Category: Crime

  • MIL-OSI Security: Silver Spring Man Pleads Guilty to “Sextortion” of More Than 100 Minors Located Throughout the United States and Abroad

    Source: Office of United States Attorneys

    Greenbelt, Maryland – Chase William Mulligan, 28, of Silver Spring, Maryland, pled guilty to two counts of producing child sexual abuse material in federal court. The charges are in connection with a scheme in which he met young girls through social media and internet chat rooms and eventually “sextorted” them.

    Specifically, through the scheme, Mulligan coerced at least 108 girls — ranging from ages 5-17 — to send him sexually explicit photographs and videos of themselves. When the girls told him they no longer wanted to send him sexually graphic images, Mulligan threatened to post the images online or come to their house.

    Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the guilty plea with Special Agent in Charge William J. DelBagno of the Federal Bureau of Investigation (FBI) – Baltimore Field Office.

    “Mulligan used manipulation, fear, and intimidation to exploit over 100 young victims. Now we must ensure that we send a clear message to Mulligan, and others, that those who abuse the most vulnerable members of our communities will pay a steep price,” Hayes said. “We’re committed to working with our law-enforcement partners to relentlessly pursue, prosecute, and bring to justice those who engage in these deplorable acts.”

    “Chase Mulligan is a depraved and dangerous predator. He used social media to target, viciously threaten, and horribly abuse more than 100 minor victims – one as young as five years old,” DelBagno said. “His abhorrent behavior is not diminished by the fact he was thousands of miles away and never met his victims, rather, it’s the opposite. Despite his distance, he presents a serious threat to any child he can access through the internet. The FBI works diligently every day to find and arrest predators like Mulligan so they can no longer prey on innocent children.”

    As detailed in the plea agreement, between at least 2019 and December 2023, Mulligan used numerous Snapchat, Discord, Roblox, Skype, Omegle, and Instagram accounts to target young girls. He convinced minors living in the United States, Canada, Denmark, Spain, Philippines, Australia, and United Kingdom to produce and send him sexually explicit images.

    Mulligan also directed minors to expose their genital areas and engage in sexual conduct. Additionally, Mulligan coerced multiple girls to urinate on camera, insert objects into their genitalia, and participate in sexual acts with dogs.

    After some victims informed Mulligan that they no longer wished to send him sexually explicit images, he threatened to publicly post the images or come to their homes. Mulligan wanted the victims to send more images depicting increasingly graphic sexual conduct.

    As part of his plea agreement, Mulligan must register as a sex offender in places where he resides, is an employee, and is a student, under the Sex Offender Registration and Notification Act.

    Mulligan is facing a mandatory minimum of 15 years and a statutory maximum of 60 years in federal prison.  U.S. District Judge Theodore C. Chuang scheduled sentencing for Wednesday, August 27, at 2:30 p.m.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by the United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims.  For more information about Project Safe Childhood, visit www.justice.gov/psc. Click the “Resources” tab on the left side of the page to learn about Internet safety education.

    U.S. Attorney Hayes commended the FBI for its work in the investigation. Ms. Hayes also thanked Assistant U.S. Attorneys Megan S. McKoy and Elizabeth Wright who are prosecuting the case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, please visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Mission Woman Sentenced to Federal Prison for Larceny and Failure to Appear

    Source: Office of United States Attorneys

    PIERRE – United States Attorney Alison J. Ramsdell announced today that U.S. District Judge Eric C. Schulte has sentenced a Mission, South Dakota woman convicted of Larceny and Failure to Appear. The sentencing took place on May 19, 2025.

    Kylie Leader Charge, age 19, was sentenced to eight months in federal prison, followed by three years of supervised release. Leader Charge was further ordered to pay a $200 special assessment to the Federal Crime Victims Fund and $1,000 in restitution.

    Leader Charge was indicted by a federal grand jury in February 2024. She pleaded guilty on February 20, 2025.

    The conviction for Larceny stemmed from an incident that occurred in November of 2023, within the Rosebud Sioux Indian Reservation, when Leader Charge and a co-defendant stole a vehicle near Mission, drove it in a reckless manner, and caused damage to the vehicle.

    Following her Indictment, Leader Charge was released on bond. On March 21, 2024, Leader Charge failed to appear for a bail review hearing as required by her bond conditions. She was subsequently indicted for Failure to Appear.

    These matters were prosecuted by the U.S. Attorney’s Office because the Major Crimes Act, a federal statute, mandates that certain violent crimes alleged to have occurred in Indian Country be prosecuted in Federal court as opposed to State court.

    These cases were investigated by the Rosebud Sioux Tribe Law Enforcement Services and the United States Marshals Service. Assistant U.S. Attorney Meghan N. Dilges prosecuted the cases.

    Leader Charge was immediately remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI USA: Grassley, Klobuchar Lead Bipartisan Resolution Calling for Return of Kidnapped Ukrainian Children

    US Senate News:

    Source: United States Senator for Minnesota Amy Klobuchar

    WASHINGTON – Senators Amy Klobuchar (D-MN) and Chuck Grassley (R-IA) led a bipartisan group of senators in introducing a resolution calling for the return of abducted Ukrainian children before finalizing any peace agreement to end Russia’s brutal invasion of Ukraine. 

    The resolution condemns Russia’s abduction and forcible transfer of Ukrainian children and notes Russia’s invasion has increasingly exposed children to human trafficking and exploitation, child labor, sexual violence, hunger, injury, trauma and death. 

    “The mass kidnapping of Ukrainian children by Russia is an atrocity,” said Klobuchar. “We cannot accept a world where children are abducted during wartime and used as a form of hostage-taking for negotiations. These children must be returned unconditionally before any peace deal is finalized.”

    “Putin’s inhumane and unprovoked attack on Ukraine started the largest war in Europe since World War II. He has kidnapped thousands of children to brainwash and Russify them in an attempt to destroy their cultural identity and heritage. The United States ought to demand these children are returned before inking a deal to end the war in Ukraine,” Grassley said. 

    Additional cosponsors of the resolution include Senators Joni Ernst (R-IA), Dick Durbin (D-IL), and John Fetterman (D-PA), Roger Wicker (R-MS) and Rick Scott (R-FL). You can find the full text of the resolution here.

    This resolution follows a bipartisan letter sent in March, led by Senators Klobuchar, Grassley and Durbin, calling for the State Department to continue supporting efforts to investigate Russia’s abduction and deportation of Ukrainian children.

    To date, Ukrainian authorities have received at least 19,546 confirmed reports of unlawful deportations and forced transfers of Ukrainian children to Russia, Belarus or Russian-occupied Ukrainian territory. The abductions aim to erase the children’s Ukrainian names, language and identity. As of April 16, Ukraine and its partners have only managed to return 1,274 abducted children. 

    The State Department’s 2024 Trafficking in Persons Report found Russia recruits or uses child soldiers, has a state-sponsored policy or pattern of human trafficking and is among the worst hubs for human trafficking in the world. 

    MIL OSI USA News

  • MIL-OSI Security: Missouri Registered Sex Offender Charged with Distributing and Receiving Child Pornography

    Source: Federal Bureau of Investigation FBI Crime News (b)

    KANSAS CITY, Mo. – A Kansas City, Mo., man was indicted by a federal grand jury on charges related to child pornography.

    According to an indictment returned this week, Jeffrey Lynn Petrie, 40, of Kansas City, Mo., was charged with one count of distributing child pornography over the internet in May 2024, and one count of receiving child pornography from Dec. 9, 2024, to Dec. 10, 2024.

    The indictment replaces a complaint originally filed on Friday, April 25, 2025. According to an affidavit filed in support of the criminal complaint, law enforcement officers received a Cybertip reporting that a user, “kinkypopper69,” was uploading video files depicting child sexual abuse materials. Petrie was later identified as the user “kinkypopper69.”

    On April 24, 2025, the FBI conducted a search at Petrie’s residence and seized a cell phone and other electronic devices.

    Petrie is a registered sex offender in Missouri based on prior convictions for child molestation in the 2nd degree.

    The charges contained in this indictment are simply accusations, and not evidence of guilt. Evidence supporting the charges must be presented to a federal trial jury, whose duty is to determine guilt or innocence.

    Under federal statutes, if convicted of distribution and receipt of child pornography, a prison sentence of not less than 15 years and not more than 40 years and a fine of up to $250,000 is authorized on each count. The maximum statutory sentence is prescribed by Congress and is provided here for informational purposes, as the sentencing of the defendant will be determined by the court based on the advisory sentencing guidelines and other statutory factors. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

    This case is being prosecuted by Assistant U.S. Attorney Teresa A. Moore. This case was investigated by the Federal Bureau of Investigation, and the Franklin County, Missouri Sheriff’s Office.

    Project Safe Childhood

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc. For more information about Internet safety education, please visit www.usdoj.gov/psc and click on the tab “resources.”

    MIL Security OSI

  • MIL-OSI Security: Shiprock Man Charged with Assault in Shooting

    Source: Federal Bureau of Investigation FBI Crime News (b)

    ALBUQUERQUE – A Shiprock man has been charged with assault with a dangerous weapon following a shooting incident outside a restaurant.

    According to court documents, Navajo Nation Police responded to a 911 call reporting that an individual was shot in the hand in front of the Little Caesars Restaurant in Shiprock. Officers located the suspect, identified as Terrold Tyler, 35, an enrolled member of the Navajo Nation, near the scene carrying a black backpack that contained a homemade firearm and five live shotgun shells. Tyler was detained without incident.

    Investigators determined that Tyler and the victim were involved in an argument behind the restaurant prior to the shooting. Tyler allegedly produced the homemade shotgun and shot the victim in the left hand. Paramedics responded to the scene, but the victim declined medical treatment.  A social media video depicting Tyler with the firearm was also recovered as evidence.

    Tyler is charged with assault with a dangerous weapon and will remain in custody pending trial, which has not yet been scheduled. If convicted of the current charges, Tyler faces up to 10 years in prison.

    U.S. Attorney Ryan Ellison and Philip Russell, Acting Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office made the announcement today.

    The Farmington Resident Agency of the Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Navajo Nation Police Department and Navajo Department of Criminal Investigations. Assistant U.S. Attorney Amy Mondragon is prosecuting the case.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Africa: Government programmes do empower inmates – Minister Groenewald

    Source: South Africa News Agency

    Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.

    “Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said. 

    The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.

    The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes. 

    These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society.
    The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria. 

    This as the international community also celebrated the 10th anniversary of the rules. 

    The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected. 

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.

    In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration. 

    “In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.

    He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025. 

    The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”

    The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.

    “Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained. 

    He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.

    “We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.” 

    He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI United Kingdom: Waste packaging company director pays high price in data fraud

    Source: United Kingdom – Executive Government & Departments

    News story

    Waste packaging company director pays high price in data fraud

    A Birmingham-based director and his company has been ordered to pay a Proceeds of Crime confiscation order, fines and costs totalling £476,995. 

    An officer on inspection duty. Please note the photo is an example of EA’s work not directly from this case.

    This follows an Environment Agency investigation into fraudulent entry of waste packaging data.

    At Birmingham Crown Court on Friday 16 May 2025, Shaobo Qin, a director of EDU Case Ltd, pleaded guilty to fraud by false representation. He was given a 2 year prison sentence suspended for 18 months.

    Qin, age 42, of Sutton Coldfield, West Midlands, was also ordered to pay a Proceeds of Crime confiscation order of £255,057. He must pay within 2 months or face 3 years in prison.

    He was also disqualified as a director for 4 years and ordered to do 200 hours of unpaid work.

    His company, EDU Case Ltd of Portway Road, Rowley Regis, was fined £200,000. The Environment Agency were also awarded £21,995 in investigation costs.

    The court was told Qin’s company was a plastics and recycling exports enterprise.  The offences were discovered by the Environment Agency towards the end of 2022.

    The company, orchestrated by Qin, was deliberately and systematically entering false data on to the Environment Agency’s National Packaging Waste Database (NPWD) for non-existent waste exports.

    This resulted in Qin receiving a benefit for himself and his company in the sum of approx. £255,000. He was arrested on Wednesday 10 January 2024 where he was interviewed by Environment Agency officers.

    EDU Case were accredited to carry out plastic packaging exports and able to issue “evidence” of that activity in the form of tonnage figures on the database.

    This evidence could be bought by businesses who are obliged to account for their plastic packaging waste under the Producer Responsibility Obligations (Packaging Waste) Regulations 2007.

    An audit conducted by Environment Agency officers in 2023 and information following that work identified discrepancies between the amount of waste exported and the amount of evidence issued. 

    The false entries represented nearly two-thirds of the business’ entire trade in 2022 towards the end of that year.

    As part of that audit, a legal notice was served on Qin and the company in September 2023.

    This notice required the production of their evidence of plastic waste exports.  In response, Qin sent a computer memory stick containing his business’ waste export evidence and a letter explaining a large discrepancy, described as an “overclaim.”

    The letter stated that the company had carried out 1,239 metric tonnes of plastic waste exports in 2022, only 453.60 metric was genuine and that the majority of his trading, 785.40 metric tonnes  was ‘a mistake.’

    In sentencing the judge said this was without doubt deliberate offending and pre-planned. There had been a significant undermining of the regulatory regime. 

    He accepted that there had been a guilty plea entered at first opportunity and that money had been put aside to repay the financial benefit made. The company was also fined to mark the seriousness of the offending.

    Sham Singh, Senior Environmental Crime Officer for the Environment Agency, said:

    “This case shows that the Environment Agency will pursue individuals and their enterprises who profit illegally.

    “This was a fraud on a large scale and undermines legitimate business and the investment and economic growth that go with it.

    “We support legitimate businesses and are proactively supporting them by disrupting and stopping the criminal element backed up by the threat of tough enforcement as in this case.

    “If anyone suspects that a company is doing something wrong, please contact the Environment Agency on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”

    The Charges

    Shaobo Qin

    Between 1st January 2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that he claimed EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    EDU Case UK Limited (Company No. 08888722)

    Between 1st January  2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    Background Information

    The Packaging Producer Responsibility Regulations were introduced to oblige the producers of waste packaging such as plastic, glass and cardboard (e.g. supermarkets) to contribute towards the financial cost of recycling and the disposal of waste. Any large organisation that meets the criteria for this obligation is required to prove they have made such financial contributions by the purchasing of credits known as Packaging Recovery Notes (PRNs) or Packaging Export Recovery Notes (PERNs) from UK waste reprocessors and waste exporters.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI United Kingdom: Flies, crossbows and comics: novel counter terrorism innovation

    Source: United Kingdom – Executive Government & Departments

    Case study

    Flies, crossbows and comics: novel counter terrorism innovation

    Nine projects, ranging from whether flies can detect explosives to how comics can reduce radicalism and how much of a risk crossbows are, were showcased.

    More than 100 people attended the third University Innovation Concept event exploring ways in which cutting-edge research, often in unexpected areas, can help fight terrorism. 

    Nine fascinating and thought-provoking projects, ranging from whether flies can detect explosives (yes!) to how comics can reduce radicalism, and how much of a terrorism risk crossbows are, were on display at a showcase at the Open University in Milton Keynes, in which the Accelerated Capability Environment (ACE) was a proud partner. 

    Researchers and delegates were welcomed by Inspector Liam Cahill, Innovation Domain Lead at the Counter Terrorism Research Lab (CTRL), and Open University professors Arosha K Bandara and Eleanor Crabb. Annette Southgate, Head of ACE, then took to the stage to stress the importance of work and innovative collaboration such as this to “getting ahead of some of the people that are trying to cause us harm”. 

    Iain Harrison, Director of Digital, Data, Analysis & Technology at Counter Terrorism Policing, explained the rigorous process, supported by ACE, that began with 62 proposals from 28 different universities, which were then reviewed and whittled down to the nine stimulating ideas on display at the showcase event. 

    Bringing academia and Counter Terrorism Policing together 

    The projects that had been explored over 12 weeks of intensive research were showcased across three themes: 

    THEME ONE: Radicalisation and Interventions 

    First to present were a team from Anglia Ruskin University, on the topic of Exploring the Impact of Critical World Events on Extremist Misinformation Network (2020-24). This involved analysing 240 posts from four major platforms to understand how extremist groups exploit global crises on popular social media platforms, using hashtags and multiple forms of misinformation to amplify uncertainty and try and recruit new audiences. It also looked to pinpoint potential novel ways to intervene in this process. 

    Next up were a team from Cranfield University, analysing how social media content algorithms respond to user interactions within specific topics, to answer the question of Can Social Media Algorithms Radicalise? This pilot was designed to quantify if user behaviours such as watching or liking videos influenced a popular platform’s algorithm, and to what extent. The conclusion was that the algorithm could be influenced to provide more content around a particular theme, but it is not yet clear how long this influence lasts. 

    The final presentation in this first session was from the University of Liverpool, exploring the topic of Graphic Novels to Enable Discussion and Promote Critical Thinking. This project involved creating a 46-page book containing four graphic novels on the topic of radicalisation, supported by front-line intervention practitioners, for use in educational strategies to encourage critical thinking. Comics were chosen because they are already popular worldwide, accessible and engaging as a format, and cheap to produce. 

    THEME TWO: Current Threats, Biosensors and Human Networks 

    After a break, another team from Cranfield University, that had been drawing big crowds in the breakout sessions for the four crossbows on display at their stand, spoke on their research into Crossbows: A Real and Current Threat. Against a background of increasing use of crossbows, which can legally be bought by anyone over the age of 18, in targeted incidents, this set out to examine the hit probability and wounding potential of four different systems, their reload times, and how these compared to current policing response times. The conclusions, from a variety of tests including depth of penetration and discharge rate, concluded that crossbows need to be considered a real and present threat for a marauding terrorist attack, because all of those tested have potential to cause significant injury, especially to unprotected organs. 

    Next up was another project that had the audience buzzing – research from a team at The Open University on Fruit Fly Biosensors: Leveraging Olfactory Responses for Detection of Explosives and Toxic Chemicals. This explored if fruit flies, which have exceptional sensitivity, could be used as biosensors to detect toxins, drug precursors and explosives. The answer was potentially yes – experiments with TNT found that exposure to the explosive led to a gradual but clear increase in fly attraction, indicating that fruit flies can detect it. Preliminary lab data also suggests starving the flies may enhance TNT detection speed. 

    The final project in this session was an explanation of a Dynamic Target Indicator Tool (D-TinT) developed by a team at the University of Exeter. This uses techniques from movement pattern analytics and social network analysis to identify the best indicators of links between nodes in a human network based on movement patterns over time. This enables a statistical and spatial mathematical model to be developed. The Tool also identifies what might be flagged as a vulnerable target – either person or place – which could allow counter terrorism stakeholders to test the impact of possible risk-reduction procedures. 

    THEME THREE: Emerging Technologies 

    The final session of a highly enjoyable day started with a team from Robert Gordon University in Aberdeen talking the audience through their research on Leveraging Artificial Intelligence (AI) to Identify and Prevent Terrorism in Prisons: Legislative Gaps and Technological Solutions. This analysed AI’s role in situational awareness and radicalisation prevention, explored how it could support existing counterterrorism efforts, evaluated legal and ethical readiness for AI to be deployed in this way, and proposed technical and legal reforms to enable the responsible use of AI technologies in prison settings. The conclusion of the research was that AI offers significant potential to enhance security and counter-radicalisation efforts in UK prisons. 

    Next, a scoping study of Augmented Reality and Terrorism was presented by Dr Richard Jones of Edinburgh Law School, part of the University of Edinburgh. Billing augmented reality as a “technology in search of a purpose”, his research explored both potential law enforcement applications, such as head-up real-time navigation and facial recognition of persons of interest, as well as how terrorists could use the same technology, for example to create video footage for propaganda purposes. It also looked at how this technology could evolve in the public domain. The research concluded that feasibility factors include device cost and availability as well as the level of required technological expertise, which is likely to fall, in addition to utility and whether it solves a problem. 

    The final presentation of the day was by a team from the University of Southampton on Exploiting Vulnerabilities in Autonomous Vehicle Systems for Terrorist Activity – Threats to UK Critical National Infrastructure. This focused on identifying vulnerabilities in autonomous vehicle systems amid increasing reliance on connected and automated vehicles, analysing how terrorists could exploit these to disrupt or control them. This could include by hijacking the vehicle controls or causing collisions via manipulating road signs. The conclusion was that proactive risk mitigation is paramount. 

    Following the event, Inspector Cahill said: “The University Innovation Concept (UIC) was conceived with the intention of bringing Counter Terrorism Policing and academia closer together to ensure operational decisions made by experienced and knowledgeable personnel are backed by science and academic rigour. 

    “The one-day showcase was also a fantastic opportunity for attendees to network, learn about ongoing research and potentially take learning back to their operational roles, and feedback has been extremely positive.”  

    Reflecting on the event, Professor Southgate said: “ACE is proud to support policing colleagues find new and creative ways of solving frontline mission problems through partnership with researchers from across a diversity of backgrounds and institutions.

    “Accessing diversity of thought, approach and experience helps us step back and consider more impactful and enduring ways of tackling existing and sometimes long-standing problems. 

    “We are keen to help identify and shine a light on brilliant academic work that can already help solve today’s mission problems; highlighting the difference this makes, help build relationships and continue encouraging our talented academic community to support frontline policing work.”

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI: Accounting professionals turn to the Rightworks Community for expert insights, proven firm strategies, and best practices trusted by their peers

    Source: GlobeNewswire (MIL-OSI)

    NASHVILLE, Tenn., May 21, 2025 (GLOBE NEWSWIRE) — RightNOW2025 — Having emerged from yet another demanding tax season, accounting professionals now confront heightened client expectations and limited time to pursue innovation and growth.

    To help with navigating these persistent obstacles, Rightworks today announced Rightworks Community, its online platform that offers accounting and tax professionals the latest tools, insights, and actionable strategies from the profession’s most trusted advisors to help drive progress and inspire future-forward firms.

    Rightworks Community combines the company’s two decades of leadership with its robust network of seasoned in-house and external experts to give members:

    • Centralized Resources: A growing range of educational content including templates, guides, articles, videos, podcasts, and CPE-eligible courses to enhance firm efficiency and deepen expertise.
    • Community Engagement: A collaborative space to develop winning strategies with like-minded professionals, benefit from mutual accountability, and receive expert guidance to navigate unique challenges and achieve their goals.
    • Emerging Best Practices: The latest trends and most effective tactics, featuring live and on-demand events, from mainstage presentations to in-depth workshops and wellness sessions led by top industry leaders, including Jason Staats, Ryan Lazanis, and more.

    In early May, Rightworks Community completed its 2025 Tax Season Programming, which included events led by Amy Vetter, CPA, Yogi, and CEO of The B3 Method Institute. The free wellness sessions were designed to support mental clarity and optimize productivity during one of the profession’s most stressful seasons.

    “The Rightworks Tax Season Programming, particularly Amy Vetter’s Chair Yoga and Mindful Meditation sessions, genuinely made a difference during a typically high-pressure time. Starting my day with these practices put my mind at ease, reduced stress, and l highly recommend attending a session to anyone seeking a positive way to begin their day,” said Susan Bannwart, CPA and President of Highpoint Advisory Services. “I’m excited to see the Chair Yoga sessions return and hope they’ll be back for next tax season.”

    Free 60-Day Membership Offer for RightNOW2025 Attendees

    To help turn their conference experience into a year-round actionable plan, Rightworks Community is extending 60 days of free Advantage membership through July 1 to RightNOW2025 attendees. The special offer is designed to enable attendees to continue learning, growing, and connecting with peers post-conference through roundtable events hosted by RightNOW2025 speakers, including Hector Garcia, Will Hill, and John Mitchell.

    “We created the Rightworks Community as part of our mission to help advance the accounting profession,” said Joel Hughes, CEO of Rightworks. “The Community is an interactive space where accounting and tax professionals can collaborate with colleagues and trusted experts who understand their challenges. Members have access to comprehensive resources that bridge the gap between traditional practices and modern strategies.”

    To learn more about Rightworks Community and to sign up, click here.

    Connect with Rightworks
    Visit our newsroom; read our blog; and follow us on LinkedIn, Facebook, and Instagram.

    About Rightworks
    Rightworks enables accounting firms and businesses to significantly simplify operations and expand their value to clients via our award-winning intelligent cloud and learning resources. This is possible with Rightworks OneSpace, the only secure cloud platform purpose-built for the accounting and tax profession, and our premier community for firm optimization, growth, and professional development. Founded in 2002, we’ve grown to serve over 10,000 accounting firms in the US—from single practitioners to Top 10 firms. For more information, please visit rightworks.com or follow us on LinkedIn, Facebook, and Instagram.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/620f46d1-db97-4811-a45f-8da51593f793

    The MIL Network

  • MIL-OSI United Kingdom: Environment Agency secures over £526K in Proceeds of Crime case

    Source: United Kingdom – Executive Government & Departments

    News story

    Environment Agency secures over £526K in Proceeds of Crime case

    An illegal enterprise in catalytic converters has brought confiscation orders for £526,215.04, at a Proceeds of Crime Award hearing.

    Converters

    The case led by the Environment Agency was concluded at Lincoln Crown Court on Friday 16 May 2025.

    The ruling was made against Long Sutton-based Platinum Group Metals Recycling Ltd and director Edvars Stancik.

    Recorder John Hardy KC ruled that Stancik, 30, had made a benefit of £4,312,925.70 from his criminal activity while his company made a benefit of £4,344,827.60.

    The court heard assets of £495,280.88 were available from the company made up of cash in a bank account and seized catalytic converters.

    Stancik’s only asset was £30,934.16 from equity in a house he sold before his trial, the court was told.

    Recorder Hardy ordered those amounts to be confiscated and ruled that £100,111.65 should be paid to the Environment Agency to cover costs.

    At a previous hearing (4 September 2024), the company and Stancik were found guilty of running an illegal waste site at Long Sutton.

    The court heard that, between December 2019 and September 2021, Stancik, 30, acted as a director of the company and traded in catalytic convertors on a colossal scale. 

    A jury heard that neither Stancik nor his company had obtained an environmental permit before buying and selling thousands of catalytic converters.

    Stancik stored the devices in containers in Long Sutton and were stored in an irresponsible manner giving rise to health risks.

    A warrant for the arrest of Stancik, who is believed to be living in Lithuania, has been issued.  He has been given 3 months to pay or face 5 years in jail.

    The Environment Agency continues to investigate ways of retrieving further proceeds.

    Peter Stark, Environment Agency Enforcement Team Leader, said:

    “Waste criminals should be aware how seriously we take their offending, including the benefit they obtain from their illegal activities.

    “Offenders won’t get away with concealing information or their assets, and due to the EA’s hard work, justice has been served.

    “Waste crime can be a blight on the environment, communities and to legitimate businesses.

    “We will continue to work with professional partners like Lincolnshire Police in this case to prevent, disrupt, investigate, and stop waste offending.

    “If anyone suspects that a company or its directors are doing something wrong, contact our 24/7 hotline on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”

    The charges:

    Platinum Group Metals Recycling Ltd.

    • Operating a regulated facility, namely a waste operation, otherwise than in accordance with an environmental permit, contrary to Regulation 12(1)(a) and 38(1)(a) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at St Thomas Court, Long Sutton).

    • Operating a regulated facility, namely a waste operation, otherwise than in accordance with an environmental permit, contrary to Regulation 12(1)(a) and 38(1)(a) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at Lime Walk, Long Sutton)

    • Keeping controlled waste contrary to section 33(1)(c) and (6) of the Environmental Protection Act 1990.) (Relating to the site at St Thomas Court, Long Sutton)

    • Keeping controlled waste contrary to section 33(1)(c) and (6) of the Environmental Protection Act 1990. (Relating to the site at Lime Walk, Long Sutton)

    Edvars Stancik

    • Causing a company to operate a regulated facility otherwise in accordance with an environmental permit contrary to Regulation 12(1)(a) and 38(1)(a) by virtue of Regulation 41(1) and 41(3) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at St Thomas Court, Long Sutton)

    • Causing a company to operate a regulated facility otherwise in accordance with an environmental permit contrary to Regulation 12(1)(a) and 38(1)(a) by virtue of Regulation 41(1) and 41(3) of the Environmental Permitting (England and Wales) Regulations 2016. (Relating to the site at Lime Walk, Long Sutton)

    • Causing a company to commit an offence, contrary to section 33(1)(c), 33(6) by virtue of s157(1) of the Environmental Protection Act 1990. (Relating to the site at St Thomas Court, Long Sutton)

    • Causing a company to commit an offence, contrary to section 33(1)(c), 33(6) by virtue of s157(1) of the Environmental Protection Act 1990. (Relating to the site at Lime Walk, Long Sutton)

    Background Information

    Catalytic converters are components in car exhausts.  They contain small amounts of precious metals contained within a metal case making them valuable.

    However, catalytic converters also contain carcinogenic fibres which, if ingested, can cause serious and irreversible lung disease. 

    The dangerous fibres can attach to shoes and clothing and be transported from one place to another.

     It is therefore extremely important that catalytic converters are handled only under the strict conditions of an environmental permit, supervised by the Environment Agency.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Council working in partnership to tackle illegal off-road biking

    Source: City of Wolverhampton

    Off-road vehicles including motorbikes, quad bikes and other similar vehicles are classed as motor vehicles and must meet specific standards to be legally ridden on public highways.

    Off-roaders must have the permission of the landowner to ride on private land and, even with permission, dangerous or careless riding can lead to prosecution. For more details, please visit Off-Road Vehicle Nuisance.

    Off-roaders may also be in breach of the High Court injunction banning street racing in the Black Country, and therefore in contempt of court, if they are used on the public highway or land open to the public either for racing or to perform stunts.

    Meanwhile, parents who are considering purchasing off-road vehicles for young people should be aware that they may be held accountable for the actions of their children if they are found using vehicles anti-socially, including fines and legal action.

    Councillor Obaida Ahmed, the council’s Cabinet Member for Health, Wellbeing and Community, said: “As a council, we are committed to ensuring the safety and well-being of all our residents.

    “The anti-social use of off-road vehicles is not only dangerous but also illegal. It can cause significant distress and danger to our communities and offenders may face fines, prosecution or have their vehicles seized.

    “We are working closely with West Midlands Police and other partners to identify and take action against offenders, and are pursuing legal measures against persistent offenders.

    “But we need the public’s help. If you witness the anti-social use of off-road vehicles, please report it to us, in confidence.”

    People can report the anti-social use of off-road vehicles to the Wolverhampton Anti-Social Behaviour Unit via asbu@wolverhamptonhomes.org.uk, Report anti-social behaviour or by calling 01902 556789, or by calling Crimestoppers on 0800 555 111 or via CrimeStoppers.

    Alternatively, contact West Midlands Police via Live Chat at West Midlands Police or call 101. In an emergency, always dial 999.

    When reporting, please provide as much information as possible, including the location of the incident, a description of the vehicle(s) involved, the time and date of the incident and any photos or videos, if available.

    Chris Seymour, ASB Officer for Wolverhampton Police, said: “We are committed to dealing with the ongoing issues surrounding the use of off-road bikes and the associated anti-social behaviour – we will continue to work closely with our partners to identify and prosecute offenders.”

    For more information or to discuss concerns, please contact the council’s Community Safety Team via safer@wolverhampton.gov.uk.
     

    MIL OSI United Kingdom

  • MIL-OSI Europe: Towards Safer Communities: Co-ordinated action to end violence against women and domestic violence

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: Towards Safer Communities: Co-ordinated action to end violence against women and domestic violence

    The meeting brought together key institutional actors to identify urgent measures, align mandates, and ensure co-ordinated engagement of ministries, parliaments, relevant institutions, and international partners. (OSCE) Photo details

    SARAJEVO, 21 May 2025 – In a decisive step toward strengthening protections for survivors of domestic violence and violence against women, the OSCE Mission to Bosnia and Herzegovina (the Mission) convened a meeting today in Sarajevo to advance the implementation of the new legal framework in the Federation of BiH (FBiH).
    The meeting brought together key institutional actors to identify urgent measures, align mandates, and ensure co-ordinated engagement of ministries, parliaments, relevant institutions, and international partners. Participants included representatives from the FBiH Ministries of Justice, Interior, Labour and Social Policy, and Health, as well as the FBiH Parliament’s Committees for Security and Gender Equality.
    The FBiH Government has recently enacted critical legislation, including the Strategy for Prevention and Fight against Domestic Violence (2024–2027) and the Law on Protection against Domestic Violence and Violence against Women. These measures represent a major advancement in aligning domestic policies with international standards and improving protection and support services for survivors.
    “We welcome the Government’s commitment to amending the Criminal Code to strengthen protections for women and children and hope to see its swift adoption by the FBiH Parliament,” said Thomas Busch, Deputy Head of the OSCE Mission to BiH. “Despite this progress, serious acts of violence persist. That’s why we must now focus on full implementation—to prevent abuse, protect victims, and ensure accountability.”
    To ensure effective implementation of the law, the following actions were agreed:

    Development and adoption of the relevant bylaws

    Given the mid-September 2025 deadline for the adoption of 14 bylaws as stipulated by the Law on Protection against Domestic Violence and Violence against Women in Federation of BiH (Law), and recognizing that the development and adoption processes will require close coordination and cooperation among various stakeholders at Federation of Bosnia and Herzegovina (FBiH) and cantonal levels of governance, as well as the need to ensure coherence and alignment between the bylaws and the relevant laws;
    Given the planned or requested support in the development of the bylaws provided by international organizations, including, inter alia, Delegation of European Union in Bosnia and Herzegovina, UN Agencies in Bosnia and Herzegovina including UN Women in Bosnia and Herzegovinian, the OSCE Mission to Bosnia and Herzegovina, and recognizing that certain key ministries have already initiated the drafting or consultation processes regarding the bylaws; and
    Given existing coordination mechanisms amongst ministries in the context of implementing the GREVIO recommendations, the FBiH Strategy for Prevention and Protection Against Domestic Violence 2024–2027, and/or establishment of the Commission for Monitoring the Implementation of this Law as stipulated by the Law, which could be leveraged for technical-level coordination, and that the first coordination meeting at the technical level is planned for end of the May.

    The following are recommended for:

    Relevant ministries:
    Establish a body or task force, composed of representatives from key FBiH ministries, to formalize existing co-ordination and oversee the process of drafting, reviewing, and harmonizing the bylaws;
    Ensure efficient, transparent and inclusive consultation processes with relevant cantonal ministries, experts and professionals on bylaws; and
    Secure timely adoption of coherent, bylaws that align with international standards and ensure the effective operationalization of the Law.

    Chairs of committees:
    By the end of 2025, organize a joint committees’ session to share experiences and practices in the implementation of the Law including to present prepared bylaws and share plans for capacity building of professionals;
    Engage in promotional activities related to the implementation of the Law and bylaws, including with relevant cantonal committees.

    The Mission:
    Provide support to relevant ministries for the horizontal and vertical harmonization of the bylaws within and with the relevant legal framework(s); and
    Facilitate regular dialogue amongst key stakeholders including organizations and members of the international community, particularly ministers and chairs of committees, to review progress, ensure consistency, efficiency, and alignment throughout the process.

    2. Capacity building of professionals on the Law and relevant bylaws

    Given existing and planned support provided by various international organizations, including various project of European Union such as EU4Police, UN Agencies including UN Women in Bosnia and Herzegovina, as well as the continuous support of the Mission, to Ministries of Interior and the and FBiH Ministry of Labor and Social Policy (MLSP) in strengthening the capacities of professionals;
    Given planned budget allocations by the FBiH Ministry of Interior (MoI) for the development of the capacity of the FBiH Police Academy and by the FBiH MLSP for the capacity building of professionals engaged in the institutional response to domestic and gender-based violence, as well as additional capacity-building activities planned under the FBiH Strategy for Prevention and Protection against Domestic Violence 2024–2027; and
    Given the validated training modules and programs developed by the FBiH MoI, FBiH MLSP, and the FBiH Minsitry of Health (MoH), as well as opportunities to ensure budget and institutional sustainability of these programs at FBiH and cantonal level where appropriate,

    The following are recommended for:

    Relevant ministries:
    Assess existing capacity-building programs, including training modules and materials, to determine their adaptability, validation, and suitability for training professionals on the Law and relevant bylaws;
    Identify the number and ranks of professionals to be trained, estimate the necessary costs, and develop an implementation timeline in co-ordination with relevant cantonal ministries; and
    Propose mechanisms to ensure the sustainability of mandatory training programs and the necessary budget, targeting an adequate timeframe for the training of professionals working on prevention and response in cases of violence, based on improved validated training programs, in order to achieve comprehensive, unified, and harmonized procedures in cases of domestic and violence against women, and
    Secure funding for the implementation of those programs through public budgets and with the international project support.

    Chairs of committees:
    Advocate with relevant committees’ counterparts at the cantonal level to secure institutional and budgetary support for the implementation of the Law;
    Advocate for the allocation of necessary funding for the work of parliamentary committees, which would include support for field visits, sessions and debates relevant to the committees’ respective legislative and oversight activities;
    Advocate for strengthening of co-operation and co-ordination of the FBiH Parliament’s committees with corresponding committees across different levels of government, which contributes to expanding committees’ capacities, positive dialogue and safeguarding stability. 

    The Mission:

    Continue to provide programmatic and political support to key ministries and institutions across different levels of governance, focusing on building the capacity of professionals and advocating for sustainable policy solutions; and
    Continue to provide programmatic and political support to relevant parliamentary committees across different level of governance, including in relation to their legislative and oversight mandates as well as co-operation and co-ordination among parliamentary committees.

    MIL OSI Europe News

  • MIL-OSI Russia: Moscow creates all conditions for professional growth of teachers — Sergei Sobyanin

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    By the end of 2024, more than 62.5 thousand Moscow teachers had improved their qualifications. A report on this topic was presented by Anastasia Rakova, Deputy Mayor of Moscow, at a meeting of the Presidium of the Moscow Government. Following the discussion of the issue Sergei Sobyanin ordered the creation of favorable conditions for improving the qualifications of teachers in the field of teaching mathematics and natural sciences.

    Regular professional development is the key to the growth of pedagogical skills and high results of students. In order to create favorable conditions for additional training of Moscow teachers, the Moscow Government has created a specialized portal of additional professional education, which contains detailed information about programs for different categories of specialists working at the school.

    “We create all the conditions for teachers to grow professionally. On the portal

    Dpos.ru already 474 educational programs. There are all formats: full-time, online and part-time,” Sergei Sobyanin wrote in his telegram channel.

    Source: Sergei Sobyanin’s Telegram channel @mos_sobyanin 

    Teachers can also choose the necessary direction of advanced training and the organization that provides training, including the Corporate University of Moscow Education.

    In 2024, training was conducted in 43 areas, among which the most popular were “Preparation for the Unified State Exam”, “Working with Insufficiently Motivated Students”, “Teaching in Pre-Professional Classes”, “Preparation for Olympiads”.

    Advanced training with the Moscow Electronic School

    A new approach to improving the qualifications of teachers has also been implemented on the platform “Moscow Electronic School”. Based on the results of independent diagnostics, OGE and USE (for the last three years) in the service “Teacher’s Portfolio” An objective assessment of the results of the work of teachers is presented, who receive personal recommendations for improving their professional skills. These may be advanced training courses, methodological materials, webinars, etc.

    In addition, the service contains a selection of video recordings of open lessons by the best teachers in Moscow. Viewing these materials helps to diversify the methodological tools and make classes more interesting. Open lessons are also an opportunity to organize professional discussions in school subject groups, exchange opinions and share experiences. For this, teachers can use ready-made scenarios of school methodological clubs with discussion questions. They are available along with video recordings of open lessons in the “My Results” section (the “Methodological Materials” block). This academic year, more than 36 thousand teachers have accessed this section over 320 thousand times.

    In addition, teachers actively use the MES library, which contains over 18 thousand electronic lesson plans, class hour topics, and other methodological materials for all subjects of the school curriculum. Their use contributes to the development of teachers’ professional competence and allows for a deeper immersion in the content of the subject.

    Innovators in pedagogy. Moscow teachers talk about interactive lessons, neural networks and professional competitions

    Mathematics and natural sciences

    Due to the growing interest of schoolchildren in mathematical and natural science education, special attention is being paid to improving the qualifications of teachers in these areas.

    In particular, starting from the new 2025/2026 academic year, Moscow schools will organize additional educational courses in mathematics, science and technology for students in grades one through six. Conducting such classes will require a more advanced level of teacher training and the acquisition of new competencies. In this regard, since April 1, 2025, more than 14 thousand primary school teachers have been studying a special course “Mathematics and the World Around Us”.

    For teachers of grades five through six, programs are being developed to improve their qualifications in mathematical and scientific literacy, as well as in methods of teaching mathematics in multi-level groups.

    For this work the capital Department of Education and Science created a council for the development of mathematical and natural science education. It included more than 50 experts: coaches of Olympiad teams, experienced teachers, scientists, university professors, methodologists, winners of international Olympiads, as well as representatives of business and state corporations.

    In addition to conducting an examination of specialized educational programs, the council members will take part in the discussion of educational courses and materials aimed at developing unconventional thinking and interest in science in schoolchildren. They will also be engaged in the examination of diagnostic materials and the preparation of recommendations for equipping schools with modern equipment.

    “We invest in the most important thing – in people who help our children become smarter, more confident and stronger every day,” summed up Sergei Sobyanin.

    New courses in mathematics and natural sciences have been prepared for the capital’s schoolchildren

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/mayor/tkhemes/12779050/

    MIL OSI Russia News

  • MIL-OSI Russia: Financial news: 05/21/2025, 11:30 (Moscow time) the values of the upper limit of the price corridor and the range of market risk assessment for the security RU000A0ZYLU6 (DOM.RF1P1R) were changed.

    Translation. Region: Russian Federal

    Source: Moscow Exchange – Moscow Exchange –

    05/21/2025 11:30

    In accordance with the Methodology for determining the risk parameters of the stock market and the deposit market of PJSC Moscow Exchange by NCO NCC (JSC), on 21.05.2025, 11-30 (Moscow time), the values of the upper limit of the price corridor (up to 104.66) and the range of market risk assessment (up to 1116.13 rubles, equivalent to a rate of 7.5%) of the security RU000A0ZYLU6 (DOM.RF1P1R) were changed.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    HTTPS: //VVV. MOEX.K.M.M.

    MIL OSI Russia News

  • MIL-OSI Russia: Financial news: 05/21/2025, 10:22 (Moscow time) the values of the upper limit of the price corridor and the range of market risk assessment for the security RU000A10AQC0 (IADOM 1P51) were changed.

    Translation. Region: Russian Federal

    Source: Moscow Exchange – Moscow Exchange –

    05/21/2025 10:22

    In accordance with the Methodology for determining the risk parameters of the stock market and the deposit market of PJSC Moscow Exchange by NCO NCC (JSC), on 21.05.2025, 10-22 (Moscow time), the values of the upper limit of the price corridor (up to 83.65) and the range of market risk assessment (up to 891.32 rubles, equivalent to a rate of 31.25%) of the security RU000A10AQC0 (IADOM 1P51) were changed

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    HTTPS: //VVV. MOEX.K.MO/N90389

    MIL OSI Russia News

  • MIL-OSI Russia: 17 NSU postgraduate students became holders of Presidential scholarships

    Translation. Region: Russian Federal

    Source: Novosibirsk State University – Novosibirsk State University –

    The 500 winners of the second competitive selection for the Russian Presidential Scholarship for postgraduate and adjunct students have been announced. The monthly scholarship is 75 thousand rubles. The payment is assigned for a period of 1 to 4 years. Last year, the first recipients of the scholarship included eight NSU postgraduate students: three from the Faculty of Natural Sciences and the Faculty of Physics, and one from the Faculty of Economics and the Institute of Humanities. In 2025, their number increased to 17.

    This year, the Presidential Scholarship was awarded to 8 postgraduate students. Faculty of Natural Sciences of NSU, 4 postgraduate students Physics Department of NSU, 2 postgraduate students Faculty of Geology and Geophysics of NSU and 3 postgraduate students Humanitarian Institute of NSU.

    Scholarships for postgraduate and adjunct students conducting scientific research within the framework of the implementation of the country’s scientific and technological development priorities were awarded to:

    Faculty of Natural Sciences of NSU:

    Olga Bakunina (3rd year of study), scientific supervisor – senior lecturer of the Department of Physics of the Specialized Scientific Center of NSU Mikhail Yuryevich Ivanov;

    Ekaterina Butikova (1st year student), scientific supervisor – head of the laboratory of cellular technologies of the Department of Experimental Lymphology of the Institute of Clinical and Experimental Lymphology – branch of the ICG SB RAS Olga Vladimirovna Poveshchenko;

    Alexander Nashivochnikov (3rd year of study), scientific supervisor – senior researcher at the Laboratory of Quantum Optical Technologies of the Physics Department of NSU Anton Ivanovich Kostyukov;

    Tamara Rakhmanova (3rd year of study), scientific supervisor – head of the cryopreservation and reproductive technologies sector of the Federal Research Center of Cytology and Genetics of the Siberian Branch of the Russian Academy of Sciences, Doctor of Biological Sciences Sergei Yakovlevich Amstislavsky;

    Arkady Samsonenko (2nd year of study), scientific supervisor – senior lecturer of the Department of Chemical and Biological Physics of the Physics Faculty of NSU Sergei Leonidovich Weber;

    Sergey Sviyazov (3rd year of study), scientific supervisor – assistant of the Department of Physical Chemistry of the Faculty of Natural Sciences of NSU Dudari Bairovna Burueva;

    Egor Sosnin (1st year of study), scientific supervisor – senior lecturer of the Department of General Physics of the Physics Faculty of NSU Stanislav Albertovich Trubachev;

    Artem Urlukov (3rd year of study), scientific supervisor – Associate Professor of the Department of Molecular Biology and Biotechnology of the Faculty of Natural Sciences of NSU Dmitry Igorevich Potemkin.

    NSU Faculty of Physics:

    Alexandra Borodulina (1st year of study), scientific supervisor – senior lecturer of the Department of Chemical and Biological Physics of the Physics Faculty of NSU Sergei Leonidovich Weber;

    Stepan Karmushin (1st year of study), scientific supervisor – director of the Advanced Engineering School of NSU Sergey Valerievich Golovin;

    Natalia Osik (2nd year of study), scientific supervisor – chief researcher of the International Tomography Center of the Siberian Branch of the Russian Academy of Sciences Yuri Pavlovich Tsentalovich;

    Andrey Cherepanov (1st year of study), scientific supervisor – Associate Professor of the Department of General Physics of the Physics Faculty of NSU Denis Anatolyevich Knyazkov.

    Faculty of Geology and Geophysics of NSU:

    Mark Ignatov (1st year of study), scientific supervisor – senior lecturer of the Department of Physical Methods for Solid State Research of the Physics Faculty of NSU Sergey Vladimirovich Rashchenko;

    Alexey Tarasov (1st year of study), scientific supervisor – senior researcher of the laboratory of lithospheric mantle and diamond deposits of the V.S. Sobolev Institute of Geology and Mineralogy of the Siberian Branch of the Russian Academy of Sciences Alexander Viktorovich Golovin.

    Humanitarian Institute of NSU:

    Dmitry Lebedkin (1st year of study), scientific supervisor – head of the Department of Fundamental and Applied Linguistics of the Humanities Institute of NSU Alexander Nikolaevich Savostyanov;

    Valeria Mikhienko (1st year of study), scientific supervisor – professor of the Department of Archeology and Ethnography of the Humanities Institute of NSU Mikhail Vasilyevich Shunkov;

    Vasily Sokolovsky (1st year of study), scientific supervisor – associate professor of the Department of Archeology and Ethnography of the Humanities Institute of NSU Andrey Vladimirovich Tabaev.

    In total, more than 4.6 thousand applications from 73 subjects of Russia were submitted to the competition. The winners were representatives of all federal districts, including 2 postgraduate students from new regions. The largest number of applications were submitted in the direction of “Engineering Sciences”.

    Candidates for the presidential scholarship were nominated by their scientific supervisors. As specified on the official website of the Ministry of Science and Higher Education of the Russian Federation, the research of scholarship applicants must be based on the priorities defined by the Strategy for Scientific and Technological Development of the Russian Federation, approved by Vladimir Putin on February 28, 2024.

    Valeria Mikhienko (NSU Humanitarian Institute):

    — As part of my dissertation research, it is planned to study the main techniques of chipping on the archaeological materials of the Upper Paleolithic of the Altai Mountains, obtained from sites with an established chronology and with the involvement of experimental data. The identification and substantiation of a new additional criterion for differentiating the Upper Paleolithic industries of the Altai Mountains will allow us to determine the main trends at different stages of the Upper Paleolithic and better understand their specificity. In the Upper Paleolithic (about 50 thousand years ago), changes in stone processing occur everywhere, which are associated with the production of new types of blanks (plates, blades, microplates) and typologically expressed tool forms (leaf-shaped bifaces). At first, man in ancient times mastered new methods of obtaining standardized stone blanks – plates within the framework of volumetric thinking, then moved on to the manufacture of smaller forms – plates, and at the end of the Upper Paleolithic he already mastered the technique of pressing and was already able to obtain microplates. All this took place against the backdrop of changes in the natural environment and the development of human cognitive abilities, which can be traced in the archaeological materials of the multi-layered sites of the Altai Mountains (from 50 to 20 thousand years ago).

    Ekaterina Butikova (FEN NSU):

    — I am researching the effects of terahertz radiation on normal and tumor human cells. As part of the project, we study how irradiation at terahertz frequencies affects cellular metabolism and the viability of various cell types. These data are important for understanding the fundamental mechanisms of terahertz radiation and may be useful for understanding safety limits.

    Stepan Karmushin (FF NSU):

    — My scientific research is devoted to a relevant and complex area of modern hydrodynamics — the mechanics of viscoelastic (non-Newtonian) fluids, including issues of unsteady flows and rheology of complex structured polymer and colloidal systems. The relevance of this topic is due to the wide range of applications of such materials in advanced technologies, including the oil and gas industry, biotechnology, pharmaceutical industry and the development of new composites. Particular attention is paid to the development of nonlinear mathematical models and analysis of the internal structure of the flow, which allows for reliable calculation of the rheology of viscoelastic fluids, as well as reproducing their behavior in real conditions. The results of the work are of both fundamental importance for modern hydrodynamics and practical value for the real sector of the economy, including cooperation with leading oil and gas companies to solve specific technological challenges.

    Alexey Tarasov (GGF NSU):

    — The topic of my project is “Melt inclusions in minerals of mantle xenoliths from kimberlites: reconstruction of mantle melt compositions”. Kimberlites are igneous rocks, which are associated with more than 90% of diamond deposits. Kimberlites are formed by the crystallization of kimberlite magmas. Kimberlite melts are formed by partial melting of mantle rocks at a depth of 160-300 kilometers. In my work, I try to reconstruct the composition of kimberlite melts. To do this, I study melt inclusions in various minerals from kimberlites.

    Dmitry Lebedkin, (NSU GI):

    — I study neural indicators in the cognitive processing of syntactic errors in the process of perceiving sentences in natural languages and arithmetic formulas.

    The aim of the study is to identify similarities and differences between the neural processes that occur during the processing of linguistic and arithmetic syntax, in order to subsequently conclude whether this process is the same or not. If not, what are the differences between them).

    To answer this question, a series of experiments will be conducted with electroencephalogram recordings. During them, participants will read arithmetic formulas and sentences in Russian, which may contain syntactic and semantic errors. The obtained indicators of brain activity will be compared both between arithmetic and Russian, and within these categories of stimuli (with or without syntactic or semantic errors).

    The results of the conducted research can be used in the development of complex educational methods intended for more productive joint study of mathematical and language disciplines. Also in the future it is possible to create therapeutic methods for supporting students with dyscalculia and related developmental disorders based on the results of this work.

    Reference:

    Scholarships for postgraduate students and adjuncts conducting research within the framework of implementing the priorities of scientific and technological development of the country were introduced in 2024. The corresponding Decree “On the scholarship of the President of the Russian Federation for postgraduate students and adjuncts conducting research within the framework of implementing the priorities of scientific and technological development of the Russian Federation” was signed by the head of state Vladimir Putin on November 27, 2023. Up to 500 scholarships in the amount of 75 thousand rubles will be allocated annually based on the results of competitive selection. They will be paid to postgraduate students and adjuncts until they complete their studies at the university. These payments are financed from the federal budget. The first recipients of the scholarship last year included eight NSU postgraduate students: three each from the Faculty of Natural Sciences and the Faculty of Physics, and one each from the Faculty of Economics and the Humanities Institute. This year their number has increased to 17.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Security: San Diego Man Charged with Smuggling Exotic Live Birds

    Source: Office of United States Attorneys

    SAN DIEGO – Ricardo Alonzo of San Diego appeared in federal court today to face charges that he smuggled 17 exotic birds into the United States from Mexico under the seat of his car.

    According to a complaint, Alonzo was the driver and registered owner of a vehicle that was intercepted by U.S. Customs and Border Protection officers at the San Ysidro Port of Entry. Officers found four bags containing 10 Burrowing Parakeets, five Yellow-Crowned Amazon Parrots, and two Red-Lored Amazon Parrots underneath the rear seat. The two Red-Lored Amazon Parrot chicks did not survive; the surviving birds were transferred to a quarantine facility managed by the U.S. Department of Agriculture.

    “Trafficking exotic birds isn’t just illegal — it’s cruel and dangerous,” said U.S. Attorney Adam Gordon. “These actions put the lives of helpless animals at risk and expose the public and other animals to serious diseases.”

    “This charge underscores our unwavering commitment to protecting vulnerable wildlife and holding traffickers accountable for their crimes,” said Shawn Gibson, special agent in charge of HSI San Diego. “We are grateful to our dedicated law enforcement partners whose collaboration was instrumental in bringing this individual to justice.”

    According to the U.S.  Fish and Wildlife Service, Amazon parrots are native to Mexico, the West Indies, and northern South America, while Burrowing Parakeets are local to Chile and Argentina.  All 30-some species of Amazon parrots, as well as the Burrowing Parakeets, are listed on either Appendix I or Appendix II of the Convention on International Trade in Endangered Species of Wild Flora and Fauna (“CITES”).

    The successful smuggling of undeclared Amazon parrots and Burrowing Parakeets into the U.S. means no quarantine period or process. This would be dangerous to the United States as birds can carry and spread Avian influenza (bird flu), psittacosis, and histoplasmosis. Bird flu is highly contagious and can cause flu like symptoms, respiratory illness, pneumonia and death in humans and other birds including birds in United States poultry farms. Quarantining animals entering the United States is intended to safeguard against this potential disease transmission.

    This case is being prosecuted by Assistant U.S. Attorney Parker Gardner-Erickson.

    DEFENDANT                                                             Case Number 25mj2712-VET                                 

    Ricardo Alonzo                                               Age: 26                                   San Diego, CA

    SUMMARY OF CHARGES

    Importation Contrary to Law – Title 18, U.S.C., Section 545

    Maximum penalty: Twenty years in prison and $250,000 fine

    INVESTIGATING AGENCIES

    U.S. Fish and Wildlife Service

    Homeland Security Investigations

    *The charges and allegations contained in an indictment or complaint are merely accusations, and the defendants are considered innocent unless and until proven guilty.

    MIL Security OSI

  • MIL-OSI United Kingdom: Dangerous weapons to be taken off our streets

    Source: United Kingdom – Executive Government & Departments

    Press release

    Dangerous weapons to be taken off our streets

    More dangerous weapons will be removed from our streets through a new government surrender scheme in partnership with the Coalition to Tackle Knife Crime.

    Throughout July, knife crime activist and member of the government’s coalition, Faron Paul, will drive across London, the West Midlands and Greater Manchester in a purpose-built and fully secure van, encouraging young people to hand over dangerous and illegal weapons safely.

    This is the government’s most ambitious weapons surrender scheme to date and will also see a major expansion of anonymous surrender bins in partnership with knife crime charity Words4Weapons.  The Home Office is funding 37 new surrender bins across London, the West Midlands and Greater Manchester – the three highest areas of knife crime in England and Wales.

    Part of the government’s Plan for Change, these initiatives will give young people more options where they can securely hand over weapons, without needing to go to a police station, helping to keep our streets safer and take more weapons out of communities.

    Young people will also be encouraged to hand in all types of weapons, including Ninja swords – which will be banned in full from 1 August.

    Policing and Crime Minister Dame Diana Johnson said: 

    This government is taking a different approach to tackling knife crime — one rooted in partnership with those who have first-hand experience of this devastating crime. 

    We are committed to halving knife crime within a decade as part of our Plan for Change — and that demands bold, radical action. 

    That is why we formed the Coalition to Tackle Knife Crime, not as a talking shop, but as a genuine, working partnership and these new initiatives are a direct result of that collaboration. I’m deeply grateful to Faron Paul and Sandra Campbell for their leadership in driving them forward. 

    We know that young people involved in crime can have complex pasts and often deep-rooted mistrust in authority, and I truly believe it’s this kind of collaboration that will save young lives.

    Faron Paul is an anti-knife crime campaigner and CEO of Faz Amnesty, who survived two life-threatening knife attacks and now does vital work in helping young people hand in knives. He also acts as a mentor to young people caught in the vicious cycle of carrying knives. Faron uses social media to raise awareness of the consequences of carrying knives.  The surrender van being driven across the country will be fully purpose-built to ensure it is safe and secure and police officers will be on hand for additional support and security. 

    Faron Paul, CEO of Faz Amnesty said:  

    The launch of the UK’s first-ever amnesty van is a historic moment — not just for FazAmnesty, but for communities across the country. In partnership with the Home Office, this van allows us to take our mission directly to the people, giving them a safe, secure, and discreet way to hand in offensive weapons. For years, we’ve worked tirelessly to remove knives and other weapons from our streets, and this van is a major step forward in that mission. It’s more than just a vehicle — it’s a symbol of hope, change, and second chances. This is about saving lives, protecting our communities, and breaking the cycle of violence. I’m incredibly proud of how far we’ve come — and this is only the beginning.

    The Home Office has partnered with surrender charity, Words4Weapons, to manufacture these bins. Words4Weapons already have several weapons bins placed across London, Hertfordshire and Sheffield, and help to connect young people with local services to access the best possible help. 

    The scheme will also include a limited compensation offering for Ninja swords handed in ahead of the ban on 1 August. Any members of the public wishing to surrender a Ninja sword in exchange for compensation will need to safely take the weapon to one of the designated police stations.

    Any member of the public found with one of these weapons following 1 August will be breaking the law and could face time in prison. 

    Sandra Campbell, CEO of Words4 Weapons said: 

    We are proud to partner with the Home Office on what is the most ambitious weapons surrender initiative to date. These bespoke Word 4 Weapons bins will provide communities with safe and anonymous disposal options. Each bin represents a proactive step towards saving lives and helping to restore neighbourhood trust. By making weapon disposals more accessible, we are not just removing dangerous items from the streets but supporting individuals to make alternative choices. We are grateful for the government’s support and pleased to contribute to this vital national initiative.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Russia: Polytechnic students won prizes at an international conference in Kazan

    Translation. Region: Russian Federal

    Source: Peter the Great St Petersburg Polytechnic University – Peter the Great St Petersburg Polytechnic University –

    Peter the Great St. Petersburg Polytechnic University took part in the IV International Scientific and Practical Conference “Discovering the World of Science”. The event was held at the preparatory faculty for foreign students. Young researchers from Tomsk and Perm Polytechnic Universities, Ivanovo State Medical University and Kazan Federal University also took part. Foreign participants discussed the history of science, important scientific discoveries and achievements, as well as promising scientific areas in countries and regions of the world.

    Pre-graduate students of the Higher School of International Educational Programs (HSIEP) from Pakistan Zarak Ali Khan and Zaib Shah presented reports prepared under the supervision of Deputy Head of Research Daria Ignatyeva and Senior Lecturer Ksenia Moiseyeva. Zarak Ali Khan presented the study “Comparative Analysis of Load Flows for Different Power Plant Configurations in ETAP”, which is dedicated to the optimization of power systems. Zaib Shah presented innovative solutions in the field of renewable energy in the report “Methods for Tracking the Maximum Power Point in Solar Power Systems”.

    The jury highly appreciated the scientific depth of the works: Zaib Shah took first place, and Zarak Ali Khan – third. Thanks to this, they got the opportunity to publish in the scientific journal of KFU.

    The event became an important platform for exchanging experience between young scientists and identifying promising areas of research. Participants agreed to intensify inter-university cooperation in energy, engineering and medical technologies, develop joint projects focused on sustainable development and “green” technologies, and expand academic mobility programs.

    Zarak Ali Khan said that he had an unforgettable experience thanks to the combination of professional growth and acquaintance with the cultural heritage of the city. Zaib Shah compared Kazan to a page from a fairy tale, noting the beauty of the Kremlin, Lake Kaban, Bauman Street and the local cuisine.

    The conference organisers noted the growing level of scientific work by foreign students and expressed confidence that the event would become a traditional launching pad for future discoveries.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Conference “IQ Project 2025”: new ideas, large-scale geography and best practices

    Translation. Region: Russian Federal

    Source: Peter the Great St Petersburg Polytechnic University – Peter the Great St Petersburg Polytechnic University –

    The IV All-Russian educational and scientific conference “IQ Project 2025” was held at the Higher School of Project Activity and Innovations in Industry of the Institute of Mechanical Engineering, Materials and Transport of SPbPU. This year, the conference broke its own records in the number of participants and expanded its geography. Representatives of SPbPU, NSU, LETI, RUT, MISiS, ISU, MFUA, SFU, KNITU, HSE, GUU, SPbGUP, KU, RUDN, Moscow Polytechnic University, OSU, GUAP took part in it.

    For the first time, representatives of companies took part in the scientific part of the conference.

    The guests and speakers of the first day of the conference were:

    Gleb Subbotin (business analyst at Gazpromneft ITO); Oleg Suvorov (head of corporate clients at 1C:North-West); Dinara Kamolova (ambassador of the process approach); Oksana Murzaeva (head of project portfolio at Norilsk Nickel).

    The day ended with a quiz, in which participants could demonstrate their erudition, compete and win prizes. A round table on the topic of “The Image of a 1C Specialist in the Eyes of Employers and Students” was also held.

    On the second day of the conference, the speakers were Igor Vlasov (senior product manager at Yandex Technologies, previously Avito, Toyota, VW) and Marina Bolsunovskaya (head of the Industrial Stream Data Processing Systems laboratory).

    Next, a plenary session was held, at which the best reports of the conference were presented:

    Dinara Kamolova, “Application of quality management tools in the IT industry” Assistant of the Higher School of Psychology and Information Technologies Zhanna Burlutskaya, “Modeling multi-agent interactions in the process of conducting intonation activities in network associations of technology companies” Assistant of the Higher School of Psychology and Information Technologies Kapiton Pospelov, “Method for assessing the limited rationality of agents in the problems of managing innovative projects” Assistant of the Higher School of Psychology and Information Technologies Salbek Beketov, “Algorithm for forming a portfolio of projects taking into account the optimal distribution of labor resources on individual projects”.

    The day ended with presentations by participants in the conference sections.

    The best reports in the sections this year were:

    Section “Corporate Information Systems” — Natalia Ilyina, report “Personalization of the educational process in an inclusive school using an information and analytical system developed on the “1C:Enterprise 8.3” platform. Section “Mathematical models of decision-making” — Liya Khabibullina, report “Algorithm for calculating crews to fulfill an airline schedule, taking into account legislative restrictions”. Section “Product management and advanced practices in training management personnel” — Irina Romanova, report “Research of product backlog prioritization methods”. Section “Management in organizational systems” — Polina Sharko, report “Application of a multi-agent approach in managing decentralized organizational systems”. Section “Innovation management” — Gleb Subbotin, report “Integration of physically informed neural networks and hydrodynamic models to improve the accuracy of reservoir situation forecasting”. Section “Quality Management” — Artem Nigmatulin, report “The concept of a simulation model of inventory management processes at an enterprise in the field of electronics”. Section “Project Management and Project Activities” — Alexey Nikitin, report “From Risk to Opportunity: Managing Positive Risks in Project Activities”, and Vadim Bulushev, report “Multi-agent neural network approach to improving project content management processes in the company “UNISTORY.LLC”.

    All abstracts of reports that have passed the review will be published in a collection indexed in the Russian Science Citation Index. The best ones will be recommended for publication in VAK journals.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Australia: Pedestrian in critical condition after Devonport crash

    Source: New South Wales Community and Justice

    Pedestrian in critical condition after Devonport crash

    Wednesday, 21 May 2025 – 4:56 pm.

    A 75-year-old woman seriously injured when hit by a car in Devonport on Wednesday morning remains in a critical condition in Royal Hobart Hospital.
    The crash happened about 8.55am at the intersection of William and Best streets, Devonport, with initial investigations indicating the female pedestrian was attempting to cross the intersection at the lights when she was struck by a black Lexus.
    The crash was witnessed by a several people, who provided assistance at the scene.
    The woman was initially transported to Launceston General Hospital for treatment however, her condition deteriorated and she was then transported by helicopter to RHH.
    Any witnesses who saw the incident or drove past the area and may have dash-cam footage are asked to call police on 131 444 or contact Crime Stoppers on 1800 333 000, or online at crimestopperstas.com.au. Information to Crime Stoppers can be provided anonymously.

    MIL OSI News

  • MIL-OSI Security: Third man charged as part of investigation into north London fires

    Source: United Kingdom London Metropolitan Police

    A third man has been charged as part of an investigation into a series of fires in north London.

    Petro Pochynok 34 (25.07.90) of north London, a Ukrainian national [C] has been charged with conspiracy to commit arson with intent to endanger life, namely:

    • conspiring together with Roman Lavrynovych and Stanislav Carpiuc and others unknown to damage by fire property belonging to another,
    • intending to damage the property,
    • intending to endanger the life or another or being reckless as to whether the life of another would thereby be endangered.

    Pochynok is due to appear at Westminster Magistrates’ Court on Wednesday, 21 May at 10:00hrs.

    The charge, which was authorised by the Crown Prosecution Service, relates to a period from Thursday, 17 April to Tuesday, 13 May this year, in which three incidents took place – a vehicle fire in NW5 on Thursday, 8 May, a fire at the entrance of a property in N7 on Sunday, 11 May and a fire at a residential address in NW5 in the early hours of Monday, 12 May.

    All have connections with a high-profile public figure, and therefore officers from the Met’s Counter Terrorism Command led the investigation into the fires.

    Pochynok was arrested on Monday, 19 May, in the Chelsea area, SW3, on suspicion of conspiracy to commit arson with intent to endanger life.

    As part of the same investigation, Roman Lavrynovych 21 (06.02.04), of Sydenham, a Ukrainian national [A] was charged with three counts of arson with intent to endanger life.

    He appeared at Westminster Magistrates’ Court on 16 May and was remanded in custody to appear at the Old Bailey on 6 June.

    Stanislav Carpiuc, 26 (15.07.98) of Romford, a Romanian national, [B] has also been charged with conspiracy to commit arson with intent to endanger life.

    He appeared at Westminster Magistrates’ Court on Tuesday, 20 May and was remanded in custody to appear at the Old Bailey on 6 June.

    Anyone with information that could assist the investigation should call police on 101 quoting CAD 441/12 May.

    MIL Security OSI

  • MIL-OSI Russia: Concerts, trainings and performances: how the large-scale project “Summer in Moscow” will take place

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    A large-scale urban project will begin on June 1 “Summer in Moscow”, which will last three months. It will once again unite all the bright charity, cultural and sports events of the next season, which will take place in all districts of the capital. Most of them will be held outdoors.

    From tastings to dancing and plein air

    The festival “Gardens and Flowers” runs until September 7. City sites will be transformed into blooming gardens, and rare plants will be seen on the capital’s streets. Muscovites and tourists will be immersed in the atmosphere of summer, will be able to take bright photo sessions and walk along picturesque routes.

    One of the main gastronomic events of the year will be the festival “Moscow is on the wave. Fish week”, which will take place from May 30 to June 8. There will be fish corners on Shkolnaya Street, and open-air shopping chalets will offer various types of fresh, dried and chilled fish and seafood. Chefs will prepare unusual and classic dishes especially for guests at the festival venues.

    As part of the historical festival “Times and Epochs” From June 11 to 15, visitors will see historical periods from Antiquity to the Great Patriotic War. Children and adults will learn to hold swords in their hands or sit at a loom, and professional reenactors will help them with this.

    The Tastes of Russia festival will take place from July 4 to 13. On the streets of the capital, you can try the cuisine of the peoples of Russia and get acquainted with dishes that have become the calling card of different cities – from Kaliningrad to Vladivostok. Tastings and culinary experiments will give you new recipes and help you choose combinations of products for your home table.

    The Kolomenskoye Museum-Reserve will host vintage market — an exhibition and sale of items from the Soviet and pre-revolutionary eras. Guests will enjoy a varied program with the participation of collectors and historians. Muscovites and tourists will be able to get acquainted with the photography craft of the film camera era, hear the sound of gramophone records from the 1920s, dance a square dance and polka to the sounds of a gramophone, remember Viktor Tsoi and the rock era of the 1980s, learn the history of the Olympic bear and purchase figurines of the mascot of the 1980 Olympics, as well as admire antique items and add badges, postcards, dishes and other things with history to their collections.

    From June 1 to September 7, there will be a summer clubThis is a sports and creative art space that will house beauty trucks, fashion pop-ups, greenhouses, a lecture hall, a climbing wall and many play areas.

    On the same dates, a festival will be held on Chistoprudny Boulevard “Street. Dancing” — a bright event for experienced dancers and those who want to learn breakdance, hip-hop, funk, shuffle and Latin. Within its framework, professional dancers will conduct master classes, organize flash mobs and battles.

    On the same days, a plein air painting will take place on Strastnoy Boulevard “Street. Art”. Art master classes, exhibitions of art objects, painting lessons in an art studio and performances by artists are organized here. Everyone is invited to participate. In addition, the participants of the competition “Moscow life in the summer” will paint unusual art objects: arches, balls and floor lamps – applications are being accepted until the end of May.

    Sergei Sobyanin: Large-scale project “Summer in Moscow” will begin on June 1

    Festival “Moscow Estates” will allow Muscovites and guests of the capital to immerse themselves in past eras in an original interactive format. The previous summer season was a record-breaking one: the event took place on the territory of 40 estates, which were visited by more than 700 thousand people. The festival was also held in winter.

    The capital will also host the Ice Moscow Tea festival, which will bring together more than 500 gastronomic establishments. Throughout the summer, they will offer visitors ice Moscow tea. The drink is prepared according to original recipes. As part of the project “Moscow Tea Party” Restaurants, cafes and hotels will continue to serve special tea sets in a signature service and with signature treats. Tea “Moscow” can be found in popular retail chains, souvenir shops and other places in the capital.

    For participants Russpass gamesusing augmented reality technologies, will offer 100 new sites where you need to look for cartoons as part of the Summer in Moscow project. For each meeting with them, virtual points are given in the form of experience. Using them, you can buy tickets to museums and other places in the capital with a discount of up to 99 percent as part of the Russpass bonus program. The game is available in the Russpass mobile application.

    An augmented reality game has been launched for guests of the Winter in Moscow venues

    Circus, theater and patriotic quests

    From June 1 to August 31, the capital will host an international open festival “Teatralny Boulevard – 2025”. Moscow will be transformed into a single large theater stage, where Muscovites and guests of the capital will be able to immerse themselves in the world of theater, try themselves in the role of an actor, decorator and director, as well as take part in a production or visit a creative workshop, learn more about the history of the theater and take a photo with their favorite artist. And of course, guests will see the best productions of Russia and foreign participants.

    Over the course of three months, more than 600 productions will be presented at 14 venues in the capital, including the amphitheater on Pokrovsky Boulevard and the amphitheater in the Polytech Museum Park. More than three thousand artists from all over the world will take part in them.

    June 1st Museum-Reserve “Kolomenskoye” a large-scale celebration of International Children’s Day will take place. Previously, it was held for many years on Tsvetnoy Boulevard, but this year the beloved event will take place at a new site that will be able to accommodate even more guests.

    Every year, the main theme of the festival is a dedication to beloved children’s poets, artists, writers, legendary films and cartoon characters. In previous years, festivals were dedicated to the legacy of Sergei Mikhalkov, Nikolai Nosov and Korney Chukovsky. This year marks the 50th anniversary of the film “The Adventures of Buratino”, which millions of children in our country have watched and continue to watch. Therefore, the festival will be held in honor of the cult character of Alexei Tolstoy.

    World Festival of Circus Arts “Idol 2025”will be held in Moscow for the ninth time. Its venue will be the arena of the Great Moscow Circus on Vernadsky Avenue, the largest circus in Europe. Guests will be able to attend performances for a whole month. The main events are scheduled from July 17 to 20, and then, until August 17, viewers will be able to enjoy the gala show of the winners.

    Since 2013, the festival has established itself as one of the most significant events in the world of circus arts. It has brought together more than 1,700 artists from 50 countries, including participants and spectators from China, Vietnam, the Philippines, Italy, Spain, Germany, Poland, Austria, the USA, Mongolia, Ethiopia, Tanzania, Mexico, Chile, Brazil, Argentina, Cuba and many other countries. The main awards – “Golden Idol”, “Silver Idol” and “Bronze Idol” are awarded by a professional jury for the most spectacular, unusual, flawlessly performed number. The prizes “Golden Manege”, “Silver Manege” and “Bronze Manege” are presented by representatives of the media. The audience sympathy prizes “Golden Audience Hall”, “Silver Audience Hall” and “Bronze Audience Hall” are awarded based on the results of audience voting.

    The Summer in Moscow project will also feature a tent circus. The structures will be located in several picturesque corners of the city. Guests will be able to immerse themselves in an atmosphere of real magic and fun. Some of the best Russian artists will present their productions and numbers. Spectators will see a show with aerial gymnasts on canvases, acrobats on a swing trapeze, clown duets, equilibrists, and jugglers. There will also be numbers with animals.

    Victory Park will be transformed into an open-air museum. In the year of the 80th anniversary of Victory, a large-scale patriotic project has been prepared for visitors. They will be offered walking and bus tours with professional guides, as well as tours in retro cars. In total, four walking routes run through the park, on which 25 monuments of Poklonnaya Gora are located.

    For young visitors, interactive quests along tangled military roads and secret partisan paths will be organized. All comers will be able to receive a stylized Red Army book, in which they can collect star stamps for completing tasks. The most active participants will receive memorable souvenirs and prizes.

    On the territory of Victory Park you can play skittles, chess and laser tag, as well as assemble a soldier’s kit bag, write a letter to the front and much more.

    Moscow Children’s Arts Festival “Sky”will be held for the third time in the capital from May 31 to June 1 in the Muzeon Arts Park. It will unite various types of art (theater, circus, music, dance), as well as science, literature and architecture. Guests will enjoy premieres, children’s operas and tours of leading regional theaters, an architectural workshop, master classes of musicians and choreographers, literary and scientific programs. Theaters and creative groups from Moscow, St. Petersburg, Nizhny Novgorod, Perm, Voronezh, Krasnoyarsk, Tobolsk, Almetyevsk and Kaliningrad will present their performances and numbers. About 90 different productions will be held at 12 venues. Guests will be able to see them from 11:00 to 20:00, admission to all events is free. Last year, the festival was visited by more than 180 thousand people.

    In early July, the Tsaritsyno Museum-Reserve will celebrate Day of Family, Love and Fidelity. This summer, the festival will be held in a multi-genre festival format for the 11th time. Last year, it was visited by 57 thousand people, for whom more than 250 artists from famous Moscow theaters and groups performed. The venue hosted lectures, over 200 master classes and other events.

    An extensive educational program has been prepared for guests of Zaryadye Park. It will begin on International Children’s Day, June 1. Each participant will be able to try themselves in the role of a physicist, chemist, biologist or engineer. Guests will also be treated to a large quest created jointly with scientists from the Lomonosov Moscow State University.

    On June 21 and 22, the Zaryadye Park will host the Theatre Weekend festival. This year, the program is dedicated to the 165th anniversary of Anton Chekhov’s birth and the 80th anniversary of the Victory. Spectators will see performances by leading Moscow theaters: the A.P. Chekhov Moscow Art Theater, the Russian Academic Youth Theater, the Moscow Sovremennik Theater, the Central Academic Theater of the Russian Army, the Praktika Theater, and others. The festival’s motto this year will be “Make way for the young!” Therefore, groups from the Moscow Art Theater School, the Moscow State Institute of Culture, the Russian Institute of Theater Arts – GITIS, as well as special guests – actors from the Donetsk Republican Academic Youth Theater will perform on stage.

    From classical music to photo exhibitions

    On June 28 and 29, the Zaryadye Park will host the New Classics festival. This year, the program is dedicated to the 125th anniversary of the birth of the avant-garde pianist and composer Alexander Mosolov. Spectators will hear his composition “Factory. Music of Machines” for the first time. Part of the work was lost, and composer Nikolai Popov and director Yuri Kvyatkovsky will supplement it, creating a large festival form. “Moscow. Music of Machines” will connect two musical eras – the avant-garde Moscow of the early 20th century and today’s Moscow. The main theme of the festival will be a dialogue between man and technology, and Zaryadye Park will once again become a space where modern classics meet the future, and traditions intertwine with innovations.

    From June 1 to September 7, film screenings will be held in the atmospheric space of the park under a glass crust as part of the “Cinema Summer in Zaryadye” festival. Viewers will see masterpieces of Russian cinema created by Vladimir Menshov, Tatyana Lioznova, Karen Shakhnazarov, Grigory Alexandrov, Mikhail Kalatozov, Alla Surikova and others. The films of these directors have already become classics. They are still watched with interest by viewers of different ages.

    Guests will be treated to 30 films, ranging from romantic comedies set against the backdrop of summer landscapes to poignant war dramas, exciting space adventures and profound social studies.

    As part of the Summer in Moscow project, two photo exhibitions will be held on Tsvetnoy Boulevard. They are dedicated to the 90th anniversary of the birth of People’s Artist of the USSR Yuri Solomin and the 110th anniversary of the birth of People’s Artist of the USSR Vladimir Zeldin.

    The exhibition in memory of Yuri Solomin will be prepared by the Moscow Directorate of Mass Events under the supervision of the State Academic Maly Theatre and his granddaughter Alexandra Solomina.

    The exhibition dedicated to Vladimir Zeldin will be organized by the Moscow Directorate of Mass Events together with the Central Academic Theater of the Russian Army. Muscovites and guests of the city will be able to get acquainted with the creative legacy of the legendary actors and see photographs from their family archives.

    Events in honor of the 80th anniversary of the victory in the Great Patriotic War

    On June 21 and 22, Moscow will host two significant events dedicated to preserving the memory of the Great Patriotic War: “Memory Line” on the Krymskaya Embankment of the Muzeon Arts Park and “Memory Watch. Eternal Flame” in the Alexander Garden. Every year, Muscovites and guests of the capital come to support them with their entire families.

    For 11 years, on June 21, the day before the start of the Great Patriotic War, the Crimean embankment of the Muzeon Art Park is illuminated by the light of 1,418 candles. Each candle is a symbol of one of the days of the war. The burning “memory line” runs from June 22, 1941 to May 9, 1945.

    The first candle in the campaign is symbolically lit from a piece of the Eternal Flame on Poklonnaya Hill. Anyone can join the event and light a candle, thereby reminding themselves and their loved ones of the importance of preserving the memory of the terrible years of the war. Every year, the line lights up in a matter of hours and continues to burn throughout June 22.

    During the event “Memory Watch. Eternal Flame” all those wishing to can remember the events of June 1941 and honor the memory of those who died for their Motherland by laying flowers at the Tomb of the Unknown Soldier. Every year young men and women from youth associations, public organizations and patriotic clubs, as well as Muscovites and guests of the capital, join in. At 04:00 a documentary recording of Yuri Levitan’s message about the beginning of the Great Patriotic War of 1941-1945 will be played. After that, there will be a minute of silence and the laying of flowers.

    On April 26, the Victory Park project began on the territory of the Victory Park. The Main Patriotic Park, implemented by the Victory Museum with the support of the Moscow Government. Until October, on weekends, visitors will be able to take the quest “Forward to Victory!” for free, which is held at more than 80 interactive sites, and immerse themselves in the atmosphere of the 1940s.

    From carnival processions to jazz concerts

    From August 28 to 31, the Gorky Festival will be held in Gorky Park. The theme of this year’s event is “Gorky Chekhov”. The theatrical program will be held at the Moscow Youth Theater, the main events, as always, will be presented in Gorky Park and Neskuchny Garden.

    Guests can expect theatrical performances, exhibitions and installations, a theatrical laboratory, a music program and a circus show. Last year, the festival covered 18 venues, which were visited by more than 330 thousand spectators.

    In June, the capital will host the IV Moscow Jazz Festival, one of the largest jazz festivals in the world and the largest jazz festival in Russia. On June 9 and 15, the opening and closing ceremonies will be held in the P.I. Tchaikovsky Concert Hall. From June 10 to 14, festival events will be held in the Hermitage Garden, Zaryadye Park, Muzeon Arts Park, VDNKh, and the Tsaritsyno Museum-Reserve. Guests will enjoy over 400 hours of live music performed by over 1,000 musicians.

    The III Moscow Summer Music Festival “Zaryadye” will be held from June 2 to July 6. World-class stars and invited artists will present concerts, special and children’s projects on the stage of the Zaryadye Hall. The closing of the festival will take place in the open air in the park’s amphitheater.

    Sports and entertainment in parks

    With the arrival of the long-awaited summer, more than 55 million guests are expected in over 50 capital parks, for whom a multi-format festival program has been prepared.

    Muscovites and tourists can expect large-scale events, including the park festival “Gardens and Vegetable Gardens”, City Day and many others.

    The parks will host over 10,000 local events. Sports enthusiasts will be able to attend daily morning exercises, outdoor training, and much more. Participation in the classes will help improve health, improve physical fitness, and develop teamwork skills.

    The cultural program includes parties in summer cinemas, immersive performances and dances. Professional artists and creative groups will present their numbers and theatrical performances. Every weekend, park visitors will be treated to music, dance flash mobs and open-air karaoke, and the Park Symphony festival will combine musical rhythms of different genres.

    Residents and guests of the capital will be able to attend gastronomic events: open master classes by famous chefs and lectures on culinary trends. Special places will be equipped for picnics.

    Summer Program for Youth: Development and Creative Growth

    Young Muscovites will enjoy an extensive entertainment and educational program. From June 9 to July 19, the Moskino Cinema Park will host the first creative camp, “Youth of Moscow.” Participants will be able to demonstrate their skills in choreography, vocals, humor, and other creative areas. The shifts will be dedicated to different areas of art: KVN, vocals and music, cinema, producing, original genre, and event organization. The “KVN School” shift is aimed at developing skills in humor and teamwork, while the “Original Genre School” will help aspiring circus performers, cheerleaders, gymnasts, and acrobats improve their skills in the performing arts, and learn how to work with props in interactive productions. As part of the “Dance School,” children will develop their abilities and try themselves in various choreography styles, learn to express emotions in dance, and create their own unique productions. In the “School of Vocals and Music” young Muscovites will be able to improve their vocals, work on their voices with professionals and unite into youth musical groups. The shift “School of Cinema, Producers and Event Organizers” will be aimed at developing organizational skills, producing and acting skills.

    The final race will be held in the format of the Art Quarter festival, where an open large-scale gala concert will take place, uniting all directions. It will be prepared by young people from different shifts of the camp.

    From June 28 to August 4, the patriotic camp “Youth of Moscow. Capital. Summer” will operate for the fourth time. The site will be the territory of the recreation center “Red Carnation”. Participants will have six thematic shifts.

    The “Achieve” shift will bring together athletes, “Manage” — representatives of student government, “Improve” — young professionals, and the “Help” shift will bring together Moscow volunteers. Young Muscovites will be able not only to develop their skills in various fields, but also to find friends, realize their creative potential, and gain new emotional experience. Songs with a guitar and meetings around a large fire will become a tradition of the camp. Meetings and master classes with participants of a special military operation are planned. All shifts will also teach how to provide first aid, resist fire, and ensure safety for yourself and your loved ones in emergency situations.

    City residents aged 18 to 35 can apply for participation. Registration is open on the portal “Youth of Moscow”.

    In honor of Youth Day, the capital will host a large number of events — from master classes and intellectual games to creative concerts and events. The flagship event will be held in Khodynka Pole Park on June 28 and 29. This year, the festival concept provides for the synergy of key areas for the comprehensive development of the city’s youth. Eight key zones dedicated to various topics will be prepared for guests: patriotism, career guidance, creativity, personal development, friendship, sports, volunteering and trends. Visitors will enjoy educational lectures, trainings and master classes, a job fair, competitions in various sports and much more.

    Traditionally, on Youth Day, the KVN League Summer Cup “Youth of Moscow” and the “Space Basketball” tournament will be held, in which youth teams will take part. Young performers who want to make a name for themselves throughout the city will be able to perform on an open stage.

    From May 25 to September 7, the Youth Point festival will be held on Bolotnaya Square. The site will host hubs — interactive modern spaces dedicated to art, sports, development, and future competencies. The festival program will include large open discos, master classes in sketching, water painting, sports activities, and much more.

    Charity initiatives

    On July 5 and 6, the Bauman Garden will host the charity festival “City of the Caring”, dedicated to the Day of Family, Love and Fidelity. The entertainment program will include activities for the whole family. Guests will enjoy creative master classes, a charity quest, a no-lose lottery and photo zones for summer photos. A play area will be set up for children. At the “Fluffy Friend” site, guests will be able to meet animals from shelters and choose pets for themselves. A charity fair will also open, where goods from Moscow non-profit organizations (NPOs) will be presented. All proceeds from sales will be directed to helping their wards.

    Visitors will be able to get to know the city’s social projects better and take part in them.

    Checkers, table tennis and fitrock

    From May 29 to September 7, Moscow will host a festival of urban sports. Throughout the summer, sports training and entertainment events aimed at popularizing an active lifestyle among residents of the capital will be held in the capital’s parks. The most active participants will receive prizes.

    The project “Summer. Beach. Moscow Sport” will be held from May 31 to August 31. It is organized for those who spend the summer in Moscow. Zumba, stretching, functional training, beach volleyball, yoga and fiery fitrock training will be held in beach recreation areas on weekends. In addition, there will be an opportunity to play tetherball, frisbee and beach tennis.

    From May 31 to September 7, training sessions for the new season of the Sports Weekend project will take place, thanks to which city residents can do sports for free under the guidance of professional trainers on Saturdays and Sundays at more than 50 unique venues in the city, as well as online.

    From June 1 to September 7, the “Chess Square” space will be available near the Metropol Hotel. On weekdays, anyone can take chess sets and play easy games. On weekends, there will be family, open and children’s tournaments, as well as master classes by famous grandmasters.

    From June 1 to September 30, a new season of free training will be held as part of the My Sports District project. Participation in them will be interesting for city residents who love sports and want to do them regularly. Classes are held all year round and change depending on the season.

    On July 5, large-scale sports events “Moscow Sports Day” and “Moscow Sports Night” will take place. Guests will enjoy more than 20 themed sports grounds, master classes, tournaments and a concert with popular artists at “Moscow Sports Day”, as well as more than 15 zones with sports activities and autograph sessions with famous athletes at “Moscow Sports Night”.

    “Green Market” and art pavilions

    From May 25 to September 7, art pavilions of the Made in Moscow project will operate in tourist areas of the capital. Here you can buy more than 70 thousand products from local manufacturers – from clothes and cosmetics to children’s toys and food products.

    The flagship venue will be the Green Market on Bolotnaya Square, where a rollerdrome with a summer cinema will be available for the first time. Guests will be treated to a rollerdrome show, discos and events organized with the participation of the capital’s Committee on Public Relations and Youth Policy, which became a partner of the flagship venue for the first time this summer season.

    Reservation of venues

    The mos.ru portal is resuming its work on the city space booking service “Everyone on the street!”. From May 20, you can submit applications for holding events.

    Representatives of small and medium-sized businesses, individual entrepreneurs, self-employed individuals and individuals can book a site free of charge.

    More than 100 venues will be available for booking, including chalets for master classes, stages, gazebos, sports and dance floors, located in every district of the city.

    Results of the booking service last year

    Last year, the city hosted the festival “Summer in Moscow. Everyone out on the street!” for the first time – a new format of interaction between the city, business and Muscovites within the framework of the event program. Its key feature was that the agenda of summer recreation in the capital was created by Muscovites themselves. About 25 thousand events (every fourth) were organized by residents, businesses or NGOs. About 1.1 thousand entrepreneurs organized about 8.5 thousand events and presented their projects to a wide audience.

    Special project “Time of Opportunities”

    For the capital’s entrepreneurs, a special project called “Time of Opportunities” is starting, previously called “Come on in!” This is an excellent opportunity to vividly tell about your business, making it memorable for a wide audience. Shops, restaurants and cafes, service enterprises, fitness centers and sports studios, educational centers and creative studios can take part in the project.

    Participants will receive a summer business box, which includes a set of free services from market leaders for business promotion, the opportunity to post information about their events on the mos.ru poster, in the Yandex Maps and 2GIS applications, as well as media support in the media: on television, in online publications, print media and Telegram channels.

    The Russpass website will organize a collection of feedback from visitors. Entrepreneurs who have collected the largest number of positive reviews will receive a package for promoting their business, “The Most Active”.

    To become part of the project, you need to prepare a unique special offer. These can be thematic master classes, seminars, shows, performances and much more. You also need to fill out a participant’s questionnaire.

    Results of the special project for the last season

    As part of the special project “Come on in!”, more than 700 organizations from various fields made over 900 offers to city residents and tourists. These were discounts and bonuses, free master classes, gastronomic tastings, tickets to performances and sports classes. More than six thousand people took advantage of them.

    Art pavilions of the Made in Moscow project

    On April 15, a selection began among the capital’s entrepreneurs who will present their products in the art pavilions of the Made in Moscow project market, which is part of the city’s summer program Summer in Moscow.

    The selection will be held for participants of the Made in Moscow project – these are self-employed people, individual entrepreneurs, representatives of small, medium and large businesses that produce children’s goods, clothing and footwear, accessories, household and animal goods and much more in the capital.

    To do this, you need to register in the project on the website business.madeinmoscow.rf, having previously familiarized yourself with the conditions (availability of a capital tax identification number, as well as a full or partial production cycle on the territory of Moscow).

    A large-scale market of local goods will cover the main tourist sites, including Bolotnaya Square. More than 700 Moscow brands will be able to get space on the shelves for selling goods. Entrepreneurs will not only present their products, but will also hold thematic lectures and master classes, organize prize draws and tastings.

    Participation in the summer market “Made in Moscow” is a free measure of support provided to businesses by the capital Department of Entrepreneurship and Innovative Development.

    This allows local brands to increase their recognition among city residents, as well as sales of goods that they produce in the city. Thus, last year from August 1 to September 9, as part of the forum-festival “Territory of the Future. Moscow 2030” on Bolotnaya Square, the market of the future “Made in Moscow” was open. It was visited by more than 150 thousand people, and the revenue of the market participants reached 50 million rubles.

    It is also worth noting the successful experience of the Made in Moscow magic market as part of the city’s winter program “Winter in Moscow”. It was held from December 20 to February 28 at seven popular sites – from Arbat to Kuznetsky Most. It was visited by more than 570 thousand people. Moscow entrepreneurs sold over 50 thousand goods.

    The market became one of the key measures of city support, which was used by more than 500 Moscow brands. A rich entertainment program was organized for guests, including more than 3.5 thousand thematic events, including master classes and fashion shows.

    Get the latest news quicklyofficial telegram channel the city of Moscow.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/nevs/ite/154057073/

    MIL OSI Russia News

  • MIL-OSI Russia: Pavilions and piers will appear on Pushkinskaya Embankment in Gorky Park

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    In the Gorky Central Park of Culture and Leisure, work continues on the construction of two multifunctional pavilions on Pushkinskaya Embankment. The construction of two berths is also planned there.

    Multifunctional pavilions in the form of a liner

    The pavilions are being built on a metal frame with reinforced concrete floors. Four of them are already ready, and two more are under construction. They will resemble a cruise liner.

    Floor-to-ceiling stained glass will be used for the facades of one of the pavilions under construction. Heated ceramic granite slabs will be laid on the roof that is used for construction, where an observation deck will be equipped. The area of the building will be 3.1 thousand square meters. Work is currently underway to construct a pit with soil replacement and a foundation; specialists have also begun installing the metal frame.

    Another multifunctional pavilion with an area of 3.5 thousand square meters and a height of 17.3 meters will be erected next to the Crimean Bridge. Its appearance will show features of constructivism. The construction of the foundation pit has already been completed, workers are starting to construct the foundation and install the monolithic slab and metal structures.

    The pavilion will have several entrances: from the Crimean Bridge, the service alley, and from the embankment. In front of each of them, a small cozy area will be arranged, and from the embankment side, an amphitheater and a green hill will be made in front of the entrance.

    On the first floor, a summer terrace will be equipped with a view of the lilac garden. On the second floor, a multi-purpose hall with a panoramic window overlooking the park will appear. It will be possible to hold a variety of events here.

    The existing passage to the embankment along the Crimean Bridge will be significantly expanded. Opposite the pavilion, a decorative panel will be created based on an unrealized sketch by Alexander Deineka.

    Piers-trestles

    This year, it is also planned to build two berths with a total area of 1.6 thousand square meters. They will be located on both sides of the ramp-stand on Pushkinskaya Embankment. Three barges will be used in the construction, two of which will deliver and store cargo, and another one will house a construction camp. They will also use two pusher tugs, a floating crane and a special pontoon for installing a crane and assembling berth structures.

    The berth structures will be trestle-type structures 110 meters long. Metal frames will be mounted on a pile foundation, and reinforced concrete slabs will be laid on them. The top coating will be made of heat-treated non-slip granite in light gray tones.

    Stainless steel railings will be installed on each of the berths. The first of them will have six staircases, including four with ramps for people with limited mobility, and the second will have three with ramps. Benches and trash bins will be installed nearby.

    Capital heated pavilions will be erected on the berths, where checkpoints with inspection equipment and turnstiles for paying for the trip will be placed. The pavilion frames will be metal, and stained glass structures made of double-chamber glass units with tempered triplex will be used for the facades.

    The buildings are equipped with good lighting, ventilation and air conditioning systems. Cable lines will be laid to organize the power supply. In order not to pollute the river with surface runoff from the piers, two water purification systems will be installed in the form of filter cartridges, which are cylindrical structures.

    The berths will be illuminated by modern LED lamps, and the pavilions will be equipped with architectural and artistic lighting.

    To ensure safe navigation on the Moscow River, the bottom will be deepened. To avoid erosion, it will be reinforced with gabion mesh structures placed on a layer of crushed stone in front of the berths.

    After the completion of the work, Pushkinskaya Embankment will become an even more popular place for city residents and tourists of all ages.

    Sergei Sobyanin: We are implementing six improvement projects in the Eastern Administrative District this year

    Get the latest news quicklyofficial telegram channelthe city of Moscow.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/nevs/ite/154127073/

    MIL OSI Russia News

  • MIL-OSI: Bitcoin Buys a View: Trump Tower Dubai Embraces Cryptocurrency Payments via Deus X Pay

    Source: GlobeNewswire (MIL-OSI)

    VILNIUS, Lithuania, May 21, 2025 (GLOBE NEWSWIRE) — Deus X Pay, a licensed institutional stablecoin payment solution setting new standards across the luxury sectors, is now enabling crypto payments for property purchases at the new Trump Tower Dubai, the first Trump International Hotel to be built in the Middle East.

    The new $1 billion Trump Tower Dubai, unveiled through partnership with London-listed Dar Global, marks a breakthrough in global luxury real estate. Eric Trump, Executive Vice President of the Trump Organisation and son of US President Donald Trump, has recently announced that Bitcoin and other digital currencies will be accepted for condo sales.

    Ziad El Chaar, CEO of Dar Global, said the Trump Tower Dubai is among the most ambitious Trump-branded residential towers globally, reflecting the project’s magnitude, stature, and symbolic significance in the region and internationally.

    Trump previously told Gulf Business that Dubai is where luxury real estate and financial innovation intersect, and projects like Trump Tower Dubai are leading the way. By embracing technologies like stablecoins, buyers gain a faster, cheaper and more transparent way to secure exclusive, high-end properties while reshaping how luxury transactions are conducted.

    Deus X Pay, a licensed Virtual Asset Service Provider (VASP) in Lithuania, offers institutional stablecoin payment solutions, enabling luxury sectors such as real estate, aviation and yachting to capitalise on this new era of finance. Deus X Pay CEO, Richard Crook, highlights that Dubai has created an environment where stablecoins can flourish as a practical, secure tool for international transactions (with Crypto Watch reporting that crypto adoption in the UAE is expected to surge 210% in 2025), giving premium buyers faster, frictionless access to high-value assets.

    “Dubai’s forward-thinking stance has unlocked a whole new economy, and the gold standard for transactions of high-value assets. International buyers seek faster settlements, fewer cross-border complications and seamless access to premium developments. This project is a defining moment — not just for Deus X Pay, but for the global real estate sector. We are thrilled to deliver the regulated rails that make it possible for premium property buyers to transact instantly, compliantly and without the traditional delays or friction.”

    The Trump Tower Dubai, an 80-story architectural icon, offers the highest international standards for ultra-high-net-worth travellers and long-stay residents. The exclusive building boasts 2-3 bedroom apartments and 4-bedroom penthouses valued at over AED 73 million, the highest outdoor swimming pool in the world, and has views of the world’s tallest building, the Burj Khalifa.

    This new skyscraper is part of an expanding trend across private aviation, superyachts, and luxury collectables as high-end sectors embrace digital assets as a payment option to future-proof legacy industries.

    For media enquiries, contact:
    Sarah Tran
    Head of Marketing
    media@deusxpay.com

    About Deus X Pay
    Deus X Pay is a regulated provider of institutional stablecoin payment solutions, revolutionising the authorisation, clearing, and settlement of cryptocurrency payments. We enhance global payment options for institutions, businesses, and corporations by seamlessly merging traditional finance with advanced digital payment infrastructure, enabling faster, more cost-effective, and secure transactions.

    Fully compliant and regulated as a Virtual Asset Service Provider, Deus X Pay operates under a license in Lithuania, supervised by the Financial Crime Investigation Service (FNTT), the Czech Republic, supervised by the Financial Analytical Office (FAU), and in Canada, supervised by the Financial Transactions and Reports Analysis Centre of Canada (FINTRAC).

    As a part of the innovative crypto investment firm Deus X Capital, we equip organisations with state-of-the-art financial tools aimed at fostering growth and success in today’s dynamic market.

    Disclaimer: This is a paid post and is provided by Deus X Pay. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/4da4d9a6-74af-4322-b030-f4ed0f09eb4f

    The MIL Network

  • MIL-OSI New Zealand: 2-for-1: Police bag prolific Auckland shoplifters

    Source: New Zealand Police

    Police have caught up with two of Auckland’s most recidivist retail crime offenders this week.

    Both men were of interest to the National Retail Investigation Support Unit (NRISU), after allegedly committing more than $10,000 worth of offending in recent months.

    Early this morning, a Waitematā Crime Squad unit came across a vehicle in Massey while carrying out prevention patrols.

    Detective Senior Sergeant Megan Goldie says a traffic stop was carried out on Don Buck Road.

    “It was soon established the man was being sought in relation to a series of shoplifting from retailers across Auckland,” she says.

    “The man will face seven shoplifting charges, with three of those being valued over $1000.”

    The 41-year-old will be appearing in the Waitākere District Court today and will have his bail opposed.

    Meanwhile, further south, Counties Manukau East Police have laid more than 10 charges against a Mongrel Mob member.

    Area Prevention Manager, Inspector Rakana Cook says units were attending a family harm event in Ōtara on Sunday.

    “Staff established one of the parties involved had numerous warrants for his arrest in relation to shoplifting offending in Auckland and Whangārei,” he says.

    “He was also a target for the NRISU given how prolific his offending has been over the past month.”

    Inspector Cook says the 34-year-old man appeared in the Manukau District Court on 10 shoplifting offences.

    “Police successfully applied to have this man’s bail opposed and he has been remanded in custody to reappear in July.

    “It’s a fantastic outcome and the man has been held accountable for thousands of dollars’ worth of offending.”

    ENDS.

    Jarred Williamson/NZ Police

    MIL OSI New Zealand News

  • MIL-OSI Russia: Between Paris and Moscow: Double Portrait in the Interior of the Era

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    Exhibition of artists Alexandra Koltsova-Bychkova and Sergey Koltsov “Between Paris and Moscow”— is a cinematic walk. Its geometry is built like a city: wide squares are given over to monumental canvases, and narrow alleys lead to chamber works, sculptures, personal items and photographs. The laconic color scheme: his — deep green and hers — delicate lilac — emphasizes the dialogue of two creative universes. The exhibition is open at the Museum of Moscow until August 24.

    Double Portrait of (Not) Forgotten Artists

    “This exhibition was created following the previous project, ‘Muscovite. Women of the Soviet Capital in the 1920s and 1930s,’ which took place exactly a year ago,” says curator Ksenia Guseva. “One of the heroines was Alexandra Koltsova-Bychkova. Visitors asked questions: ‘Who is she? Why did no one know about her? How did she end up in Paris?'”

    This is how the idea of a personal exhibition was born, which turned into a double portrait – of Alexandra and her husband, sculptor Sergei Koltsov.

    These two artists did not shout about themselves, did not join groups, were not the “main” artists of the era, but perhaps they reflected it most accurately – not in manifestos, but in details and halftones.

    Two retrospectives in one space

    The exhibition has a geography and a clear storyline. The cities act as co-authors. “The story of a married couple is connected with two cities,” explains Anna Trapkova, General Director of the Museum of Moscow. The exhibition begins with revolutionary Moscow, and at its culmination takes the viewer to seething Paris. “This is a combination of a person’s biography, the life of the city and a creative path,” adds Anna Trapkova.

    The exhibition unfolds like a literary script for a good film, divided into four chapters.

    “Obretenie” – Moscow, 1910s, Stroganov School. He is a budding sculptor, in love with the Renaissance, she is a little older – a master of embroidery, unlike her avant-garde peers in red scarves and overalls, feminine and graceful.

    “Paris” is a business trip in the late 1920s, where they discovered the freedom of European modernism and understood that an artist can create for himself and about himself.

    “Outside the Current” – return to the USSR. Koltsov’s recognition – successes in monumental creativity. Koltsova-Bychkova’s rejection of art for the masses.

    “Solitude” – Koltsov leaves life. Creativity became a way to transform loneliness into solitude and contemplation.

    Each of the four sections has its half and its half. And, like in a good movie, there is a plot, a climax, a denouement. There is a general line – the artists’ biographies, their main works. There are details – documents, even Alexandra’s student card from Stroganovka, personal photos: chamber, intimate cards – she in a cambric shirt on a balcony on vacation in Crimea… A beautiful woman who loved to be photographed. She loved to paint her self-portraits and loved it when her husband painted her. She was a muse for him and for herself.

    The exhibition’s graphic design also works to tell the story of two artists who reflected each other in their work. “The inverted titles live in an interesting way – this is a hint at mirrors. You can notice in the writing of the chapters that the capital letters are of an atypical design,” notes graphic designer Rustam Gabbasov, who said that he was inspired by the variety of fonts on Koltsova-Bychkova’s Parisian business card.

    Sergei Koltsov: from Stroganov’s student to sculptor

    The son of a skilled cabinetmaker, Koltsov entered the Stroganov School at the age of 15. During his student years, he created plaster bas-reliefs in the spirit of the Renaissance, a bronze St. George the Victorious, a wooden pagan Bacchus, and showed that he was not afraid of experiments and masterfully worked with different materials.

    The curator points to the only surviving sculpture from the 1920s — a sketch for a monument to Mikhail Frunze. If you remove the Budyonovka, we will see a work that refers to the masters of the Renaissance. “He masterfully juggled various historical styles. Each of his monuments, created in the context of socialism, has a similar source of inspiration,” Ksenia Guseva emphasizes.

    Alexandra Bychkova: Muse, Embroiderer, Artist

    Bychkova came to Stroganov as an experienced craftswoman: she was much better at embroidery than her fellow students. Her diploma work, a panel with three melancholic muses in a flower garden, is a reference to either the Pre-Raphaelites or Borisov-Musatov. In the 1920s, she worked as a costume designer at the theater and headed the embroidery workshop. Among the key exhibits were the elegant hats that Bychkova decorated. Her signature style and color scheme were discernible in them. The hats were brought in worn out, and Alexandra gave them a second life and turned them into art objects rather than wardrobe details. After Stroganov, she entered VKHUTEMAS, but chose the painting department, which determined the direction of her work.

    Unity and independence

    In 1924 they got married, and the exhibition features a touching exhibit – a surviving marriage certificate. She took a double surname – Koltsova-Bychkova, emphasizing their unity and her independence.

    “It’s surprising, but these are completely different artists, sometimes diametrically opposed,” notes Anna Trapkova, director of the Museum of Moscow. “But they are obviously in dialogue.”

    Their dialogue was especially dynamic in their portraits of each other. Koltsova-Bychkova often depicted her husband, drawing parallels, as modernists loved. For example, she paints him with a bandage after an operation, making a reference to Vincent van Gogh’s “Self-Portrait with a Cut-Off Ear and a Pipe.” Among Koltsov’s surviving paintings is a portrait of Alexandra: she stands with a brush and palette, immersed in her work.

    Of interest is Koltsova-Bychkova’s still life with a sculpture of her husband, “Portrait of a Wife,” which the Moscow Museum acquired at auction on the eve of the exhibition.

    “Koltsova-Bychkova depicts herself through the eyes of her husband in a sculptural embodiment. This piece is significant in terms of how their creative destinies intersected and what their love story was,” notes Anna Trapkova.

    Moscow – Paris – Moscow

    In the 1920s and early 1930s, long trips abroad for Soviet artists were not uncommon. Koltsov spent two years in Paris on the orders of the People’s Commissariat of Education, his wife stayed for four. He painted pictures of Parisian life – he shared the views of the French socialists. The largest work of that period is presented at the exhibition – “Parade of the Disabled in Paris”: together with the artist, we observe the annual meeting of veterans of the First World War – the atmosphere and color of the work are tense.

    Koltsova-Bychkova is in demand in Paris. She creates embroideries, prints for fabrics, textile panels. The panels are also at the exhibition – bright, contrasting and at the same time very harmonious.

    After Paris…

    When the couple returned from France, Moscow greeted them with a different city. The NEP was replaced by industrialization, the city was being built dynamically. Artists created frescoes, monumental sculptures, ceramic panels – art was supposed to become part of the architecture. Koltsov was looking for a balance between monumentality and chamber, personal art. And his wife completely immersed herself in painting, as she understood it, without looking back at trends.

    “In Paris, they realized that an artist might not owe anything,” notes curator Ksenia Guseva. “After her return, Alexandra withdrew from professional life, but immersed herself in painting.”

    A monumental artist without a monumental legacy

    Koltsov became a sought-after monumentalist: he supervised the creation and installation of sculptures on the roof of the Lenin Library, and participated in the post-war restoration of Moscow. Ironically, almost none of the monumental heritage was preserved or was not implemented. In the 21st century, during restoration, his sculptures were removed from the facade of the Bolshoi Theater – their subsequent fate is unknown. But the chamber works presented at the exhibition surprise with their diversity: the figure of an old fisherman, a female torso made of wood, a bronze sculpture “Motherhood”, paintings, sketches – the master was interested in different aspects of life, styles, materials.

    They loved living outside the city. For him, the dacha became an escape from endless orders, for her, a place of artistic discoveries. She paints a self-portrait in a dacha hat with a reference to Van Gogh, and draws colorful and complex still lifes with flowers that she grew herself.

    (Not) The Finale. Solitude…

    After her husband died of heart disease in 1951, Koltsova-Bychkova continued to paint the same subjects, but the colors became deeper: instead of fresh light green and pink, they were burgundy, violet, and dark crimson. She began the main late cycle with her husband, and finished it alone — views from the balcony of their apartment.

    “This tragic part is reflected in the exhibition: Koltsova-Bychkova remains alone, continues to live in the famous Pertsov House, sees how the Cathedral of Christ the Savior is being demolished, watches how the House on the Embankment grows. In a series of works, we see changes from the same point in different time periods, in different seasons,” says Anna Trapkova.

    This is a reference to Monet, to his views of the Rouen Cathedral. She devoted 30 years to this series of landscapes.

    Return…

    After her husband’s death, the artist devoted herself to preserving his legacy. She donated her works to museums, and in 1974, she organized her first solo exhibition, bringing back interest in the work of Sergei Koltsov. She painted until the end of her days and, according to her relatives, was a “tough nut to crack.” The archive was preserved by her niece Marina Medvedeva, and then by her children. The Koltsova-Bychkova family helped the creators of the exhibition and attended the opening. “These people were devoted to art their entire lives, and only amazingly talented people — my family — could write and create so much,” says Elena Krugova, Koltsova-Bychkova’s niece.

    Absolutely unlimited artists

    For most, Soviet art is Alexander Deineka, Vera Mukhina, Yuri Pimenov — the mastodons of that era. But there is another layer. “I am interested in looking at the Soviet history of art in a non-standard way. Our task is to discover forgotten names, to look at what was happening with art not from one point of view, but from different ones. These are absolutely unlimited artists,” sums up the exhibition curator Ksenia Guseva.

    The exhibition is an example of a multi-layered approach to revealing the artists’ work. The selection of works, the geometry of the space, and even the unusual fonts tell a long story of great love for art, two cities, and each other.

    Buy tickets for the exhibition “Between Paris and Moscow” you can on mos.ru.

    Get the latest news quicklyofficial telegram channelthe city of Moscow.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/nevs/ite/154121073/

    MIL OSI Russia News

  • MIL-OSI New Zealand: Greenpeace slams Federated Farmers over ‘selfish’ behaviour on climate

    Source: Greenpeace

    Greenpeace says that Federated Farmers’ intent to ‘go to battle’ over methane targets is yet another example of the agri-business lobby group’s selfish approach to life on our collective home.
    Federated Farmers, Beef + Lamb and Dairy NZ have been pushing for methane targets aligned with ‘no additional warming’ – an approach that has been harshly criticised by climate scientists, the Climate Commission and the Parliamentary Commissioner for the Environment.
    Greenpeace spokesperson Amanda Larsson says “The New Zealand dairy industry is the country’s worst climate polluter. The oversized dairy herd is cooking the climate with superheating methane emissions, yet agri-industry lobby groups refuse to play their part in tackling the climate crisis, instead leaving it to the rest of us to clean up their mess.
    “Yet again, Federated Farmers are attempting to convince us that they are the exception to the rule. But this new concept they’re promoting – no additional warming – is not based on science. They’ve simply come up with a way to count emissions differently so that they can justify doing less.”
    Methane emissions are responsible for a third of global heating to date, and the agricultural industry is the single biggest source. Those emissions are rising faster than at any other time in history.
    “The consequence of the livestock industry selfishly absconding their climate responsibility is that everyone else has to pick up the slack. Or, alternatively, that we all suffer the consequences of more floods, storms, fires and droughts. All of which affect frontline farming communities first,” says Larsson.
    Greenpeace says the key flaw in no additional warming is that it ignores the historic pollution caused by intensive livestock farming.
    “It’s a bit like expecting your mortgage to magically be written off. The catch is that your debt still exists, it’s just that someone else will have to pay for it. Ignoring the historic methane emissions from agriculture won’t make that pollution – or its warming impact – go away.”

    MIL OSI New Zealand News

  • MIL-OSI Security: Business Owner Pleads Guilty to Fraud and Money Laundering Schemes

    Source: United States Department of Justice (National Center for Disaster Fraud)

    PHILADELPHIA – United States Attorney David Metcalf announced that Zaven Yeghiazaryan, 44, of Newtown, Pennsylvania, pleaded guilty before the Honorable Gerald J. Pappert to 13 counts of an indictment charging him with conspiracy, health care fraud, wire fraud, and money laundering in connection with his execution of a variety of schemes.

    The charges arose from the defendant’s commission of fraud offenses targeting, among others, government programs, including through the use of shell companies and false identities, between January 2020 and April 2024. The defendant’s fraud offenses targeted two government programs which offered relief during the Covid-19 pandemic: the Small Business Administration’s Economic Injury Disaster Loan program, and the Pandemic Unemployment Assistance Program. In addition, the defendant admitted that he participated in a scheme to defraud the Medicaid program.

    Based upon his guilty pleas to the 13 counts, the defendant faces a maximum possible sentence of 230 years in prison, a three-year period of supervised release, and a $3,250,000 fine, restitution of $334,905 and forfeiture. Sentencing is scheduled for September 4, 2025.

    The case was investigated by the Social Security Administration – Office of the Inspector General, Internal Revenue Service – Criminal Investigation, the United States Postal Inspection Service, Homeland Security Investigations, the Department of Health and Human Services – Office of Inspector General, the United States Department of Labor, the United States Department of Transportation – Office of the Inspector General and the State Department. It is being prosecuted by Assistant United States Attorneys Mary E. Crawley and Special Assistant United States Attorney Megan Curran. 

    MIL Security OSI