenue streams for partners and empowers advertisers to acquire their most valuable customers at scale. Founded in 2010, Fluent uses its deep expertise in performance marketing to drive monetization and increase engagement at key touchpoints across the customer journey. For more insights visit https://www.fluentco.com/.

    Contact Information

    Investor Relations
    Fluent, Inc.
    InvestorRelations@fluentco.com

    The MIL Network

  • MIL-OSI USA: U.S. International Trade in Goods and Services, December and Annual 2024

    Source: US Bureau of Economic Analysis

    The U.S. Census Bureau and the U.S. Bureau of Economic Analysis announced today that the goods and services deficit was $98.4 billion in December, up $19.5 billion from $78.9 billion in November, revised.

    U.S. International Trade in Goods and Services Deficit
    Deficit: $98.4 Billion  +24.7%°
    Exports: $266.5 Billion  –2.6%°
    Imports: $364.9 Billion  +3.5%°

    Next release: Thursday, March 6, 2025

    (°) Statistical significance is not applicable or not measurable. Data adjusted for seasonality but not price changes

    Source: U.S. Census Bureau, U.S. Bureau of Economic Analysis; U.S. International Trade in Goods and Services, February 5, 2025

    Exports, Imports, and Balance (exhibit 1)

    December exports were $266.5 billion, $7.1 billion less than November exports. December imports were $364.9 billion, $12.4 billion more than November imports.

    The December increase in the goods and services deficit reflected an increase in the goods deficit of $18.9 billion to $123.0 billion and a decrease in the services surplus of $0.6 billion to $24.5 billion.

    For 2024, the goods and services deficit increased $133.5 billion, or 17.0 percent, from 2023. Exports increased $119.8 billion or 3.9 percent. Imports increased $253.3 billion or 6.6 percent.

    Three-Month Moving Averages (exhibit 2)

    The average goods and services deficit increased $4.7 billion to $83.8 billion for the three months ending in December.

    • Average exports decreased $1.2 billion to $268.8 billion in December.
    • Average imports increased $3.5 billion to $352.7 billion in December.

    Year-over-year, the average goods and services deficit increased $19.2 billion from the three months ending in December 2023.

    • Average exports increased $9.8 billion from December 2023.
    • Average imports increased $29.0 billion from December 2023.

    Exports (exhibits 3, 6, and 7)

    Exports of goods decreased $7.5 billion to $170.2 billion in December.

      Exports of goods on a Census basis decreased $6.7 billion.

    • Consumer goods decreased $1.8 billion.
      • Pharmaceutical preparations decreased $1.4 billion.
    • Industrial supplies and materials decreased $1.8 billion.
      • Crude oil decreased $0.9 billion.
      • Other petroleum products decreased $0.3 billion.
      • Other precious metals decreased $0.3 billion.
      • Fertilizers, pesticides, and insecticides decreased $0.3 billion.
    • Capital goods decreased $1.4 billion.
      • Computers decreased $0.9 billion.
      • Civilian aircraft increased $1.4 billion.
    • Automotive vehicles, parts, and engines decreased $0.9 billion.
      • Trucks, buses, and special purpose vehicles decreased $0.4 billion.
      • Other automotive parts and accessories decreased $0.3 billion.

      Net balance of payments adjustments decreased $0.8 billion.

    Exports of services increased $0.4 billion to $96.3 billion in December.

    • Travel increased $0.3 billion.
    • Financial services increased $0.1 billion.

    Imports (exhibits 4, 6, and 8)

    Imports of goods increased $11.4 billion to $293.1 billion in December.

      Imports of goods on a Census basis increased $11.3 billion.

    • Industrial supplies and materials increased $10.8 billion.
      • Finished metal shapes increased $9.2 billion.
      • Nonmonetary gold increased $1.0 billion.
    • Consumer goods increased $2.2 billion.
      • Toys, games, and sporting goods increased $0.8 billion.
      • Cell phones and other household goods increased $0.8 billion.
    • Capital goods increased $1.3 billion.
      • Computers increased $1.2 billion.
      • Computer accessories increased $0.9 billion.
      • Civilian aircraft decreased $1.1 billion.
    • Automotive vehicles, parts, and engines decreased $2.2 billion.
      • Passenger cars decreased $1.6 billion.

      Net balance of payments adjustments increased $0.1 billion.

    Imports of services increased $1.0 billion to $71.8 billion in December.

    • Transport increased $0.5 billion.
    • Travel increased $0.3 billion.

    Real Goods in 2017 Dollars – Census Basis (exhibit 11)

    The real goods deficit increased $14.9 billion, or 15.4 percent, to $111.9 billion in December, compared to a 17.3 percent increase in the nominal deficit.

    • Real exports of goods decreased $5.4 billion, or 3.7 percent, to $141.9 billion, compared to a 3.8 percent decrease in nominal exports.
    • Real imports of goods increased $9.5 billion, or 3.9 percent, to $253.8 billion, compared to a 4.0 percent increase in nominal imports.

    Revisions

    In addition to revisions to source data for the November statistics, the seasonally adjusted goods data were revised for January through November so that the totals of the seasonally adjusted months equal the annual totals.

    Revisions to November exports

    • Exports of goods were revised up $0.1 billion.
    • Exports of services were revised up $0.1 billion.

    Revisions to November imports

    • Imports of goods were revised up $0.8 billion.
    • Imports of services were revised up $0.1 billion.

    Goods by Selected Countries and Areas: Monthly – Census Basis (exhibit 19)

    The December figures show surpluses, in billions of dollars, with Netherlands ($5.0), South and Central America ($3.5), United Kingdom ($2.3), Hong Kong ($0.7), Brazil ($0.4), Saudi Arabia ($0.4), Belgium ($0.3), and Australia ($0.2). Deficits were recorded, in billions of dollars, with China ($25.3), European Union ($20.4), Mexico ($15.2), Switzerland ($13.0), Vietnam ($11.4), Canada ($7.9), Germany ($7.6), Taiwan ($6.9), Ireland ($6.2), South Korea ($5.6), Japan ($5.5), India ($4.9), Italy ($4.1), Malaysia ($2.5), France ($1.1), Israel ($0.8), and Singapore ($0.4).

    • The deficit with Switzerland increased $9.1 billion to $13.0 billion in December. Exports decreased $0.7 billion to $1.2 billion and imports increased $8.4 billion to $14.2 billion.
    • The deficit with Canada increased $2.9 billion to $7.9 billion in December. Exports decreased $0.4 billion to $29.1 billion and imports increased $2.5 billion to $37.0 billion.
    • The deficit with Ireland decreased $3.1 billion to $6.2 billion in December. Exports decreased $0.1 billion to $1.2 billion and imports decreased $3.2 billion to $7.5 billion.

    Annual Summary for 2024

    Exports, Imports, and Balance (exhibit 1)

    For 2024, the goods and services deficit was $918.4 billion, up $133.5 billion from $784.9 billion in 2023. Exports were $3,191.6 billion, up $119.8 billion from 2023. Imports were $4,110.0 billion, up $253.3 billion from 2023.

    The 2024 increase in the goods and services deficit reflected an increase in the goods deficit of $148.5 billion, or 14.0 percent, to $1,211.7 billion and an increase in the services surplus of $14.9 billion, or 5.4 percent, to $293.3 billion.

    The goods and services deficit was 3.1 percent of current-dollar gross domestic product in 2024, up from 2.8 percent in 2023.

    Exports (exhibits 3, 6, and 7)

    Exports of goods increased $38.6 billion to $2,083.8 billion in 2024.

      Exports of goods on a Census basis increased $47.1 billion.

    • Capital goods increased $40.2 billion.
      • Computer accessories increased $11.3 billion.
      • Civilian aircraft engines increased $8.7 billion.
      • Computers increased $8.2 billion.
      • Semiconductors increased $8.1 billion.
    • Other goods increased $17.9 billion. (See the “Notice” for more information.)
    • Automotive vehicles, parts, and engines decreased $10.8 billion.
      • Other automotive parts and accessories decreased $4.3 billion.
      • Passenger cars decreased $4.0 billion.
      • Trucks, buses, and special purpose vehicles decreased $3.0 billion.

      Net balance of payments adjustments decreased $8.5 billion.

    Exports of services increased $81.2 billion to $1,107.8 billion in 2024.

    • Travel increased $26.3 billion.
    • Other business services increased $16.0 billion.
    • Telecommunications, computer, and information services increased $11.9 billion.
    • Financial services increased $11.6 billion.

    Imports (exhibits 4, 6, and 8)

    Imports of goods increased $187.1 billion to $3,295.6 billion in 2024.

      Imports of goods on a Census basis increased $187.2 billion.

    • Capital goods increased $103.3 billion.
      • Computer accessories increased $33.5 billion.
      • Computers increased $28.3 billion.
      • Semiconductors increased $9.4 billion.
      • Other industrial machinery increased $9.0 billion.
    • Consumer goods increased $48.4 billion.
      • Pharmaceutical preparations increased $43.6 billion.
    • Automotive vehicles, parts, and engines increased $16.1 billion.
      • Passenger cars increased $10.0 billion.
      • Other automotive parts and accessories increased $4.8 billion.
    • Foods, feeds, and beverages increased $15.9 billion.
      • Meat products increased $3.5 billion.
      • Fruits, frozen juices increased $2.3 billion.
      • Bakery products increased $2.2 billion.
      • Other foods increased $2.0 billion.
      • Vegetables increased $1.7 billion.

      Net balance of payments adjustments decreased $0.2 billion.

    Imports of services increased $66.2 billion to $814.4 billion in 2024.

    • Travel increased $19.2 billion.
    • Charges for the use of intellectual property increased $12.2 billion.
    • Transport increased $11.7 billion.
    • Insurance services increased $11.5 billion.

    Real Goods in 2017 Dollars – Census Basis (exhibit 11)

    The real goods deficit increased $98.8 billion, or 9.6 percent, to $1,132.4 billion in 2024, compared to a 13.2 percent increase in the nominal deficit.

    • Real exports of goods increased $41.7 billion, or 2.5 percent, to $1,737.8 billion, compared to a 2.3 percent increase in nominal exports.
    • Real imports of goods increased $140.5 billion, or 5.1 percent, to $2,870.2 billion, compared to a 6.1 percent increase in nominal imports.

    Goods by Selected Countries and Areas – Census Basis (exhibits 14 and 14a)

    The 2024 figures show surpluses, in billions of dollars, with Netherlands ($55.5), South and Central America ($47.3), Hong Kong ($21.9), Australia ($17.9), and United Kingdom ($11.9). Deficits were recorded, in billions of dollars, with China ($295.4), European Union ($235.6), Mexico ($171.8), Vietnam ($123.5), Ireland ($86.7), Germany ($84.8), Taiwan ($73.9), Japan ($68.5), South Korea ($66.0), Canada ($63.3), India ($45.7), Thailand ($45.6), Italy ($44.0), Switzerland ($38.5), Malaysia ($24.8), Indonesia ($17.9), France ($16.4), Austria ($13.1), and Sweden ($9.8).

    • The deficit with the European Union increased $26.9 billion to $235.6 billion in 2024. Exports increased $2.6 billion to $370.2 billion and imports increased $29.4 billion to $605.8 billion.
    • The deficit with Taiwan increased $26.1 billion to $73.9 billion in 2024. Exports increased $2.4 billion to $42.3 billion and imports increased $28.5 billion to $116.3 billion.
    • The surplus with the Netherlands increased $12.7 billion to $55.5 billion in 2024. Exports increased $8.3 billion to $89.6 billion and imports decreased $4.4 billion to $34.1 billion.

    All statistics referenced are seasonally adjusted; statistics are on a balance of payments basis unless otherwise specified. Additional statistics, including not seasonally adjusted statistics and details for goods on a Census basis, are available in exhibits 1-20b of this release. For information on data sources, definitions, and revision procedures, see the explanatory notes in this release. The full release can be found at www.census.gov/foreign-trade/Press-Release/current_press_release/index.html or www.bea.gov/data/intl-trade-investment/international-trade-goods-and-services. The full schedule is available in the Census Bureau’s Economic Briefing Room at www.census.gov/economic-indicators/ or on BEA’s website at www.bea.gov/news/schedule.

    Next release: March 6, 2025, at 8:30 a.m EST
    U.S. International Trade in Goods and Services, January 2025

    Notice

    Impact of Canada Border Services Agency’s (CBSA) Release of CBSA Assessment and Revenue Management (CARM)

    The CBSA introduced a new accounting system (CARM) on October 21, 2024. As a result, importers in Canada have experienced delays in filing shipment information. These delays affected the compilation of statistics on U.S. exports of goods to Canada for September through December 2024, which are derived from data compiled by Canada through the United States – Canada Data Exchange. A dollar estimate of the filing backlog is included in estimates for late receipts and, following the Census Bureau’s customary practice for late receipt estimates, is included in the export end-use category “Other goods” as well as in exports to Canada. This estimate will be replaced with the actual transactions reported by the Harmonized System classification in June 2025 with the release of “U.S. International Trade in Goods and Services, Annual Revision.” Until then, please refer to the supplemental spreadsheet “CARM Exports to Canada Corrections,” which provides a breakdown of the late receipts by 1-digit end-use category. This spreadsheet will be updated as late export transactions are received to reflect reassignments from the initial “Other goods” category to the appropriate 1-digit end-use category.

    If you have questions or need additional information, please contact the Census Bureau, Economic Indicators Division, International Trade Macro Analysis Branch, on 800-549-0595, option 4, or at eid.international.trade.data@census.gov or BEA, Balance of Payments Division, at InternationalAccounts@bea.gov.

    Upcoming Changes to the Real (Chained-Dollar) Series

    Effective with the release of the February 2025 statistics on April 3, 2025, the Census Bureau will continue to use the Bureau of Labor Statistics (BLS) U.S. Import and Export Price Indexes to calculate the chained-dollar series (exhibits 10 and 11). The BLS will be implementing changes to the indexes with the release of the February 2025 U.S. Import and Export Price Indexes on March 18, 2025. The changes to the indexes could impact the chained-dollar values. Please refer to the BLS notice for additional information on the Upcoming Change to Data Source for Import and Export Price Indexes: U.S. Bureau of Labor Statistics.

    If you have any questions or need additional information, please contact the Census Bureau, Economic Statistical Methods Division, International Trade Statistical Methods Branch, on 301-763-3080.

    MIL OSI USA News

  • MIL-OSI Global: Ukraine: prospects for peace are slim unless Europe grips the reality of Trump’s world

    Source: The Conversation – UK – By Stefan Wolff, Professor of International Security, University of Birmingham

    When EU leaders gathered for their first ever meeting solely dedicated to defence issues on February 3, in Brussels, the war in Ukraine was uppermost on their minds. Yet, three weeks before the third anniversary of Russia’s full-scale invasion, Ukraine is only the tip of an iceberg of security challenges that Europe faces.

    War on a scale not seen in Europe since 1945 has returned to the continent. Russian sabotage of everything from critical infrastructure to elections is at levels reminiscent of the cold war. And the future of the EU’s most important defence alliance, Nato, is uncertain.

    In light of these challenges alone, let alone the ongoing instability in the Middle East, western Balkans and south Caucasus, it’s hard to disagree with the observation by EU council president António Costa that: “Europe needs to assume greater responsibility for its own defence.”

    But it’s hardly a groundbreaking statement. And at the end of proceedings, the outcome of what was ultimately only an informal meeting, was underwhelmingly summarised by Costa as “progress in our discussions on building the Europe of defence”.

    This does not bode well for Ukraine. US support is unlikely to continue at the levels reached during the final months of the Biden administration. In fact, ongoing debates in the White House on Ukraine policy have already caused some disruption to arms shipments from Washington to Kyiv.

    Building blocs

    If there is a silver lining for Ukraine here, it is Trump’s continuous search for a good deal. His latest idea is that Ukraine could pay for US support with favourable concessions on rare earths, and potentially other strategic resources.

    These would include preferential deals to supply the US with titanium, iron ore and coal, as well as critical minerals, including lithium. Whether this is a sustainable basis for US support in the long term is as unclear as whether it will make any material difference to Trump thinking beyond a ceasefire.

    The other ray of hope for Ukraine is that there is a much greater recognition in EU capitals now about the need for a common European approach to defence. A greater focus on building a “coalition of the willing” including non-EU members UK and Norway is a potentially promising path.

    But hope, as they say, is not a winning strategy. In a Trump-like transactional fashion, Brussels – in exchange for a deal on defence with London – is insisting on UK concessions on youth mobility and fishing rights. It’s unlikely that this will prove an insurmountable stumbling bloc, but it will create yet more delays at a moment when time is of the essence for Europe as a whole to signal determination about security and defence.

    This is further complicated by two factors. On the one hand, there is the looming threat of a trade war between the US and the EU. That the UK may still be able to avoid a similar fate, according to Trump, feels like good news for London. But it will also put the UK in a potentially awkward position as it seeks an ambitious post-Brexit reset with the EU and harbours hopes to improve relations with China.

    With Trump clearly hostile towards both Brussels and Beijing, this may become an impossible balancing act for the British government to pull off.

    Europe’s fragile unity

    On the other hand, EU unity has become more fragile. Trump’s victory has emboldened other populist leaders in Europe – notably the significantly more pro-Russian Slovak and Hungarian prime ministers, Robert Fico and Viktor Orbán. The same applies to the UK, where Nigel Farage, leader of the Reform UK party – which has overtaken the ruling Labour party in the latest public opinion polls – is known for his Ukraine-sceptical views.

    To that equation add a weak government in France and the likelihood of protracted coalition negotiations in Germany after hotly contested parliamentary elections at the end of February. The prospects for decisive EU and wider European action on strengthening its own security and defence capabilities right now appear vanishingly slim.

    Seen in the light of such multiple and complex challenges, it is astonishing how much the EU is still trapped in a wishful thinking exercise – and one that appears more and more disconnected from reality. Contrary to Costa’s fulsome pronouncements after the EU leaders’ meeting, there is little evidence that the US under Trump will remain Europe’s friend, ally and partner.

    There’s also little to suggest that the American president shares the values and principles that once underpinned the now rapidly dismantling international order. Other countries’ national sovereignty, territorial integrity and the inviolability of their borders are not at the forefront of Trump’s foreign policy doctrine.

    If, as Costa proclaimed, “peace in Europe depends on Ukraine winning a comprehensive, just and lasting peace”, then the future looks bleak indeed for Europe and Ukraine. At this point the EU and its member states are a long way off from being able to provide Ukraine with the support it needs to win. This is not just because they lack the military and defence-industrial capabilities. They also lack a credible, shared vision of how to acquire them while navigating a Trumpian world.

    Stefan Wolff is a past recipient of grant funding from the Natural Environment Research Council of the UK, the United States Institute of Peace, the Economic and Social Research Council of the UK, the British Academy, the NATO Science for Peace Programme, the EU Framework Programmes 6 and 7 and Horizon 2020, as well as the EU’s Jean Monnet Programme. He is a Trustee and Honorary Treasurer of the Political Studies Association of the UK and a Senior Research Fellow at the Foreign Policy Centre in London.

    ref. Ukraine: prospects for peace are slim unless Europe grips the reality of Trump’s world – https://theconversation.com/ukraine-prospects-for-peace-are-slim-unless-europe-grips-the-reality-of-trumps-world-248911

    MIL OSI – Global Reports

  • MIL-OSI China: Chinese premier meets with Kyrgyz president in Beijing

    Source: People’s Republic of China – State Council News

    BEIJING, Feb. 5 — Chinese Premier Li Qiang on Wednesday met with visiting Kyrgyz President Sadyr Japarov in Beijing.

    Noting that under the strategic guidance of the two heads of state, China-Kyrgyzstan relations have developed rapidly in recent years, Li also said that the foundation of mutual trust has been strengthened, bilateral cooperation upgraded, and friendly exchanges deeply rooted in the hearts of the two peoples.

    China is willing to work with Kyrgyzstan to implement the important consensus reached by the presidents of the two countries, firmly support each other on major issues concerning core interests, expand mutually beneficial cooperation in all respects, and better contribute to their respective modernization drives, Li said.

    Li added that China stands ready to enhance the synergy of development strategies with Kyrgyzstan, focus on high-quality Belt and Road cooperation, advance the construction of China-Kyrgyzstan-Uzbekistan railway and other connectivity projects, and create more new highlights of cooperation in fields such as mining, green energy, scientific and technological innovation.

    He further said that China will work closely with Kyrgyzstan in the United Nations and other multilateral mechanisms, strengthen the China-Central Asia mechanism, and steadily advance cooperation within the framework of the Shanghai Cooperation Organization — so as to inject more certainty into regional peace, stability and development.

    Japarov said Kyrgyzstan attaches great importance to the comprehensive strategic partnership for a new era with China, and is willing to further strengthen high-level exchanges with China, deepen cooperation concerning connectivity, agriculture, finance, mining, science and technology, tourism and people’s livelihood development, and strengthen youth and cultural exchanges between the two countries.

    Kyrgyzstan welcomes more Chinese enterprises to invest in Kyrgyzstan and will provide a safe and sound business environment for Chinese enterprises, Japarov added.

    MIL OSI China News

  • MIL-OSI Russia: Marat Khusnullin discussed the development of the region with the Governor of the Samara Region Vyacheslav Fedorishchev

    Translartion. Region: Russians Fedetion –

    Source: Government of the Russian Federation – An important disclaimer is at the bottom of this article.

    Previous news Next news

    Marat Khusnullin held a working meeting with the Governor of the Samara Region Vyacheslav Fedorishchev

    Deputy Prime Minister Marat Khusnullin held a working meeting with the Governor of the Samara Region Vyacheslav Fedorishchev, at which issues of the region’s socio-economic development were discussed.

    “The region is developing systematically in various directions, including the region showing good results in construction. The implementation of integrated development projects for territories with an urban development potential of 1 million square meters of housing has begun. Large-scale road projects are being implemented. Thus, in July last year, the President opened traffic on the bypass of the city of Tolyatti with a bridge across the Volga. This road is part of the international corridor Europe – Western China. In addition, we are upgrading public transport. Due to federal support measures, 306 buses and 22 trolleybuses have been delivered to the Samara Region since 2020,” said Marat Khusnullin.

    The meeting also discussed the progress of the construction of the Teatralnaya metro station, for which an infrastructure budget loan was allocated. The Deputy Prime Minister noted the importance of this project for increasing the mobility of residents and the overall comprehensive development of Samara.

    “The Tolyatti bypass has significantly relieved the road on the Zhigulevskaya hydroelectric power station dam from traffic congestion and is globally helping the export, industrial, logistics and tourism potential of the region. The opening of the new highway is a long-awaited event for residents of the Samara-Tolyatti agglomeration. But a number of financial issues remain. Regional expenses for the concession fee, compensation for costs associated with the rise in the cost of the facility, and the return of the attracted infrastructure budget loan will amount to more than 91.5 billion rubles in the period from 2024 to 2037, with the majority of them, in the amount of 59 billion rubles, falling on the first 5 years of operation of the facility. Today we considered the possibility of allocating up to 10 billion rubles annually from the federal budget to the budget of the Samara Region from 2025 to 2031 for the implementation of the project to build a bypass of Tolyatti with a bridge crossing over the Volga until the mandatory payments from the region are reduced to an acceptable level,” said the Governor of the Samara Region Vyacheslav Fedorishchev.

    The parties also discussed the region’s work within the framework of the new national project “Infrastructure for Life”.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Global: Nigeria’s Brics partnership: economist outlines potential benefits

    Source: The Conversation – Africa – By Stephen Onyeiwu, Professor of Economics & Business, Allegheny College

    During its 16th annual summit in Kazan, Russia, Brics – a group of emerging economies determined to act as a counterweight to the west and to whittle down the influence of global institutions – invited Nigeria and eight other countries to join it as “partner” countries. Nigeria formally accepted the invitation in January 2025. That invitation has generated questions about how Nigeria stands to benefit, especially when US president Donald Trump is threatening to sanction members of the group if they replace the US dollar as reserve currency. It was established in 2006 and initially composed of Brazil, Russia, India, and China. South Africa joined in 2010 and the bloc added four new members (Egypt, Ethiopia, Iran and the United Arab Emirates) in 2023. In this interview, development economist Stephen Onyeiwu argues that Nigeria stands to gain from a Brics partnership, but would have to carefully balance its domestic interests with those of its western allies and Brics.

    What does it mean to be a Brics ‘partner’ country?

    The introduction of Brics partnership is an expansion mechanism designed to bring in more participants without giving them full membership. It is akin to “observer” status.

    Brics partners can participate in special sessions of summits and foreign ministers’ meetings, as well as other high-level events. Partners can also contribute to the organisation’s official documents and policy statements.

    But partners cannot host annual Brics summits or determine the venue. Neither can they select new members and partners.

    How beneficial is Brics partnership to Nigeria?

    The main benefit would be access to finance offered by Brics’ New Development Bank.

    The New Development Bank was established as an alternative to western-dominated international financial institutions like the World Bank and International Monetary Fund. These institutions are sometimes used by the leading western countries to keep developing countries in line on global issues.

    Some developing countries are reluctant to criticise western countries for fear of losing access to funding by western-backed international financial institutions.

    Nigeria has been running a budget deficit of about 5% of GDP since 2019, and it needs funding to pay for the deficits. The New Development Bank could be an important source of funding for investment in Nigeria’s infrastructure, manufacturing, agriculture, and so on.

    New Development Bank loans are also available in member countries’ local currencies. They don’t have to earn foreign exchange to repay the loans. This fosters exchange rate stability and promotes economic growth. The New Development Bank raises funds in member countries’ local currencies, and lends them to member countries.

    Nigeria could use its Brics partnership to garner the group’s support in matters that affect Nigeria globally. For instance, there have been requests for African countries to be included as permanent members (without veto power) of the UN security council. South Africa and Nigeria have been touted as potential candidates. Should this issue be raised at the UN, Nigeria can count on the support of its Brics allies, which includes two permanent members (China and Russia) of the security council.

    Mutual understanding and cooperation with other Brics members and partners might spill over into economic, trade and investment agreements. Friendly countries are more likely to trade with each other and invest in each other’s economy.

    How can Nigeria maximise its status as a Brics partner?

    Nigeria should use it to attract foreign direct investment in strategic sectors of the economy, such as infrastructure, manufacturing, agriculture and technology.

    Some Brics members, like China, India, and the UAE, have investors that are seeking investment outlets abroad. Nigeria could use the bloc’s annual summits to showcase investment opportunities.

    The global economy is transitioning into “frontier industries and technologies”, such as big data, artificial intelligence, solar, drones, gene editing, 3D printing, blockchains, Internet of Things (IoT), 5G, robotics and nanotechnology. China, India and Brazil are already well advanced in these technologies.

    Nigeria should use its partnership with these countries to build capabilities in frontier industries and technologies. It could get favourable terms in the transfer of these technologies.

    Nigeria seeks to diversify its economy from reliance on the export of hydrocarbons. But Nigerian producers have had a hard time accessing global markets. The country should negotiate trade deals that provide access to Brics markets, especially agricultural and agro-processed products, arts and crafts.

    But Nigeria has to promote economic growth and structural transformation at home. If the Nigerian economy falters, it is unlikely the country will be invited to become a full member of Brics.

    Would adding new members and partners reduce western dominance?

    Brics has so far not been able to significantly change the dynamics of the international political economy. Adding new members and partners, while symbolic, will not act as an effective counterweight to the influence of the G7 and G20 groups of nations.

    Most of the countries and partners in Brics are either allies of western countries or neutral on global issues. They are unlikely to support decisions or actions that are grossly inimical to western interests.

    Egypt and the UAE, for instance, receive military aid from the United States. Ethiopia and Nigeria are top recipients of foreign aid in Africa, much of it from western-backed financial institutions.

    The only outlier in the mix is Iran, whose membership was promoted by Russia. But Iran has no leverage to influence others in the bloc.

    On balance, therefore, Brics will not be a threat to western countries.

    Brics aspires to weaken the dominance of the US dollar for international transactions. Close to 90% of international trade transactions are conducted with the US dollar.

    Brics countries plan to reduce dollar dominance by encouraging member countries to settle their trade and financial transactions using their domestic currencies. For instance, South African businesses could purchase Chinese goods using the South African rand, while the Chinese could do the same for South African goods using the Chinese yuan. The more members you have in Brics swapping their currencies, the less important the US dollar will be.

    It is unlikely, however, that an increase in the number of Brics members and partners will weaken the dollar. Most will continue to have significant economic relationships with the west, including trade and foreign aid.

    They will also continue to conduct business with many non-Brics countries, which also have economic relationships with the west. They will need the US dollar to transact with many other countries.

    So increasing the number of Brics members and partners does not pose a threat to dollar dominance.

    Stephen Onyeiwu does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Nigeria’s Brics partnership: economist outlines potential benefits – https://theconversation.com/nigerias-brics-partnership-economist-outlines-potential-benefits-248943

    MIL OSI – Global Reports

  • MIL-OSI Africa: Nigeria’s Brics partnership: economist outlines potential benefits

    Source: The Conversation – Africa – By Stephen Onyeiwu, Professor of Economics & Business, Allegheny College

    During its 16th annual summit in Kazan, Russia, Brics – a group of emerging economies determined to act as a counterweight to the west and to whittle down the influence of global institutions – invited Nigeria and eight other countries to join it as “partner” countries. Nigeria formally accepted the invitation in January 2025. That invitation has generated questions about how Nigeria stands to benefit, especially when US president Donald Trump is threatening to sanction members of the group if they replace the US dollar as reserve currency. It was established in 2006 and initially composed of Brazil, Russia, India, and China. South Africa joined in 2010 and the bloc added four new members (Egypt, Ethiopia, Iran and the United Arab Emirates) in 2023. In this interview, development economist Stephen Onyeiwu argues that Nigeria stands to gain from a Brics partnership, but would have to carefully balance its domestic interests with those of its western allies and Brics.

    What does it mean to be a Brics ‘partner’ country?

    The introduction of Brics partnership is an expansion mechanism designed to bring in more participants without giving them full membership. It is akin to “observer” status.

    Brics partners can participate in special sessions of summits and foreign ministers’ meetings, as well as other high-level events. Partners can also contribute to the organisation’s official documents and policy statements.

    But partners cannot host annual Brics summits or determine the venue. Neither can they select new members and partners.

    How beneficial is Brics partnership to Nigeria?

    The main benefit would be access to finance offered by Brics’ New Development Bank.

    The New Development Bank was established as an alternative to western-dominated international financial institutions like the World Bank and International Monetary Fund. These institutions are sometimes used by the leading western countries to keep developing countries in line on global issues.

    Some developing countries are reluctant to criticise western countries for fear of losing access to funding by western-backed international financial institutions.

    Nigeria has been running a budget deficit of about 5% of GDP since 2019, and it needs funding to pay for the deficits. The New Development Bank could be an important source of funding for investment in Nigeria’s infrastructure, manufacturing, agriculture, and so on.

    New Development Bank loans are also available in member countries’ local currencies. They don’t have to earn foreign exchange to repay the loans. This fosters exchange rate stability and promotes economic growth. The New Development Bank raises funds in member countries’ local currencies, and lends them to member countries.

    Nigeria could use its Brics partnership to garner the group’s support in matters that affect Nigeria globally. For instance, there have been requests for African countries to be included as permanent members (without veto power) of the UN security council. South Africa and Nigeria have been touted as potential candidates. Should this issue be raised at the UN, Nigeria can count on the support of its Brics allies, which includes two permanent members (China and Russia) of the security council.

    Mutual understanding and cooperation with other Brics members and partners might spill over into economic, trade and investment agreements. Friendly countries are more likely to trade with each other and invest in each other’s economy.

    How can Nigeria maximise its status as a Brics partner?

    Nigeria should use it to attract foreign direct investment in strategic sectors of the economy, such as infrastructure, manufacturing, agriculture and technology.

    Some Brics members, like China, India, and the UAE, have investors that are seeking investment outlets abroad. Nigeria could use the bloc’s annual summits to showcase investment opportunities.

    The global economy is transitioning into “frontier industries and technologies”, such as big data, artificial intelligence, solar, drones, gene editing, 3D printing, blockchains, Internet of Things (IoT), 5G, robotics and nanotechnology. China, India and Brazil are already well advanced in these technologies.

    Nigeria should use its partnership with these countries to build capabilities in frontier industries and technologies. It could get favourable terms in the transfer of these technologies.

    Nigeria seeks to diversify its economy from reliance on the export of hydrocarbons. But Nigerian producers have had a hard time accessing global markets. The country should negotiate trade deals that provide access to Brics markets, especially agricultural and agro-processed products, arts and crafts.

    But Nigeria has to promote economic growth and structural transformation at home. If the Nigerian economy falters, it is unlikely the country will be invited to become a full member of Brics.

    Would adding new members and partners reduce western dominance?

    Brics has so far not been able to significantly change the dynamics of the international political economy. Adding new members and partners, while symbolic, will not act as an effective counterweight to the influence of the G7 and G20 groups of nations.

    Most of the countries and partners in Brics are either allies of western countries or neutral on global issues. They are unlikely to support decisions or actions that are grossly inimical to western interests.

    Egypt and the UAE, for instance, receive military aid from the United States. Ethiopia and Nigeria are top recipients of foreign aid in Africa, much of it from western-backed financial institutions.

    The only outlier in the mix is Iran, whose membership was promoted by Russia. But Iran has no leverage to influence others in the bloc.

    On balance, therefore, Brics will not be a threat to western countries.

    Brics aspires to weaken the dominance of the US dollar for international transactions. Close to 90% of international trade transactions are conducted with the US dollar.

    Brics countries plan to reduce dollar dominance by encouraging member countries to settle their trade and financial transactions using their domestic currencies. For instance, South African businesses could purchase Chinese goods using the South African rand, while the Chinese could do the same for South African goods using the Chinese yuan. The more members you have in Brics swapping their currencies, the less important the US dollar will be.

    It is unlikely, however, that an increase in the number of Brics members and partners will weaken the dollar. Most will continue to have significant economic relationships with the west, including trade and foreign aid.

    They will also continue to conduct business with many non-Brics countries, which also have economic relationships with the west. They will need the US dollar to transact with many other countries.

    So increasing the number of Brics members and partners does not pose a threat to dollar dominance.

    – Nigeria’s Brics partnership: economist outlines potential benefits
    – https://theconversation.com/nigerias-brics-partnership-economist-outlines-potential-benefits-248943

    MIL OSI Africa

  • MIL-OSI Russia: Digital diagnostics to double number of foreign publications in 2024

    Translartion. Region: Russians Fedetion –

    Source: Center for Diagnostics and Telemedicine of the Moscow Department of Health (DZM)

    The scientific journal Digital Diagnostics has seen a significant increase in the number of publications by foreign authors in 2024, doubling the figures for previous years. This year, the journal has published 16 articles written by foreign authors, compared to an average of 7 articles per year in previous years. The journal currently collaborates with authors from six countries.

    Center for Diagnostics and Telemedicine.

    Yuri Vasiliev, Chief Consultant in Radiology at the Moscow Health Department and CEO of the Center for Diagnostics and Telemedicine, noted that in 2024, their journal expanded its international reach as it featured articles by Indian scientists for the first time. He noted that India, as a member of BRICS, is part of an international organization with which they actively cooperate. He expressed confidence that broad international cooperation and exchange of experience will significantly improve scientific development in their countries. He also noted that 16 foreign articles were published in the journal this year, significantly more than the 7 articles published in 2022 and 2021. Notably, Italy presented 13 articles on clinical cases and scientific reviews, while Indian scientists presented original research in teleradiology, which is considered a valuable contribution to the field.

    In 2024, two landmark papers by Indian authors were published: “Radiological evaluation of pulmonary vascular and gastrointestinal changes in COVID-19 patients referred to a tertiary care centre in Chennai, India: a prospective cross-sectional study” and “Role of teleradiology in interpreting ultrasound images obtained in the emergency setting”. These papers were prepared by research teams from Image Core Lab and Mahatma Gandhi.

    This year, the Diagnostics and Telemedicine Center actively established contacts with colleagues from the BRICS countries. The Center’s employees took part in the International Municipal Forum of the BRICS countries and visited a specialized healthcare exhibition in New Delhi called India Health. In addition, the Center was visited by delegations from four BRICS countries – China, India, Iran and South Africa.

    Digital Diagnostics is recognized as one of the most progressive and prestigious journals in the field of radiology. Every year its portfolio expands and includes a wide range of topics, such as radiology and instrumental diagnostics, innovative methods, application of artificial intelligence, healthcare management and other scientific topics. The journal publishes articles by outstanding Russian scientists, as well as international experts who make a significant contribution to the development of scientific research. The journal publishes articles in three languages: Russian, English and Chinese, with a circulation of 5,000 copies.

    MIL OSI Russia News

  • MIL-OSI China: Xi signs order to promulgate revised regulations on military equipment research

    Source: People’s Republic of China – State Council News

    BEIJING, Feb. 5 — Xi Jinping, chairman of the Central Military Commission, has signed an order to promulgate a set of revised regulations on scientific research related to military equipment.

    The regulations set rules for the quality control, cost management, acceptance procedures, support measures, and safety and confidentiality issues of relevant work.

    The regulations, comprising 49 articles in eight chapters, will take effect on March 1.

    MIL OSI China News

  • MIL-OSI Asia-Pac: Fraudulent websites, internet banking login screens and mobile applications (Apps) related to China Construction Bank (Asia) Corporation Limited

    Source: Hong Kong Government special administrative region

    Fraudulent websites, internet banking login screens and mobile applications (Apps) related to China Construction Bank (Asia) Corporation Limited
    Fraudulent websites, internet banking login screens and mobile applications (Apps) related to China Construction Bank (Asia) Corporation Limited
    ******************************************************************************************

    The following is issued on behalf of the Hong Kong Monetary Authority:      The Hong Kong Monetary Authority (HKMA) wishes to alert members of the public to a press release issued by China Construction Bank (Asia) Corporation Limited relating to fraudulent websites, internet banking login screens and Apps, which have been reported to the HKMA. A hyperlink to the press release is available on the HKMA website.           The HKMA wishes to remind the public that banks will not send SMS or emails with embedded hyperlinks which direct them to the banks’ websites to carry out transactions. They will not ask customers for sensitive personal information, such as login passwords or one-time password, by phone, email or SMS (including via embedded hyperlinks).           Anyone who has provided his or her personal information, or who has conducted any financial transactions, through or in response to the websites, login screens or Apps concerned, should contact the bank using the contact information provided in the press release, and report the matter to the Police by contacting the Crime Wing Information Centre of the Hong Kong Police Force at 2860 5012.

     
    Ends/Wednesday, February 5, 2025Issued at HKT 16:35

    NNNN

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Sydney ETO holds reception in Sydney to celebrate Year of Snake (with photos)

    Source: Hong Kong Government special administrative region

         The Hong Kong Economic and Trade Office, Sydney (Sydney ETO) hosted a reception in Sydney, Australia, yesterday (February 4) to celebrate Chinese New Year.

         Over 300 guests from various sectors including political and business circles, media, academic and community groups as well as government representatives attended the Sydney reception. Among them was the Consul General of the People’s Republic of China in Sydney, Mr Wang Yu. The Chairman of the M+ Board, Chairman of the Tai Kwun Culture and Arts Company Limited and Vice Chairman of the West Kowloon Cultural District Authority Board, Mr Bernard Chan, was invited as the keynote speaker to share with the guests the vibrant arts and cultural scenes in Hong Kong.

         The Director of the Sydney ETO, Mr Ricky Chong, said in his welcoming remarks that both Hong Kong and Australia embrace free trade, rule of law, and multiculturalism as core values, under which Hong Kong and Australia’s bilateral trade, investment situation and people-to-people ties flourish. New South Wales, in particular, has long been a significant partner for Hong Kong in the finance, trade, tourism, and education sectors.

         “As we celebrate Chinese New Year, let us also reflect on how our collaboration can grow even stronger. With Hong Kong serving as the ‘super connector’ with the Guangdong-Hong Kong-Macao Greater Bay Area and Mainland China, the opportunities for Australian businesses are unprecedented. Together, we can explore new horizons and ensure our partnership continues to thrive,” Mr Chong added.  

         In his keynote speech, Mr Chan introduced to guests the various world class venues in the West Kowloon Cultural District, including M+ museum, the Hong Kong Palace Museum and Xiqu Centre, as well as their partnerships with over 20 of the top arts and cultural institutions in the world. He also shared about the vibrant activations and inspiring exhibitions in Tai Kwun – a centre for arts, culture and heritage. Mr Chan will also speak at the Chinese New Year reception to be hosted by the Sydney ETO in Melbourne tomorrow (February 6).

         In addition to the Sydney and Melbourne receptions, the Sydney ETO will also host Chinese New Year receptions in Brisbane (February 13), Perth (February 18) and Adelaide (February 20) in Australia, and Auckland (February 25) in New Zealand, to celebrate the Year of the Snake with local communities.               

    MIL OSI Asia Pacific News

  • MIL-OSI Economics: Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024

    Source: Securelist – Kaspersky

    Headline: Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024

    “Nigerian” spam is a collective term for messages designed to entice victims with alluring offers and draw them into an email exchange with scammers, who will try to defraud them of their money. The original “Nigerian” spam emails were sent in the name of influential and wealthy individuals from Nigeria, hence the name of the scam.

    The themes of these phishing emails evolved over time, with cybercriminals leveraging contemporary events and popular trends to pique the interest of their targets. However, the distinctive characteristics of the messages that placed them in the “Nigerian” scam category remained unchanged:

    • The user is encouraged to reply to an email. It is usually enough for the attackers to receive a reply in any format, but sometimes they ask the victim to provide additional information, such as contact details or an address.
    • Typically, scammers mention a large amount of money that they claim the recipient is entitled to, either due to sheer luck or because of their special status. However, some emails use other types of bait: investment opportunities, generous gifts, invitations to an exclusive community, and so on.
    • The body of most “Nigerian” scam emails includes the email address – often registered with a free email service – of the alleged benefactor or an agent, which may be different from the sender’s address. Sometimes the return address is given in the Reply-To field rather than the message itself, and the address also differs from the one in the From field. Alternatively, the message body might contain a phone number in place of an email address.
    • The messages are often poorly written, with a large number of mistakes and typos. The text may well be the product of low-quality machine translation or generated by a large language model poorly trained on that language.

    Types of “Nigerian” email messages

    Email from wealthy benefactors

    A fairly common tactic that has superseded the original “Nigerian” scam involves messages purportedly from wealthy individuals suffering from a terminal illness and facing imminent death. They claim to have no heirs, and therefore wish to bequeath their vast fortune to the recipient, whom they deem worthy.

    The narrative may change slightly from one email to the next. For example, a “wealthy benefactor” might ask the recipient to act as a go-between for a monetary transfer to a third party in exchange for a reward, as described in the email above, or simply offer a valuable gift. The message can claim to be written by either a dying millionaire or, as in the example below, a legal representative of the deceased.

    Alternatively, the “millionaires” may be in good health and supposedly donating their money purely out of the goodness of their hearts. To enhance credibility, attackers can embed links to publicly available data about the individual they’re posing as.

    Compensation scams

    Beyond the “millionaire giveaway” scam, fraudsters frequently use the lure of compensations from governments, banks and other trusted entities. By doing so, they exploit the victim’s vulnerability rather than their greed. Scammers sometimes take their victims on an emotional rollercoaster ride. They start by frightening people with bad news, then calm them down by saying the problem has been fixed, and finally surprise them with a generous offer of compensation.

    For example, in the email screenshot below, the attackers, posing as high-ranking officials at a major bank, claim that “corrupt employees” were attempting to steal the recipient’s money. The bank claims to have taken action and is offering an exorbitant amount as damage compensation. To get it, the recipient is urged to contact a correspondent bank as soon as possible at an email address, which is, unsurprisingly, registered with a free email service.

    Scammers have another trick up their sleeve when it comes to compensations: they pretend to be from the police or some international organization and promise to give victims of “Nigerian” scams or other rip-offs their money back. In the example below, scammers, posing as the Financial Stability Council and the United Bank for Africa (UBA), promise the victim a payout from a so-called “fraud victims compensation fund”.

    Sometimes scammers pretend to be “victims of fraud” themselves. The screenshot below shows a common example: scammers masquerade as victims of cryptocurrency fraud, offering help from “noble hackers” who they claim helped them recover their losses.

    Lottery scams

    Lottery win notification scams share many similarities with “Nigerian” scams. Fraudsters promise recipients large sums of money and provide their contact details for further communication. It’s likely that the victim has never heard of the lottery they’ve supposedly won.

    In some cases, scammers employ unusual tactics. For example, in a message claiming to be from a European lottery director, the email body is all but empty. All the “win” details and next steps are in a PDF attachment. The file includes a free email address, which is typical of “Nigerian” scams, and asks you to send fairly detailed personal information, such as your full name, address, and both your mobile and landline phone numbers. They even ask for your job position.

    In other similar emails, we noticed image attachments that included all the details about the supposed “win” and contact information.

    Another lottery scam tactic combines two types of bait: a lottery win (fraudsters pretend to be someone else who has won and is now offering you money) and offering a donation from a wealthy elderly person.

    In some cases, to make their scams more convincing, scammers attach photos of documents to their emails that supposedly confirm the sender’s identity or their winnings.

    Online dating scams

    Some “Nigerian” scams are so sophisticated that they can be hard to spot right away. These include offers of friendship that often develop into romantic conversations, which can be almost indistinguishable from real-life interactions. We’ve seen examples of really long email exchanges where a whole drama played out. A man and a woman met online and hit it off, chatting for hours about everything under the sun. Now, one of them is finally ready to meet the other in person. However, they can’t afford the ticket or visa, and they’re pleading with their partner for financial help so they can meet.

    In a different scenario, the scammer pretends to send an expensive gift to their partner. Eventually, they claim they can’t afford the postage and ask the victim to cover the costs. If the victim agrees, they’ll be hit with a series of additional fees, and the package will never materialize.

    “Nigerian” spam for businesses

    While “Nigerian” scams are often targeted at individual users, similar spam can also be found in the B2B sector. Cybercriminals claim to be seeking businesses to invest in, and the recipient’s company may be their target. To arrange a “partnership”, they ask the recipient to reply to the email.

    Current “Nigerian” spam themes

    Some of the spam samples above reference recent or current real-world events, such as the COVID-19 pandemic or Saudi Arabia’s possible BRICS membership. This is typical of “Nigerian” scams. There are countless ways scammers exploit various global or local, significant or ordinary, positive or negative events, news, incidents, and activities to pursue their selfish goals.

    The most talked-about event of 2024, the US presidential election, significantly influenced the types of scams we saw. Emails that took advantage of this topic were sent to users around the globe. For instance, in the following message, the scammers claimed that the recipient, who uses a German email address, was lucky enough to win millions of dollars from the Donald J. Trump Foundation.

    Creativity unbound

    While most spam fits into well-known categories, scammers can come up with some very surprising offers. We’ve seen quite a few messages from people claiming they’re giving away a piano because they’re moving or because the previous owner has passed away, as is often the case.

    Sometimes you find some really unusual specimens. For example, in the screenshot below, there’s an email allegedly sent from a secret society of Illuminati who claim to be ready to share their wealth and power, as well as make the lucky recipient famous if they agree to become part of their grand brotherhood.

    Conclusion

    “Nigerian” spam has existed for a long time and is characterized by its diversity. Fraudsters can pose as both real and fictitious individuals: bank employees, lawyers, businesspeople, magnates, bankers, ambassadors, company executives, law enforcement officers, presidents or even members of secret societies. They use a variety of stories to hook the user: compensations and reimbursements, donations and charity, winnings, inheritances, investments, and much more. Messages can be anything from short and captivating to long and persuasive, filled with numerous convincing claims designed to lull the victim into a false sense of security. The main danger of such emails lies in the fact that at first glance, there is nothing harmful in them: no links to phishing sites and no suspicious attachments. Scammers exclusively rely on social engineering and are willing to correspond with the victim for an extended period, increasing the credibility of their fabricated story.

    To avoid falling victim to such scams, it’s important to understand the dangers of tempting offers and to be critical of emails allegedly sent from influential individuals. If possible, it’s best to avoid responding to messages from unverified senders altogether. If for some reason you can’t avoid corresponding with a stranger, before responding to even an innocent message about finding a new owner for a piano, it’s worth double-checking the information in it, paying attention to inconsistencies, grammatical errors, etc. If the reply-to address is different from the sender’s address, or if you see a different address in the email body, this may be a sign of fraud.

    MIL OSI Economics

  • MIL-OSI Europe: Written question – Europe lags behind in the development of Artificial Intelligence – E-000341/2025

    Source: European Parliament

    Question for written answer  E-000341/2025
    to the Commission
    Rule 144
    Nikolaos Anadiotis (NI)

    Europe[1] appears to be significantly lagging behind in investment in and development of Artificial Intelligence (AI) technologies compared to the United States and China[2] and the competition between them[3], impacting not only technological progress but also the ability to attract skilled human resources. This has negative implications for the future of the EU.

    In this context, what are the Commission’s strategies for: a) strengthening investment in the field of AI in order to make Europe competitive at the global level, b) creating an attractive framework to draw in talent and develop skills in AI within Europe, and c) promoting ethics, transparency and security in AI technologies, as well as harmonising their development and use with the values and rights of European citizens?

    Submitted: 27.1.2025

    • [1] https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52024SA0008(01)
    • [2] https://github.com/deepseek-ai/DeepSeek-R1
    • [3] https://breakingthenews.net/Article/Nasdaq-futures-tumble-3-amid-DeepSeek-concerns/63416020
    Last updated: 5 February 2025

    MIL OSI Europe News

  • MIL-OSI Europe: Written question – What measures does the Commission intend to put in place to overcome the ‘energy transition’ crisis? – E-000311/2025

    Source: European Parliament

    Question for written answer  E-000311/2025
    to the Commission
    Rule 144
    Mathilde Androuët (PfE)

    Both the Commissioner for Climate Change, Carbon Neutrality and Clean Growth[1] and the Draghi Report[2] have drawn attention to the erosion of our industrial sovereignty, particularly in relation to China, in the renewable energy and electric vehicle sectors. The Draghi Report also warns that Europe is losing competitiveness as a result of very high gas and electricity prices in the EU[3].

    A study[4] by the Committee on Constitutional Affairs assessing the conditions for the creation of a Climate and Energy Union identifies legal, regulatory, institutional and political obstacles to its establishment. The study also points to the lack of sufficient financial resources to carry out an energy transition that requires massive investment, far in excess of the EUR 660 billion earmarked for the green transition in the Multiannual Financial Framework 2021-2027.

    As an example, the Bruegel think tank estimates that EU countries would need to invest around EUR 1 300 billion each year until 2030 and then EUR 1 540 billion per year between 2031 and 2050 to complete the energy transition[5].

    • 1.What adjustments does the Commission advocate in such a situation?
    • 2.Does it dispute the figures provided by the Bruegel think tank?

    Submitted: 23.1.2025

    • [1] Europe ‘getting more dependent on China’ for clean tech, EU climate chief warns, Frédéric Simon, Euractiv, 14 February 2024.
    • [2] Mario Draghi’s report on the future of European competitiveness, https://commission.europa.eu/topics/strengthening-european-competitiveness/eu-competitiveness-looking-ahead_en#paragraph_47059
    • [3] La grande panne de l’industrie européenne, Bastien Bonnefous, Le Monde, 23 September 2024.
    • [4] https://www.europarl.europa.eu/RegData/etudes/STUD/2024/764399/IPOL_STU(2024)764399_EN.pdf
    • [5] L’Europe n’a pas les moyens de sa transition énergétique, Transitions & Énergies, 13 December 2024, https://www.transitionsenergies.com/europe-pas-les-moyens-transition-energetique
    Last updated: 5 February 2025

    MIL OSI Europe News

  • MIL-OSI China: Spring Festival holiday box office hits record high, underscoring Chinese film market’s vitality, resilience

    Source: People’s Republic of China – State Council News

    Spring Festival holiday box office hits record high, underscoring Chinese film market’s vitality, resilience

    BEIJING, Feb. 5 — The 2025 Spring Festival holiday has set a new milestone for China’s thriving film industry, with box office revenue reaching a staggering 9.51 billion yuan (approximately 1.33 billion U.S. dollars) between Jan. 28 and Feb. 4, as announced by the China Film Administration on Wednesday.

    The record-breaking numbers don’t stop there: the holiday also saw a significant surge in attendance, with 187 million moviegoers packing theaters over the course of the extended week, setting new highs in both box office earnings and audience turnout.

    Animated feature “Ne Zha 2” emerged as the undisputed leader, grossing an impressive 4.84 billion yuan. The film’s performance helped establish it as a powerhouse within the festive season’s crowded lineup, with a commanding lead over its competitors.

    “Watching ‘Ne Zha 2’ was a rollercoaster of emotions with laughter in the first half and tears towards the end,” said Zhang Bohan, 22, a movie enthusiast from Beijing. “The film continues the theme of the first installment, showcasing the courage of young people who bravely confront challenges, because ‘if there’s no road ahead, I will make my own.’”

    Following behind in second place was “Detective Chinatown 1900,” which earned 2.28 billion yuan. “Creation of the Gods II: Demon Force” secured third place with a box office total of 998 million yuan, while “Legends of the Condor Heroes: The Gallants,” “Boonie Bears: Future Reborn” and “Operation Hadal” also rounded out the top six films, according to ticketing platform Maoyan.

    With the rankings reflecting a strong demand for a diverse range of genres during the holiday season, Maoyan analyst Lai Li highlighted the significance of the box office performance. “The holiday’s record-breaking numbers provide a robust start to the year for the film market, showcasing the tremendous resilience and upward potential of China’s film industry,” he remarked.

    In addition to the box office milestones, Jan. 29 — the Spring Festival, or the Chinese New Year — set its own records, with daily box office earnings reaching 1.808 billion yuan and 35.22 million viewers attending theaters. This marked a new chapter for Chinese cinema, setting all-time records for both single-day earnings and audience turnout.

    Rao Shuguang, president of the China Film Critics Association, emphasized the cultural significance of the season’s success, in an interview with Xinhua. “‘Ne Zha 2’ has not only shattered box office records but also garnered widespread critical acclaim, underscoring the continued growth of Chinese cinema. The film proves that a good movie needs a compelling story, sharp storytelling and well-developed characters.”

    Rao expressed his hope that China would continue to produce high-quality films that engage audiences and draw more moviegoers to theaters.

    The Capital Cinema in downtown Beijing’s Xidan commercial district reported that its overall occupancy rate reached nearly 50 percent, with 43,000 moviegoers attending screenings during the holiday. “Given the characteristics of the films in this year’s holiday slate, we added more late-night showings to accommodate the demand,” said Yu Chao, executive deputy general manager of Beijing’s Capital Cinema.

    Yu’s sentiment was echoed by prominent Chinese film industry figures. Yin Hong, vice chairman of the China Film Association and a professor at Tsinghua University told Xinhua that the success of the Spring Festival box office was driven by a wave of films that not only tell compelling Chinese stories but also embody the strength and craftsmanship of Chinese cinema.

    “The Spring Festival box office has served as a barometer for China’s film market, bringing with it the promising winds of ‘restarting the future,’” Yin said, highlighting the year 2025 as a critical period for both global cinema and Chinese film’s revival.

    MIL OSI China News

  • MIL-OSI China: China taps ice, snow to fuel economic growth

    Source: People’s Republic of China – State Council News

    BEIJING, Feb. 5 — From winter sports to snow tourism, China is actively tapping into its ice and snow resources to create new growth drivers for the world’s second-largest economy, according to multiple officials and experts at a recent roundtable.

    Tourists are now more willing to pay for leisure and cultural activities related to ice and snow tourism, said Dai Bin, president of the China Tourism Academy, at the latest episode of the China Economic Roundtable, an all-media talk show hosted by Xinhua News Agency.

    Dai said that various new business models are arising from the thriving industry. “Once tourists arrive at their destinations, they look for accommodation, dining options and interactions with locals. What attracts them most is often the unique folk customs and cultural heritage of the region.”

    Harbin, China’s northernmost provincial capital, exemplifies the country’s thriving ice and snow economy. During the eight-day Spring Festival holiday that concluded on Tuesday, Harbin Ice-Snow World attracted over 610,000 visits. This ice theme park, featuring dazzling ice sculptures, saw more than 100,000 visits on Feb. 1, setting a new record for daily attendance compared to previous years.

    In addition to Harbin, various new ice and snow tourism attractions have emerged across Heilongjiang Province. These include the snow-covered forests of Yichun, one of China’s most forested cities, winter birdwatching in Qiqihar, where native red-crowned cranes can be spotted, and aurora viewing in Mohe, near the China-Russia border, according to Qi Bin, deputy director of the Heilongjiang provincial department of culture and tourism.

    Peng Fuwei, an official with the National Development and Reform Commission, China’s top economic planner, said that China has established a dual manufacturing-service model to develop its ice and snow economy. According to Peng, the country can now produce 15 kinds of ice and snow sports equipment, ranging from snowboards to snow-making machines.

    In ice and snow services, Peng said multiple sectors flourish simultaneously, including competitions and performances, catering and accommodation, winter sports training, and leisure tourism.

    Looking ahead, Peng said that the central budget will continue to support the construction of public service facilities for eligible ice and snow sports and tourism. Also, qualifying ice and snow tourism equipment will receive support through ultra-long special treasury bonds for equipment upgrades.

    According to China’s national blueprint for the ice and snow economy, the industry is expected to play a greater role in expanding employment and promoting high-quality development by 2030. Ice and snow consumption will be a key growth driver for domestic demand.

    By then, several high-quality destinations for ice sports and tourism will be established, and the total scale of the ice and snow economy is projected to reach 1.5 trillion yuan (about 209.2 billion U.S. dollars), the document says.

    MIL OSI China News

  • MIL-OSI China: Technology empowers upcoming Asian Winter Games

    Source: People’s Republic of China – State Council News

    HARBIN, Feb. 5 — The 9th Asian Winter Games in Harbin, capital city of China’s northernmost Heilongjiang Province, promises to be a sporting event of excellence and fair play, empowered by cutting-edge technology used by the organizers.

    From the innovative design of the torch to the high-performance materials used in athletes’ clothing, as well as tools designed to ensure fair play and advanced security systems, technology is intricately woven into every facet of the event.

    ICE TORCH

    The torch for the upcoming Asian Winter Games is a masterpiece of design and engineering. Crafted by Harbin Engineering University, the torch is made of transparent special functional materials and takes the shape of a blooming lilac flower, showing a gradation of colors from ice crystals to snowflake white. When lit, it creates a mesmerizing visual effect of ice and fire, beautifully symbolizing the vibrant spirit of the city.

    Sun Gaohui, a professor from the College of Materials Science and Chemical Engineering at Harbin Engineering University, said that the design process involved overcoming significant technical challenges, including ensuring transparency, resistance to extreme temperature fluctuations, flame retardancy, and cost efficiency.

    WATERPROOF CLOTHING

    The Chinese sports delegation will be outfitted in specially designed clothing made from high-performance materials.

    Developed in collaboration between sportswear brand ANTA and Donghua University, the clothing features a cutting-edge material that provides exceptional waterproofing and moisture-wicking properties. This ensures that athletes remain dry, comfortable and protected against harsh weather conditions.

    Chinese skater Liu Guanyi praised the clothing’s remarkable windproof and waterproof capabilities, noting that they can keep athletes cool and dry throughout intense training sessions.

    VIDEO REPLAY

    To ensure fairness in high-speed racing events like short track speed skating and speed skating, the research team at the Harbin Sport University has developed an advanced dual-screen video replay system.

    According to Shan Baohai, a professor at the university, unlike the International Skating Union’s standard equipment, which provides only one replay screen for referees, this innovative system adds a second screen, allowing referees to simultaneously view multiple angles.

    Shan emphasized that this technological advancement plays a crucial role in enabling quick and accurate decision-making during competitions. Additionally, the system can leverage accumulated data and big data analytics to provide scientific insights for athlete training, competition strategy development, and event organization optimization.

    SECURITY MANAGEMENT

    For the first time, the competition venues will utilize 5G NR indoor enhanced positioning technology, developed by telecom operator China Unicom. This cutting-edge system enables real-time tracking of personnel responsible for operations and maintenance, ensuring rapid response in case of emergencies and guaranteeing the smooth operation of the event.

    Ji Yanqi, an expert from China Unicom’s Heilongjiang branch, highlighted the importance of this technology in enhancing event security and efficiency.

    Furthermore, other advanced technologies such as 5G-A network have been deployed to elevate the event’s overall security capabilities.

    MIL OSI China News

  • MIL-OSI China: Village in eastern China celebrates Start of Spring

    Source: China State Council Information Office 2

    Miaoyuan village in Quzhou city, Zhejiang province, held ritual activities on Monday to celebrate Lichun, or the Start of Spring, the first of the 24 solar terms in the Chinese lunar calendar.

    Children line the temple doorstep in a ritual to mark the Start of Spring in Miaoyuan village, Zhejiang province, on Feb. 3, 2025. [Photo/China.org.cn]
    In the morning, a ritual ceremony was held at a local temple, where villagers presented flower baskets and sacrificial offerings to Goumang, the God of Spring, praying for harvest and prosperity in the coming year.
    During the ceremony, the ritual of Whipping the Spring Ox was conducted on the farmland in front of the temple. A village elder led a plow ox adorned with red flowers on its horns and draped in a red cloth to the field, while a child dressed up as the God of Spring, whipped the ox. It signified the beginning of agricultural activities for the new year.

    The ritual of Whipping the Spring Ox is conducted to mark the Start of Spring in Miaoyuan village, Zhejiang province, on Feb. 3, 2025. [Photo/China.org.cn]
    A cultural exchange activity was held in the temple after the ceremony. Scholars, international guests, and local residents engaged in discussion on intangible cultural heritage and solar term traditions.
    The traditional Chinese solar calendar divides the year into 24 solar terms. In 2016, the 24 Solar Terms was inscribed on the Representative List of the UNESCO Intangible Cultural Heritage of Humanity.

    MIL OSI China News

  • MIL-OSI: Aurora Mobile’s GPTBots.ai Integrates DeepSeek’s Janus-Pro

    Source: GlobeNewswire (MIL-OSI)

    SHENZHEN, China, Feb. 05, 2025 (GLOBE NEWSWIRE) — Aurora Mobile Limited (NASDAQ: JG) (“Aurora Mobile” or the “Company”), a leading provider of customer engagement and marketing technology services in China, today announced that its leading enterprise AI agent platform, GPTBots.ai, has integrated DeepSeek’s Janus-Pro into its ecosystem as an Open Tool, further expanding its comprehensive suite of AI capabilities. This integration follows the recent addition of DeepSeek’s R1 large language model (LLM), reinforcing GPTBots.ai’s position as a leader in delivering cutting-edge AI solutions tailored for enterprises.

    Janus-Pro, part of DeepSeek’s groundbreaking image model family, has set a new benchmark in AI image generation. Known for its hyper-realistic outputs, contextual understanding, and seamless style adaptation, Janus-Pro excels in creating visually stunning and contextually accurate images. It also offers advanced capabilities like multi-modal input processing, enhanced image consistency, and rapid rendering, making it ideal for industries such as marketing, e-commerce, and design. By integrating Janus-Pro as an Open Tool, GPTBots empowers businesses to unlock new creative possibilities while streamlining visual content creation.

    An Extensive Toolkit Empowering Enterprise AI Agents
    GPTBots offers a comprehensive suite of tools designed to enable enterprises to build intelligent AI agents that automate workflows, enhance customer interactions, and optimize operations. These tools are categorized into My Tools (custom-built tools tailored to specific business needs) and Open Tools (pre-configured tools accessible to all users).

    With the addition of Janus-Pro as an Open Tool, GPTBots’ ecosystem now includes a wide range of tools, such as:

    • LinkedIn Tools: LinkedIn Find Company and LinkedIn Find Person for professional networking and lead generation.
    • HubSpot Tools: HubSpot Contacts, HubSpot Company, HubSpot Deals, and HubSpot Tickets for seamless CRM and sales management.
    • DALL-E 3 and CogView: Advanced image generation tools for creative and business applications.
    • Google Search Pro: Enhanced search capabilities for retrieving accurate and actionable information.
    • Google Video: For creating and managing engaging video content.
    • WhatsApp API Message: For efficient customer communication and engagement.
    • EngageLab Email Sender: Automating email campaigns for marketing and customer outreach.

    These tools represent just a fraction of the extensive library of Open Tools available on GPTBots, ensuring businesses have access to the most relevant and impactful solutions for their unique needs.

    Empowering Enterprises with GPTBots.ai

    GPTBots is designed to simplify AI adoption for businesses, offering a no-code/low-code platform that enables users to deploy AI agents quickly and effectively. With features like enterprise-grade SLA guarantees, role-based access control, and seamless integration with popular business systems, GPTBots ensures businesses can focus on achieving their goals without worrying about technical complexities.

    By combining tools like Janus-Pro, LinkedIn, HubSpot, and Google Video, GPTBots provides enterprises with a unified platform to automate workflows, enhance customer experiences, and drive growth. Whether it’s creating high-quality visual content, managing customer relationships, or optimizing marketing strategies, GPTBots empowers businesses to achieve more with less effort.

    About GPTBots.ai

    GPTBots.ai is a complementary general-purpose LLM AI bot featuring private data input and continuous fine-tuning, which can replace ‘rule-based’ chatbots, improve user experience, and reduce costs. GPTBots.ai aims to provide users with an end-to-end business platform that can seamlessly integrate robots into existing applications and workflows via plug-ins. GPTBots.ai also allow users to have great access to, and more efficiently and effectively using, AIGC to improve overall corporate productivity and output quality.

    To know more, please visit https://www.gptbots.ai.

    About Aurora Mobile Limited

    Founded in 2011, Aurora Mobile (NASDAQ: JG) is a leading provider of customer engagement and marketing technology services in China. Since its inception, Aurora Mobile has focused on providing stable and efficient messaging services to enterprises and has grown to be a leading mobile messaging service provider with its first-mover advantage. With the increasing demand for customer reach and marketing growth, Aurora Mobile has developed forward-looking solutions such as Cloud Messaging and Cloud Marketing to help enterprises achieve omnichannel customer reach and interaction, as well as artificial intelligence and big data-driven marketing technology solutions to help enterprises’ digital transformation.

    For more information, please visit https://ir.jiguang.cn/.

    Safe Harbor Statement

    This announcement contains forward-looking statements. These statements are made under the “safe harbor” provisions of the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as “will,” “expects,” “anticipates,” “future,” “intends,” “plans,” “believes,” “estimates,” “confident” and similar statements. Among other things, the Business Outlook and quotations from management in this announcement, as well as Aurora Mobile’s strategic and operational plans, contain forward-looking statements. Aurora Mobile may also make written or oral forward-looking statements in its reports to the U.S. Securities and Exchange Commission, in its annual report to shareholders, in press releases and other written materials and in oral statements made by its officers, directors or employees to third parties. Statements that are not historical facts, including but not limited to statements about Aurora Mobile’s beliefs and expectations, are forward-looking statements. Forward-looking statements involve inherent risks and uncertainties. A number of factors could cause actual results to differ materially from those contained in any forward-looking statement, including but not limited to the following: Aurora Mobile’s strategies; Aurora Mobile’s future business development, financial condition and results of operations; Aurora Mobile’s ability to attract and retain customers; its ability to develop and effectively market data solutions, and penetrate the existing market for developer services; its ability to transition to the new advertising-driven SAAS business model; its ability to maintain or enhance its brand; the competition with current or future competitors; its ability to continue to gain access to mobile data in the future; the laws and regulations relating to data privacy and protection; general economic and business conditions globally and in China and assumptions underlying or related to any of the foregoing. Further information regarding these and other risks is included in the Company’s filings with the Securities and Exchange Commission. All information provided in this press release and in the attachments is as of the date of the press release, and Aurora Mobile undertakes no duty to update such information, except as required under applicable law.

    For more information, please contact:

    Aurora Mobile Limited
    E-mail: ir@jiguang.cn

    Christensen

    In China
    Ms. Xiaoyan Su
    Phone: +86-10-5900-1548
    E-mail: Xiaoyan.Su@christensencomms.com

    In U.S.

    Ms. Linda Bergkamp
    Phone: +1-480-614-3004
    Email: linda.bergkamp@christensencomms.com

    The MIL Network

  • MIL-OSI China: Scientists develop new AI model for cyclone forecast

    Source: China State Council Information Office 2

    Chinese scientists have developed a new artificial intelligence (AI) method to forecast the rapid intensification of a tropical cyclone, shedding new light on improving global disaster preparedness.
    Recently, researchers from the Institute of Oceanology at the Chinese Academy of Sciences published this study in the journal, Proceedings of the National Academy of Sciences.
    The rapid intensification of a tropical cyclone, which refers to a dramatic increase in the intensity of a tropical storm over a short period, remains one of the most challenging weather phenomena to forecast because of its unpredictable and destructive nature.
    According to the study, traditional forecasting methods, such as numerical weather prediction and statistical approaches, often fail to consider the complex environmental and structural factors driving rapid intensification. While AI has been explored to improve rapid intensification prediction, most AI techniques have struggled with high false alarm rates and limited reliability.
    To address this issue, the researchers have developed a new AI model that combines satellite, atmospheric and oceanic data. When tested on data from the tropical cyclone periods in the Northwest Pacific between 2020 and 2021, the new method achieved an accuracy of 92.3 percent and reduced false alarms to 8.9 percent.
    The new method improved accuracy by nearly 12 percent compared to existing techniques and boasted a 3-times reduction in false alarms, representing a significant advancement in forecasting, said the study.
    “This study addresses the challenges of low accuracy and high false alarm rates in rapid intensification forecasting,” said Li Xiaofeng, the study’s corresponding author.
    “Our method enhances understanding of these extreme events and supports better defenses against their devastating impacts,” Li added.

    MIL OSI China News

  • MIL-OSI Economics: Take my money: OCR crypto stealers in Google Play and App Store

    Source: Securelist – Kaspersky

    Headline: Take my money: OCR crypto stealers in Google Play and App Store

    In March 2023, researchers at ESET discovered malware implants embedded into various messaging app mods. Some of these scanned users’ image galleries in search of crypto wallet access recovery phrases. The search employed an OCR model which selected images on the victim’s device to exfiltrate and send to the C2 server. The campaign, which targeted Android and Windows users, saw the malware spread through unofficial sources. In late 2024, we discovered a new malware campaign we dubbed “SparkCat”, whose operators used similar tactics while attacking Android and iOS users through both official and unofficial app stores. Our conclusions in a nutshell:

    • We found Android and iOS apps, some available in Google Play and the App Store, which were embedded with a malicious SDK/framework for stealing recovery phrases for crypto wallets. The infected apps in Google Play had been downloaded more than 242,000 times. This was the first time a stealer had been found in Apple’s App Store.
    • The Android malware module would decrypt and launch an OCR plug-in built with Google’s ML Kit library, and use that to recognize text it found in images inside the gallery. Images that matched keywords received from the C2 were sent to the server. The iOS-specific malicious module had a similar design and also relied on Google’s ML Kit library for OCR.
    • The malware, which we dubbed “SparkCat”, used an unidentified protocol implemented in Rust, a language untypical of mobile apps, to communicate with the C2.
    • Judging by timestamps in malware files and creation dates of configuration files in GitLab repositories, SparkCat has been active since March 2024.

    A malware SDK in Google Play apps

    The first app to arouse our suspicion was a food delivery app in the UAE and Indonesia, named “ComeCome” (APK name: com.bintiger.mall.android), which was available in Google Play at the time of the research, with more than 10,000 downloads.

    The onCreate method in the Application subclass, which is one of the app’s entry points, was overridden in version 2.0.0 (f99252b23f42b9b054b7233930532fcd). This method initializes an SDK component named “Spark”. It was originally obfuscated, so we statically deobfuscated it before analyzing.

    Suspicious SDK being called

    Spark is written in Java. When initialized, it downloads a JSON configuration file from a GitLab URL embedded in the malware body. The JSON is decoded with base64 and then decrypted with AES-128 in CBC mode.

    The config from GitLab being decrypted

    If the SDK fails to retrieve a configuration, the default settings are used.

    We managed to download the following config from GitLab:

    The “http” and “rust” fields contain SDK-specific C2 addresses, and the tfm flag is used to select a C2. With tfm equal to 1, “rust” will be used as the C2, and “http” if tfm has any other value.

    Spark uses POST requests to communicate with the “http” server. It encrypts data with AES-256 in CBC mode before sending and decrypts server responses with AES-128 in CBC mode. In both cases, the keys are hard-coded constants.

    The process of sending data to “rust” consists of three stages:

    • Data is encrypted with AES-256 in CBC mode using the same key as in the case of the “http” server.
    • The malware generates a JSON, where is the data upload path and is the encrypted data from the previous stage.

    • The JSON is sent to the server with the help of the native libmodsvmp.so library via the unidentified protocol over TCP sockets. Written in Rust, the library disguises itself as a popular Android obfuscator.

    Static analysis of the library wasn’t easy, as Rust uses a non-standard calling convention and the file had no function names in it. We managed to reconstruct the interaction pattern after running a dynamic analysis with Frida. Before sending data to the server, the library generates a 32-byte key for the AES-GCM-SIV cipher. With this key, it encrypts the data, pre-compressed with ZSTD. The algorithm’s nonce value is not generated and set to “unique nonce” (sic) in the code.

    Extending the AES key using the hard-coded nonce value

    The AES key is encrypted with RSA and is then also sent to the server. The public key for this RSA encryption is passed when calling a native method from the malicious SDK, in PEM format. The message is padded with 224 random bytes prior to AES key encryption. Upon receiving the request, the attackers’ server decrypts the AES key with a private RSA key, decodes the data it received, and then compresses the response with ZSTD and encrypts it with the AES-GCM-SIV algorithm. After being decrypted in the native library, the server response is passed to the SDK where it undergoes base64 decoding and decryption according to the same principle used for communication with the “http” server. See below for an example of communication between the malware module and the “rust” server.

    An example of communication with the “rust” server

    Once a configuration has been downloaded, Spark decrypts a payload from assets and executes it in a separate thread. It uses XOR with a 16-byte key for a cipher.

    A payload being decrypted

    The payload (c84784a5a0ee6fedc2abe1545f933655) is a wrapper for the TextRecognizer interface in Google’s ML Kit library. It loads different OCR models depending on the system language to recognize Latin, Korean, Chinese or Japanese characters in images. The SDK then uploads device information to /api/e/d/u on the C2 server. The server responds with an object that controls further malware activities. The object is a JSON file, its structure shown below. The uploadSwitch flag allows the malware to keep running (value 1).

    The SDK then registers an application activity lifecycle callback. Whenever the user initiates a chat with the support team, implemented with the legitimate third-party Easemob HelpDesk SDK, the handler requests access to the device’s image gallery. If the pw flag in the aforementioned object is equal to 1, the module will keep requesting access if denied. The reasoning behind the SDK’s request seems sound at first: users may attach images when contacting support.

    The reason given when requesting read access to the gallery

    If access is granted, the SDK runs its main functionality. This starts with sending a request to /api/e/config/rekognition on the C2 and getting parameters for processing OCR results in a response.

    These parameters are used by processor classes that filter images by OCR-recognized words. The malware also requests a list of keywords at /api/e/config/keyword for KeywordsProcessor, which uses these to select images to upload to the C2 server.

    Searching for keywords among OCR image processing results

    Besides KeywordsProcessor, the malware contains two further processors: DictProcessor and WordNumProcessor. The former filters images using localized dictionaries stored decrypted inside rapp.binary in the assets, and the latter filters words by length. The letterMin and letterMax parameters for each process define the permitted range of word length. For DictProcessor, wordlistMatchMin sets a minimum threshold for dictionary word matches in an image. For WordNumProcessor, wordMin and wordMax define the acceptable range for the total number of recognized words. The rs field in the response to the request for registering an infected device controls which processor will be used.

    Images that match the search criteria are downloaded from the device in three steps. First, a request containing the image’s MD5 hash is sent to /api/e/img/uploadedCheck on the C2. Next, the image is uploaded to either Amazon’s cloud storage or to file@/api/res/send on the “rust” server. After that, a link to the image is uploaded to /api/e/img/rekognition on the C2. So, the SDK, designed for analytics as suggested by the package name com.spark.stat, is actually malware that selectively steals gallery content.

    Uploading an image link

    We asked ourselves what kind of images the attackers were looking for. To find out, we requested from the C2 servers a list of keywords for OCR-based search. In each case, we received words in Chinese, Japanese, Korean, English, Czech, French, Italian, Polish and Portuguese. The terms all indicated that the attackers were financially motivated, specifically targeting recovery phrases also known as “mnemonics” that can be used to regain access to cryptocurrency wallets.

    Unfortunately, ComeCome was not the only app we found embedded with malicious content. We discovered a number of additional, unrelated apps covering a variety of subjects. Combined, these apps had been installed over 242,000 times at the time of writing this, and some of them remained accessible on Google Play. A full inventory can be found under the Indicators of Compromise section. We alerted Google to the presence of infected apps in its store.

    Popular apps containing the malicious payload

    Furthermore, our telemetry showed that malicious apps were also being spread through unofficial channels.

    SDK features could vary slightly from app to app. Whereas the malware in ComeCome only requested permissions when the user opened the support chat, in some other cases, launching the core functionality acted as the trigger.

    One small detail…

    As we analyzed the trojanized Android apps, we noticed how the SDK set deviceType to “android” in device information it was sending to the C2, which suggested that a similar Trojan existed for other platforms.

    Collecting information about an infected Android device

    A subsequent investigation uncovered malicious apps in App Store infected with a framework that contained the same Trojan. For instance, ComeCome for iOS was infected in the same way as its Android version. This is the first known case of an app infected with OCR spyware being found in Apple’s official app marketplace.

    The ComeCome page in the App Store

    Negative user feedback about ComeCome

    Malicious frameworks in App Store apps

    We detected a series of apps embedded with a malicious framework in the App Store. We cannot confirm with certainty whether the infection was a result of a supply chain attack or deliberate action by the developers. Some of the apps, such as food delivery services, appeared to be legitimate, whereas others apparently had been built to lure victims. For example, we saw several similar AI-featured “messaging apps” by the same developer:

    Messaging apps in the App Store designed to lure victims

    Besides the malicious framework itself, some of the infected apps contained a modify_gzip.rb script in the root folder. It was apparently used by the developers to embed the framework in the app:

    The contents of modify_gzip.rb

    The framework itself is written in Objective-C and obfuscated with HikariLLVM. In the apps we detected, it had one of three names:

    1. GZIP;
    2. googleappsdk;
    3. stat.

    As with the Android-specific version, the iOS malware utilized the ML Kit interface, which provided access to a Google OCR model trained to recognize text and a Rust library that implemented a custom C2 communication protocol. However, in this case, it was embedded directly into the malicious executable. Unlike the Android version, the iOS framework retained debugging symbols, which allowed us to identify several unique details:

    • The lines reveal the paths on the framework creators’ device where the project was stored, including the user names:
      • /Users/qiongwu/: the project author’s home directory
      • /Users/quiwengjing/: the Rust library creator’s home directory
    • The C2-rust communication module was named im_net_sys. Besides the client, it contains code that the attackers’ server presumably uses to communicate with victims.
    • The project’s original name is GZIP.

    Project details from code lines in the malicious framework

    The framework contains several malicious classes. The following are of particular interest:

    • MMMaker: downloads a configuration and gathers information about the device.
    • ApiMgr: sends device data.
    • PhotoMgr: searches for photos containing keywords on the device and uploads them to the server.
    • MMCore: stores information about the C2 session.
    • MMLocationMgr: collects the current location of the device. It sent no data during our testing, so the exact purpose of this class remained unclear.

    Certain classes, such as MMMaker, could be missing or bear a different name in earlier versions of the framework, but this didn’t change the malware’s core functionality.

    Obfuscation significantly complicates the static analysis of samples, as strings are encrypted and the program’s control flow is obscured. To quickly decrypt the strings of interest, we opted for dynamic analysis. We ran the application under Frida and captured a dump of the _data section where these strings were stored. What caught our attention was the fact that the app bundleID was among the decrypted data:

    com.lc.btdj: the ComeCome bundleID as used in the +[MMCore config] selector

    As it turned out, the framework also stored other app bundle identifiers used in the +[MMCore config] selector. Our takeaways are as follows:

    1. The Trojan can behave differently depending on the app it is running in.
    2. There are more potentially infected apps than we originally thought.

    For the full list of bundle IDs we collected from decrypted strings in various framework samples, see the IoC section. Some of the apps associated with these IDs had been removed from the App Store at the time of the investigation, whereas others were still there and contained malicious code. Some of the IDs on the list referred to apps that did not contain the malicious framework at the time of this investigation.

    As with the Android-specific version, the Trojan implements three modes of filtering OCR output: keywords, word length, and localized dictionaries stored in encrypted form right inside the framework, in a “wordlists” folder. Unfortunately, we were unable to ascertain that the malware indeed made use of the last method. None of the samples we analyzed contained links to the dictionaries or accessed them while running.

    Sending selected photos containing keywords is a key step in the malicious framework’s operation. Similar to the Android app, the Trojan requests permission to access the gallery only when launching the View Controller responsible for displaying the support chat. At the initialization stage, the Trojan, depending on the application it is running in, replaces the viewDidLoad or viewWillAppear method in the relevant controller with its own wrapper that calls the method +[PhotoMgr startTask:]. The latter then checks if the application has access to the gallery and requests it if needed. Next, if access is granted, PhotoMgr searches for photos that match sending criteria among those that are available and have not been processed before.

    The code snippet of the malicious wrapper around the viewDidLoad method that determines which application the Trojan is running in

    Although it took several attempts, we managed to make the app upload a picture to Amazon’s cloud and then send information about it to the attackers’ server. The app was using HTTPS to communicate with the server, not the custom “rust” protocol:

    The communication with the C2 and upload to AWS

    The data being sent looks as follows:

    The oldest version of the malicious framework we were investigating was built on March 15, 2024. While it doesn’t differ significantly from newer versions, this one contains more unencrypted strings, including API endpoints and a single, hardcoded C2 address. Server responses are received in plaintext.

    URLs hard-coded into the oldest version of the malicious framework

    File creation date in the app

    Campaign features

    While analyzing the Android apps, we found that the word processor code contained comments in Chinese. Error descriptions returned by the C2 server in response to malformed requests were also in Chinese. These, along with the name of the framework developer’s home directory which we obtained while analyzing the iOS-specific version suggest that the creator of the malicious module speaks fluent Chinese. That being said, we have insufficient data to attribute the campaign to a known cybercrime gang.

    Our investigation revealed that the attackers were targeting crypto wallet recovery phrases, which were sufficient for gaining full control over a victim’s crypto wallet to steal the funds. It must be noted that the malware is flexible enough to steal not just these phrases but also other sensitive data from the gallery, such as messages or passwords that might have been captured in screenshots. Multiple OCR results processing modes mitigate the effects of model errors that could affect the recognition of access recovery phrase images if only keyword processing were used.

    Our analysis of the malicious Rust code inside the iOS frameworks revealed client code for communicating with the “rust” server and server-side encryption components. This suggests that the attackers’ servers likely also use Rust for protocol handling.

    Server-side private RSA key import

    We believe that this campaign is targeting, at a minimum, Android and iOS users in Europe and Asia, as indicated by the following:

    • The keywords used were in various languages native to those who live in European and Asian countries.
    • The dictionaries inside assets were localized in the same way as the keywords.
    • Some of the apps apparently operate in several countries. Some food delivery apps support signing up with a phone number from the UAE, Kazakhstan, China, Indonesia, Zimbabwe and other countries.

    We suspect that mobile users in other regions besides Europe and Asia may have been targeted by this malicious campaign as well.

    One of the first malicious modules that we started our investigation with was named “Spark”. The bundle ID of the malicious framework itself, “bigCat.GZIPApp”, caught our attention when we analyzed the iOS-specific Trojan. Hence the name, “SparkCat”. The following are some of the characteristics of this malware:

    • Cross-platform compatibility;
    • The use of the Rust programming language, which is rarely found in mobile apps;
    • Official app marketplaces as a propagation vector;
    • Stealth, with C2 domains often mimicking legitimate services and malicious frameworks disguised as system packages;
    • Obfuscation, which hinders analysis and detection.

    Conclusion

    Unfortunately, despite rigorous screening by the official marketplaces and general awareness of OCR-based crypto wallet theft scams, the infected apps still found their way into Google Play and the App Store. What makes this Trojan particularly dangerous is that there’s no indication of a malicious implant hidden within the app. The permissions that it requests may look like they are needed for its core functionality or appear harmless at first glance. The malware also runs quite stealthily. This case once again shatters the myth that iOS is somehow impervious to threats posed by malicious apps targeting Android. Here are some tips that can help you avoid becoming a victim of this malware:

    • If you have one of the infected apps installed on your device, remove it and avoid reinstalling until a fix is released.
    • Avoid storing screenshots with sensitive information, such as crypto wallets recovery phrases, in the gallery. You can store passwords, confidential documents and other sensitive information in special apps.
    • Use a robust security product on all your devices.

    Our security products return the following verdicts when detecting malware associated with this campaign:

    • HEUR:Trojan.IphoneOS.SparkCat.*
    • HEUR:Trojan.AndroidOS.SparkCat.*

    Indicators of compromise

    Infected Android apps
    0ff6a5a204c60ae5e2c919ac39898d4f
    21bf5e05e53c0904b577b9d00588e0e7
    a4a6d233c677deb862d284e1453eeafb
    66b819e02776cb0b0f668d8f4f9a71fd
    f28f4fd4a72f7aab8430f8bc91e8acba
    51cb671292eeea2cb2a9cc35f2913aa3
    00ed27c35b2c53d853fafe71e63339ed
    7ac98ca66ed2f131049a41f4447702cd
    6a49749e64eb735be32544eab5a6452d
    10c9dcabf0a7ed8b8404cd6b56012ae4
    24db4778e905f12f011d13c7fb6cebde
    4ee16c54b6c4299a5dfbc8cf91913ea3
    a8cd933b1cb4a6cae3f486303b8ab20a
    ee714946a8af117338b08550febcd0a9
    0b4ae281936676451407959ec1745d93
    f99252b23f42b9b054b7233930532fcd
    21bf5e05e53c0904b577b9d00588e0e7
    eea5800f12dd841b73e92d15e48b2b71

    iOS framework MD5s:
    35fce37ae2b84a69ceb7bbd51163ca8a
    cd6b80de848893722fa11133cbacd052
    6a9c0474cc5e0b8a9b1e3baed5a26893
    bbcbf5f3119648466c1300c3c51a1c77
    fe175909ac6f3c1cce3bc8161808d8b7
    31ebf99e55617a6ca5ab8e77dfd75456
    02646d3192e3826dd3a71be43d8d2a9e
    1e14de6de709e4bf0e954100f8b4796b
    54ac7ae8ace37904dcd61f74a7ff0d42
    caf92da1d0ff6f8251991d38a840fb4a

    Trojan configuration in GitLab
    hxxps://gitlab[.]com/group6815923/ai/-/raw/main/rel.json
    hxxps://gitlab[.]com/group6815923/kz/-/raw/main/rel.json

    C2
    api.firebaseo[.]com
    api.aliyung[.]com
    api.aliyung[.]org
    uploads.99ai[.]world
    socket.99ai[.]world
    api.googleapps[.]top

    Photo storage
    hxxps://dmbucket102.s3.ap-northeast-1.amazonaws[.]com

    Names of Infected Android APKs from Google Play
    com.crownplay.vanity.address
    com.atvnewsonline.app
    com.bintiger.mall.android
    com.websea.exchange
    org.safew.messenger
    org.safew.messenger.store
    com.tonghui.paybank
    com.bs.feifubao
    com.sapp.chatai
    com.sapp.starcoin

    BundleIDs encrypted inside the iOS frameworks
    im.pop.app.iOS.Messenger
    com.hkatv.ios
    com.atvnewsonline.app
    io.zorixchange
    com.yykc.vpnjsq
    com.llyy.au
    com.star.har91vnlive
    com.jhgj.jinhulalaab
    com.qingwa.qingwa888lalaaa
    com.blockchain.uttool
    com.wukongwaimai.client
    com.unicornsoft.unicornhttpsforios
    staffs.mil.CoinPark
    com.lc.btdj
    com.baijia.waimai
    com.ctc.jirepaidui
    com.ai.gbet
    app.nicegram
    com.blockchain.ogiut
    com.blockchain.98ut
    com.dream.towncn
    com.mjb.Hardwood.Test
    com.galaxy666888.ios
    njiujiu.vpntest
    com.qqt.jykj
    com.ai.sport
    com.feidu.pay
    app.ikun277.test
    com.usdtone.usdtoneApp2
    com.cgapp2.wallet0
    com.bbydqb
    com.yz.Byteswap.native
    jiujiu.vpntest
    com.wetink.chat
    com.websea.exchange
    com.customize.authenticator
    im.token.app
    com.mjb.WorldMiner.new
    com.kh-super.ios.superapp
    com.thedgptai.event
    com.yz.Eternal.new
    xyz.starohm.chat
    com.crownplay.luckyaddress1

    MIL OSI Economics

  • MIL-OSI China: Announcement on Open Market Operations No.21 [2025]

    Source: Peoples Bank of China

    Announcement on Open Market Operations No.21 [2025]

    (Open Market Operations Office, February 5, 2025)

    In order to offset the impact of factors such as the concentrated maturity of reverse repo operations, thereby keeping liquidity adequate in the banking system, the People’s Bank of China conducted reverse repo operations in the amount of RMB697 billion through quantity bidding at a fixed interest rate on February 5, 2025.

    Details of the Reverse Repo Operations

    Maturity

    Volume

    Rate

    7 days

    RMB697 billion

    1.50%

    Date of last update Nov. 29 2018

    2025年02月05日

    MIL OSI China News

  • MIL-OSI China: ‘Ne Zha’ sequel sets box office record for Chinese animation

    Source: China State Council Information Office 3

    A poster for “Ne Zha 2.” [Image courtesy of Coloroom Pictures]

    Fantasy feature “Ne Zha 2” has become the top-grossing domestic animated feature of all time in a milestone for Chinese cinema.

    As of Wednesday, “Ne Zha 2,” has earned over 5.05 billion yuan (about 705 million U.S. dollars) since it premiered just eight days ago on Jan. 29, according to data from ticketing app Beacon.

    It is remarkable that the previous high was set by the same film series, with the first “Ne Zha” installation raking in nearly 5.04 billion yuan in 2019.

    As ticket sales continue to climb, the sequel could reach a total box office revenue of 6 billion yuan, which would be a record for Chinese film, Beacon projects.

    The franchise takes its name from a mythological character in the Ming Dynasty (1368-1644) novel “Fengshen Yanyi,” or “The Investiture of the Gods.” This character, Ne Zha, is also depicted as a demon-slaying hero in the 16th-century Chinese classic “Journey to the West.”

    While rooted in Chinese mythology, “Ne Zha 2” — directed by Yang Yu, who goes by the nickname Jiaozi — takes bold creative strides by focusing on Ne Zha’s struggles and growth.

    The film reimagines classic elements of Chinese mythology, preserving cultural authenticity while offering fresh interpretations with themes such as personal identity, self-fulfillment, family and friendship, which resonate widely with audiences and evoke a strong sense of empathy.

    “As I was watching, I burst out in both laughter and tears. It’s hilarious at the beginning, but deeply touching when the mother and son are separated,” said Zhang Bohan, a film enthusiast from Beijing, commenting on “Ne Zha 2.”

    The visuals of “Ne Zha 2” surpass the film’s predecessor, with over 1,900 special effects shots offering an even more immersive cinematic experience. Ne Zha’s costumes, Taiyi Zhenren’s magical artifacts, the architecture of the underwater Dragon Palace, and the scene design of Kunlun Wonderland — every detail of the film highlights the unique charm of traditional Chinese culture.

    Impressing audiences with its stunning visuals and engaging storyline, “Ne Zha 2” is rated above 95 percent of animations on Douban, a popular Chinese film review platform.

    The film’s domestic box office success has further fueled expectations for its overseas performance, thanks to its fusion of traditional Chinese culture, cutting-edge special effects and modern values.

    According to its overseas release schedule, “Ne Zha 2” will be screened in countries such as the United States, Canada, Australia, New Zealand, South Africa, Egypt, Singapore, Japan and the Republic of Korea.

    Gou Qiangshi, an associate professor at Chengdu University’s College of Chinese & ASEAN Arts, has noted that Chinese literary classics are a major source of inspiration for domestic animated films. The key to bringing new life to these classics is their creative adaptation to align with contemporary narrative arts.

    In recent years, domestic animated films that celebrate traditional Chinese culture have received increased attention, entering a period of rapid development. Films like “Chang’an,” “White Snake” and “Ne Zha” have sparked widespread interest, leading a fresh wave of cinema trends. 

    MIL OSI China News

  • MIL-OSI China: Chinese post growing interest in ice, snow fun as life gets better: experts

    Source: People’s Republic of China – State Council News

    BEIJING, Feb. 5 — Ice and snow have become an essential element in the Chinese people’s quest for a more fulfilling life, driven by a booming winter tourism sector, experts noted during a recent economic roundtable.

    The growth of ice and snow tourism has transformed how Chinese people perceive and experience winter, according to Dai Bin, president of the China Tourism Academy, who shared his views during the latest episode of the China Economic Roundtable, an all-media talk show hosted by Xinhua News Agency.

    In the past, particularly in northeast China, where bitter winter temperatures are the norm, people tended to stay indoors during the cold months. However, a noticeable shift is occurring as more people now embrace outdoor activities during winter. Many people are flocking to Harbin, the capital of China’s northernmost province of Heilongjiang, which is renowned for its abundant snowfall and stunning ice sculptures, to immerse themselves in the icy atmosphere.

    Research by the tourism academy projects that over 500 million people will participate in ice and snow tourism during the peak season in 2024-2025, driving consumption by more than 600 billion yuan (about 83.7 billion U.S. dollars), said Dai.

    The passion for ice and snow sports has also ignited, noted Ai Yu, an official with the General Administration of Sport of China. The scope of people participating in winter sports has extended beyond traditional northern regions; additionally, winter sports have now shifted from winter-only activities to year-round offerings that are accessible both indoors and outdoors, Ai highlighted.

    Regions with rare snowfall are also capitalizing on the trend, as winter wonderlands created by artificial snow are popping up in southern China to meet growing demand, Dai added.

    China aims to boost its ice and snow economy as a new growth sector, targeting an economic scale of 1.2 trillion yuan by 2027 and 1.5 trillion yuan by 2030, according to guidelines issued by the General Office of the State Council in November 2024.

    The annual Central Economic Work Conference, held in December last year, also called for active efforts to develop the country’s ice and snow economy.

    MIL OSI China News

  • MIL-OSI China: Xi Jinping and his four-decade bond with Iowan friends

    Source: People’s Republic of China – State Council News

    BEIJING, Feb. 5 — China and the United States, sharing extensive common interests and broad space for cooperation, can become partners and friends.

    This goodwill message, along with Chinese New Year greetings, was sent by Chinese President Xi Jinping to his friends in the U.S. state of Iowa ahead of this year’s Spring Festival.

    He was replying to 58 Iowans who sent him a greeting card and recalled in it the Chinese leader’s first visit to Iowa in 1985. Among them are Xi’s longtime friends Luca Berrone, Gary Dvorchak and Sarah Lande.

    Nearly four decades ago, Xi traveled to the United States for the first time. During that visit, he met these ordinary Americans. Since then, a special bond has been formed that lasts to this day.

    CURIOUS YOUNG MAN

    In the spring of 1985, Xi, then an official of Zhengding County, Hebei Province, led a five-member delegation to Iowa, known as “the world’s food capital,” to learn about crop production and livestock farming.

    During the visit, he spent three days in Muscatine, a city in rural eastern Iowa along the Mississippi River, where he stayed with local hosts Thomas and Eleanor Dvorchak. The homestay left a lasting impression.

    Recalling the trip decades later, Xi said he still remembered where he stayed: 2911 Bonnie Drive. “That was my first face-to-face contact with the Americans,” Xi said. “The days I spent with them are unforgettable.”

    Xi and his delegation were warmly received in Muscatine. “On our first night, our hostess asked what time we would wake up the next morning and what we would like to eat,” recalled Xia Wenyi, the delegation’s translator.

    Xi responded that he was happy to eat whatever the family typically had. According to Xia’s recollection, Xi said, “We want to experience and understand the daily life of an everyday American family.”

    Hostess Eleanor prepared a big breakfast with coffee and tea every day during Xi’s stay. Xi slept in the Star Trek-themed bedroom belonging to the Dvorchaks’ son, Gary, who was then away at university.

    “Everything, no matter what, was very acceptable to him — he was humble,” Eleanor recounted.

    Xi’s visit came after China and the United States had spent years working to restore relations in the late 1970s. In 1983, then Iowa Governor Terry Branstad signed a sister-state agreement with Hebei and led a 50-member delegation to the provincial capital of Shijiazhuang in 1984, which, as he recalled, led to Xi’s trip in 1985.

    “We wanted to treat them as we were treated in Hebei. So we went all out,” recalled Branstad, who served as U.S. ambassador to China from 2017 to 2020.

    Xi’s itinerary in Muscatine included tours to farms and food processing plants, interviews with local media, a “Welcome to Muscatine” luncheon and a boat excursion on the Mississippi River.

    It was Xi’s first sighting of the Mississippi River. “When I was young, I had read the novels of Mark Twain, and I had long wanted to see for myself the picturesque scenery of the Mississippi,” Xi said when he revisited Iowa back in 2012.

    “He was curious about everything and asked questions about everything,” recalled Sarah Lande, one of the Muscatine tour coordinators. Local newspaper Muscatine Journal also reported on how Xi engaged with residents, answering “a variety of questions about China and its people.” Xi was also given a key to the city.

    In 2023, reminiscing about this experience, Xi said, “I have found that although our two countries are different in history, culture and social system and have embarked on different development paths, our two peoples are both kind, friendly, hardworking and down-to-earth.”

    LASTING CONNECTIONS

    Xi has said on several occasions that the foundation of China-U.S. relations was laid by the people of both sides. Xi has stayed in touch with old friends in Iowa through reunions, letters and shared memories.

    In 2012, Xi visited Iowa once again as China’s vice president. He made sure to add Muscatine to his jam-packed itinerary so he could reunite with the old friends. They chatted over tea at Lande’s home, gathering around a couch in the living room. Their hour-long meeting was filled with laughter.

    Thomas and Eleanor Dvorchak, who had moved to Florida, made a special trip back. Xi recognized the couple the moment he saw them and shared his memories of his stay at the Dvorchaks.

    “You were the first group of Americans I came into contact with,” Xi told his Iowa friends. “To me, you are America.”

    Lande compiled their stories into a memoir titled Old Friends: The Xi Jinping-Iowa Story, which was published in 2018. Upon learning about Lande’s book project, Xi sent some of his own photos.

    Another reunion of these old friends occurred in 2023 when Xi visited San Francisco for the APEC leaders’ meeting. When Xi saw Gary, son of the Dvorchaks, he said, “I stayed in your room and remember the sweatshirts and ball gear there.”

    “There was genuine happiness, so you could see the smile on his face. He was really enjoying it,” Gary said of the reunion.

    Gary first met Xi in person in 2015 when the Chinese president hosted the Dvorchak family for a private dinner in Beijing. During the gathering, Gary’s parents presented Xi with a photo album titled “Commemorating 30 Years of Friendship,” featuring photos from 1985 and 2012.

    When Gary’s father, Thomas Dvorchak, passed away in 2024, Xi conveyed his condolences, expressing that he had always valued the genuine friendship.

    The Dvorchaks’ Iowa home, where Xi once stayed, has been turned into a museum and renamed the Sino-U.S. Friendship House. Gary noted that visitors can appreciate how much the friendship has grown over the years.

    “For America and China to be friends as countries, it is important for people to understand each other,” he said.

    THE YOUTH AND TOMORROW

    For the Chinese leader, the future of China-U.S. relations depends on the youth. For years, Xi has worked to foster friendly exchanges between young people in China and the United States.

    During his 2023 visit to San Francisco, Xi announced an initiative to invite 50,000 young Americans to China for exchange and study programs over a five-year span.

    Shortly after, Lande, who maintained correspondence with Xi, wrote to him, expressing hope that Muscatine High School students could join the program.

    With Xi’s support, over 20 Muscatine students visited Beijing, Shanghai, Hebei and other places in China in January 2024, becoming the first group of American students to participate in the program.

    After their visit, the students, delighted by their experiences, wrote a letter to Xi. In a reply, Xi told them he felt happy for them. He encouraged more young Americans to visit China to get a first-hand experience of the real China and foster genuine friendships with their Chinese counterparts.

    In April, another group of Muscatine students arrived in Hebei. They made a special trip to Zhengding County to visit the place where Xi once worked.

    Lucas Berrone, board of directors of Iowa Sister States, escorted the students on the trip. Berrone met Xi in 1985. He mapped out a two-week itinerary for Xi’s first Iowa tour and spent hours driving the delegation to farms and plants. Their friendship has endured over the decades.

    Berrone sees these exchange trips as an opportunity to introduce a new generation to the friendship between China and the United States. He is hopeful about “passing the torch” to the younger generation.

    Joseph McNeely, a student from Muscatine who traveled to China thanks to the exchange program, expressed his gratitude to Berrone: “Thank you for continuing the friendship between you and President Xi and for helping this trip come to light.”

    McNeely made some Chinese friends from Shijiazhuang Foreign Language School during the trip. As a symbol of friendship, they planted a tree in Hebei.

    This year, during the Chinese Spring Festival, Berrone hosted Chinese students from Shijiazhuang Foreign Language School in Iowa. The students were on vacation, touring the United States and making new friends in Muscatine.

    As he had many times before, Berrone shared his story of hosting Xi and other Chinese delegates in Iowa 40 years ago. “Their stay, even though brief, made the connection with the families opening up their homes and their hearts.”

    “That connection was the first building brick of a relationship that has lasted 40 years and continues to grow as a wonderful friendship and an inspiring story for relations between China and the United States,” Berrone added.

    MIL OSI China News

  • MIL-OSI China: Spanish potter shapes fusion of Eastern and Western art in China’s ‘porcelain capital’

    Source: China State Council Information Office 3

    This photo taken on May 1, 2023 shows a view of the Taoxichuan Ceramic Art Avenue at night in Jingdezhen, east China’s Jiangxi Province. (Xinhua)

    In the quiet of winter, the cherry trees in the courtyard have withered, yet the fruits continue to flourish in the porcelain works of Spanish ceramic artist Jaume Ribalta.

    The 32-year-old artist, who has spent the past three years wandering through Jingdezhen, dubbed China’s “porcelain capital”, in Jiangxi Province, draws inspiration from his surroundings to craft pieces that seamlessly blend nature with artistry.

    Ribalta settled in Xianghu Village, a hub for ceramic artists in Jingdezhen, where he established his studio and now feels at home, deeply immersed in the rhythms of rural Chinese life.

    Amid the Spring Festival aura, Ribalta’s studio courtyard hums with festive energy, as red lanterns sway among the greenery, festive paintings adorn the doors, and traditional decorations like spring couplets and Chinese knots complete the scene, marking a joyful celebration of the season.

    “Over the years, I’ve created a Zodiac series of teacups, each featuring a different Chinese zodiac animal in my designs. Last year it was the dragon, and this year it’s the snake,” he explains. “I’ve grown to love this traditional Chinese cultural element and have continued to incorporate it into my work.”

    His studio is filled with Chinese elements — antique furniture, a portrait of Confucius, and traditional ink landscape paintings — each detail reflecting Ribalta’s deep appreciation for Chinese culture.

    “I learned Chinese painting from books, with masters like Qi Baishi serving as my ‘teachers,’” he said. Beyond this, Ribalta has expertly fused his Spanish heritage with Chinese artistry, drawing inspiration from the black-and-white ceramic designs of his hometown, Barcelona. He employs traditional blue-and-white porcelain techniques to craft distinctive works that seamlessly blend Eastern and Western artistic styles.

    Jingdezhen’s history of ceramics spans over 2,000 years, and its role as an official and royal kiln elevated its porcelain-making techniques to the highest level in history. Driven by a passion for ceramics, thousands of foreign artists have migrated to Jingdezhen, a city with a population of less than 900,000, in recent years. During the peak period, there was one foreigner among every six migrants.

    The open, inclusive and eclectic creative environment of Jingdezhen has allowed foreign drifters like Ribalta, despite initial language barriers, to quickly adapt to local life. For him, Jingdezhen is a vast cultural heritage, where every corner offers fertile ground for ceramic artistry.

    In addition to the many ceramic studios nearby, Ribalta said another reason he was drawn to this particular village is its proximity to Jingdezhen Ceramic University.

    “Engaging in conversations with young ceramic artists and students, exploring how to blend tradition with innovation, is key to keeping my inspiration alive,” he said.

    For Ribalta, Jingdezhen was the obvious choice for his ceramic art, as the city is like “an art utopia,” boasting an omnipresent artistic atmosphere and a warm, free-spirited environment. However, creating individual ceramic pieces is not his sole ambition. He said that his goal for the year 2025 is to create a cultural landmark for the village.

    He pulled up his design concept on his phone, explaining how blue-and-white porcelain could move beyond its traditional role as vessels and be repurposed as striking wall decorations.

    “In Spain and Portugal, ceramics are often used in architectural decoration,” he said. “China has many exquisite, large blue-and-white porcelain vases, but their application in architectural settings is relatively rare. I hope to integrate ceramics into architecture in a public space someday, creating a monumental scene that blends Chinese and Western cultures with my own hands.”

    MIL OSI China News