Category: European Union

  • MIL-OSI United Kingdom: Award-winning author to hold talk at Central Library

    Source: Scotland – City of Aberdeen

    An international award-winning author will be hosting a free talk this Saturday at Aberdeen Central Library.  

    Leila Aboulela will discuss her latest book ‘A New Year’, released as part of this year’s World Book Night, as well as talking about her career, inspirations and love of reading and writing.  

    Councillor Martin Greig, Aberdeen City Council’s culture spokesperson, said: “We are delighted to welcome such a distinguished author to our library.  

    “Leila’s work is hugely influential and insightful and I encourage everyone to come along and be inspired.” 

    Leila Aboulela said: “I am delighted to be back at the central library. Here in the early 1990s, my ambition to become a writer was first ignited.  

    “I attended creative writing workshops and author events which introduced me to the works of Scotland’s top writers. And of course I borrowed and read lots of books. I also made friends at the library, lifelong friends. The library will always be one of my favourite places in Aberdeen.” 

    The talk will be followed by a book signing, and copies of Leila’s books will be available to purchase.  

    Born in Cairo, Egypt, and brought up in Khartoum, Sudan, Leila began her literary career after moving to Aberdeen. Her work has received critical recognition for its depiction of the interior lives of Muslim women and the exploration of identity, migration and Islamic spirituality.  

    An Afternoon with Leila Aboulela will be held on Saturday 24 May at 2:30pm at Aberdeen Central Library. Booking is required to attend this event. To reserve a place, please email libraryevents@aberdeencity.gov.uk or phone 01224 070707.  

    Image credit: Rania Rustom 

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Sunderland gears up for active fun with family events at Ford and Downhill Football Hubs this May Half-Term

    Source: City of Sunderland

    Residents across Sunderland are being invited to join a packed schedule of family fun at the Ford and Downhill Football Hubs this May half term. This is part of the city’s commitment to promoting active lifestyles for all ages and abilities.

    On Wednesday 28 May, head over to Ford Football Hub and drop in for a day packed with fun activities that are perfect for all ages and abilities. From exciting family games to gentle movement sessions, there’s something for everyone.

    Try your hand at basketball with Lambton Raptors, enjoy some friendly non-contact rugby with Vigor Rugby, or jump into classic group games with ParkPlay – a big hit with kids and grown-ups alike. There’s even Walking Football for those who prefer a gentler pace, and light, music-filled sessions like Clubbercise that are all about having fun.

    Families can also hop on the Melissa Bus – an interactive mobile space where you can explore health and wellbeing in a hands-on, engaging way.
    Kids will love the smoothie bike, where they can pedal their way to a fruity treat, while parents can browse stalls from NHS Oral Health, Everyone Active, and other local groups offering friendly tips and advice.

    The fun continues on Friday 30 May at Downhill Football Hub, where the day features even more inclusive activities. Fancy a stretch and a moment of calm? Join the Stretch & Relax session – great for loosening up and taking a breather together. The Family Fit 4 Fun session, run by the Active Sunderland Healthy Lifestyle Team, is all about playful movement and bonding as a family – no experience needed!

    Councillor Beth Jones, Cabinet Member of Communities, Culture and Tourism at Sunderland City Council, said: “These events are all about bringing families together to enjoy activity together – moments of movement, fun, and connection. Whether you’re playing games, trying something new, or just soaking up the atmosphere, there’s something for everyone to enjoy.”

    To find out more details about Active Sunderland family fun days, visit www.mysunderland.co.uk/familyfun

    MIL OSI United Kingdom

  • MIL-OSI Russia: HSE students win gold medals at international mathematical Olympiad in Ashgabat

    Translation. Region: Russian Federal

    Source: State University Higher School of Economics – State University Higher School of Economics –

    In Ashgabat (Turkmenistan) was held V Open Mathematical Olympiad for Students OMOUS-2025 (Open Mathematical Olympiad for University Students), which brought together teams from Turkmenistan, Uzbekistan, Indonesia, Iran, Romania, Poland, the United Arab Emirates, Russia and India. In total, about 500 students joined the event.

    Four undergraduate students from HSE took part in the competition.Applied Mathematics and Computer ScienceFaculty of Computer Science (FKN) Vasily Silvestrov, Bogdan Butyrin, Daniil Soulnov and Anastasia Salimova, as well as the team coach, expert Center for Student Olympiads Igor Vorontsov.

    The Olympiad consisted of two rounds: individual and team. The individual round lasted four hours, the participants were asked to solve six problems. In this competition, the students of the Faculty of Computer Science showed excellent results, winning gold medals.

    The team round of the Olympiad took place the next day and lasted two hours, during which ten problems had to be solved. Here, the FKN team took second place, scoring 69 points out of 100.

    Vasily Silvestrov

    — Preparing for the problems of previous years, we understood that the Olympiad is not easy, but we have a good chance of winning gold medals. For me, this was the first international Olympiad, which added reasons to be nervous. We got a lot of points on the appeal. We prepared for it for two nights: we wrote alternative solutions and prepared criteria for them. Overall, it was an unforgettable experience: interesting culture, a beautiful city, delicious food. I would like to thank the organizers of the Olympiad for choosing and preparing the problems. We hope that next year, our university teams will also achieve excellent results.

    Text: Maria Vorontsova

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI United Kingdom: Greens welcome apparent U-turn from government on winter fuel payments

    Source: Green Party of England and Wales

    Reacting to comments in the Commons today in which Keir Starmer said he wanted to ensure more pensioners are eligible for winter fuel payments, Sian Berry MP said:

    “The Prime Minister’s statement shows just how much pressure he is now under, from the public, Greens and others in opposition, and many Labour MPs, to demonstrate he has at least some understanding that his Government’s cuts are hurting people.

    “To truly right these many wrongs, the Chancellor must try harder, and use her upcoming fiscal decisions to tax extreme wealth fairly. This could not only restore payments in full to the millions of pensioners Labour has betrayed, but also enable her to reconsider other cruel political choices, including £5 billion in cuts to welfare and her refusal to cancel the two-child benefit cap.

    “Together, these u-turns would save hundreds of thousands from being pushed into poverty, and Greens will be making the case for this alongside everyone affected until this Government does the right thing.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Government Taskforce meets on Merseyside to bolster nation’s flood resilience

    Source: United Kingdom – Executive Government & Departments

    Press release

    Government Taskforce meets on Merseyside to bolster nation’s flood resilience

    Flood response capabilities on display at Merseyside fire base

    The third meeting of the Government’s national Floods Resilience Taskforce convened in Aintree today

    Bolstering the nation’s resilience to flooding, including in Merseyside, was top of the agenda as the Government’s national Floods Resilience Taskforce convened in Aintree today (Wednesday 21 May).  

    The meeting was chaired by Floods Minister Emma Hardy and hosted by Mersey Fire and Rescue Service at their National Resilience Centre of Excellence, one of the UK’s most advanced emergency service training facilities, used to co-ordinate national responses to large scale incidents and provide firefighters with the necessary training and skills to respond to events such as severe flooding.  

    The Government inherited the nation’s flood defences in their worst condition on record. To ensure the country is protected from the devastating impacts of flooding, more than 1,000 flood defences will be built or repaired through the Plan for Change as part of a record £2.65 billion two-year investment. 

    Today’s Taskforce meeting brought together partners including Defra, Cabinet Office, the Ministry for Housing, Communities and Local Government, the Environment Agency, the Met Office, Local Resilience Forums, Mayoral Offices, emergency responders, the National Farmers Union, and environmental interest groups. 

    Floods Minister Emma Hardy said:

    The role of any government is to protect its citizens. Having inherited flood defences in disrepair, we are bringing together valued partners through our Floods Resilience Taskforce here in Aintree as we look to speed up and co-ordinate flood preparation and resilience. 

    Through our Plan for Change, we’re investing a record £2.65 billion to repair and build more than 1,000 flood defences across the country, protecting tens of thousands of homes and businesses including on Merseyside.

    The group discussed plans to modernise the UK’s system for flood warnings further, stressing the need for users to understand better how it works for effective decision-making, planning and response. The development of a common warnings framework across the UK will enhance the service and support actions to reduce risks to people, property and livelihoods.  

    The Taskforce also confirmed plans to improve the way the government identifies individuals vulnerable to flooding. This includes using the risk vulnerability tool, unveiled last month by the Cabinet Office, which will enable thousands of officials to see how vulnerable particular areas are to risks by mapping real time crisis data such as live weather warnings, alongside demographic statistics. 

    The meeting touched upon the flood recovery framework, which through local authorities in England provides government support in the aftermath of flooding in exceptional circumstances. There was also discussion of the Bellwin scheme, which is used to reimburse local authorities in England for the costs of the actions they take in the immediate aftermath of an emergency or disaster that endangers life or property. It was agreed that further work is required to improve public understanding of flood resilience. 

    Caroline Douglass, Executive Director for Flood and Coastal Risk Management at the Environment Agency, said:

    Protecting communities in England from the devastating impact of flooding is one of our top priorities as climate change brings more extreme weather. 

    By participating in the Floods Resilience Taskforce, we’re ensuring we share information and co-ordinate our approach to bolster protection for thousands of homes and businesses from the dangers of flooding, preventing billions of pounds worth of damages.

    Minister Oppong-Asare, Parliamentary Secretary at the Cabinet Office, said:

    The Flood Resilience Taskforce sits at the heart of our work to protect communities from extreme weather and flooding.  

    Today’s meeting highlighted how digital tools can strengthen our flood response to identify and support those who are most vulnerable to the impacts of flooding.  

    Through the taskforce, we’re continuing to work closely with key partners to keep people, homes, and businesses safe.

    Met Office Services Director Simon Brown said: 

    Our observations show that the UK is getting wetter, we are seeing more days with over 50mm rainfall in autumn months. A warmer, moister atmosphere increases the capacity for deluges of rain, which can result in serious flooding. A recent study looking at the storms through autumn and winter in 2023/24 found climate change increased the amount of rainfall from these storms, making them about 20% more intense. 

    A number of recent Met Office attribution studies have shown that some recent heavy rainfall events in the UK associated with flooding can be linked to human-caused climate change. Since 1998 the UK has seen six of the 10 wettest years on record. Events such as the wettest February on record in 2020, are expected to become more frequent by 2100 due to climate change.

    The Government’s record investment in flood defences includes around £2.5 million in funding for Merseyside across 2024/25 and 2025/26, including £1 million for a flood alleviation scheme to protect communities near the Pool watercourse at Churchtown in Southport.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: An update on libraries in Sutton Coldfield

    Source: City of Birmingham

    Following the cabinet decision on 11 February to transform the library services, Sutton Coldfield’s town centre library will close on 27 June.

    The closure is due to the significant investment required to address the condition of the building and associated Health and Safety concerns.

    The closure of the Town centre library located in the Red Rose shopping centre also allows Birmingham City Council with partners to progress the redevelopment of the Red Rose shopping centre as a priority for the transformation of the Sutton Coldfield Town Centre.

    Cllr Saima Suleman, Cabinet Member for Digital, Culture, Heritage & Tourism said:

    “We remain committed to providing a library service across Sutton Coldfield and will continue to work with partners for the continuation of Boldmere and Walmley libraries, in addition to services at Mere Green Library.

    “The mobile library service will also continue to serve the area providing access for those impacted by the closure.  Residents in Sutton Coldfield can continue to access the 24-hour online service, citywide book reservation service, self-service, Library Services at Home, and digital library offering. We remain open to exploring future partnership opportunities as they arise across the city.”

    Further information on the closure, alternate arrangements and in finding your nearest library can be found at: https://www.birmingham.gov.uk/directory_record/5153/sutton_coldfield_library

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings

    Source: United Kingdom – Government Statements

    News story

    Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings

    Joint statement from the Panel co-chairs, Lord Collins of Highbury, Parliamentary Under Secretary of State for Foreign, Commonwealth and Development Affairs and H.E. Salah Ahmed Jama, Deputy Prime Minister, Federal Government of Somalia

    Joint statement:

    “Today marks the first meeting of the High-Level Panel on Social Protection in Fragile and Conflict-Affected Settings. And the beginning of our six-month mandate.

    Nearly three-quarters of the world’s extreme poor live in fragile settings, where crises are lasting longer, forcing more people from their homes, and contributing to migration.

    When floods, cyclones and droughts hit, when conflict breaks out, when economic shocks destroy livelihoods, social protection can provide a first line of defence, an effective locally led solution that enables the most vulnerable people to withstand, survive, recover from crisis and rebuild their lives at home. One that reduces the need for humanitarian response.

    But despite its proven potential, it is often overlooked in the fragile and conflict-affected settings where it is needed most.

    Over the next six months, the Panel will gather and review lessons from across sectors and regions – including through a forthcoming global public enquiry. As co-chairs, our goal is to come up with bold, practical recommendations that can drive meaningful change.”

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Email the FCDO Newsdesk (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Next generation farming

    Source: Scottish Government

    Support for young people into agricultural careers.

    More than £2 million will be available to support young people entering farming through a pre-apprenticeship programme and training fund.

    Speaking at a joint NFU Scotland and Scottish Government summit on new entrants, Agriculture Minister Jim Fairlie launched a newly procured Land Based Pre-apprenticeship Programme with £1.8 million committed over three years. 

    Mr Fairlie also confirmed the relaunch and procurement of the Next Generation Practical Training Fund.  The fund is open from now until March 2027 with at least £300,000 a year to help young people access skills training in a flexible, individual way. 

    Mr Fairlie said:

    “I know from my own experience the hard work and dedication that it takes to enter the industry as a new entrant farmer and the challenges young people can face. These two funds will help more people get practical training to launch their agriculture careers.

    “The pre-apprenticeship programme has been expanded to take on close to 400 people and to date we have had more than 60 applications for the training fund. This is a really promising start and is a positive step towards improving safety on-farm and training up the depleted post-Brexit labour force.”

     

    Duncan Macalister, Vice President, NFU Scotland, said:

    “We welcome this vital investment in practical training and pre-apprenticeship opportunities. These programmes are not just about developing skills, they are about securing the future of Scottish agriculture.

    “We urgently need action on land access and capital support to complement this step forward, so that young people can see a clear, supported path into the sector.”

    Lantra Scotland Director Dr Liz Barron-Majerik said:

    “Lantra works to enhance Scotland’s natural environment and support the rural economy, by increasing the number and diversity of employees in Scotland’s land-based and aquaculture sector and driving their skills development. The training fund and the pre-apprenticeship programme are both of great benefit to new entrants to agriculture as they start on their career path, and so I’m delighted that we’re going to be managing them on behalf of, and in partnership with, FONE and the Scottish Government.

    “We look forward to working with our training provider partners on the delivery of the training funds, and the Scottish Machinery Rings, SRUC and Borders College on the pre-apprenticeship. We would also like to encourage others who are interested in becoming involved to please get in touch via scotland@lantra.co.uk.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Westminster to introduce Selective Licensing Scheme to improve private sector housing standards | Westminster City Council

    Source: City of Westminster

    Westminster City Council has announced the implementation of a new Selective Licensing Scheme for privately rented homes, reaffirming its commitment to raising housing standards and creating a fairer, safer rental environment for residents across the city.

    The new scheme, set to cover 15 of the city’s 18 wards, will apply to all privately rented properties excluding Houses in Multiple Occupation (HMOs) that are already covered under existing mandatory and additional licensing schemes. This decisive move is aimed at tackling poor housing conditions and reducing anti-social behaviour by targeting rogue landlords and bringing substandard properties up to acceptable living standards.

    Westminster City Council undertook a thorough statutory consultation process before approving the scheme. The council commissioned Cadence Innova, an independent consultancy with expertise in public sector engagement, to carry out an extensive series of consultation activities. These included outreach with landlords, tenants, residents, and other key stakeholders. Cadence Innova has independently reviewed and reported on the responses and findings from the consultation.

    The decision to proceed with the scheme follows careful consideration of the consultation results and a detailed evidence base, highlighting the need for intervention in areas where housing conditions and anti-social behaviour remain problematic.

    Councillor Matt Noble, Cabinet Member for Regeneration and Renters, said:

    “The Selective Licensing Scheme is about supporting responsible landlords and ensuring that every resident in Westminster has access to safe, secure, and well-maintained housing. We’re focused on improving living conditions, not only to protect tenants but also to support landlords who do the right thing.”

    Once the decision becomes effective, the council will formally designate the selective licensing areas. Full details, including the scheme’s start date and guidance on when and how landlords can apply for licences, will be published in due course. 

    Notes to Editors:

    • The Scheme will be rolled out over two ‘designations’.
    • Designation 1 consists of eight wards experiencing high levels of poor housing conditions – Abbey Road, Church Street, Harrow Road, Knightsbridge and Belgravia, Little Venice, Maida Vale, Queen’s Park and Westbourne.
    • Designation 2 consists of seven wards experiencing both high levels of poor housing conditions and significant and persistent problems caused by anti-social behaviour  – Bayswater, Hyde Park, Lancaster Gate, Marylebone, Pimlico North, Regent’s Park and West End.
    • The Selective Licensing Scheme excludes properties already licensed under Westminster’s existing HMO schemes. Other exemptions also apply, including properties managed by Registered Providers of Social Housing.
    • The scheme is part of Westminster’s broader Private Rented Sector Strategy.
    • Licensing will enable the council to require landlords to meet basic housing standards, with enforcement powers for non-compliance.
    • Incentives will apply to landlords of well managed properties including fee discounts for accredited landlords and for the most energy efficient properties.

    For more information contact mediateam@westminster.gov.uk

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Urgent aid must be allowed to enter Palestinian territory

    Source: Scottish Greens

    Patrick Harvie MSP calls on the UK Government to fix broken energy market

    High energy bills are punishing households and families and baking in high rates of inflation for years to come, say the Scottish Greens.

    The Scottish Greens have called for UK Labour to listen to climate experts, take urgent action to fix the broken energy market, and end the artificial high price for clean green electricity, which is cheap to generate but expensive to consume.

    This comes following the publication of new monthly figures from the Office for National Statistics showing that inflation has jumped to 3.5% in April, the highest level since February last year.

    The ONS has revealed that big increases in utility bills – including electricity and gas bills – have impacted inflation, after changes to the Ofgem energy price cap earlier this year sent April rates soaring.

    Independent climate advisors have advised that the UK Government must act urgently to make electricity cheaper, through rebalancing prices to remove policy levies from electricity bills.

    The Scottish Greens’ climate spokesperson, Patrick Harvie, said:

    “At a time when so many are already struggling to make ends meet, households and families across our country are now facing the highest rates of inflation since February last year.

    “Labour promised to make energy bills cheaper, but they have only gone up. Keir Starmer and his colleagues must urgently step in to make sure that households get the benefit of the low price of renewable energy, to help get inflation under control.

    “This isn’t just about the price cap. Climate experts are clear – out-of-date policy levies on electricity bills are stopping costs from coming down for consumers, and that’s a barrier to people switching away from fossil fuels for heat and transport. So even though home-grown renewable energy is very cheap to generate, that’s not being reflected in the bills people are paying. 

    “We desperately need to fix the broken energy market that is plunging people into poverty all while keeping our reliance on climate-wrecking fossil fuels.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Reeves must resign over second wave of austerity

    Source: Scottish Greens

    Patrick Harvie calls for UK to take action on Israeli aid blockade

    Israeli forces must urgently allow aid to reach extremely vulnerable children, says Scottish Greens Co-Leader Patrick Harvie MSP, ahead of a Parliamentary committee hearing from aid agencies working in Gaza and the West Bank.

    It comes after warnings yesterday from the United Nations that 14,000 babies could die in Gaza unless extra aid arrived. Israel claims to have ended their 11-week aid blockade of Gaza, but the UN has warned that the aid trucks allowed in so far are just a “drop in the ocean” compared to what Gaza needs.

    Scottish Greens have continually called for the UK & Scottish Governments to end complicity in the war crimes being committed by Israel.

    The Labour UK Government has provided more arms to Israel in three months than the previous three years under Conservative governments, and the SNP Scottish Government have continued to fund arms manufacturers who produce parts for the F-35 fighter jets which have been used by Israel.

    Scottish Greens Co-Leader Patrick Harvie MSP said:

    “The situation in Gaza is unprecedented in modern times, with the world allowing Israel to inflict  collective punishment on a grotesque scale. Aid blockades and genocide are never acceptable yet governments across the West have overlooked Israel’s war crimes.

    “Israeli forces have withheld urgent aid from civilians for over 11 weeks, and despite their claims to be allowing aid into Palestinian territory, we have heard from the front lines that what is being allowed to enter is nowhere near enough.

    “Senior Ministers in the Israeli Government are quite explicit about their intention to destroy Palestinian life in Gaza, and their utter contempt for international law.

    “The UK Labour Government have blood on their hands, they have continued to enable and support Israel’s war crimes throughout this disgraceful campaign. They must now surely end all trade with Israel, and join with other countries to ensure that urgent aid is provided to meet the immediate needs of the people of Gaza.”

    MIL OSI United Kingdom

  • MIL-OSI Security: NATO Secretary General commends Czechia’s commitment to a stronger, fairer and more lethal Alliance

    Source: NATO

    NATO Secretary General Mark Rutte welcomed Czech President Petr Pavel to NATO Headquarters on Wednesday (21 May 2025) to discuss preparations for the upcoming NATO Summit in The Hague.

    The Secretary General praised Czechia as a strong and reliable Ally, highlighting its defence investment and support to Ukraine. “You spend more than 2% of GDP on defence, and I welcome the commitment you’ve already made to increase defence spending to 3% in the coming years,” said Mr Rutte.

    Czechia plays an important role in NATO’s deterrence and defence, contributing to Forward Land Forces in Slovakia, Latvia and Lithuania. This year, Czechia will also deploy combat aircraft to Iceland in support of NATO’s air policing mission.

    The Secretary General commended Czechia’s substantial support to Ukraine, including over 1.3 billion euros in military assistance. He welcomed the success of the Czech-led ammunition initiative, which has helped deliver over 3 million rounds of large-calibre ammunition to Ukraine, including 1.5 million in 2024 alone. Mr Rutte also underlined Czechia’s growing role in NATO’s long-term support to Ukraine, including contributions to NATO’s Security Assistance and Training command (NSATU) in Wiesbaden and the deployment of 20 personnel to NSATU’s Logistics Enabling Nodes this July.

    Looking ahead to the NATO Summit in The Hague, Secretary General Rutte stressed the importance of strengthening NATO’s deterrence and defence even further, increasing defence spending, and building a stronger and more innovative transatlantic defence industry. “We will need to do much more, and this will remain our focus as we prepare for The Hague Summit,” he said. “We have a lot of work to do. And I know I can count on Czechia’s continued commitment and leadership.”

    MIL Security OSI

  • MIL-OSI Africa: Government programmes do empower inmates – Minister Groenewald

    Source: South Africa News Agency

    Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.

    “Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said. 

    The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.

    The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes. 

    These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society.
    The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria. 

    This as the international community also celebrated the 10th anniversary of the rules. 

    The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected. 

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.

    In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration. 

    “In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.

    He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025. 

    The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”

    The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.

    “Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained. 

    He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.

    “We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.” 

    He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI United Kingdom: Waste packaging company director pays high price in data fraud

    Source: United Kingdom – Executive Government & Departments

    News story

    Waste packaging company director pays high price in data fraud

    A Birmingham-based director and his company has been ordered to pay a Proceeds of Crime confiscation order, fines and costs totalling £476,995. 

    An officer on inspection duty. Please note the photo is an example of EA’s work not directly from this case.

    This follows an Environment Agency investigation into fraudulent entry of waste packaging data.

    At Birmingham Crown Court on Friday 16 May 2025, Shaobo Qin, a director of EDU Case Ltd, pleaded guilty to fraud by false representation. He was given a 2 year prison sentence suspended for 18 months.

    Qin, age 42, of Sutton Coldfield, West Midlands, was also ordered to pay a Proceeds of Crime confiscation order of £255,057. He must pay within 2 months or face 3 years in prison.

    He was also disqualified as a director for 4 years and ordered to do 200 hours of unpaid work.

    His company, EDU Case Ltd of Portway Road, Rowley Regis, was fined £200,000. The Environment Agency were also awarded £21,995 in investigation costs.

    The court was told Qin’s company was a plastics and recycling exports enterprise.  The offences were discovered by the Environment Agency towards the end of 2022.

    The company, orchestrated by Qin, was deliberately and systematically entering false data on to the Environment Agency’s National Packaging Waste Database (NPWD) for non-existent waste exports.

    This resulted in Qin receiving a benefit for himself and his company in the sum of approx. £255,000. He was arrested on Wednesday 10 January 2024 where he was interviewed by Environment Agency officers.

    EDU Case were accredited to carry out plastic packaging exports and able to issue “evidence” of that activity in the form of tonnage figures on the database.

    This evidence could be bought by businesses who are obliged to account for their plastic packaging waste under the Producer Responsibility Obligations (Packaging Waste) Regulations 2007.

    An audit conducted by Environment Agency officers in 2023 and information following that work identified discrepancies between the amount of waste exported and the amount of evidence issued. 

    The false entries represented nearly two-thirds of the business’ entire trade in 2022 towards the end of that year.

    As part of that audit, a legal notice was served on Qin and the company in September 2023.

    This notice required the production of their evidence of plastic waste exports.  In response, Qin sent a computer memory stick containing his business’ waste export evidence and a letter explaining a large discrepancy, described as an “overclaim.”

    The letter stated that the company had carried out 1,239 metric tonnes of plastic waste exports in 2022, only 453.60 metric was genuine and that the majority of his trading, 785.40 metric tonnes  was ‘a mistake.’

    In sentencing the judge said this was without doubt deliberate offending and pre-planned. There had been a significant undermining of the regulatory regime. 

    He accepted that there had been a guilty plea entered at first opportunity and that money had been put aside to repay the financial benefit made. The company was also fined to mark the seriousness of the offending.

    Sham Singh, Senior Environmental Crime Officer for the Environment Agency, said:

    “This case shows that the Environment Agency will pursue individuals and their enterprises who profit illegally.

    “This was a fraud on a large scale and undermines legitimate business and the investment and economic growth that go with it.

    “We support legitimate businesses and are proactively supporting them by disrupting and stopping the criminal element backed up by the threat of tough enforcement as in this case.

    “If anyone suspects that a company is doing something wrong, please contact the Environment Agency on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”

    The Charges

    Shaobo Qin

    Between 1st January 2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that he claimed EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    EDU Case UK Limited (Company No. 08888722)

    Between 1st January  2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    Background Information

    The Packaging Producer Responsibility Regulations were introduced to oblige the producers of waste packaging such as plastic, glass and cardboard (e.g. supermarkets) to contribute towards the financial cost of recycling and the disposal of waste. Any large organisation that meets the criteria for this obligation is required to prove they have made such financial contributions by the purchasing of credits known as Packaging Recovery Notes (PRNs) or Packaging Export Recovery Notes (PERNs) from UK waste reprocessors and waste exporters.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI: No KYC, 100x Leverage, Big Bonuses, Simple Interface — Why Beginners Love BexBack

    Source: GlobeNewswire (MIL-OSI)

    SINGAPORE, May 21, 2025 (GLOBE NEWSWIRE) — Bitcoin has officially shattered the long-anticipated $100,000 barrier, marking a historic milestone for the crypto market. As shown in the latest TradingView chart, BTC continues to push higher, riding the upper edge of the Bollinger Bands with no signs of slowing down.

    While the bull run creates exciting opportunities, traders are now facing a critical question: Which platform is best positioned to help them capitalize on this volatility?

    Introducing BexBack — A Streamlined Futures Trading Platform Built for This Moment

    In a sea of exchanges that are often overloaded, overcomplicated, or overregulated, BexBack stands out with its fast, frictionless, and fully non-KYC approach to crypto derivatives trading.

    Whether you’re a seasoned leverage trader or just getting started, BexBack delivers a powerful yet simple experience, offering:

    • No KYC Required — Trade anonymously with just an email
    • 100% Deposit Bonus + $100 Trading Bonus — Double your capital and get a head start
    • Up to 100x Leverage — Maximize your position in times of volatility
    • Free Demo Account — Practice with 10 BTC and 1,000,000 USDT risk-free
    • 50+ Perpetual Contracts — Including BTC, ETH, XRP, ADA, SOL and more
    • Zero Spread, No Slippage — What you see is what you get

    Security and Speed in One Package

    BexBack isn’t just fast — it’s secure. With cold wallet fund storage, multi-signature withdrawal approvals, and real-time risk monitoring, the platform ensures your assets and trades are well protected.

    Global Access, Real Freedom

    BexBack proudly serves a global user base. With no mandatory KYC, even traders from regions with limited access to traditional exchanges can participate freely and instantly.

    About BexBack?

    BexBack is a leading cryptocurrency derivatives platform offering up to 100x leverage on futures contracts for BTC, ETH, ADA, SOL, XRP, and over 50 other digital assets. Headquartered in Singapore, the platform also operates offices in Hong Kong, Japan, the United States, the United Kingdom, and Argentina. Like many top-tier exchanges, BexBack holds a U.S. MSB (Money Services Business) license and is trusted by more than 500,000 traders worldwide. The platform accepts users from the United States, Canada, and Europe, with zero deposit fees and 24/7 multilingual customer support, delivering a secure, efficient, and user-friendly trading experience.

    As Bitcoin Enters Price Discovery, Don’t Get Left Behind

    Markets like this don’t come around often. Whether you’re aiming to ride short-term price swings or position for long-term growth, BexBack provides the tools, leverage, and freedom you need to trade your way.

    Create your account, claim your bonuses, and trade with confidence — all on BexBack.

    Website: www.bexback.com

    Contact: business@bexback.com

    Contact:
    Amanda
    business@bexback.com

    Disclaimer: This content is provided by BexBack The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.
    Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/b8f30a8d-29e8-4fb0-80dd-03331565d74c

    https://www.globenewswire.com/NewsRoom/AttachmentNg/6ee01a23-4395-4b2a-abc6-6b0bf1e42222

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7050b1ab-3ad2-439a-8061-df433b50576b

    https://www.globenewswire.com/NewsRoom/AttachmentNg/d5f5e1fb-7fa6-4b9d-9ef5-46780f2a0f40

    https://www.globenewswire.com/NewsRoom/AttachmentNg/9e8b7e7d-1a2a-429a-831b-69b996334ec4

    The MIL Network

  • MIL-OSI Economics: MPTS 2025 celebrates largest edition ever with record visitor numbers, reveals MBI, a GlobalData company

    Source: GlobalData

    The UK’s most powerful hub for the creative industries united for two days of engaged networking, passionate debate and exceptional insights into AI, the creator economy, production craft and more – helping attendees stay ahead-of-the-curve for the year ahead.

    London, United Kingdom, 21 May 2025 – After two exceptional days of conversation, collaboration and community, the biggest and buzziest MPTS yet welcomed a record 13,000 attendees from 50 countries, uniting the UK’s media and entertainment industry together in the heart of London, like never before. The exhibition is organized by Media Business Insight (MBI) Ltd, a GlobalData company.

    Hosted at London’s Olympia on 14-15 May, the red-hot editorially driven program delivered 100+ free-to-attend sessions across eight theatres, showcasing the insight and passion of more than 350 expert speakers and guest keynotes. The bustling show floor was packed with more than 300 exhibitors and sponsors, showcasing imagination, determination and standout talent of the UK’s creative and technical communities – at a time of both global challenge and immense opportunity.

    Setting the agenda for MPTS, a State of the Nation Production keynote outlined a media and entertainment landscape in which storytellers had to embrace screens, formats and creators of all kinds.

    Kate Beal, CEO, Woodcut Media, asserted: “TV doesn’t exist anymore in the way we knew it.”

    Derren Lawford, CEO, Dare Pictures, said: “We are in the middle of a decade of profound transition, and we are past the tipping point. TV is part of a wider, connected series of industries around the creation and distribution and funding of content.”

    Headliners at MPTS include:

    • Producer and presenter Ross Kemp, who took us on an exhilarating tour of investigative documentaries on the front lines of conflict, drug cartels and organised crime gangs. “They will know in a second if you are not telling the truth,” he said. “I specialize in telling the truth, it is as simple as that.”
    • Georgie Holt, whose company Flight Story produces the world’s second biggest podcast ‘Diary of a CEO’, declared: “We are in the era of the Founder Creator — creators who are now in charge of media content and able to monetise spectacularly outside of traditional gatekeepers.”
    • NFL professional turned American Football broadcaster Jason Bell explained how sports coverage was evolving into the F1 Drive To Survive model, in which athlete personalities and back stories were the keys to growing audiences.
    • Blockbuster editor Eddie Hamilton gave a masterclass about the precision involved in making Top Gun: Maverick and five Mission: Impossible movies with Tom Cruise. He said: “Every nuance is refined hundreds of times. Sometimes we watch a 10-minute scene 40 times in a day, checking to see where your eye is moving in the frame.”

    Diverse representation is a vital sign of the industry’s health and MPTS is proud to set the benchmark to secure equal representation and attendance from the next generation, not only across the program, but also something clearly witnessed across the show floor amongst exhibitors and attendees.

    MPTS also prioritizes the crucial importance of sustainability and, in continuing association with BAFTA albert brought this conversation to the fore with experts including Peter Okell, Sky Studios Elstree; Luke Seraphin, Sky Studios and Claire O’Neill, A Greener Future speaking in the Sustainability Series.

    Sam Street, Marketing Officer, BAFTA Albert commented: “MPTS is a really key moment in our calendar. It is always so great to connect with suppliers, companies, studios and creatives who share our common passion for sustainability within screen industries. It has also been really valuable to curate our sustainability series of panels across this year’s show, we’ve had some really insightful discussions and emphasised the importance of environmental focus throughout the screen industries.”

    We did not need a machine to predict the high demand for news and information about AI. The brand-new ticketed AI Training program and the expanded AI Media Zone drew exceptional attendance, with exhibitors such as Dot Group, Moments Lab and Software. Conversations in these packed-out sessions revolved around the impact of AI from ideation to VFX, featuring real-world insights and discussions on bridging the gap between theory and practice from speakers including Pete Archer, BBC; Jon Roberts, ITN and Damien Viel, Banijay Entertainment.

    With a record number of exhibitors already rebooking for 2026, MPTS continues to prove its value as the UK’s number one event for media and production professionals, where brands, creatives and decision-makers come together to connect, collaborate and grow.

    Jane Shepard, Senior Channel Marketing Manager, Sandisk, said: “MPTS 2025 was a spectacular showcase of innovation, bringing together the brightest minds and cutting-edge technology in the industry. An unforgettable experience for all attendees.”

    Tom Rundle, Application Engineer, Yamaha Music, said: “It has been very busy for us. We have seen a huge mix of customers from the broadcast sector here, but also customers from the other industries which we serve, whether that’s live or theatre who have deliberately come to the show to seek us out to speak to us. Will we be back next year? Yes, absolutely, this is the first year for us, so it was always a bit of a toe in the water, but it’s been vastly more successful than we thought it was going to be.”

    Peter Alderson, Business Manager, Nikon, said: “This is our second year at MPTS, we’ve gone a little bit bigger on our stands, almost doubling it, and I think it’s definitely been worthwhile doing. We’ve partnered with RED, who we recently purchased, and MRMC so it’s making a lovely statement about where we are in the market, and I think we’re in the right place to make that statement here at MPTS.”

    Jennifer Hudson, Marketing Executive, Videndum, said: “This show is really important in our calendar – we attend nearly every year and find so much value in it. We get to meet with so many different professionals within the industry, and this year has been really, really positive for us. We’ve walked away with quite a few leads and made new relationships. It’s a fantastic show, and we would thoroughly recommend anyone thinking about coming and having a stand here to definitely do it – you won’t regret it.”

    Will Pitt, Head of Sales Solutions, Techex, said: “My impression of the show is that it’s been incredibly busy and very positive. Techex particularly specialise in solving some of the headaches that a lot of the broadcast industry is grappling with at the moment, namely, how they transition into an IP-led architecture from a legacy architecture and what that journey looks like. As such, our standards have been packed pretty much throughout the show to come and look at products, but also to come and talk about ideas and lean into what that journey looks like specifically for them. So not a generic journey, but specific to their drivers and their wants and needs in the short and medium term. We particularly like MPTS because it’s London based and many of the engineers that we speak to and collaborate with are based here and therefore it’s an easy journey for them to take half a day, a day out to come and investigate what we have to offer, but also to have those conversations. And so for organisations like WBD or Sky, the BBC, ITV, etc. They can come here quite easily and engage with us, spend some time talking in real life and not over teams or Zoom.”

    Charlotte Wheeler, Event Director, MPTS said: “Without doubt, 2025 was the most stimulating, ahead-of-the-curve MPTS yet. At a time when we are seeing the industry under real pressure from budget cuts to talent shortages and perpetual change, the conversations and connections on the show floor were positive and demonstrated infectious community spirit. The level of attendance and the quality of attendees from across all sectors of the industry was incredible – not just stakeholders in technology but representatives from production and commissioning, the creator economy, those new to the industry and freelancers were all brought together by MPTS under one roof.

    “A huge amount of work goes into making sure that there is equal representation across our extensive conference programme. I am proud that MPTS is one of – if not the – most diverse shows both in terms of attendees and panellists.

    “Thank you to everyone for exhibiting, sponsoring, speaking, attending and engaging with the show to make MPTS such a thrilling success. We are already planning for 2026, which marks MPTS’ 10th edition, so look forward to a landmark celebration!”

    Save the date for MPTS 2026 when we return to Olympia Grand Hall, London on 13 – 14 May 2026.

    The conversation does not stop when the doors close. MPTS is more than just two days a year – it is a connected, year-round community for the broadcast and media industry. From on-demand content to exclusive events, there’s still so much to explore. Stay connected with us: https://www.mediaproductionshow.com/register-interest

    To enquire about exhibiting at our landmark 10th edition, please go to: https://www.mediaproductionshow.com/stand-enquiry

    MBI is the publisher of market-leading titles including Broadcast, Broadcast Sport, Broadcast Tech, KFTV, The Knowledge and Screen International.

     

    MIL OSI Economics

  • MIL-OSI United Kingdom: New Chair and members of the Joint Nature Conservation Committee appointed

    Source: United Kingdom – Executive Government & Departments

    News story

    New Chair and members of the Joint Nature Conservation Committee appointed

    Dr David Cooper named as new Chair; Professor Tom Meagher reappointed and Professor Julia Jones confirmed as new member

    Dr David Cooper has been appointed as the Chair of the Joint Nature Conservation Committee (JNCC). The appointment was made in conjunction with the devolved governments and is for a three-year term from 1 June 2025 to 31 May 2028.

    Professor Tom Meagher has been reappointed as an independent member of the Committee. Tom’s term will run for four years until 3 April 2029. 

    Furthermore, Professor Julia Jones has been appointed as an independent member of the Committee. Julia’s term will run for three years until 31 May 2028.

    The new appointments have been made on merit and in accordance with the Governance Code on Public Appointments.

    As the UK’s statutory advisor on nature, the JNCC provides scientific evidence and advice to the devolved governments of the UK, the UK government, and the UK’s Overseas Territories and Crown Dependencies, to help policymakers turn science into action for nature.

    Biographical details

    Dr David Cooper

    • David Cooper is Visiting Fellow at the Oxford Martin School and Honorary Researcher of the Leverhulme Centre for Nature Recovery at the University of Oxford.
    • David has more than 30 years’ experience in international science and policy, including at the Convention on Biological Diversity and the UN Food and Agriculture Organization. As CBD Deputy Executive Secretary and Acting Executive Secretary, he was instrumental in facilitating the development and adoption of the Kunming-Montreal Global Biodiversity Framework and related agreements.
    • David has contributed to the work of the Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services among other scientific reports and assessments.
    • He has chaired a number of bodies including the Collaborative Partnership on Sustainable Wildlife Management, the Biodiversity Indicators Partnership, and the Inter-agency liaison group on Invasive Alien Species.

    Professor Tom Meagher

    • Tom Meagher has been a member of the JNCC since April 2021. He is Professor of Plant Biology at the University of St Andrews and served as Director of the St Andrews Global Challenges Forum. He was previously a member of the Defra Science Advisory Council and the Natural Environment Research Council.
    • Tom leads an international and interdisciplinary initiative developing novel remote sensing technology to aid the assessment and conservation of plant biodiversity. He has also worked with the British Council, the British Embassy Lima, and government agencies in Peru to promote the establishment of a national botanic garden and plant biodiversity initiative.
    • He has been an active contributor to the Scottish Government’s environmental and conservation science strategy, following his former role as a Trustee of the Royal Botanic Garden Edinburgh.

    Julia Jones

    • Julia Jones is Professor in Conservation Science at Bangor University and currently holds the Prince Bernhard Chair of International Nature Conservation at Utrecht University.
    • She is a trustee of WWF-UK and is a member of the British Ecological Society and the Society for Conservation Biology. She serves on the advisory board of the Sounds Right initiative, a collaboration between the Museum for the United Nations and the music industry to allow nature to collect royalties from her sounds.
    • She has previously served as the Director of the Low Carbon Energy and Environment Research Network Wales, and on the Welsh committee of the RSPB.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: DfE Update: 21 May 2025

    Source: United Kingdom – Executive Government & Departments

    Correspondence

    DfE Update: 21 May 2025

    Latest information and actions from the Department for Education about funding, assurance and resource management, for academies, local authorities and further education providers.

    Applies to England

    Documents

    Details

    Latest for further education

    Article Title
    Action Declare your subcontracting arrangements for the 2024 to 2025 academic year
    Information Adult funding allocations for 2024 to 2025
    Information Release of Apprenticeship funding rules, 2025 to 2026, Version 1
    Information Earnings adjustment statement (EAS)
    Information New foundation apprenticeships available from 1 August 2025
    Reminder Year-end funding claim for 2024 to 2025

    Latest information for academies

    Article Title
    Action Declare your subcontracting arrangements for 2024 to 2025 academic year
    Reminder Year-end funding claim for 2024 to 2025
    Events and webinars ‘Buying for schools’ summer term webinar schedule is open for bookings
    Events and webinars Academy finance professionals June Power Hour – Budget Forecast Return

    Latest information for local authorities

    Article Title
    Action Declare your subcontracting arrangements for 2024 to 2025 academic year
    Information Consistent financial reporting data collection for 2024 to 2025 is now open
    Information Update on early years 2025 summer term data collection
    Information Earnings adjustment statement (EAS)
    Information New foundation apprenticeships available from 1 August 2025
    Reminder Submit your section 151 (S151) officer assurance return and schools financial value standard (SFVS) assurance statement for 2024 to 2025
    Reminder Year-end funding claim for 2024 to 2025
    Events and webinars ‘Buying for schools’ summer term webinar schedule is open for bookings

    Updates to this page

    Published 21 May 2025

    Sign up for emails or print this page

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Consultation launched on proposed changes to transport for post-16 SEND students

    Source: City of Wolverhampton

    Fees for post-16 SEND travel were due to be introduced in 2020 following consultation but halted due to the outbreak of the Covid pandemic.

    Fresh consultation is now being held on the introduction of a charging policy which will require a contribution towards the cost of post-16 SEND travel.

    This would bring the council in line with the approach taken by neighbouring authorities.

    The proposed charges would apply to students moving into post-16 SEND education from September 2025 and those already in post-16 SEND education.

    Any payments would be spread over 3 terms with a reduction for low income families.

    Councillor Qaiser Azeem, the City of Wolverhampton Council’s Cabinet Member for Transport, said: “We are one of the few remaining councils to offer free transport for this age group. Most authorities charge a contribution due to there being no legal requirement to provide post 16 transport.

    “We remain committed to ensuring young people lead independent healthy lives, feel safe and secure and achieve their full potential.

    “While in an ideal world we would not need to consider introducing charges, the proposals to introduce a contribution towards the cost of post-16 SEND travel, align with, or are less than, neighbouring authorities.

    “We would of course work closely with families affected to support them should these changes be introduced.

    “It is important we hear from parents, carers, students, schools and the wider community as part of this consultation, so please take this opportunity to have your say.”

    In line with legislation there is no transport charge for pupils aged 5 to 16 or for adult learners aged 19 to 25.

    The consultation is now live and runs until 13 June. Take part at Consultation on Post 16 SEND Transport Charges – City of Wolverhampton Council – Citizen Space.
     

    MIL OSI United Kingdom

  • MIL-OSI Europe: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    From 19 to 21 May, the OSCE Secretariat in collaboration with the Government of Andorra, the US Mission to the OSCE, and University of Andorra co-organized the first-ever Model OSCE in Sant Julià de Lòria, Andorra.
    The three-day event brought together 25 young people with diverse backgrounds from Andorra, Algeria, the United States of America, Japan and Morocco, offering them a unique opportunity to strengthen their soft skills and deepen their understanding of peace and security issues through peer-to-peer learning on multilateralism, international relations and diplomacy.
    The programme featured sessions on the OSCE’s mandate, history, structure, and decision-making processes, as well as its co-operation with OSCE Partners. It also included discussions on Finland’s priorities on 2025 Chairpersonship, the Youth and Security Agenda, the role of women in diplomacy and multilateralism, and hands-on training in negotiation and mediation.
    In her opening remarks, Andorra’s Minister of Foreign Affairs, H.E. Imma Tor Faus emphasized the country’s ongoing support of youth engagement in international affairs: “After hosting the OSCE activities in 2022 focused on Youth and Security, today’s event reaffirms Andorra’s strong and ongoing commitment to the OSCE’s Youth and Security Agenda. We are proud to support the efforts of the Office of the Secretary-General, both politically and financially, to advance this vital work. The Model OSCE reflects the values we stand for and aligns closely with our priority of promoting youth participation in international organizations.”
    Omar Cardentey, Head of Public Affairs for the US. Mission to the OSCE also shared his personal experience in working in the multilateral settings and encouraged young participants to never give up or doubt their ability to make an impact.
    The Model OSCE echoed the motto “nothing about youth without youth”, underscoring the crucial role of young people in building sustainable and peaceful societies.
    One participant, Lisa Cruz Lackner from Andorra, captured the spirit of the event: “Capacity-building initiatives like this are more than trainings. They create a unique space for dialogue, understanding, and mutual learning. When we come together with different experiences, perspectives, and identities, we don’t just learn about the issues—we learn how to listen, negotiate, and collaborate beyond borders. These events empower us not only to understand global challenges, but to see ourselves as part of the solution. In a setting like the Model OSCE, you quickly realize that diversity is not a challenge to overcome—it is the key to building more inclusive, effective and lasting approaches to peace and security.”
    Participants also engaged in exchanges with young diplomats and parliamentarians from Andorra and Malta, gaining firsthand insights into diplomatic careers. The event encouraged collaborative learning and dialogue throughout its session.
    The Model OSCE was held as part of the Extra-budgetary Project “Accelerating the implementation of the Youth and Security Agenda in the OSCE region”, which aims to empower young people to shape a more secure and co-operative future across the OSCE region.

    MIL OSI Europe News

  • MIL-OSI United Kingdom: Flies, crossbows and comics: novel counter terrorism innovation

    Source: United Kingdom – Executive Government & Departments

    Case study

    Flies, crossbows and comics: novel counter terrorism innovation

    Nine projects, ranging from whether flies can detect explosives to how comics can reduce radicalism and how much of a risk crossbows are, were showcased.

    More than 100 people attended the third University Innovation Concept event exploring ways in which cutting-edge research, often in unexpected areas, can help fight terrorism. 

    Nine fascinating and thought-provoking projects, ranging from whether flies can detect explosives (yes!) to how comics can reduce radicalism, and how much of a terrorism risk crossbows are, were on display at a showcase at the Open University in Milton Keynes, in which the Accelerated Capability Environment (ACE) was a proud partner. 

    Researchers and delegates were welcomed by Inspector Liam Cahill, Innovation Domain Lead at the Counter Terrorism Research Lab (CTRL), and Open University professors Arosha K Bandara and Eleanor Crabb. Annette Southgate, Head of ACE, then took to the stage to stress the importance of work and innovative collaboration such as this to “getting ahead of some of the people that are trying to cause us harm”. 

    Iain Harrison, Director of Digital, Data, Analysis & Technology at Counter Terrorism Policing, explained the rigorous process, supported by ACE, that began with 62 proposals from 28 different universities, which were then reviewed and whittled down to the nine stimulating ideas on display at the showcase event. 

    Bringing academia and Counter Terrorism Policing together 

    The projects that had been explored over 12 weeks of intensive research were showcased across three themes: 

    THEME ONE: Radicalisation and Interventions 

    First to present were a team from Anglia Ruskin University, on the topic of Exploring the Impact of Critical World Events on Extremist Misinformation Network (2020-24). This involved analysing 240 posts from four major platforms to understand how extremist groups exploit global crises on popular social media platforms, using hashtags and multiple forms of misinformation to amplify uncertainty and try and recruit new audiences. It also looked to pinpoint potential novel ways to intervene in this process. 

    Next up were a team from Cranfield University, analysing how social media content algorithms respond to user interactions within specific topics, to answer the question of Can Social Media Algorithms Radicalise? This pilot was designed to quantify if user behaviours such as watching or liking videos influenced a popular platform’s algorithm, and to what extent. The conclusion was that the algorithm could be influenced to provide more content around a particular theme, but it is not yet clear how long this influence lasts. 

    The final presentation in this first session was from the University of Liverpool, exploring the topic of Graphic Novels to Enable Discussion and Promote Critical Thinking. This project involved creating a 46-page book containing four graphic novels on the topic of radicalisation, supported by front-line intervention practitioners, for use in educational strategies to encourage critical thinking. Comics were chosen because they are already popular worldwide, accessible and engaging as a format, and cheap to produce. 

    THEME TWO: Current Threats, Biosensors and Human Networks 

    After a break, another team from Cranfield University, that had been drawing big crowds in the breakout sessions for the four crossbows on display at their stand, spoke on their research into Crossbows: A Real and Current Threat. Against a background of increasing use of crossbows, which can legally be bought by anyone over the age of 18, in targeted incidents, this set out to examine the hit probability and wounding potential of four different systems, their reload times, and how these compared to current policing response times. The conclusions, from a variety of tests including depth of penetration and discharge rate, concluded that crossbows need to be considered a real and present threat for a marauding terrorist attack, because all of those tested have potential to cause significant injury, especially to unprotected organs. 

    Next up was another project that had the audience buzzing – research from a team at The Open University on Fruit Fly Biosensors: Leveraging Olfactory Responses for Detection of Explosives and Toxic Chemicals. This explored if fruit flies, which have exceptional sensitivity, could be used as biosensors to detect toxins, drug precursors and explosives. The answer was potentially yes – experiments with TNT found that exposure to the explosive led to a gradual but clear increase in fly attraction, indicating that fruit flies can detect it. Preliminary lab data also suggests starving the flies may enhance TNT detection speed. 

    The final project in this session was an explanation of a Dynamic Target Indicator Tool (D-TinT) developed by a team at the University of Exeter. This uses techniques from movement pattern analytics and social network analysis to identify the best indicators of links between nodes in a human network based on movement patterns over time. This enables a statistical and spatial mathematical model to be developed. The Tool also identifies what might be flagged as a vulnerable target – either person or place – which could allow counter terrorism stakeholders to test the impact of possible risk-reduction procedures. 

    THEME THREE: Emerging Technologies 

    The final session of a highly enjoyable day started with a team from Robert Gordon University in Aberdeen talking the audience through their research on Leveraging Artificial Intelligence (AI) to Identify and Prevent Terrorism in Prisons: Legislative Gaps and Technological Solutions. This analysed AI’s role in situational awareness and radicalisation prevention, explored how it could support existing counterterrorism efforts, evaluated legal and ethical readiness for AI to be deployed in this way, and proposed technical and legal reforms to enable the responsible use of AI technologies in prison settings. The conclusion of the research was that AI offers significant potential to enhance security and counter-radicalisation efforts in UK prisons. 

    Next, a scoping study of Augmented Reality and Terrorism was presented by Dr Richard Jones of Edinburgh Law School, part of the University of Edinburgh. Billing augmented reality as a “technology in search of a purpose”, his research explored both potential law enforcement applications, such as head-up real-time navigation and facial recognition of persons of interest, as well as how terrorists could use the same technology, for example to create video footage for propaganda purposes. It also looked at how this technology could evolve in the public domain. The research concluded that feasibility factors include device cost and availability as well as the level of required technological expertise, which is likely to fall, in addition to utility and whether it solves a problem. 

    The final presentation of the day was by a team from the University of Southampton on Exploiting Vulnerabilities in Autonomous Vehicle Systems for Terrorist Activity – Threats to UK Critical National Infrastructure. This focused on identifying vulnerabilities in autonomous vehicle systems amid increasing reliance on connected and automated vehicles, analysing how terrorists could exploit these to disrupt or control them. This could include by hijacking the vehicle controls or causing collisions via manipulating road signs. The conclusion was that proactive risk mitigation is paramount. 

    Following the event, Inspector Cahill said: “The University Innovation Concept (UIC) was conceived with the intention of bringing Counter Terrorism Policing and academia closer together to ensure operational decisions made by experienced and knowledgeable personnel are backed by science and academic rigour. 

    “The one-day showcase was also a fantastic opportunity for attendees to network, learn about ongoing research and potentially take learning back to their operational roles, and feedback has been extremely positive.”  

    Reflecting on the event, Professor Southgate said: “ACE is proud to support policing colleagues find new and creative ways of solving frontline mission problems through partnership with researchers from across a diversity of backgrounds and institutions.

    “Accessing diversity of thought, approach and experience helps us step back and consider more impactful and enduring ways of tackling existing and sometimes long-standing problems. 

    “We are keen to help identify and shine a light on brilliant academic work that can already help solve today’s mission problems; highlighting the difference this makes, help build relationships and continue encouraging our talented academic community to support frontline policing work.”

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI: IP Fabric Advances Security Posture Assurance with Firewall Discovery and Simulation

    Source: GlobeNewswire (MIL-OSI)

    BOSTON, May 21, 2025 (GLOBE NEWSWIRE) — IP Fabric, the Automated Infrastructure Assurance Platform, today announced advanced firewall management features that close critical security and compliance gaps. The latest release includes firewall filtering simulation, transparent firewall discovery and visualization, enhanced compliance checks and granular access controls. These capabilities give enterprises full visibility into how traffic is encrypted, filtered and enforced — helping teams detect misconfigurations, ensure that every firewall is discovered and modeled, and create triggers to automate responses to risk in partnership with the firewall management systems already in use.

    Up to 20% of a network — including the critical firewalls that block malicious traffic and access — are improperly configured in enterprise companies. IT leaders carry a fiduciary responsibility to ensure infrastructure is secure, compliant and cost-effective, starting with a complete understanding of network assets and behavior. Security assessors and regulatory auditors know this, which is why firewall configurations are integral to controls outlined in global frameworks like NIST, CIS, ISO 27001 and SOC 2. IP Fabric’s latest release shows exactly how all firewalls, segmentation and encrypted traffic behave in the real world to reduce risk created by gaps in defense, strengthen protection and speed audit preparation.

    “Infrastructure defense shouldn’t live in silos, but too often our tools and teams do,” said Pavel Bykov, CEO and co-founder of IP Fabric. “We’re giving IT and security teams a shared, end-to-end understanding of how traffic flows, including how it’s encrypted, filtered and enforced across transparent firewalls and IPSec tunnels. When you can visualize devices, end-to-end paths, misconfigurations and gaps in your defense in context, you can take informed action to strengthen your security posture, prove continuous compliance and avoid unbudgeted costs.”

    Key security and compliance enhancements in IP Fabric 7.2

    1. Modern firewall filtering simulation: See how traffic is allowed or blocked by URLs, threat feeds and domain names.

    2. Transparent firewall discovery and visualization: Visualize Layer 2 firewalls and encrypted tunnels to improve monitoring and detect gaps in defense. Now supporting Palo Alto Networks, FortiGate and Firepower firewalls.

    3. Enhanced compliance and intent checks: Identify all devices in the traffic path, map CVEs to vulnerable assets and run tailored checks to spot misconfigurations faster in support of global security frameworks such as NIST, CIS, ISO 27001 and SOC 2.

    4. Granular user access controls for security extensions: Restrict who can deploy or edit automation scripts to prevent unauthorized changes and support compliance.

    5. Next-generation firewall management: Ensure security posture consistently among firewalls both on-prem and in the public cloud, regardless of vendor. Trigger changes based on up-to-date insights into compliance and network behavior.

    By delivering unparalleled visibility and control into security policies, firewall enforcement and compliance posture, IP Fabric’s latest release empowers enterprises to close security gaps before attackers exploit them.

    For a complete list of features included in IP Fabric 7.2 visit the company blog.

    About IP Fabric
    IP Fabric is the industry’s leading automated infrastructure assurance platform, offering a continuously validated view of cloud, network and security infrastructure to improve stability, security and spend. Within minutes, the platform creates a unified view of devices, state, configurations and interdependencies, normalizing multi-vendor data and revealing operational truth through automated intent checks. By uncovering risks and providing actionable insights, IP Fabric empowers enterprises to accelerate IT and business transformation while reducing costs. Trusted by industry leaders like Red Hat, Major League Baseball and Air France, IP Fabric delivers the foundation for a secure and modern infrastructure.

    Learn more at ipfabric.io and follow the company on LinkedIn.

    Media Contact
    Liesse Jayalath
    ipfabric@lookleftmarketing.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/90b60f9f-ceea-4df0-8039-81e631394f01

    The MIL Network

  • MIL-OSI: BTCC Exchange Appoints Dan Liu as CEO Ahead of 14th Anniversary Milestone

    Source: GlobeNewswire (MIL-OSI)

    VILNIUS, Lithuania, May 21, 2025 (GLOBE NEWSWIRE) — BTCC, one of the world’s longest-serving cryptocurrency exchanges, today announces the appointment of Dan Liu as its new Chief Executive Officer. Liu, who previously served as Chief Research Officer at BTCC, brings extensive expertise in both traditional finance and cryptocurrency markets to his new role.

    As BTCC approaches its 14th anniversary in June, Dan Liu’s appointment as CEO marks a new chapter for the exchange. Under his leadership, BTCC aims to build upon its legacy as the world’s most established crypto exchange while pursuing sustainable growth. This vision will carry BTCC confidently into the future, elevating the platform beyond traditional security to drive meaningful industry evolution.

    From Research Visionary to CEO

    Since joining BTCC in 2019, Liu has been instrumental in the exchange’s rapid growth and innovation in the cryptocurrency space. As a dynamic young leader, he previously served as Chief Research Officer at the exchange. With his strategic vision over the years, BTCC expanded its services to users from over 160 countries and significantly enhanced its product offerings in both futures and spot trading markets while maintaining high security standards.

    Liu’s forward-thinking approach to market dynamics has made him a sought-after and respected voice in the cryptocurrency space, with regular features in prominent crypto media outlets including Cointelegraph, Markets Insider, and Japanese publication Monthly Digital Assets.

    “I am deeply honored to lead BTCC Exchange at such a pivotal time for both our platform and the broader cryptocurrency ecosystem,” said Liu. “My crypto journey began back in 2013, and that early passion has only grown stronger over the years. As we celebrate our 14th anniversary this year, I’m excited to combine my background in traditional finance with my love for blockchain innovation. We remain committed to bridging these two worlds, continuing to build trust within the community while accelerating our global expansion.”

    Building on Legacy, Focused on Future

    Since joining BTCC in 2019, Liu has guided the exchange through various market conditions while driving innovation and growth. His leadership has positioned BTCC as an industry pioneer across multiple market cycles.

    One of Liu’s most notable contributions was leading the launch of Tokenized Futures, an innovative financial product rarely seen in the industry. This bold step bridged the gap between traditional finance and blockchain technology and positioned BTCC as a forward-thinking exchange.

    Additionally, under Liu’s strategic guidance, BTCC launched its highly successful Copy Trading feature, which has received exceptional user engagement and positive feedback. This feature provides an accessible entry point for those exploring cryptocurrency markets, aligning perfectly with BTCC’s mission of making digital asset trading more inclusive.

    With his academic background in conventional markets, Liu brings valuable analytical skills to the evolving cryptocurrency space. His leadership represents a new approach where trust, transparency, and blockchain technology work together.

    Looking ahead, Liu’s focus is on global expansion while navigating increasingly diverse regulatory standards across markets. “One of my most important missions is educating the general public about cryptocurrency and making trading accessible to everyday users,” Liu explains. To support this vision, he plans to deepen BTCC’s community connections by attending global industry events and creating direct dialogue with users and partners across different markets—insights that will help shape the platform’s future and inform regional strategies.

    Under Liu’s leadership, BTCC Exchange is poised to continue its legacy as one of the most trusted, secure, and innovative cryptocurrency exchanges globally.

    About BTCC

    Founded in 2011, BTCC is one of the world’s longest-serving cryptocurrency exchanges, offering secure and user-friendly trading services to millions of users globally. With a commitment to security, innovation, and community building, BTCC continues to be a trusted platform in the evolving cryptocurrency landscape.

    Website: https://www.btcc.com/en-US

    X: https://x.com/BTCCexchange

    Contact: press@btcc.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/d56fc540-d6fd-4c6f-ae1a-a3ea93410608

    The MIL Network

  • MIL-OSI Global: Small Boat: this slim, devastating novel about a real migrant shipwreck reminds us of the cruelty of indifference

    Source: The Conversation – UK – By Fiona Murphy, Assistant Professor in Refugee and Intercultural Studies, Dublin City University

    There’s a particular kind of story that’s rarely executed well – one without heroes, without lessons, without even the cold comfort of a villain you can confidently point at and say: there, that’s the evil. Vincent Delecroix’s Small Boat – a slim, bruising novel translated with quiet precision by Helen Stevenson – is that kind of story.

    Small Boat, which was shortlisted for the 2025 International Booker Prize, centres on a real horror: the drowning of 27 people in the English Channel on November 24 2021. They were crowded into an inflatable dinghy in the dark, reaching out over crackling radio lines, asking – in French, in English, in Kurdish – for help. They didn’t get it.

    What is known – not imagined in Delecroix’s pages – is that both French and British coastguards received their calls. And both hesitated, passing responsibility back and forth like a poisoned parcel. People died while operators discussed jurisdiction. The Cranston Inquiry, established to examine the failures of that night, is ongoing, its transcripts and testimonies peeling back the layers of bureaucratic neglect.

    Delecroix doesn’t give us the migrants’ stories directly. He focuses instead on a fictional French coastguard operator, a woman who spent that night on the radio, doing (or not doing) what her training, her weariness, her own justifications allowed. In the aftermath, she is questioned – not in a court, but in a room filled with mirrors. She faces a policewoman who looks like her, thinks like her, speaks with her same clipped, professional cadence.

    She listens back to recordings of her own voice on the rescue line promising help that would not come, offering assurances she did not believe. She is left to reckon with the unbearable fact that someone, somewhere (was it her?) spoke the words: “You will not be saved.”




    Read more:
    International Booker prize 2025: six experts review the shortlisted novels


    She isn’t especially monstrous. She’s tired. She’s professional. She has a young daughter at home and an ex-partner who sneers at her work. She runs on the beach to decompress. In one of the novel’s most arresting turns, she compares herself to a mass-produced tin opener: efficient, functional, affectless. Delecroix draws her with enough delicacy that we cannot quite hate her. And that, of course, is far more unsettling.

    Reading Small Boat, I thought – as one inevitably does – of Hannah Arendt’s banality of evil. Not evil as grand spectacle or ideology, but as administration, the quiet conviction that one is simply fulfilling a role. Arendt coined the phrase watching the trial of Adolf Eichmann, one of the chief Nazi organisers of the Holocaust. Eichmann organised the trains but claimed never to have hated the passengers. What Arendt saw was not a monster but a functionary – and that, of course, was the point.

    I thought too about my own work as an anthropologist researching forced displacement across Ireland, Turkey and Australia. I’ve sat with people whose lives are shaped not by violence in its cinematic form, but by violence as policy: the hotel room without a kitchen, the letter that never arrives, the bed that’s taken away with no warning.

    I’ve heard a senior Irish official describe the state’s provision of housing and support for asylum seekers as “sufficient”. Meanwhile people, stateless and waiting, are asked to prove their vulnerability again and again until even their grief is suspect.

    Institutional indifference

    The institutionalisation of indifference: that’s the real story here. The smugness of protocols. The liturgy of duty rosters and shift reports. It wasn’t evil that let those people drown in the Channel – it was ordinary people in warm offices, citing rules, filling forms, following scripts.

    We can see the birth of such indifference in policies like the UK’s abandoned Rwanda plan, which casually proposed outsourcing asylum itself, as if refuge were a commodity.

    Delecroix’s brilliance lies in showing how violence at the border is carried out not by villains, but by workers. By women with mortgages, men on night shifts, people who’ve learned to sort calls for help by urgency, credibility, accent. “Sorting,” the narrator explains, “is perhaps the most important part of the job.” Not all distress calls are equal. And the assumption – always lurking, never spoken – is that some lives are more likely to be saved.

    At one point, the narrator’s colleague Julien answers calls from migrants by quoting Pascal: “Vous êtes embarqués.” You are already embarked. A fatalist shrug disguised as wisdom. As if to say: you should have thought of all this before you left. The shrug does the work of a policy, the quotation the work of a wall.

    And yet, the narrator cannot fully perform indifference. She is haunted by the sea. She remembers loving it as a child. Now, it terrifies her. She feels it watching her, pursuing her, wanting to surge past the shore and swallow the continent whole. She runs along the beach to quiet her mind – a run that is almost the same length as the journey those on the dinghy tried to make.

    If Small Boat has a flaw, it’s that it sometimes flirts with making guilt into its own form of lyricism. But this too may be deliberate. It is easier, perhaps, to feel sorry than to feel implicated. And far easier to narrate moral confusion than to prevent its causes.

    What Delecroix has written is not a redemption story. It’s not a psychological thriller. It is a chamber piece for one voice and many ghosts. There are no grand gestures here. Just small refusals, small failures. And the small, flickering boats of each human life, drifting toward – or away from – one another in the dark.

    In a world ever more brutal towards those who flee war, hunger and despair, Delecroix’s novel is a necessary and merciless indictment. It reminds us that the shipwreck is not theirs alone. It is ours too.

    Fiona Murphy does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Small Boat: this slim, devastating novel about a real migrant shipwreck reminds us of the cruelty of indifference – https://theconversation.com/small-boat-this-slim-devastating-novel-about-a-real-migrant-shipwreck-reminds-us-of-the-cruelty-of-indifference-255052

    MIL OSI – Global Reports

  • MIL-OSI United Kingdom: Seed sowers sought to explore food potential of Scotland’s underutilised land Nutrition scientists are recruiting an army of seed sowers to help them understand how Scotland could better exploit its underutilised – or “marginal” – lands.

    Source: University of Aberdeen

    Freda Farquharson (left) and Wendy Russell

    Nutrition scientists are recruiting an army of seed sowers to help them understand how Scotland could better exploit its underutilised – or “marginal” – lands.
    Nutrition scientists are recruiting an army of seed sowers to help them understand how Scotland could better exploit its underutilised – or “marginal” – lands.
    Researchers at the university’s Rowett Institute have been very busy filling small packs with dozens of sorrel seeds to send out to participants across the country.
    Now they are appealing for anyone with an interest in taking part in the Wild Edibles Citizen Science project to get in touch and join the community.
    The idea is for as many people as possible to then share their experiences of how they get on nurturing the plants – and then using them in the kitchen.
    A dedicated Facebook group has been set up to share hints and tips and encourage a wider debate about the role wild edibles may play in the future.
    Wild edibles can be cultivated across much of Scotland. They thrive in poorer soils, are more climate resilient than many of our modern crops and have lower water, nutrients and pesticides requirements.
    They are also rich in phytochemicals, compounds that we think help prevent diseases such as cardiovascular disease and some cancers.
    Professor Wendy Russell, who leads the Rowett’s Scottish Government-funded research into sustainable food systems and supply, is spearheading the project.

    Only a small proportion of Scotland can be used to grow mainstream crops, and with increasing urban spread and ambitious plans to protect nature and biodiversity, as well as to reforest and protect our peat bogs, it is important to think about how we use our land.” Professor Wendy Russell

    In an introductory video posted to the Facebook group, Prof Russell said: “We’re really interested in how Scotland uses its underutilised – sometimes called ‘marginal’ – lands.
    “Only a small proportion of Scotland can be used to grow mainstream crops, and with increasing urban spread and ambitious plans to protect nature and biodiversity, as well as to reforest and protect our peat bogs, it is important to think about how we use our land.
    “This citizen science project is an opportunity for us to have a discussion around the use of wild edibles in our food system. Everyone should have a say about these important questions about the way we adapt what we grow and eat in the future and we are looking forward to building a community of seed planters to help grow that conversation.”
    Project co-leader Freda Farquharson told potential recruits: “We are keen to hear as many of your stories as possible – where are you planting the seeds, how are you tending them, how well are they growing, what dishes are you planning to use the sorrel in?”
    The Rowett research led by Prof Russell is showing how nature-based solutions could be pivotal in mitigating and adapting to climate change whilst restoring nature.
    Scotland’s future landscape will look very different, having to accommodate increased urban spread as well as larger areas of afforestation and peatland restoration. There is also an immediate necessity to produce our food in the most efficient and environmentally friendly way possible, but also to be mindful that we restore and enhance important habitats for our precious and unique biota.
    Mainstream agriculture will have to quickly adapt to contribute to meeting Scotland’s climate, biodiversity and heath targets, but we must also identify opportunities for nature-based food solutions as they could be pivotal in mitigating and adapting to climate change whilst restoring nature.
    Participants (UK only) can sign up for their seeds and get more information here: https://www.abdn.ac.uk/rowett/research/wild-edibles/ Or contact the team at: wildedibles@abdn.ac.uk

    Related Content

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Island schools to benefit from new speech and language support tools 21 May 2025 Island schools to benefit from new speech and language support tools

    Source: Aisle of Wight

    Children across the Isle of Wight are set to benefit from a new initiative aimed at improving speech, language and communication skills in schools and early years settings.

    The Isle of Wight Council’s Virtual School has invested in a set of Progression Tools developed by Speech and Language UK.

    The tools, along with dedicated training provided by the council’s Schools Speech and Language Support Team, will be provided to every school and setting.

    Covering ages three to 18, the Progression Tools help teachers and staff identify speech and language challenges early — often before they become barriers to learning. They can also be used to track speech and language development over time or following targeted programmes.

    A training event for education providers will take place on Wednesday 18 June, offering practical guidance on how to use the tools to support children more effectively. The training is open to all Island settings, including nurseries, schools, and post-16 providers.

    All settings with a child cared for by the Isle of Wight Council have already received an invitation. Invitations for all other settings will be sent to headteachers or managers after the half-term break.

    If your setting would like to ensure you receive an invitation directly, please email: virtual.school@iow.gov.uk

    Councillor Claire Critchison, Cabinet member for children’s services and education, welcomed the initiative, saying: “This is a fantastic example of how we’re working together across services to give every child the best start in life.

    “Early identification of speech and language needs can make a huge difference to a child’s confidence, learning, and future opportunities.

    “By equipping our schools and early years settings with the right tools and training, we’re not only supporting our most vulnerable children, such as those in care, but also strengthening the overall quality of education across the Island.

    “I’m proud to see our teams leading the way in making sure no child’s needs go unnoticed.”

    The Virtual School, which supports care-experienced children, will also require the use of the Progression Tool as part of Personal Education Plans (PEPs) for children in care, ensuring their needs are identified and addressed as early as possible.

    Carol Payne, deputy chief executive of Speech and Language UK, said: “We’re honoured to be working with the Isle of Wight Council and its dedicated staff to support those children with speech and language challenges.

    “From our research we know there are two million children in the UK with speech and language challenges and our unique tools and training programmes make it easier to identify those children so that they can get the support they need to help them thrive at school, into young adulthood and beyond.”

    The initiative has also been shared with NHS colleagues, who are supportive of the collaborative approach being taken across education and health services.

    As well as designing innovative tools and training for educators Speech and Language UK offers a free advice line and guidance to families to help them support their child’s skills.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Council leaders visit Portakabin HQ to champion local skills and apprenticeships

    Source: City of York

    The Deputy Leader of City of York Council, alongside senior council officers, recently visited the Portakabin head office in York.

    Portakabin, the market leader in the manufacture and construction of modular buildings, is one of York’s largest employers, with over 1,000 people working across its head office and manufacturing facility in the city. The company has proudly called York home for more than 60 years.

    As a globally recognised brand, Portakabin recently welcomed local leaders to its York headquarters to discuss future growth opportunities, the importance of strong public-private partnerships, and to reflect on recent successes, including a thriving apprenticeship scheme that is opening skilled career paths for young people across the region.

    The apprenticeship scheme at Portakabin offers its people development opportunities, with 98% of apprentices offered a full-time career with the company once their apprenticeship completes.

    Apprenticeships range from the required skills for modular building construction such as electrical apprenticeships, to product design, quantity surveying, finance, and marketing.

    Councillor Pete Kilbane, Deputy Leader of the Council with responsibility for Economy and Culture, said:

    I was delighted to accept the invitation from Portakabin to visit their head office and hear about the work taking place to provide skilled and well-paid jobs.

    “York is a fantastic place to do business, we have a highly skilled population, and it is a great place to live.

    “A key priority of this council is for the city to have a fair, thriving, green economy for all, which provides opportunities and well-paid jobs. Portakabin are one of many amazing businesses in York who will help us to achieve that ambition. It was particularly good to hear so much about their apprenticeship schemes and how that is turning into long-term careers for our young people.”

    Dan Ibbetson, CEO at Portakabin said:

    We were delighted to welcome Councillor Pete Kilbane to our Head Office here in York. We are proud to be a York based business, delivering exceptional spaces across the UK and Northern Europe from our home here in Huntington.

    “Our successes are testament to the people that work here, the highly skilled and motivated teams that deliver a meaningful impact both in work and the wider York community. It was a pleasure to give Councillor Kilbane and other senior leaders from the council an insight into the people, community and spaces we deliver here at Portakabin.” 

    For businesses big and small there’s lots of support available to help your business prosper and thrive through the council’s Growth Managers. For more information visit:  https://www.york.gov.uk/GrowYourBusiness or email economicgrowth@york.gov.uk.

    MIL OSI United Kingdom

  • MIL-Evening Report: Australia’s Wong condemns ‘abhorrent, outrageous’ Israeli comments over blocked aid

    Asia Pacific Report

    Australia’s Foreign Minister Penny Wong has released a statement saying “the Israeli government cannot allow the suffering to continue” after the UN’s aid chief said thousands of babies were at risk of dying if they did not receive food immediately.

    “Australia joins international partners in calling on Israel to allow a full and immediate resumption of aid to Gaza,” Wong said in a post on X.

    “We condemn the abhorrent and outrageous comments made by members of the Netanyahu government about these people in crisis.”

    Wong stopped short of outlining any measures Australia might take to encourage Israel to ensure enough aid reaches those in need, as the UK, France and Canada said they would do with “concrete measures” in a recent joint statement.


    An agreement has been reached in a phone call between UAE Foreign Minister Sheikh Abdullah bin Zayed Al Nahyan and his Israeli counterpart Gideon Saar, reports Al Jazeera.

    According to the Palestinian news agency WAM, the aid would initially cater to the food needs of about 15,000 civilians in Gaza.

    It will also include essential supplies for bakeries and critical items for infant care.

    ‘Permission’ for 100 trucks
    Earlier yesterday, a spokesperson for the UN humanitarian office in Geneva said Israel had given permission for about 100 aid trucks to enter Gaza.

    However, the UN also said no aid had been distributed in Gaza because of Israeli restrictions, despite a handful of aid trucks entering the territory.

    “But what we mean here by allowed is that the trucks have received military clearance to access the Palestinian side,” reports Tareq Abu Azzoum from Deir el-Balah, central Gaza.

    “They have not made their journey into the enclave. They are still stuck at the border crossing. Only five trucks have made it in.”

    Israel’s Gaza aid “smokescreen” showing the vast gulf between what the Israeli military have actually allowed in – five trucks only and none of the aid had been delivered at the time of this report. Image: Al Jazeera infographic/Creative Commons

    The few aid trucks alowed into Gaza are nowhere near sufficient to meet Gaza’s vast needs, says the medical charity Doctors Without Borders, known by its French initials MSF.

    Instead, the handful of trucks serve as a “a smokescreen” for Israel to “pretend the siege is over”.

    “The Israeli authorities’ decision to allow a ridiculously inadequate amount of aid into Gaza after months of an air-tight siege signals their intention to avoid the accusation of starving people in Gaza, while in fact keeping them barely surviving,” said Pascale Coissard, MSF’s emergency coordinator in Khan Younis.

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI United Kingdom: ‘Shine your light’: responding to challenges facing the charity sector

    Source: United Kingdom – Executive Government & Departments

    Speech

    ‘Shine your light’: responding to challenges facing the charity sector

    Charity Commission Chief Executive David Holdsworth delivers keynote speech at Charity Times’ Annual Conference 2025.

    Thank you Srabani and good morning everyone / bore da pawb.

    It’s a privilege to be speaking to at this conference for the first time as the Commission’s CEO, after rejoining the organisation last summer.

    I probably don’t need to explain to this audience why I returned to work with the charity sector.

    Current operating environment and challenges 

    The Charity Commission stands at a unique vantage point, where the perspectives of charities, government, the public and donors meet.

    From this position, we see three trends.

    First, an incredibly challenging economic environment for the sector.

    Like other sectors, charities face inflationary pressures and rising operational costs.

    But charities are also dealing with increased demands for their services.

    The cumulative impact of these trends on charities is, in some cases, extremely challenging.

    Second, charities, like other organisations, are contending with rapid technological and social change.

    Some tech innovations, notably in the space of AI, offer tools that can help charities do more with less and increase their impact.

    But looking ahead, these technologies potentially challenge the very role of organisations and institutions in the traditional sense.

    Notably when coupled with changing attitudes, especially among younger people, whose allegiances are increasingly to causes, not ‘bricks and mortar’ or brands and institutions and where technology platforms offer alternatives of direct giving to those in need.  

    Thirdly – global conflicts, geo political shifts and instability. The shocking invasion of Ukraine and conflicts in the middle east have seen demands on and need of charity increase significantly. Whilst at the same time the once seemingly immovable, solid post war geo political system is shifting, creating uncertainty and instability. This makes responding to increased global need more difficult and challenging to navigate.

    Impact and Potential

    Despite those challenges the sector has never been more important – and let’s be clear what charities achieve for society is astonishing, both in terms of scale and impact.

    Based on Annual Returns submitted to the Commission for 2023’s accounts, the sector had an annual income of over £96 billion – up around 7% on the previous year.

    We registered just over 5,000 new charities last year, having assessed a record 9,840 applications – a 9% increase on the previous year.

    And there are around 700,000 trustees who collectively steward the sector though good times and bad, and whose work often goes unrecognised and uncelebrated – though we at the Commission are all too aware of their service and contribution.

    But numbers alone don’t tell of the human impact of charity. Of the positive difference charities make in transforming or enriching communities, our environment, our wildlife, heritage, culture as well as saving and improving countless individual lives.

    It is that impact that charities, their amazing trustees, volunteers and employees have – that we must not lose sight of – nor let the challenges shroud.

    There are so many examples to tell.

    Like the Felix Project which had a landmark year, providing 38 million meals through its network of 1,264 community organisations and schools by growing its network of collaborations. Building on that success it has launched its Multibank, which has seen 1.46 million non-food essential items distributed to try and ensure no Londoner in need goes without.

    Welsh Women’s Aid and its partners helped 739 survivors access refuge-based support. That is life-saving intervention happening every day, across the country – offering not just physical shelter but a sense of home and safety when people need it most.

    That the osprey – that magnificent bird of prey – which was once driven to near extinction in the UK – is now thriving, with over 250 nesting pairs living in Britain today, is thanks to charities.

    And it is thanks to charity that, on average, two lives are saved at sea every single day by RNLI volunteers.  

    Also I know from my last CEO role at the Animal and Plant Health Agency, thanks to animal welfare charities’ campaigning work over decades, the UK now has one of the most advanced legal frameworks protecting animal health and welfare.

    These a just a few examples of what has been made possible by the charity sector.

    Potential and Opportunity

    So whilst I don’t underestimate for one moment the challenges charities face – and which I have seen first hand on my many visits – I would urge you not to let those challenges dim nor shroud the huge impact you are having, everyday.

    I also firmly believe that as Albert Einstein once said:

    in the middle of difficulty lies opportunity.

    Arguably, the bigger the challenge, the greater the opportunity. Ideas previously rejected as too radical; innovation that once felt too big; conversations which felt too challenging can suddenly feel possible – and necessary.

    Take for example, the city I call home, Liverpool. Which is incidentally also the Commission’s main home, where most of our staff are based.

    I grew up in Liverpool in the 1980s. It was a time when the city felt like it had lost its way, with ever increasing challenges and ever dwindling opportunity and resources.

    Today my home city is transformed. And that transformation happened through collaboration – a combination of philanthropic investments, national and local government investment, alongside renewed community action notably in the arts, culture and tourism which acted as catalysts for wider renewal.

    Each individual project mattered, but what made for game-changing transformation was the cumulative impact of collaborative and complementary efforts from a number of actors. And that is true across the sector today.

    Take for example, Fareshare. Working collaboratively, supporting other charities in their network, they’ve helped distribute 92% more food over the last year, and made their budgets go 78% further.

    This resulted in them distributing a whopping 135 million meals, reaching nearly 1 million people.

    If you’ll allow me to return once more to my hometown.

    In late 2024, Zoe’s Place, a hospice in Liverpool which provides care to children, faced an uncertain future. The community of Liverpool, supported by business leaders and politicians, as well as a fellow charity the Institute of our Lady of Mercy, fellow hospice Claire’s Place and regional media collectively rallied to save Zoe’s Place, with the Commission playing a key facilitating role.

    Now, ownership has been transferred to the newly registered Liverpool Zoe’s Place. The charity’s trustees have also finalised plans to build the charity’s new home, securing the continuation of the former charity’s legacy.

    The hospice had been helping families through the unimaginable since 1995 – to see that vital service disappear would have been gutting for the community, and a huge blow to the families who rely on the organisation’s support.

    Instead, by reawakening their community’s passion and pride in the service, the charity will now continue to provide that support for years to come.

    In addition to this kind of public appeal, forging new corporate partnerships is another option being explored by many charities. Indeed, the Charities Aid Foundation estimates that UK businesses contribute around £4 billion to the sector.

    Take one example – a mere stone’s throw from here: national homelessness charity, Shelter.

    The organisation has partnered with clothing brand, Lucy and Yak. Last year they held a successful pop-up shop in Kings Cross, and now, they’ve launched donation boxes in several Lucy and Yak shops across the country encouraging customers to donate clothing.

    Shelter has responded to competition facing charity shops with the rise of preloved selling platforms in an agile and innovative way. Through this partnership, they’ve added a funding stream to their ‘bow’ and potentially reached new supporters.

    But I appreciate that public appeals and new corporate partnerships won’t work for everyone.  

    As a result of the Covid pandemic, many charities needed to re-evaluate their financial resilience and ability to weather further storms – many had dipped into their reserves, while others had little to fall back on.

    With the same desire to ensure services do not come to an end, some charities with similar goals turned to mergers – combining resources to create something more sustainable.

    For example, Community Integrated Care, one of the largest social care providers in the UK, merged with Inspire, a social care provider based in Scotland, in 2023. The charities saw how funding shortfalls, economic pressures and workforce shortages were impacting social care more broadly and chose to secure their future together rather than struggle through apart. And it paid off.

    Community Integrated Care’s income increased by £22 million in the year after the merger, and the charities reported publicly that the merger was a good strategic fit. These charities found strength in unity while continuing to provide that sense of belonging their beneficiaries depend on.

    Mergers are not the answer for all – and I don’t underestimate the work that can be involved in navigating a successful transition. But where you decide a merger is the best way forward, the Commission is on hand.

    Conclusion: strength in collaboration

    I’ve touched upon a few examples today to evidence my underlying confidence in this sector’s collective power. Just as no home is built by a single pair of hands, no lasting social change comes from isolated efforts.

    Our dear late Queen, Elizabeth II, once said:

    On our own, we cannot end wars or wipe out injustice, but the cumulative impact of thousands of small acts of goodness can be bigger than we imagine.

    In the year of the 80th anniversary of Victory in Europe and Victory in Japan we should remember those words and that out of darkness can come something brighter and better than before.

    From the darkness of tyranny, fascism and unfathomable loss came a renewed determination for peace, democracy and equality. That which charities had long fought for then came forward in the form of the NHS, welfare state, expansion of access to higher education, and workers’ rights.

    While the challenges facing society may be less existential, I believe this sector can again play a transformational role across communities, across government, local and national, with businesses and philanthropists to once again tackle our biggest issues with joint purpose.

    There is no greater charity sector in the world than here and my message is clear.

    Keep shining a light, charities.

    Shine a light on your charitable purpose.

    Shine a light of hope, and of refuge to those in need.

    Shine a light on your innovation and impact.

    And always remember that you not only stand on the shoulders of giants, but you too are now building that better brighter future for the next generation.

    Thank you. I look forward to hearing your thoughts, and taking your questions.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom