Category: European Union

  • MIL-OSI United Kingdom: Southport perpetrator Prevent Learning Review

    Source: United Kingdom – Government Statements

    Security Minister Dan Jarvis gave an update on the Prevent Learning Review – jointly commissioned with Counter Terrorism Policing following the Southport attack.

    With permission, Madam Deputy Speaker, I will make a statement updating the House on the government’s response to the Southport murders.

    The attack in Southport in July last year was one of the most appalling and barbaric crimes committed in this country.

    For young children and adults to be attacked in this way and 3 young girls killed is utterly heartbreaking. The Home Secretary and I would like to thank those people who showed great bravery in attempting to stop the attack.  

    For this foul act of violence to happen while children were enjoying themselves at a dance class at the beginning of the school holidays is beyond comprehension.

    Our thoughts and prayers are with the families of the 3 girls and all those injured as they continue to live with the trauma of that dark day.

    No one should have to go through what they have, and we are steadfast in our commitment to ensuring they get every possible support.

    Madam Deputy Speaker, responsibility for this abhorrent attack lies with the perpetrator. Axel Rudakubana has been sentenced to life imprisonment. He will serve a minimum of 52 years in prison.

    And Mr Justice Goose said it is highly likely that he will never be released.

    When the Home Secretary addressed the House on this case last month, she outlined the multiple interactions the perpetrator had with state bodies in the years before the attack. This included police, social services and mental health services.

    There are serious questions about how various agencies failed to identify and collectively act on the warning signs.

    All those questions must be answered – we owe that to the families, who deserve the truth about what went wrong.

    That is why the government is committed to understanding and addressing the failings in this tragic case through a comprehensive public inquiry.  

    It will examine the issues raised in this case but also wider challenges around rising youth violence.

    We are moving swiftly to set up the inquiry.

    We will consult the families to ensure all critical issues are addressed while remaining sensitive to the needs of those most affected. We expect to announce further details about the inquiry next month.

    While we do not pre-empt the conclusions of the inquiry, there are areas where action can and must be progressed immediately.

    Prevent is a vital part of our counter-terrorism system. We must endeavour to identify those susceptible to radicalisation early and before they go on to commit terrorist acts.

    Prevent receives nearly 7,000 referrals every year and our hard-working frontline staff have supported nearly 5000 people away from terrorism since 2015. We must get Prevent right.

    That is why the Home Office and Counter-Terrorism Policing commissioned a rapid Prevent learning review immediately after the attack.

    These are usually internal technical reviews intended to identify swift learning and improvement for Prevent.

    But the importance of the families needing answers has meant that, today, following close engagement with the families, we are taking the unusual step of publishing the Prevent Learning Review.

    And I can update the House that the perpetrator was referred to Prevent 3 times between December 2019, when he was aged 13, and April 2021, when he was 14. Those referrals were made by his schools.

    The first referral reported concerns about him carrying a knife and searching for school shootings on the internet. The second referral was focused on his online activity relating to Libya and Gaddafi. His third referral was for searching for London bombings, the IRA, and the Israel-Palestine conflict.

    On each of these occasions, the decision at the time was that the perpetrator should not progress to the Channel multi-agency process.

    But the Prevent Learning Review found that there was sufficient risk for the perpetrator to have been managed through Prevent.

    It found that the referral was closed prematurely and there was sufficient concern to keep the case active while further information was collected.

    The review is clear on the concerning behaviours that the perpetrator demonstrated. It highlights his interest in the Manchester Arena attack.

    That he talked about stabbing people.

    And it flagged that some of the grievances that could have been a motivation, were not fully considered.

    The review also highlights the perpetrator’s clear vulnerabilities and complex needs that may have made him more susceptible to being drawn into terrorism.

    The review concluded that:

    1. Too much focus was placed on the absence of a distinct ideology, to the detriment of considering the perpetrator’s susceptibility, grievances, and complex needs.
    2. There was an under-exploration of the significance of his repeat referrals and the cumulative risk, including his history of violence.
    3. There were potentially incomplete lines of enquiry.
    4. And that at the time, the perpetrator could have fallen into a Mixed, Unclear or Unstable category for Channel due to his potential interest in mass violence.

    Indeed, the overall conclusion of the review is that he should have been case-managed through the Channel multi-agency process, rather than closed to Prevent.

    This would have enabled co-ordinated multi-agency risk management and support.

    Madam Deputy Speaker, the Prevent Learning Review made 14 recommendations for improvements to Prevent.

    We have accepted these findings and rapid action has been taken to implement the recommendations.

    Counter Terrorism Policing have conducted in-depth assurance visits to every region to determine whether the issues identified in this case have been resolved by operational improvements made since 2021.

    Urgent work is underway to address the findings.

    The Prevent Assessment Framework was launched in September and is now in place across all regions. It was developed by experts and is being used to triage and risk-assess all Prevent referrals. It will improve decision-making at all stages of the Prevent system. Roll-out of this tool has been accompanied by rigorous mandatory training.

    We have begun an end-to-end review of Prevent thresholds to ensure Prevent can deal with the full range of threats we see today, from Islamist extremism, which is the most significant terrorist threat the UK faces, through to the fascination with mass violence we saw in the Southport case.

    This internal review will complete in April and further strengthen the approach to repeat referrals, and ensure that clear policy, guidance, and training is in place.

    We have completed the first stage of a policy review into how Prevent supports referrals who have mental ill-health or are neurodivergent.

    Actions for improving the operational approach have been identified and will be implemented swiftly, with oversight from the new Prevent Commissioner.

    We are also strengthening our approach to the oversight of referrals that do not meet Prevent thresholds, to make sure that people receive the right support.

    Next week, a pilot starts in several local areas to test new approaches to cases that are transferred to other services.

    And, of course, the government has appointed Lord Anderson as Interim Prevent Commissioner. This is the first time that Prevent will have a dedicated independent oversight, in its history and this will ensure Prevent is always held to the highest standards.

    His first task is to review the perpetrator’s Prevent history, drawing on the Prevent Learning Review. This will identify whether there is further learning, examine improvements made to Prevent since 2021, and identify any remaining gaps that require further improvement. 

    Lord Anderson will complete the review within his term as Interim Commissioner, which will end with the appointment of a permanent commissioner in the summer of this year.

    But it is simply not enough to focus only on this case. We need to take an even more robust approach to identifying learning swiftly and driving that learning through the Prevent system.

    The Prevent Commissioner will be tasked with overseeing a new approach to Prevent learning reviews that enables rapid debriefing and urgent action after incidents, but also provides a clear framework that binds other agencies into the joint learning process.

    Transparency and enabling public scrutiny is also fundamental.

    And that is why we will take steps to publish the findings of other independent Prevent learning reviews where there has been an incident of national significance.

    So, Madam Deputy Speaker, next week, we will publish the Prevent Learning Review into the appalling attack on Sir David Amess to enable further public scrutiny of this important programme.

    Madam Deputy Speaker, the first duty of government is to ensure the security of our country and the safety of our people, because nothing matters more.

    And while we can never undo the hurt and pain caused by this unthinkably wretched attack, we can, we must and we will do everything in our power to prevent further atrocities.

    As the Prime Minister said, Southport must be a line in the sand for Britain.

    If that means asking difficult questions about shortcomings or failures, so be it.

    If it means holding institutions and processes to account, we will do so without fear or favour.

    And if changes are required to protect the public and combat the threats that we face, then this government will not hesitate to act.

    I commend this statement to the House.

    Updates to this page

    Published 5 February 2025

    MIL OSI United Kingdom

  • MIL-OSI Security: Attorney General Loretta E. Lynch Delivers Statement at Briefing to Discuss the U.S. Government’s Ongoing Counterterrorism Efforts

    Source: United States Attorneys General 13

    As I’ve said previously, we stand in solidarity with the people of France at this difficult time.  We are committed to providing any and all assistance to our allies in Europe and around the world as we all face this global threat.  Now we’ve made that commitment clear, not just with words, but with our actions.  The Department of Justice, the FBI and other agencies are in close contact with French authorities, through our international legal assistance channels, to provide support to the French in their ongoing investigation, to coordinate strategies with them, and to advance our shared efforts as we obtain further information that may be relevant to these attacks.  We are operating on an expedited basis, as well, to ensure that the victim assistance professionals at the Department of Justice and the FBI are available to assist the victims and their families.  We’ve also expanded the FBI’s legal attaché office in Paris to offer assistance on an as-needed basis, and we have personnel working day and night to respond to any additional requests for assistance.  Now earlier today, President Obama spoke by phone with President Hollande to discuss the latest developments in the investigation and to reaffirm our partnership in the fight against terrorism.

    Now of course, our highest priority is and will remain the security of our homeland and the safety of all Americans.  At the Department of Justice, we are operating around the clock, as we have since 9/11 and even before, to uncover and disrupt any plot that take aim at our people, our infrastructure and our way of life.  We take all threats seriously, we’re acting aggressively to defuse threats as they emerge, and we are vigorously investigating and prosecuting those who seek to harm the American people. 

    In fact, since 2013, we have charged more than 70 individuals for conduct related to foreign-fighter interests and homegrown violent extremism, and we continue to take robust actions to monitor and to thwart potential extremist activity.  The Department of Justice and the FBI are working closely with the Department of Homeland Security, with the broader intelligence community and our partners around the world in all of these efforts, and we are bringing every resource to bear in the service of our mission.

    As I think it’s important to note, that as we do this work, we are guided, obviously, by our commitment to the protection of the American people, but also by our commitment to the protection of our American values, which include the timeless principles of inclusivity and freedom that have always made this country great.  We need to say, we will not let our actions be overtaken by fear, and we will not allow merchants of violence to rob us of our most precious ideals.  Our values are not secondary considerations in the fight against terror – they are central to the work that we do, and they are essential to the nation that we protect.  They are also the reason that we are a target, and they are what terrorists want most to see us abandon.  They want us to live in fear, and we refuse.  They want us to change who we are, and what makes us quintessentially American, and that we will never do.

    MIL Security OSI

  • MIL-OSI Security: Attorney General Loretta E. Lynch Delivers Keynote Address on Counterterrorism and International Cooperation

    Source: United States Attorneys General 13

    Thank you, Dr. [Robin] Niblett, for that kind introduction; for your leadership here at the Royal Institute of International Affairs; and for your lifetime of dedicated work in the service of international cooperation and global security.  I also want to thank Prime Minister [David] Cameron and the members of Her Majesty’s government for their hospitality during my visit to the United Kingdom.  And I’d like to thank this group of distinguished colleagues, inspiring leaders and devoted public servants for participating in this important conversation.  It’s a privilege to join you here today as we honor the unique bond between our nations; as we reaffirm the cherished values and ideals that we share; and as we rededicate ourselves to building the stronger, safer, and more united world for which we have fought together in the past, and toward which we continue to strive today.

    The United Kingdom and the United States have long been close partners and staunch allies and the connection between us – which Winston Churchill referred to as our “special relationship” – is one with deep roots and a rich history.  Almost all of America’s founders proudly considered themselves Englishmen and many were hesitant to shed that honorable title, even after the start of the American Revolution.  And the revolution itself – though it pitted us against one another in armed conflict – was inspired by the ideals of the British Enlightenment: responsive government, robust rights and liberties, and the fundamental equality of all people.      

    Those ideals have been a source of mutual understanding and shared strength ever since – and while they have been threatened by injustice within our nations and hostility from beyond our shores, they have continued not only to endure, but to expand.  Through the courageous struggles of prominent leaders and humble citizens; of freed slaves and former colonial subjects; of suffragists, ethnic minorities, religious dissenters and gay and lesbian advocates – we have extended the rights of liberty, equality and justice.  Through the tremendous courage and sacrifice of our countrymen –in two World Wars, in battlefields of Korea and today in the skies over Syria and Iraq– we have defended our beliefs against tyranny and oppression.  And together, we have come to the aid of others inspired by the principles that we share.

    Today, the values that have guided and defined us for centuries are facing a persistent threat: the rise of global terrorism and extremism – a scourge that has inflicted its pain on both of our nations in the recent past.  Ten years ago, this great city endured devastating attacks on its public transportation system, and you suffered another attack in the Underground only this week.  In the United States, as you know, we have also suffered terrorist attacks and we are currently investigating last week’s tragic shootings in California as an act of terror.  And as recent events in Paris, Beirut, and Mali remind us, we are far from alone in being targeted by these agents of violence.  These attacks are carried out with a single, repugnant purpose: to harm, frighten and intimidate anyone who believes in open and tolerant societies; in free and democratic governments; and in the right of every human being to live in peace, security and freedom.  As two nations who serve as beacons of those ideals to people around the world, we have a special responsibility to take on this terrorist threat, and to prevent it from causing the destruction it is so desperate to inflict.

    As Attorney General of the United States, my highest priorities are the security of our country and the safety of the American people.  At the Department of Justice, we are working tirelessly to uncover and disrupt plots that take aim not only at the United States, but at nations around the world.  We are acting aggressively to defuse threats as they emerge.  And we are vigorously investigating and prosecuting individuals who seek to harm innocent people.  To stop plots before they can be brought to fruition, we are going after individuals engaged in preparatory activities like fundraising, recruitment, planning and training.  Our approach has yielded important results: since 2013, we have charged more than 70 individuals for conduct related to foreign terrorist fighter interests and homegrown violent extremism and we continue to take action designed to monitor and thwart potential extremist activity. 

    But no nation can fight terrorism alone.  As our world continues to grow more interconnected and interdependent, cooperation and joint action are more essential than ever to combating cross-border threats like terrorism, cybercrime, corruption and human trafficking.  And while modern technology has helped to widen the circle of opportunity for so many citizens around the globe, it has also provided new channels that criminals can exploit for their own ends.  Online, violent ideologies can rapidly proliferate and spread and threats can leap borders and oceans in an instant.  No nation can exist in a bubble of isolation; no country can imagine themselves immune from world events; and the security of each state increasingly depends on the security of all states.  The words of four centuries past ring ever true today, “no man is an island entire of itself.”  In this environment, our strategic understanding and our common humanity demand that we supplement nationwide vigilance with international cooperation.

    That is why the United States is working with organizations like INTERPOL and EUROPOL to share information on foreign fighters.  It’s why we have provided resources, including FBI agents, to support INTERPOL’s Fusion Cell, which investigates the training, financing, methods and motives of terrorist groups around the world.  And it is why we have crafted information-sharing agreements with more than 45 international partners to identify and track suspected terrorists – a partnership that has now provided INTERPOL with approximately 4,000 profiles on foreign terrorist fighters.  From efforts to degrade terrorist capabilities, to building cooperative networks that help to preserve and share information and evidence after an attack, we are demonstrating our deep commitment to collaboration worldwide. 

    Let me give one example of how critical it is that we work together.  Terrorists, like other criminals, count on the difficulties that law enforcement agencies have in sharing information across borders – difficulties that are magnified now that electronic information may be stored in many different countries and may quickly disappear.  But starting some years ago, criminal justice experts from the U.S., the UK, France and the other G7 countries created the 24/7 cyber network – a rapid reaction system that now links approximately 70 countries.  Thanks to that system, after the recent horrific attacks in Paris, French investigators were able to work immediately with the U.S. Department of Justice and with U.S. Internet Service Providers, to preserve data from social media accounts and webpages identified as connected to the attacks, and to seek emergency disclosures to protect lives.  It is this kind of innovative thinking about international information sharing that we need to increase.

    Of course, it is also important to emphasize that our efforts to fight terrorism must always be compatible with safeguarding privacy and civil liberties – exactly as the 24/7 cyber system is designed to be.  Often, in conversations like this one, there is an implicit assumption that our safety must be balanced against our rights and our values; that there is a necessary trade-off between the hopeful optimism of our ideals and the cold reality of our national security.  But the view that we must abdicate our values to maintain our security presents a false choice.  Rather, our security exists to protect our values, because they are the wellspring of all that we are.  Progress within our nations has always been driven by our desire to live up to our ideals – of inclusiveness and opportunity, of equal rights and equal justice – and if we curb those rights in a misguided bid for short-term security, we betray not only our ancestors; not only ourselves; and not only our children – but all those for whom the United States and the United Kingdom represent the possibility of a better, freer future.

    In this regard, I am proud to say that the Obama Administration, with the support of Congress, has made the protection of civil liberties and privacy a priority in the fight against terrorism.  The record is a remarkable one: President Obama has created unprecedented transparency regarding our guidelines for collection and use of signals intelligence, including signals intelligence collected in bulk.  The President nominated and the senate has confirmed, an independent Privacy and Civil Liberties Oversight Board, as envisioned by Congress.  And just last week, independent public advocates were appointed to advise the Foreign Intelligence Surveillance Court, as called for by the USA Freedom Act.  

    Moreover, in all of these efforts, as President Obama has made clear, our goal is to extend privacy protections not only to U.S. citizens, but to foreign nationals as well.  That is why, after years of negotiation, I am very happy to say that we were able to initial in September the U.S./EU “Umbrella” Data Privacy and Protection Agreement regarding law enforcement information.  And it is why – in a truly unprecedented step – the Administration has supported legislation to extend judicial redress rights to foreign nationals for privacy breaches regarding law enforcement information – legislation that, thanks to strong Congressional support, already has passed our House of Representatives, and is now pending in the Senate.  

    These actions are not only unprecedented, but reflective of the United States’ deep commitment to the principles they protect, as well as the importance of our relationship with our European partners in this struggle.  That is why it is particularly disappointing that the European Court of Justice – in a case based on inaccurate and outdated media reports – recently struck down the Safe Harbor Agreement in the Schrems decision.  And it is highly concerning to us that data privacy legislation advancing in the European Parliament might further restrict transatlantic information sharing – a step that not only ignores the critical need for that information sharing to fight terrorism and transnational crime, but also overlooks the enormous steps forward that the Obama Administration and Congress have taken to protect privacy.  It is important that all of us – on both sides of the Atlantic – work to set the record straight regarding our commitment to protect not only the safety of our citizens, but also their civil liberties and privacy.

    But one thing I am confident of in our work on these issues and in the larger fight against terrorism – we will not lose ourselves to fear.  We will respond to this and other threats the way we know best – by reaffirming the very ideals that distinguish us from those who wish us harm: freedom of speech; religious tolerance; the open exchange of ideas; and government that represents the will of its people.  These are the principles of Runnymede and Philadelphia, of the Glorious Revolution and the American Revolution – the principles that we have risen to defend time and again and emerged victorious.  For centuries, these ideals have inspired countless men and women around the world to seek the better life that is the promise of humanity and to demand that the elemental dignity of all mankind be recognized and respected.  And we must keep their promise alive.  

    There is no doubt that we come together at a time of uncertainty, facing dangerous threats and determined adversaries.  But in this moment of global challenge, we remain dedicated to the task that remains before us and to the work that so many have given their last full measure of devotion to fulfill.  Our nations may have been bloodied, but we will remain unbowed – in defense of our citizens, in solidarity with our allies and in allegiance to the values that make us who we are. 

    The road ahead will not always be easy.  We will encounter more times of uncertainty and setbacks.  But as we move forward in the work that will secure our homelands and prove our principles once more, we are fortified with the strength of our time-tested traditions, by the partnership of our longstanding allies and by the legacies of the brave men and women who fought to make our nations everything they are today.  I am confident about the road ahead.  I know that our promise will endure.  And if we can lean on our faith in our enduring values – and hold fast to our unshakeable belief in the cause of justice and the rule of law – then I have no doubt that out of a long and difficult night of challenge, a brighter day will come.

    Thank you.

    MIL Security OSI

  • MIL-OSI Security: Assistant Attorney General Leslie R. Caldwell Delivers Remarks at the 12th Annual State of the Net Conference

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Good morning. The Attorney General apologizes for not being able to be here today.  She was at the World Economic Forum in Switzerland – addressing cybercrime issues – and, unfortunately, unable to get back to D.C. in time for this because of the snowstorm.

    Thank you, Tim [Lordan], for that warm welcome, and for your leadership of the Internet Education Foundation (IEF).  I also want to thank the IEF for the invaluable services you have provided since your organization was founded nearly two decades ago – and that you continue to provide today.  Through this conference series, you bring together industry leaders, dedicated experts and devoted public servants to explore how we can harness new technologies to build more empowered communities and a stronger nation.

    As the Assistant Attorney General of the Criminal Division, my foremost task in the cyber area is the vigorous, fair and effective enforcement of our cyber laws.  The Justice Department does that by finding ways to protect our networks against evolving threats, by thwarting bad actors online, and by ensuring that both our security and our liberties remain as strong in the digital age as they have been throughout our history. 

    Essentially, we are focused on a question that President Obama posed in his State of the Union address a few weeks ago: How do we make technology work for us, and not against us? 

    In our age of rapid change and constant disruption, that question is relevant to almost every aspect of our lives, including law enforcement and national security.

    There is no doubt that technology has both expanded and complicated our capacity to detect, investigate and prosecute crimes.  Today, by using new technologies, we can analyze some types of evidence with unprecedented speed and accuracy, and coordinate with partners around the world in real time. 

    But as law enforcers have become better equipped, so have the law breakers we’re working to disrupt.  Digital technology has transformed how police and prosecutors do our jobs, but it has also transformed how wrongdoers commit their crimes.  Our bank accounts and personal information now exist online, tempting thieves and fraudsters. 

    The greater anonymity of cyberspace gives cover to drug dealers and arms traffickers.  Dark websites are used to circulate illicit content, like images of child sexual exploitation and stolen credit cards. 

    Communication is frequently by instant message and email, so there are no actual paper trails, but rather virtual ones in data stored on digital devices, hard drives and in the cloud.  And it isn’t just criminals who exploit the Internet for nefarious purposes. 

    The web also hosts groups and individuals who seek to harm our core security interests – from state-sponsored hackers conducting economic espionage; to rogue militants and official cyber warfare units targeting our infrastructure; to terrorist groups plotting attacks, radicalizing recruits and spreading hateful ideologies.

    These emerging threats require nimble, innovative and adaptive responses, and at the Department of Justice, we are committed to doing our part to ensure that law enforcement stays a step ahead of bad actors. 

    The FBI continues to investigate cyber intrusions and national security threats while monitoring individuals, organized groups and state actors who might attempt to steal sensitive data or inflict harm.  We recently created a Cybersecurity Unit within our Criminal Division, staffed with experienced prosecutors fluent in the law, policy and practice of cybercrime prevention. 

    And the Bureau of Alcohol, Tobacco, Firearms and Explosives has established an Internet Investigations Center (known as IIC) where federal agents, legal counsel and investigators track and counter illegal online firearms trafficking.  The IIC – which was highlighted in the president’s recent recommendations to curb gun violence – has already identified a number of significant traffickers operating over the Internet, and their work has led to prosecutions against individuals and groups using the “dark net” to traffic guns to criminals or attempting to buy firearms illegally online. 

    Of course, the Department of Justice’s work to combat cybercrime is enhanced through our collaboration with law enforcement partners in other agencies, such as the U.S. Secret Service and U.S. Postal Inspection Service.  And we are working to enhance cybersecurity and information sharing through our work with the Department of Homeland Security.

    These are important steps to protect our online information and to combat crime here at home – but with an entity as vast and complex as the Internet, we must also reach beyond our own borders to partner with other countries.  And that’s exactly what we’ve done. 

    In the last fiscal year, the FBI’s Cyber Division embedded three permanent Cyber Assistant Legal Attachés in the United Kingdom, Canada and Australia to help facilitate information-sharing, improve cooperation on investigations and build even stronger relationships with our allies. 

    We recently placed a Criminal Division prosecutor with Eurojust in The Hague and one in Southeast Asia.  These positions will help to facilitate information-sharing, improve cooperation on investigations and build even stronger relationships with our law enforcement partners in other countries.

    We’ve also created a cyber unit in our Office of International Affairs (OIA) dedicated to responding to and executing requests for electronic evidence from foreign authorities – requests that have increased by 1,000 percent over the last decade. 

    To help manage that significant growth, we have been actively hiring additional attorneys and professional staff for OIA’s Mutual Legal Assistance Treaty Modernization Project, and we hope to continue expanding our ability to help our overseas counterparts.  And we are providing critical, real-time assistance to foreign counterparts through the 24/7 Points of Contact Network established by the Group of Seven Nations and by the Budapest Cybercrime Convention – a convention that, I am pleased to note, continues to be joined by countries around the world committed to fighting cybercrime.

    Partnerships like these don’t just cultivate closer connections with our friends and allies – they also get results.  In 2012, we participated in a multinational sweep of child-pornography websites, ultimately dismantling more than 200 websites that sexually exploited children. 

    In November 2014, we joined more than 15 countries under the auspices of the European Cybercrime Centre – or EC3 – to launch Operation Onymous, which shuttered a number of so-called “dark market websites” peddling drugs, weapons, stolen credit card data, fake passports and computer-hacking tools. 

    And this past July, our joint effort with EC3 shut down the Darkode hacking forum – an underground site where hackers convened to buy, sell and trade malicious software, botnets, intrusion tools and stolen personal information.  That operation involved a coalition of 20 nations, led by the U.S. Department of Justice and EC3, and allowed us to charge, arrest or search 70 Darkode members and associates around the world. 

    The Justice Department will continue to work with foreign law enforcement agencies to prevent and prosecute groups and individuals that illegally use the Internet for crime and exploitation.  Of course, as we seek to ensure the safety and integrity of our devices, databases and networks, it is crucial that we work closely not only with other law enforcement officers, but also with the people who create and design these products themselves – the executives, entrepreneurs and engineers who make America’s tech sector the envy of the world. 

    Our collaboration has been instrumental in a range of important victories, including the takedown of the GameOver Zeus Botnet, an operation in which technology and data-security companies played an invaluable role.  We are committed to building on those successes by maintaining strong partnerships with the private sector. 

    That’s why the department has placed a high priority on entities like the FBI’s National Cyber Investigative Joint Task Force, which enables collaboration across government to respond to computer intrusions and attacks, and the National Cyber-Forensics & Training Alliance, which brings together law enforcement, private partners and experts in academia to address the cyber threats we face together. 

    And it’s why the Attorney General and I have been meeting regularly with industry leaders to foster cooperation and discuss urgent issues – including last week at the World Economic Forum in Switzerland, where the Attorney General joined with industry leaders to endorse five recommendations for enhancing public/private partnerships to fight cybercrime.  We will continue to reach out to representatives of the tech industry, and our door is always open to new ideas for combatting cybercrime and online extremism. 

    One area where cooperation between the government and the private sector is especially important is in addressing the growing problem of the government’s inability to obtain critical information in electronic form even when we have court authorization to do so.  This is the problem known as “going dark.” 

    While investigations used to rely on physical evidence – like handwritten notes, or documents stored in filing cabinets – as you can imagine, in the 21st century that kind of evidence is growing scarce.  Our ability to track and prosecute criminals now often depends on instant messages, emails and other forms of digital information.  In fact, nearly every criminal investigation we undertake at the federal level relies on electronic evidence. 

    But as new ways of using encryption become an increasingly standard feature of personal electronic devices and messaging platforms, companies are losing the ability to respond to lawful processes.  Those materials are increasingly inaccessible to law enforcement officers, even when we have a warrant to examine them.  And we find ourselves facing obstacles which can stop our investigations and prosecutions in their tracks.

    The security of our online information is critically important, and so is the legal process that protects our values and our safety.  These are complementary, not competing priorities.  After all, digital security is a vital tool, but it is not a cure-all – especially when it impedes our ability to protect ourselves and each other in the physical world. 

    The Department of Justice is completely committed to seeking and obtaining judicial authorization for electronic evidence collection in all appropriate circumstances.  But once that authorization is obtained, we need to be able to act on it if we are to keep our communities safe and our country secure. 

    From gang activity to child abductions to national security threats, the ability to access electronic evidence in a timely manner is often essential to successfully conducting lawful investigations and preventing harm to potential victims. 

    As FBI Director [James] Comey recently said, in May, two terrorists attempted to kill a lot of people.  One of the terrorists exchanged 109 messages with an overseas terrorist.  We have no idea what he said because it was encrypted.  That is a big problem.  We have to grapple with it.

    That’s why the Justice Department and organizations like the International Association of Chiefs of Police, the National District Attorneys Association and the Major Cities Chiefs Association feel strongly that there needs to be a way for law enforcement to retrieve critical information in cases where it’s necessary and authorized.  We are committed to working with innovators, leaders and problem-solvers like you to figure out how we can best meet this public need together.

    Of course, our interest in working together with you extends beyond this particular issue.  The Internet has so fundamentally changed the way we live our lives that there are times when institutions like law enforcement must evolve.  And as we seek to adapt to this new reality in a wide variety of ways, your creativity, your expertise and your leadership can help us ensure that the innovations we enjoy will benefit and protect the American people – and not those who would harm them or their liberties and rights.

    We understand that this is no easy task.  These are novel and difficult challenges.  But what makes us confident about our ability to succeed is that, throughout our history, this country has always found a way to move forward while retaining the values that make us who we are.  We are certain that we will do the same in the digital age.  And together, we will build a brighter, safer and more prosperous future for all.

    Thank you for your ongoing cooperation in that effort, and for your commitment to our shared goals.  I look forward to all that we will accomplish – together – in the weeks and months ahead.

    MIL Security OSI

  • MIL-OSI Global: US health funding cuts: what Nigeria stands to lose

    Source: The Conversation – Africa – By Oyewale Tomori, Fellow, Nigerian Academy of Science

    US president Donald Trump’s decision to withdraw the US from the World Health Organization is threatening funding for critical health programmes like HIV/Aids and tuberculosis in different parts of the world, including Nigeria.

    The Conversation Africa’s Adejuwon Soyinka asked professor of virology and former WHO Africa regional virologist Oyewale Tomori why Nigeria is heavily dependent on US funding for some of its health programmes, what’s at risk and how to mitigate the impact.

    How dependent is Nigeria on US funding for health?

    Sadly, Nigeria and many African countries are too dependent on US funding and other donor funding for basic health activities and interventions. These activities are the normal function of a good and responsive government which is committed to the welfare of citizens.

    According to a US embassy publication, since 2021, the US has committed to providing nearly US$20 billion in health programmes in Africa. The report says in 2023 alone, the US invested over US$600 million in health assistance in Nigeria. That is about 21% of Nigeria’s 2023 annual health budget.

    Nigeria has, over the years, allocated on the average about 5% of the national budget to health. Three quarters of that covers recurrent expenditure like salaries.

    Nigeria’s proposed 2025 budget is ₦49.74 trillion (US$33 billion), of which ₦2.4 trillion (US$1.6 billion) (4.8%) is allocated to health. This is lower than the 5.15% allocated to health in the 2024 budget.

    The private sector plays a significant role in the Nigeria’s healthcare system, providing close to 60% of healthcare services.

    In recent years, traditional medicine is increasingly offering complementary and alternative medicine in support of the services provided by the federal, state and local government areas levels.

    What health programmes does the US fund in Nigeria?

    The US support is focused on preventing malaria, under the US President’s Malaria Initiative; ending HIV, through the US President’s Emergency Plan for AIDS Relief; and delivering vaccines (COVID, polio, rotavirus, IPV2 and HPV).

    Malaria is a major public health concern in Nigeria. In 2021, there were an estimated 68 million cases of malaria and 194,000 deaths. Nigeria has the highest burden of malaria globally, nearly 27% of the global malaria burden.

    Nigeria has a high burden of HIV – fourth in the world. A large number of Nigerians live with the virus. The national agency responsible for AIDS control reported a rate of 1,400 new HIV cases per week in 2023.

    Nigeria has experienced outbreaks of yellow fever, meningitis, cholera, Lassa fever and COVID-19.

    In addition to helping with managing these major diseases, the US government also provided funds to strengthen the country’s ability to prevent, detect, respond to and recover from emerging public health threats.

    With these funds, a Public Health Emergency Management Programme was established and national disease surveillance systems were upgraded. Nigeria’s laboratory diagnostics were enhanced to test for Ebola, mpox, yellow fever, measles, Lassa fever, cholera and cerebrospinal meningitis.

    Other countries (Japan, Germany, Canada, the UK) also provided support through building and equipping laboratories and training health workers.

    What’s most at risk?

    Interventions most at risk are those of which the Nigerian government has abdicated its responsibilities to the donors. They include provision of rapid diagnostic tests for malaria, insecticide-treated bed nets, malaria preventive treatments in pregnancy, provision of fast acting malaria medicines and insecticide for home spraying.

    The following HIV interventions are likely to be adversely affected: HIV counselling and testing services, especially for pregnant women to prevent mother-to-child transmission of HIV, and the care of people living with HIV with TB/HIV services, as well as care and support for orphans and vulnerable children.

    Sustaining laboratory capacity for rapid disease diagnosis will suffer a major setback with reduced or lack of reagents and consumables.

    A huge amount of laboratory equipment is provided by donors. Servicing and replacement of equipment will be affected.

    The Nigerian health sector’s challenges include inadequate funding, shortage of healthcare professionals, poor access to healthcare due to cost, poor infrastructure, and high prevalence of preventable diseases.

    Cutting off US money is not likely to affect the shortage of healthcare professionals, as the major reason for the shortage is their deteriorating work environment and unsafe social environment. This environment was created by years of economic downturn and social insecurity in Nigeria.

    Why is Nigeria still so reliant on US funding?

    I think Nigeria lacks national pride as it begs for assistance to provide what it already has the resources for. The government seems to place the well-being of the citizens on a secondary status.

    Many African governments assume the world owes Africa compensation for colonial activities. But to me, the danger to Nigeria’s freedom from dependency is not truly knowing what we are, who we are, and how endowed we are.

    The world describes Nigeria as “resource limited” and, without thinking, Nigerians accept such name calling. Nigeria is not resource-limited, it is resource wasteful. Nigeria is not resource constrained; it is corruption constrained. Until Nigerians know who and what we are, we will never find the solution to our problems.

    Nigeria’s acceptance of the tag “resource-limited” drives it to beg for assistance even in areas of its highest capability, capacity and competence and where it has highly trained people. Like disease prevention and control.

    Africa has since the 1960s experienced numerous outbreaks of diseases and has acquired significant expertise in disease prevention and control. An example is the 2014 Ebola outbreak in Nigeria, which was brought under control within three months with only 20 cases and eight deaths.

    This was a disease that raged for three years and ravaged three countries: Guinea, Liberia and Sierra Leone. It was reported in seven others with 28,600 cases and 11,326 deaths.

    In Nigeria, the country coordinated response activities which were anchored on the participation of the community. The community was part of disease investigation, contact tracing, isolation of cases and adoption of infection, prevention and control interventions.

    How can Nigeria mitigate the impact?

    Nigeria must immediately provide emergency funds to cover the shortfall arising from the action of the US government. What Trump has done should have been anticipated, because he did the same things during his first term of office.

    Nigeria must re-order its priorities, and provide funds to create and sustain an enabling environment for talented human resources to function effectively for disease control and prevention.

    The country must prioritise disease prevention and control (in that order) through adequate and sustained funding of disease surveillance activities at all levels of governance.

    Nigeria needs to decentralise disease surveillance, prevention and control by enabling states and local government areas to take responsibility. The Nigeria Centre for Disease Control and Prevention should coordinate state and local government areas activities, instead of acting as the controller of diseases in Nigeria.

    Oyewale Tomori does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. US health funding cuts: what Nigeria stands to lose – https://theconversation.com/us-health-funding-cuts-what-nigeria-stands-to-lose-248921

    MIL OSI – Global Reports

  • MIL-OSI Global: Trump’s second tone: authoritarian, radical and triumphalist in a divided US

    Source: The Conversation – France – By Jérôme Viala-Gaudefroy, Spécialiste de la politique américaine, Auteurs historiques The Conversation France

    US President Donald Trump’s inaugural address on January 20 revealed the key themes of his rhetoric–triumphalism and overt authoritarianism–and provided insight into the programme he wants to implement. However, accomplishing his goals will not be easy amid deep divisions within the country that narrowly elected him.

    The triumphant hero: martyr and messiah

    In his 2017 inaugural address, Trump delivered a populist message decrying “the establishment” for the “carnage” afflicting “forgotten Americans”. Eight years later, in the longest inaugural speech in four decades, he painted a starkly different picture–one of a victorious and ambitious country with himself as both its savior and an embodiment of its triumph.

    Trump used the words “I,” “me” and “my” 50 times in his 2025 address, compared to just four in 2017, deliberately merging his personal identity with that of the nation.


    J. Viala-Gaudefroy, Fourni par l’auteur

    He cast himself as both a hero-martyr –“tested and challenged more than any president in our 250-year history”– and the sole leader capable of solving the country’s problems. He linked his personal journey to divine intervention, declaring that God had saved him on July 13, the day he survived an assassination attempt in Pennsylvania, “I was saved by God to make America great again.”

    A radical crackdown on immigration

    Trump’s stance on immigration is significantly more extreme than his 2017 agenda. While his first term focused on reinforcing borders, he now frames illegal immigration as an “invasion” requiring military intervention. On inauguration day, the president signed several executive orders, including one seeking to eliminate birthright citizenship despite its protection under the 14th Amendment. His hardline approach energizes supporters within his conservative base, some of whom subscribe to the “great replacement” theory and view his policies as necessary to preserve American identity.

    Culture wars: race, gender and education

    In his second inaugural address, Trump expanded his rhetoric to encompass culture war issues, aggressively targeting diversity, equity, and inclusion (DEI) policies in US workplaces. He accused the state of “socially engineering race and gender into every aspect of public and private life”, and then began dismantling programmes promoting equality, including recruitment efforts aimed at hiring racial and sexual minorities within the federal government.

    His executive orders rescind measures dating back to the Civil Rights era, including one from president Lyndon B. Johnson mandating equal opportunity policies for federal contractors. Echoing president Ronald Reagan, Trump framed these actions in anti-racist language –“We will forge a society that is colorblind and merit-based”– disregarding the well-documented realities of systemic racism.

    Trump also asserted that “there are only two genders, male and female”, and has signed an order recognizing only biological sex at birth. Framing this move as a defense of women, he argues that their “safe spaces”, including bathrooms and sports competitions, must be protected from individuals who “identify” as female.

    In education, he decried critical perspectives on US history as “unpatriotic”, insisting that schools instill national pride instead of “teaching our children to hate our country”. His plan includes reducing or eliminating federal funding for schools that teach “inappropriate racial, sexual, or political content” or mandate vaccines and mask-wearing–despite education policy largely falling under state jurisdiction.

    Reviving founding myths

    Trump’s historical narrative is steeped in romanticized patriotism. He revived the myth of “the frontier”, a late 19th century ideal portraying westward expansion as the ultimate symbol of American dynamism. This narrative ignores histories of the genocide of indigenous peoples and environmental destruction.

    His vision of “inexhaustible” natural resources –particularly shale oil and gas, described as “liquid gold”– reflects this ideology of relentless economic expansion and 19th century “bonanza economics”. By rejecting US conservationist traditions, Trump is prioritizing industrial growth over environmental sustainability.

    Expansionism reimagined: from the frontier to space

    Trump draws inspiration from president William McKinley (1897–1901), an advocate of expansionism during the Spanish-American War, which brought territories such as the Philippines and Puerto Rico under US control. Reviving the concept of “manifest destiny”, he merged exceptionalism with expansionism, vowing to “plant the American flag on Mars.”

    Trump restated his intention to rename the Gulf of Mexico the “Gulf of America”–a gesture with little practical impact given that much of the gulf lies outside US territory. While he has expressed interest in purchasing Greenland (which he has also claimed to be willing to take over) and even annexing Canada, he mentioned neither in his inaugural speech. However, he did promise to take control of the Panama Canal, justifying the move with a series of lies and exaggerations regarding its history and operation.

    A new golden age or “Gilded Age”?

    Trump’s admiration for McKinley extends to his economic policies. He envisions a protectionist strategy driving national reindustrialization. Yet, McKinley’s era–the “Gilded Age”–was marked by extreme inequality, a lack of income and corporate taxes, minimal regulation and rampant corruption. The wealthiest figures of the time, later dubbed “robber barons”, mirror the oligarchic ambitions of Trump’s current supporters.

    Ironically, as economist Douglas A. Irwin notes, the economic prosperity of the late 19th century was not driven by tariffs but by mass immigration. Between 1870 and 1913, the US population doubled due to an influx of unskilled laborers, a reality at odds with Trump’s strict immigration agenda.

    A nation divided under an assertive authoritarianism

    Trump’s vision, as outlined in his speech, is one of maximal presidential power, where justice is subordinated to political goals. His decision to pardon over 1,500 individuals convicted for their involvement in the January 6, 2021 Capitol riot underscores this authoritarian approach, reinforcing the idea that traditional laws do not apply to his most loyal and even violent supporters.

    He has also launched a sweeping purge of the federal administration, citing “integrity, competence, and loyalty” as guiding values. Additionally, he has openly planned to use the Justice Department and FBI for political purposes.

    Unlike previous presidents, Trump made no effort to unite a deeply divided nation during his address. He ignored the tradition of acknowledging his predecessor, Joe Biden, and instead declared his electoral victory proof that “the entire nation is rallying behind our agenda.”

    However, the US remains fractured politically. Trump secured less than 50% of the popular vote in the November election, his party holds the narrowest House majority since the 1930s, and he entered office with one of the lowest initial approval ratings in 70 years–just 47%. His personal favorability was even lower, hovering around 41% (Reuters, NPR).

    This polarization is evident in the public reaction to his most controversial policies, such as his pardoning of the January 6 rioters just after his inaugural address. While his base celebrates these decisions, the broader American public largely disapproves. The fundamental question remains: can US institutions withstand the growing tensions? Without majority support, realising Trump’s most radical societal and political agenda may prove an uphill battle.

    Jérôme Viala-Gaudefroy ne travaille pas, ne conseille pas, ne possède pas de parts, ne reçoit pas de fonds d’une organisation qui pourrait tirer profit de cet article, et n’a déclaré aucune autre affiliation que son organisme de recherche.

    ref. Trump’s second tone: authoritarian, radical and triumphalist in a divided US – https://theconversation.com/trumps-second-tone-authoritarian-radical-and-triumphalist-in-a-divided-us-248502

    MIL OSI – Global Reports

  • MIL-OSI United Kingdom: InnovateUkraine opens second round of investment for clean energy projects

    Source: United Kingdom – Executive Government & Departments

    Additional £17m will foster UK-Ukraine collaboration in the clean energy field.

    • InnovateUkraine’s second round will focus on low-carbon solutions to boost Ukraine’s energy resilience

    • First InnovateUkraine cohort preparing for demonstration and accelerator stage

    The UK will invest £17 million in innovative energy projects to support the recovery and future sustainability of Ukraine’s energy system. The funding announced during the visit of Foreign Secretary David Lammy to Kyiv will support the second round of the InnovateUkraine competition, a challenge fund to pilot low-carbon solutions tailored to Ukraine’s energy needs.

    The second round of InnovateUkraine will spur innovative collaborations between British, Ukrainian and international businesses and research institutions, to develop the scalable and sustainable energy innovations of the future.

    InnovateUkraine 2 will focus on the following technologies: 

    • Smart green grids
    • Renewable generation
    • Renewable heat
    • Green fuels
    • Low-carbon buildings and homes
    • Industrial decarbonisation
    • Repurposing existing energy infrastructure

    The British Ambassador to Ukraine, Martin Harris said:

    I am proud that the UK is further increasing its funding to the Ukrainian energy sector. This latest contribution underpins our commitments under the 100-Year Partnership, signed by the Prime Minister and President Zelenskyy in January.

    These projects, led jointly by British and Ukrainian business, universities, and civil society, will help both our countries develop clean and sustainable energy solutions for the future.

    InnovateUkraine is a showcase for the forward-looking partnership between our countries. The UK is standing shoulder-to-shoulder with Ukraine for the next century.

    Applications for InnovateUkraine Round 2 will open in mid-March 2025. Once they have undergone screening, successful projects will run for 24 months from late 2025. The teams will receive support and guidance from an accelerator programme, to help with attracting further investment.

    InnovateUkraine’s first cohort of projects is already transforming the lives of the Ukrainian people by creating reliable and novel methods of heating and powering buildings, as well as fuelling the imagination of the next generation of scientists and innovators.

    These projects include: a new, locally manufacturable battery storage technology which potentially undercuts and outperforms existing technologies; a technology which allows the upcycling of waste concrete to dramatically reduce the embodied emissions of new buildings and structures; and a new tool to make production of geothermal energy in Ukraine more efficient and ripe for investment.

    To find out more about the scope and eligibility requirements, please visit: www.innovateukraine.io

    Updates to this page

    Published 5 February 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: Member of Al-Qaeda in the Arabian Peninsula Sentenced to 44 Years in Prison for Terrorism Offenses

    Source: US State of California

    Minh Quang Pham, also known as “Amim”, 41, was sentenced today to 44 years in prison and a lifetime of supervised release for attempted suicide bombing in alliance with al-Qaeda in the Arabian Peninsula (AQAP), a designated foreign terrorist organization.

    “The defendant was sentenced for an attempt to commit an act of terrorism and plotting a suicide bombing on behalf of AQAP,” said Devin DeBacker, head of the Justice Department’s National Security Division. “The Justice Department will not rest in seeking justice for acts of terrorism and will continue to thwart any attempt to jeopardize global security.”

    “Pham coordinated with known terrorist Anwar al-Aulaqi on a plot to conduct a suicide bombing at Heathrow International Airport which could have killed or injured many people, but fortunately that plan was stopped,” said Assistant Director David J. Scott of the FBI’s Counterterrorism Division. “Pham also tried to recruit others to commit acts of terrorism. The FBI will work with our partners to hold accountable those who align themselves with terrorist organizations and attempt to carry out acts of violence.”

    “Minh Quang Pham’s actions were not just an affront to the safety of this country, but to the principles of peace and security that we hold dear,” said U.S. Attorney Danielle R. Sassoon for the Southern District of New York. “Today’s sentencing underscores our collective resolve to stop terrorism before it occurs, and place would-be terrorists in prison.”

    According to court documents, in December 2010, Pham informed others that he planned to travel to Ireland while residing in London. From Ireland, he traveled to Yemen, the principal base of operations for AQAP. Pham traveled to Yemen in order to join AQAP, wage jihad on behalf of AQAP, and martyr himself for AQAP’s cause. After arriving in Yemen, he swore an oath of loyalty to AQAP in the presence of an AQAP commander.

    While in Yemen in 2010 and 2011, Pham provided assistance to and received training from Anwar al-Aulaqi, a U.S.-born senior leader of AQAP. Al-Aulaqi advised Pham to return to the U.K. for the purpose of finding and making contact with individuals who, like Pham, wanted to travel to Yemen to join AQAP. Al-Aulaqi also provided Pham with money, as well as a telephone number and e-mail address that Pham was to use to contact al-Aulaqi upon his return to the U.K. In addition, Pham exchanged his laptop computer with al-Aulaqi, who provided him with a new “clean” laptop to take with him when he returned to the U.K. so that the authorities would not find anything if they searched his computer.

    In or about June 2011, prior to his departure from Yemen, Pham approached al-Aulaqi about conducting a suicide attack whereby he would “sacrifice” himself on behalf of AQAP. Al-Aulaqi personally taught Pham how to create a lethal explosive device using household chemicals and directed Pham to detonate such an explosive device at the arrivals area of Heathrow International Airport following Pham’s return to the U.K. in 2011. Al-Aulaqi instructed Pham to carry an explosive in a concealed backpack and target the area where flights arrived from the U.S. or Israel. During this time, Pham made videos depicting his preparation to carry out that attack. In one video, Pham is shown wiring an electrical device for the use of making an explosive device. In another video, he sketches an explosive device to be contained in a backpack, and in a third, Pham wears a backpack with wiring for explosives on it, which he turns on in the video.

    During this time, around June or July 2011 — shortly before Pham returned from Yemen to the U.K. — Pham recorded a video in which he attempted to recruit and encourage individuals in the West to engage in violent jihad abroad or in their home countries. In this video, he also expresses a desire to martyr himself. At the outset of this video, consisting of an approximately 13-minute-long monologue, Pham states that, “America itself is not fighting a war with a group or an organization, they are fighting with the army of Allah, the believers.” He continues, in part, “We have that opportunity, that ability to be in their midst, in their land . . . and I advise the brothers inshallah to, whatever you can, to gather and prepare and strike the enemy in their own land . . . The saying, a thousand cuts, you hit them with as much as you can until inshallah the enemy will bleed to death.” During his time in Yemen, Pham also assisted with the preparation and dissemination of AQAP’s propaganda magazine, Inspire. Pham, who has college degrees in both graphic design and animation, worked directly with now-deceased U.S. citizen, Samir Khan, who was a prominent member of AQAP responsible for editing and publishing Inspire.  

    Pham also received a six-page document entitled “Your Instructions” from al-Aulaqi in Yemen, which provided detailed instructions on how Pham was to commit his suicide attack at Heathrow. The document from al-Aulaqi instructed Pham, “[d]o not do anything for the first three months” and “[y]ou should target Christmas/ New Year season[.]” The instructions from al-Aulaqi provided explicit direction about the importance of using shrapnel to kill as many people as possible, including that “[t]he proper use of shrapnel is as important as the main charge itself. The detonation wave from a main charge of AP by itself is most likely not going to cause the death of anyone except those who are in its immediate vicinity. It is the shrapnel that would do the job. You may imagine this IED as a shotgun that is firing in all directions.” The document therefore instructed Pham to take “special care” with the “proper arrangement and choice of shrapnel,” and to “poison” it to inflict maximum death.

    On July 27, 2011, Pham returned to the U.K. Upon his arrival at Heathrow, U.K. authorities detained Pham, searched him, and recovered various materials from him, including a live round of 7.62mm caliber armor-piercing ammunition, which is consistent with ammunition that is used in a Kalashnikov assault rifle, a type of weapon for which Pham received training from AQAP in Yemen. U.K. authorities released Pham and cautioned him for his possession of the live round of ammunition, before, in December 2011, arresting him pursuant to their authorities under U.K. immigration law. In searches of Pham’s residence, other locations, and vehicles, U.K. authorities recovered several pieces of electronic media. Among other things, a forensic analysis of Pham’s electronic media showed that he was accessing speeches and writings of al-Aulaqi as late as December 2011 — months after Pham’s return to the U.K.

    On May 24, 2012, a grand jury returned an indictment charging Pham with terrorism offenses and U.S. authorities sought Pham’s extradition from the U.K. He was provisionally arrested with a view towards extradition on June 29, 2012, and he was extradited to the United States on Feb. 26, 2015. On Jan. 8, 2016, Pham pleaded guilty to terrorism offenses related to certain of the same underlying conduct. On May 27, 2016, Pham was sentenced by U.S. District Judge Alison J. Nathan principally to a term of 40 years in prison. On Sept. 12, 2017, the U.S. Court of Appeals for the Second Circuit affirmed Pham’s conviction and sentence. Thereafter, Pham made a motion that, based on intervening Supreme Court decisions, resulted in the vacatur of one of the counts of his conviction. Ultimately, the government, with Pham’s consent, moved to vacate Pham’s earlier convictions. On April 8, 2021, a grand jury returned a superseding indictment, reinstating certain charges and filing other new charges against Pham, and which formed the basis for Pham’s May 11, 2023, guilty plea and conviction.

    The FBI Washington and New York Field Offices investigated the case. The Justice Department’s Office of International Affairs, Metropolitan Police Service/SO 15 Counter Terrorism Command at New Scotland Yard, Crown Prosecution Service, and the Home Office provided assistance in the investigation, extradition, and prosecution of the case.

    Assistant U.S. Attorney Jacob H. Gutwillig for the Southern District of New York and Trial Attorney John Cella of the National Security Division’s Counterterrorism Section prosecuted the case. 

    MIL OSI USA News

  • MIL-OSI Security: Attorney General Loretta E. Lynch Delivers Remarks at a Naturalization Ceremony Held at the Department of Justice

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Thank you for that kind introduction, U.S. Citizenship and Immigration Services Director Leon Rodriguez.  And thank you, Principal Deputy Assistant Attorney General Vanita Gupta, for your wonderful remarks and for your extraordinary service at the helm of our Civil Rights Division.  I am so thrilled to welcome so many Justice Department colleagues and honored guests to the Great Hall.  And I want to extend my warmest welcome to all of you, our newest American citizens.  It is a true honor to be among the first to congratulate you on taking the oath of allegiance.  You come to us from 40 nations around the world, from Sierra Leone to South Korea, from Pakistan to Portugal, from Mexico to Malaysia.  From so many places and through so many paths you have come here to be with all of us – illustrating this country’s motto of “E Pluribus Unum” – out of many, one.  You come to us with hopes and dreams as diverse as the paths you took to get here: hopes for economic and professional possibility, dreams of a better life for your children, and expectations about the freedoms and privileges of citizenship.  And in turn, we look to you with gratitude.  We are so glad you are here.  In joining us, you sustain one of the richest traditions of our nation, which is indeed a nation of immigrants. 

    To say that immigrants have been a core part of our American narrative would be a great understatement.  Immigrants played a critical role in the founding of our country; many of our roads and buildings and businesses were built by immigrants; and our society continues to be powered by the ingenuity, diligence and drive of immigrants.  Sometimes, it even seems as if we have taken more than we have given, as immigrants have fought and died to preserve our freedoms, and they have toiled and struggled to enrich our society.  From the military to government; from academia to the arts – in every sector of every industry, we are stronger because of the diversity and talent of Americans with immigrant roots.  And so we celebrate all of the richness you bring to our tapestry.  We celebrate the foods you eat, the languages you dream in, and the religions you practice.  We celebrate the wealth of skills and perspectives you have chosen to bring to our shores – attributes that have always made us a stronger, wiser and better people. 

    We are also humbled by your careful study of our institutions and our government – and your deliberate choice of our systems and our values.  I know that the process has not been easy, quick, or casual.  Some of you have waited and worked for years to achieve this goal.  You have learned about American history and you have internalized the civic responsibilities that accompany citizenship.  And in doing so, you have learned that ours is a nation that upholds liberty and equality for all; that defends the freedoms of religion, press and assembly; and that strives against prejudice and discrimination. 

    Of course, observing actual democracy in action reveals it to be a tumultuous process, as our recent election has shown.  The rhetoric and the tone around so many issues can lead to fear and uncertainty and may have caused some of you to question whether the country you have seen over recent weeks and months is indeed the same one whose founding principles you’ve been studying so diligently.  Yet the history you learned gives us the answer to that question.  Over 200 years ago, we decided what kind of a country we wanted to be.  We’re not there yet and we have had challenges at many points along the way.  Our path forward to realizing our founding ideals has had twists and turns and outright reversals, yet we have continued to push ever onwards towards them. 

    And the lesson for every generation of Americans is the need and the obligation to pick up the challenge of making the American dream real for our own time and beyond.  That is why it is so wonderful, so vital and so important that you are all here today.  Joining this young, opinionated, vibrant country, because we need your vision and your voice, your tenacity and your resolve.  Some of you have lived in nations that do not enjoy our rights and liberties; we need you to help remind us of how precious our freedom is.  Some of you have felt the sting of discrimination; we need you to show us the value of tolerance.  And some of you have lived in societies that did not allow citizens a voice in their government; we need you to help bolster our participatory democracy.

    And so as we conclude today, I ask that you give your voice, your passion, and your energy to the work of building a country that keeps faith with our founding promises.  I hope you will choose to vote in every election.  I hope we will see and hear you in a range of settings – from school board meetings to charity fundraisers, from Little League games to political debates.  I hope that you will share your rich perspectives and talents with those in your communities.  And I hope you will never lose sight of the ideals of this country and the way ordinary citizens have, throughout our history, been the ones who have made them real for all.  These are the ways we shape the country we leave for our children.  We depend on you – as we depend on all of our citizens – to help safeguard our shared values.  I am confident that you will rise to this challenge, as you have already risen to so many, and I look forward to all of your wonderful contributions.

    In a moment you will take the Pledge of Allegiance for the first time as citizens of this great country.  I want you to truly listen to those words as you make that pledge.  Your allegiance, your commitment and your drive is pledged not to any one person or agency of our government, but instead to the symbol of our country’s perseverance in the face of challenge and struggle — “the flag of the United States of America.”  And even more than that, “to the Republic for which it stands,” that brave, wonderful experiment we began over 200 years ago.  And the simple yet eloquent words, describing us as “one nation, under God, indivisible, with liberty and justice for all,” are both the challenge and the commitment for every citizen of this great country.  And now, my fellow Americans, let us ever work together to make it so.

    Congratulations on this great achievement. 

    MIL Security OSI

  • MIL-OSI Security: Principal Deputy Associate Attorney General Bill Baer Delivers Remarks Highlighting Elder Justice at the State Of Financial Fraud in America Event

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Thank you Robert for that kind introduction and for your leadership and dedication as CEO of Financial Industry Regulatory Authority (FINRA).  And thank you to the Stanford Center on Longevity and the FINRA Investor Education Foundation, for hosting this conference and for the great work that you do.  It is an honor to join with the many people in this audience who dedicate their lives to combatting financial fraud and protecting elderly Americans.  This is a noble and enduring effort.   

    As many people here know, financial fraud targeted at the elderly is a serious problem.  At the beginning of 2011, the first Baby Boomers reached the age of 65.  I reached that milestone myself just last year.  Indeed, 10,000 Americans turn 65 every day, and the percentage of Americas over 65 is growing.  5.8 percent of this group experiences identity theft in a given year.  I had that ugly experience just last month. 13.8 percent experiences consumer fraud in a given year.  4.5 percent of people over 50 experience financial fraud in a five-year period.  While there are varying accounts about how much the overall financial loss is, it is well into the billions of dollars.  

    Statistics aside, we are here together because we know all too well that this is a problem that takes a personal toll.  Almost all of us know someone who has been the victim of financial fraud.  And while it affects people of all ages, it can be especially devastating for elderly people, many of whom are dependent on their savings and are concerned about their own mental decline or other people’s perception of their mental decline.  

    I recently saw letters written by the victims of a set of schemes that we took action against.  One described having sent “hundreds of checks” for a company’s “great offers” and tried to explain to the fraudster that “due to bad eyes, [he] has to use magnifying glasses to read” and had “been caught paying many times for th[e] very same offer.”  Another, believing that the con men would send him a promised gift, tried to explain that he had sent his prior payments by money order and was now enclosing cash, “all [he] can send.”  Another explained that when she gets the vast inheritance she’d been promised, she would use it to help her family, the homeless and needy children.   

    The nature and scope of elder fraud varies tremendously.  At the Department of Justice, we see small, family based schemes, such as caregivers tricking elderly victims out of their savings or abusing powers of attorney.  We see institutional schemes, such as nursing homes that provide unnecessary services or bill for services never provided.  And we see global fraud networks that are—quite literally—organized crime.  These schemes involve networks of businesses with careful divisions of labor.  They target millions of Americans, maintain lists of victims, and, once someone has been duped, target those people again and again. One recent victim wrote a letter explaining: “Each day I keep getting more and more offers and it’s almost impossible for me to keep up with them.” 

    Large and diverse problems like this require broad based solutions.  We at the Department of Justice know we can’t solve this problem alone.  Coordination is essential not only with our federal partners, but with local, state and international authorities.  And public and private partnerships are key to our understanding of the scope of the problem and to the lasting success of any solution.

    Research into basic questions, such as why are elderly people vulnerable, and how can we detect fraud and abuse, is critical to attacking the problem.  The FINRA Foundation and Stanford Center on Longevity launched the Financial Fraud Research Center five years ago.  As some of your ongoing research has demonstrated, there is a natural decline in cognition as people age, especially ability to think fast and process new information.  The elderly are sometimes lonely or otherwise socially isolated. Some are uncomfortable with technology.  Many have pools of relatively liquid retirement assets.  Some are dependent on caregivers.  All of these factors make the elderly particularly susceptible to certain schemes. 

    There is much more to learn.  The Department of Justice has invested in partnerships to help us all better understand the causes and risk factors associated with elder financial exploitation.  For example, just a few weeks ago, we announced an award of nearly $800,000 to the Urban Institute and the University of Southern California to develop and test prevention programs that will address elder abuse, neglect and financial exploitation.  To enhance our understanding of financial exploitation by conservators and guardians, last year our Office for Victims of Crime funded a project to search for innovative, evidence-based programs and practices that successfully detect and remedy conservator fraud.  And people like you are furthering our understanding.  This conference is highlighting emerging research on susceptibility to fraud and fraud prevention.

    Beyond efforts to understand how and why elder fraud occurs, continuing dedication to enforcement is required to stop it.   This is not a partisan issue.  We have seen Democratic and Republican administrations alike express a shared commitment to using all tools in the Department of Justice’s enforcement arsenal.  Back in the 1990s, under Attorney General Reno, the Department of Justice created the Elder Justice Initiative to centralize information, facilitate training, and coordinate within the Department and across the federal government.  During the Bush Administration, the Department of Justice initiated an elder mistreatment research grant program, funding cutting edge research on elder abuse and financial exploitation that continues today.

    During this Administration, Congress created the Elder Justice Coordinating Council as part of the Affordable Care Act to facilitate interagency cooperation at the highest of levels.  At the Department of Justice, we formed the Attorney General’s Advisory Committee’s Elder Justice Working Group, which is comprised of U.S. Attorneys from across the country who are dedicated to improving our information sharing on financial scams targeting the elderly.  And just this year, we created ten regional Elder Justice Task Forces that operate throughout the country, partnering with state and local law enforcement and prosecutors to enhance our collective response to elder financial fraud and abuse. 

    Our Elder Justice Initiative has also been assisting with community capacity building.  This includes supporting the training of local law enforcement and prosecutors.  And to enhance civil legal aid to seniors, in June 2016, the Department of Justice, in collaboration with the Corporation for National and Community Service, launched the Elder Justice AmeriCorps, the first-ever army of lawyers and paralegals to help elderly victims of abuse and exploitation.  The program will support 300 AmeriCorps members throughout the country and is expected to reach over 8,000 older adults over the next two years.

    A multi-faceted problem requires coordination between different federal agencies; it demands a whole of government approach.  Mail is involved; we must coordinate with the Postal Inspection Service.  Money is involved; we must coordinate with the Treasury Department.  People target the elderly; we must coordinate with agencies that serve the elderly, such as the Social Security Administration.  

    And more and more, we are seeing schemes that are highly complex and global.  Stopping these schemes require extensive cooperation—not just with state and local authorities, but also across the federal government and with our international counterparts.  For example, the Department of Justice’s Consumer Protection Branch co-chairs the International Mass-Marketing Fraud Working Group, a network of civil and criminal law enforcement agencies from Australia, Belgium, Canada, Europol, the Netherlands, Nigeria, Norway, Spain, the United Kingdom and the United States.  

    We can point to meaningful progress.  In the past several years, we have successfully shut down several international lottery scams where con men and women have contacted elderly victims in the United States, told the victims they won cash and prizes, and persuaded them to send thousands of dollars in fees to release the money.  Of course, the victims never received cash or prizes in return.  In a series of cases, perpetrators made calls from Jamaica using Voice Over Internet Protocol technology that made it appear as if the calls were coming from the United States.  They convinced victims to send money to middlemen in South Florida and North Carolina, who forwarded the money to Jamaica.  We have had great success breaking up these networks through joint efforts between Jamaican law enforcement and U.S. agencies including the Postal Inspection Service, Department of Homeland Security, U.S. Marshals Service, Federal Trade Commission and Internal Revenue Service.  Since 2009, the Department of Justice has prosecuted or is prosecuting over 100 individuals linked to such lottery schemes, and has convicted and sentenced over 40 defendants.

    We have had similar success going after global “psychic schemes.”  Con men and women send letters purportedly written by “world-renowned psychics” stating that they had a vision revealing that the recipient has the opportunity to obtain great wealth.  The letters appear personalized, refer to the recipient by name, and often contain portions that appear handwritten.  The solicitations urge victims to purchase products and services that will ensure this good fortune.  Investigations by the Department of Justice and Postal Inspection Service, among others, revealed the complexity of these schemes.  Not only were there the fraudsters themselves, but there were separate companies performing different roles, such as processing victim payments and maintaining databases of consumers who responded to solicitations.  In a two-week period, one company in the United States processed as much as $500,000 in payments for just one psychic scheme.  We have discovered similar companies in Quebec, Hong Kong, Switzerland and France.  

    Perhaps the most significant example of cooperation to date were our wide-ranging enforcement actions taken in September of this year to dismantle a global network of mass mailing schemes targeting elderly and vulnerable victims.  The schemes involved a network with components in Canada, France, India, the Netherlands, Singapore, Switzerland, Turkey and the United States.   The network included an India-based printer that manufactured solicitations and arranged for bulk shipment to U.S. victims; a mailer in Switzerland; list brokers in the United States who bought and sold lists of victims so that once victims had fallen prey, others could target them; a “caging” service in the Netherlands that collected money; and a Canadian payment processor that, for more than 20 years, helped dozens of international fraudsters gain access to U.S. banks and take money from Americans.  Stopping this network involved coordination between the Department of Justice, Department of Treasury, Postal Inspection Service, Federal Trade Commission, Iowa Attorney General’s office and counterparts in other countries.  Just to give you a sample of the coordinated actions, on Sept. 22, 2016: 

    • The Treasury Department’s Office of Foreign Assets Control blocked assets from the Canadian payment processor and a network of individuals and entities across 18 countries.
    • The Justice Department filed criminal charges and a civil injunction against a Turkish mass mailer. 
    • The Justice Department brought a series of civil actions to shut down companies based in the United States, India, Switzerland and Singapore.  These companies were responsible for mailing millions of multi-piece solicitations to potential victims throughout the United States.  
    • The Justice Department entered into a consent decree with two Dutch “caging” businesses that collected and forward money.  Our efforts were coordinated with Dutch authorities who executed search warrants on the businesses and took control of the Dutch post office boxes used to receive victims’ funds.   
    • The Federal Trade Commission filed a case against a related mass-mailer, printer, and list broker.  
    • The Iowa Attorney General negotiated a compliance agreement with two firms that brokered victim lists.

    Of course, what matters even more than going after these schemes is preventing people from falling prey in the first place.  Here too, federal agencies are working in cooperation and dedicated to the effort.   The Department of Justice has distributed educational materials about these kinds of scams, the U.S. Postal Inspection Service has developed an electronic press kit for media outlets, my former colleagues at the Federal Trade Commission operate a “Pass It On” campaign that encourages people to share information about frauds that affect older Americans, the Social Security Administration is educating beneficiaries through its network of over 1,200 field offices nationwide, and the Consumer Financial Protection Bureau has produced a mail fraud alert placemat in coordination with Meals on Wheels America to distribute to seniors nationwide.  Similarly, private organizations that work in the area of elder justice and consumer protection are doing their part.  For example, AARP will be posting information through its Fraud Watch Network.  And the Consumers Union, the policy arm of Consumer Reports, is alerting consumers about a variety of elder scams.  

    Going forward, the Department of Justice will continue to work with private, local, state, federal and global partners.   And we urge all of you to tell us where the Department can do more.  The federal government’s work on behalf of the elderly began long before this Administration, and it will continue long after.  I expect that my successors, and my successors’ successors, will share our commitment to making sure our parents, grandparents and friends age with grace and dignity.  And I look forward to all of you, who have worked so hard in this area, working with the next Administration to combat financial fraud and protect elderly Americans.  Thank you again for having me here today.  

    MIL Security OSI

  • MIL-OSI Security: Assistant Attorney General Leslie R. Caldwell Delivers Remarks Highlighting Cybercrime Enforcement at Center for Strategic and International Studies

    Source: United States Attorneys General 13

    Good morning, and thank you, Jim [Lewis], for that kind introduction.  I am pleased to be here speaking to you today, and I want to thank the Center for Strategic and International Studies (CSIS) for having me.  

    Over the past two and a half years, I have had the honor of serving as the Justice Department’s Assistant Attorney General for the Criminal Division – and with that, the responsibility of ensuring that the division and its over 700 prosecutors have the support and authorities they need to fulfill their responsibilities to the American people.  I have also had the opportunity to see first-hand the dedication, rigor, intelligence and respect that America’s prosecutors bring to their work every day.  As my time as the Assistant Attorney General of the Criminal Division comes to a close, I am incredibly proud of where the division stands today and all that we have accomplished together.

    One constant truth about investigating and prosecuting crime is that it is never without its challenges, although the precise nature of the difficulties and obstacles we face changes with the times.  Today, some of the most significant hurdles we encounter relate to technology and the Internet.  

    Innovation in computing, the Internet, and related services has had tremendous benefits for our economy, our ability to connect with others, and the convenience, efficiency, and security of our everyday lives.  It has also transformed how we in law enforcement do our jobs by expanding our ability to detect, investigate and prosecute criminal activity.  

    However, these same innovations permit criminals to more easily victimize Americans, including from afar, while concealing their identities and enabling destruction of evidence.  We face an enormous task in responding to these new threats – ranging from botnets and ransomware to online child sexual exploitation and firearms trafficking, to name just a few – and that task is not getting any easier.  This morning I will focus on four challenges that have been and must continue to be the center of our work if we intend to succeed: 
    •    First, the growth of sophisticated, global cyber threats; 
    •    Second, dangerous loopholes in our legal authorities; 
    •    Third, the widespread use of warrant-proof encryption; and, 
    •    Fourth, inefficient cross-border access to electronic evidence.

    As I will explain in more detail, the past few years have marked some significant progress in some of these areas.  We have grown more nimble and effective in cooperative international law enforcement efforts to bring cyber criminals to justice and remediate cybercrime.  And we have managed to effect some targeted and common-sense improvements in legal authorities.  But in other areas, the challenges remain, and in some cases have become more prominent.  Let me begin with the threat.  The global nature of the Internet means that criminals now can easily victimize more people within the United States in more dangerous ways, all without ever setting foot here.  Some of the most significant criminal activity in recent years is the result of sophisticated criminal groups reaching across our borders from perceived safe harbors.  As we rely more and more on network communications to handle virtually every aspect of our lives, the cost of cybercrime will only rise – to over two trillion globally by 2019, according to some estimates – and the United States is a uniquely attractive target.

    We have responded first and foremost by aggressively identifying, apprehending, and prosecuting offenders.  This past October, for example, the Russian cybercriminal Roman Seleznev was convicted by a jury in Seattle.  Seleznev was a hacker who, from the other side of the world, pilfered data for millions of payment cards from the computer systems of small business owners across America – a crime that strikes at the trust and security of our everyday financial transactions.  Seleznev was the son of a member of the Russian parliament, and the Russian government filed diplomatic protests and tried to pressure us into releasing him.  But that’s not how justice in America works, and he is now in an American prison.

    We recognize that we cannot prosecute our way out of cybercrime, but prosecution must remain an integral component of our response to global cyber threats.  That is why foreign hackers like “Guccifer” – who hacked into the email and social media accounts of about a hundred Americans, including two former U.S. presidents – as well as Vladimir Drinkman and Dmitriy Smilianets – who, along with co-conspirators, conducted a worldwide hacking scheme that compromised more than 160 million credit card numbers – have likewise found themselves within the reach of American law enforcement.  Thanks to the work of our colleagues in the National Security Division, the same holds true for individuals like Su Bin – who conspired with Chinese military hackers to steal cutting-edge U.S. aircraft designs – and Ardit Ferizi – who shared stolen PII belonging to 1,300 U.S. military and government personnel with a member of ISIL, for publication on a hit list.  All have now been brought to the United States to face justice.  

    The department’s strong track record in this area is a critical deterrent to would-be attackers.  Over the last twenty years, for example, our Computer Crime and Intellectual Property Section (CCIPS) – the centerpiece of our prosecutorial response to criminal cyber threats – has successfully prosecuted cases involving more than one billion stolen pieces of information, including payment card data, email addresses and social security numbers – more than three pieces of data for every American alive today.

    Our international partnerships make this work possible.  And they have been key in another way as well.  Even when prosecution is not yet an option – for example, because we have been unable to identify or apprehend a criminal target – we have developed operational expertise in disrupting cybercriminal infrastructure in the United States and abroad.  For example, we have worked hand-in-hand with our foreign partners to address technical threats like botnets, so-called “bulletproof” hosts, Darknet markets and international hacking forums.  

    Indeed, just last week, the department led a multinational operation to dismantle a vast network of dedicated criminal servers known as “Avalanche,” which allegedly hosted more than two dozen of the world’s most dangerous and persistent malware campaigns.  The Avalanche network served clients operating as many as 500,000 infected computers on a daily basis and is associated with monetary losses in the hundreds of millions of dollars worldwide.  We were joined in this effort by investigators and prosecutors from more than 40 jurisdictions across the globe.  We must maintain existing international law enforcement cooperation – and develop new mechanisms to work with foreign partners – if we hope to continue these successes.

    These efforts have also benefitted from growth in our technical and investigative capacity.  The Criminal Division has steadily increased resources for CCIPS, along with its in-house Cybercrime Lab, over the last two years.  The Cybercrime Lab has become the go-to resource across U.S. law enforcement for intractable problems in accessing and understanding digital evidence, whether that means uncovering evidence that a defendant accessed online terrorist radicalization materials to rebut a claim of entrapment, or cracking passwords to dozens of devices that hold key evidence of serious crimes.

    We have also found that augmenting our own expertise and legal authorities with insight from private sector institutions allows us to identify and develop new, creative responses.  For example, in 2014, the FBI, in conjunction with a coalition of nearly a dozen foreign countries and a group of elite computer security firms, dismantled the Gameover Zeus botnet.  That botnet, which infected more than one million computers around the world, inflicted over $100 million in losses on American victims alone, and was responsible for the spread of the Cryptolocker ransomware.  The Gameover Zeus operation represents what we can achieve when law enforcement agencies collaborate with private sector experts, and indeed, many private organizations provided similar assistance in the recent Avalanche take-down.  I hope that it will continue to serve as a model for the department’s future work.

    This relationship works in both directions.  The investigative experience of our CCIPS prosecutors can offer important lessons for private sector entities.  In addition, navigating the federal laws that govern network monitoring practices – laws in which CCIPS specializes – can be fraught for organizations seeking to improve their cybersecurity.  That is why, two years ago, we created the Cybersecurity Unit, a group of CCIPS prosecutors who can leverage their case-related experience to develop and share practical cybersecurity advice with the private sector.  The Unit has also played an integral role in implementation of the Cybersecurity Information Sharing Act (CISA).  So not only have we benefitted from private sector experts for our operational needs, but we have made a practice of sharing our knowledge base as well.

    Even as the department addresses technical obstacles to preventing and prosecuting cybercrime, however, we confront a second challenge: arbitrary gaps in the law that frustrate some of our most pressing investigations.  One example of such a loophole was the venue provision of Rule 41 of the Federal Rules of Criminal Procedure. 

    As that Rule existed prior to Dec. 1, 2016, when law enforcement sought court approval for a search warrant, it generally was required to seek authorization from a court sitting in the same geographic district where the property to be searched was located.   This Rule made perfect sense in dealing with the physical world.  But in the cyber-world, we increasingly face scenarios where criminals use technology to hide the location of their computers, meaning that we could not know where the computers were located.  In those circumstances, federal law did not clearly identify which judge could authorize a search.   

    Similarly, we regularly encounter crimes like mass hacking through botnets that are carried out in multiple districts at once, all across the country.  But in order to respond in a timely, comprehensive manner, the prior version of the Rule arguably required authorities to obtain a warrant in each district – up to 94 in all, across 9 time zones, ranging from the Virgin Islands to Guam.  

    Last week, a three year effort, spearheaded by the Criminal Division, and approved by the U.S. Supreme Court, culminated in a targeted, procedural fix to the venue provisions of the Rule to ensure that technology does not render our investigative abilities obsolete.  The update to the Rule does not alter the probable cause or other standards we must meet to obtain a search warrant.   What the Rule does change is that now, when criminals hide the location of their computers through anonymizing technology, we don’t have to figure out in which federal district the computers are physically located before we can act to stop criminal activity.  Likewise, when a criminal deploys a botnet that indiscriminately infects computers nationwide – as many botnets now do – we don’t have to go to as many as 94 different judges. 

    The need to update Rule 41 was not theoretical.  Today, dozens of websites on Tor – a proxy network – openly distribute images of child rape and sexual exploitation, where they are frequented by tens of thousands of pedophiles.  These sites can thrive in the open because proxy networks, like Tor, hide the locations of the criminals’ servers and the identities of their administrators and users.  While law enforcement – and the general public – can easily find images of child sexual exploitation by visiting one of these sites, we often cannot locate and shut down the websites or identify and apprehend the abusers.  More troubling, the child victims stand little chance of rescue.

    The recent investigation of “Playpen,” a Tor site used by more than 100,000 pedophiles to encourage child sexual abuse and trade sexually explicit images of that abuse, illustrates why a Rule 41 fix was necessary.  In that case, authorities were able to wrest control of the site from the administrators, and then obtained court approval to use a remote search tool to retrieve limited information, including the user’s IP address, only if a user accessed child pornography on the site.  This enabled a traditional, real-world investigation, leading to more than 200 active prosecutions and the identification or rescue of at least 49 American children who were subject to sexual abuse.  

    Yet in some of the resulting cases, federal courts relying on the language of the prior version of Rule 41 found that even though the probable cause and other standards for obtaining a warrant were satisfied, evidence obtained in searches nevertheless had to be excluded because the judges who issued warrants lacked venue over the computers, which turned out to be physically located outside their geographic districts.  This is a perverse result, as it would mean that criminals who are savvy enough to hide their locations – which is not difficult given current technologies – could place themselves beyond the reach of law enforcement.  

    This is a good example of why the amendments to Rule 41 are such a crucial step forward.  They make clear which courts are available to consider whether a particular warrant application comports with the Fourth Amendment, without altering in any way the substantive requirements for – or privacy protections provided by – a warrant.  This will ensure that criminals who use anonymizing technologies are not immune from justice, and that threats like botnets are not too big to investigate and remediate effectively.

    This fix is a not a cure-all, however.  Our response to cyber threats requires revisiting laws that simply did not anticipate and cannot adjust to modern technology.  We must continue to move forward – not backward – to ensure that our laws protect Americans from criminals, and not the other way around.

    I now want to turn to some challenges that, despite the best efforts of many, will continue to confront policymakers in the years to come.  As society’s use of computers and the Internet has grown, so too has the importance of digital evidence in criminal investigations.  In nearly every criminal investigation we undertake at the federal level – from homicides and kidnappings to drug trafficking, organized crime, financial fraud and child exploitation – critical information comes from smart phones, computers and online communications, often instead of physical evidence.  Yet, these materials are increasingly unavailable to law enforcement as a result of certain implementations of encryption, even when we have a warrant to examine them.

    This is because, in an attempt to market products and services as protective of personal privacy and data security, companies increasingly are offering products with built-in encryption technologies that preclude access to data even when a court has issued a search warrant.  Service providers with more than a billion user accounts, that transmit tens of billions of messages per day around the world, now advertise themselves as unable to comply with warrants.  And device manufacturers that have placed hundreds of millions of products in the market have embraced the same principle.  We in law enforcement often describe this sort of encryption as “warrant-proof encryption.”  

    Let me be clear: the Criminal Division is on the front lines of the fight against cybercrime.  We recognize that the development and adoption of strong encryption is essential to counteracting cyber threats and to promote our overall safety and privacy.  But certain implementations of encryption pose an undeniable and growing threat to our ability to protect the American people.  Our inability to access such data can stop our investigations and prosecutions in their tracks.

    Inaction is not a suitable response.  Our occasional success in accessing information protected by seemingly “warrant-proof encryption” is unpredictable and inadequate.  There are devices in evidence lockers across the country that remain locked.  

    As the President reminded us recently, the Government has different responsibilities – a different “balance sheet” and different “stakeholders” – than a corporation.  There is nothing wrong with companies pursuing profits and marketing strategies, but no one should expect that they will take into account all of the societal interests that are at stake.  And that is especially true for our public safety mission.  Our ability to protect Americans from crime has become dependent, in thousands of cases, on the business decisions of for-profit corporations.  More troublingly, even when companies have the technical ability to reasonably assist us in accessing encrypted information, they have refused to do so for fear of “tarnishing” their image.  Regardless of which side of this issue you are on, we can all agree that market-driven decisions are not and have never been a substitute for sound public safety policies. 

    Business decisions made by for-profit companies have had enormous effects on our public safety in other ways as well.  Data held by major Internet service providers can be crucial to identifying and holding accountable the perpetrators of virtually every federal crime we handle.  Increasingly, however, American providers and other providers subject to the jurisdiction of the United States are storing such information outside the United States, and not always at rest and in the same location.  The data can be partitioned and stored in multiple locations, or moved about on an ongoing basis, and some providers may not even know where all data relating to a particular user is at a given time.  

    It is this last challenge – foreign-stored digital evidence – that I will close with today.  The department has worked diligently to increase the cross-border availability of data, through mechanisms like the 24/7 Network, which facilitates the preservation of digital evidence, as well as mutual legal assistance treaties and the Budapest Convention on Cybercrime, which enhance international cooperation in obtaining that evidence.  The Criminal Division has also directed additional resources toward a dedicated cyber mutual legal assistance unit in our Office of International Affairs, which has seen a 1,000 percent increase in incoming requests for computer records since 2000.

    But while these are important crime-fighting tools, they have significant shortcomings.  The United States has mutual legal assistance treaties with less than half the countries in the world, some of which place limitations on when assistance is available or the types of evidence that can be obtained.  Even then, obtaining evidence can take months, if not years.  Ireland, for example, reports that in routine cases it takes 15 to 18 months to execute a request for assistance from a foreign country.  In less experienced or less cooperative countries, the process can take even longer.  Sometimes we never receive a response at all.  

    Recently, the difficulties caused by foreign-stored data for public safety have become more acute.  In July, the Second Circuit Court of Appeals, in the so-called “Microsoft Ireland” case, held that U.S. authorities cannot use a search warrant issued by a U.S. court pursuant to the Stored Communications Act (SCA) to compel a U.S. service provider, such as Microsoft, to produce data that it chooses to store for its own business purposes (and typically without the knowledge or input of its subscribers) outside the United States.

    So, what is already a difficult and time-consuming process of gathering electronic evidence may now also become an impossible one, for both the United States and our partners.  Since the Microsoft decision was handed down, U.S. providers such as Google, Microsoft and Yahoo! have refused to produce information that they have chosen to store abroad in response to search warrants issued by courts even outside the Second Circuit.  This has been the case even in instances where the account-holder was an American citizen residing in the United States, and when the crime under investigation is carried out on American soil.  And this includes warrants obtained on behalf of foreign countries pursuant to mutual legal assistant requests.

    U.S. law generally does not require our providers to store this data in a particular location or make it accessible in any particular way.  But as a result, the ability of law enforcement to effectively investigate serious crime may now be determined entirely by a provider’s data management practices, well-intentioned or not.  One major American provider, for example, is unable to determine the country in which foreign-stored data is located; and even if it could, the data is frequently moved and may not be in the same country from day to day.  Under the Second Circuit’s decision, a SCA warrant is not available.  But sending an MLAT request to a foreign country could result – after months of delay – in a notification that the relevant data is no longer there.

    It is for this reason that, in October, the department filed a petition for the case to be reheard by the entire Second Circuit en banc.  It is also why we intend to submit legislation to Congress to address the decision’s significant public safety implications.  This issue must be resolved before we move to other important initiatives, such as legislation to implement a cross-border data agreement with the United Kingdom.

    Looking forward, I cannot predict how the rehearing petition, or the broader concerns implicated by the Microsoft decision, will play out.  And I suspect that, whether the issue relates to warrant-proof encryption or cross-border access to evidence, reaching a resolution will be challenging.  But these decisions must be made in the policy arena, not by the private sector alone.  We cannot allow changing technologies or the economic interests of the private sector to overwhelm larger policy issues relating to the needs of public safety and national security.  And we must let government fulfill its fundamental responsibilities to protect the American people.

    I know that the panel to follow will focus on some of these challenges for the future, but let me offer my own thoughts here.  In each of these areas, we must proceed thoughtfully and balance multiple different legitimate interests.  Yet several basic principles should be obvious.  First, sitting back and doing nothing is not an acceptable option.  The world is changing around us, and those seeking to do harm are evolving with it; if those responsible for ensuring public safety do not have the same ability to adapt, public safety will suffer.  Second, these changes pose policy challenges, and we need to develop policy responses.  Rather than let evolutions in technology dictate our responses, we must think ahead as a society and develop appropriate frameworks to address new and upcoming challenges before they become crises.  And finally, when there are multiple interests at stake – public safety, cybersecurity, international comity and civil rights and civil liberties – we cannot allow the most consequential decisions to be made by a single stakeholder, or leave them to the whim of the commercial marketplace.  We would never tolerate that approach in other areas of importance to society, and we should not do so here.  Thank you.

    MIL Security OSI

  • MIL-OSI United Kingdom: Fast-track devolution approved for the city and wider region

    Source: City of Portsmouth

    Portsmouth City Council has welcomed the Government’s decision to fast-track establishing a new Strategic Authority for Portsmouth, Southampton Hampshire, and the Isle of Wight.

    The confirmation today that the area will be included in the Government’s Devolution Priority Programme is a major step towards establishing the new Strategic Authority for the region with elections for a new Mayor now likely to be held in May 2026.

    A new Strategic Authority would bring significant additional funding and powers devolved from government departments to the region, with a focus on driving economic growth, investment in infrastructure and strategic transport and planning. The elected Mayor will have responsibility for these new powers, all other council services, such as parks, libraries and waste collection, would continue to be delivered by existing councils.

    Last year the four upper tier authorities across Hampshire & the Solent (Portsmouth City Council, Southampton City Council, Hampshire County Council and Isle of Wight Council) submitted a joint expression of interest to Government signalling their support for establishing a regional ‘strategic’ authority in order to access the additional funding and powers it could bring. This was followed in January by a request to be included in the Government’s Devolution Priority Programme (DPP), a fast-track programme designed to deliver new Strategic Authorities across England.

    Government have signalled they will launch a public consultation on proposals for Strategic Authorities to seek local residents’ views. Government has been clear this is to gather feedback but is not a referendum on the proposals.

    Cllr Steve Pitt, Leader of Portsmouth City Council, said:

    “I am pleased Hampshire and The Solent has been selected as part of the Devolution Priority Programme and will ensure our area can benefit sooner from additional powers and investment for jobs and skills, housing and transport at a sub-regional level.

    “I have always said I favoured a deal for just the Solent area without an elected Mayor, but government ruled this out as an option so we now focus on what we can do to make a positive impact for our area, and one benefit a Mayor would bring is a seat for our region at the Government’s new Council of Nations and Regions.

    “We’re expecting government will fund the necessary changes without any impact on local taxpayers and once it has set out the next steps we’ll work with our partners to move things forward and get the best possible deal for our residents.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Update on fire at Barrow Centre, Mount Edgcumbe

    Source: City of Plymouth

    Mount Edgcumbe House and Country Park has been closed to all visitors today (Wednesday) following a fire at the Barrow Centre yesterday evening.

    Two flats and two holiday lets at the Centre have been seriously damaged by the fire, which was put out by crews from Cornwall Fire and Rescue Service assisted by Devon and Somerset Fire and Rescue Service, who are still on site this morning.

    The Barrow Centre was evacuated as soon as the fire was discovered and fortunately no one was injured.

    Other sections of the Barrow Centre housing businesses and flats are now being assessed. Mount Edgcumbe House itself has not been impacted.

    Sadly, those living in the damaged flats have lost their personal belongings. They were provided with temporary accommodation elsewhere in the park last night.

    The cause of the fire is being investigated.

    The buildings will now be assessed by structural engineers and the area around the Barrow Centre made safe and cordoned off.

    The park is expected to reopen tomorrow and an update on when businesses in the Barrow Centre can re-open will be provided once all the assessments have been completed.

    The Mount Edgcumbe House and Country Park team is contacting anyone who have any upcoming events or bookings that may be affected by the fire.

    Mount Edgcumbe House and Country Park is jointly owned and managed by Plymouth City Council and Cornwall Council.

    Plymouth councillor Tom Briars-Delve, Joint chair of the Mount Edgcumbe Joint Committee, said: “Everyone here is obviously devastated by the damage caused to the properties on the estate and our sympathies are with the families who have lost their possessions and the affected business owners. We will be supporting those families and the affected businesses however we can.

    “We are very thankful no one was injured by the fire and will leave it to the fire service to investigate its cause and how it spread. We are grateful for the efforts of the fire crews throughout the night.

    “Our priority is to support the families affected and to make the area safe so we can reopen the park and help the businesses resume their operations as soon as possible.”

    Cornwall councillor Kate Ewert, Joint chair of the Mount Edgcumbe Joint Committee, said: “The fire is devastating for everyone involved and I know there is a sense of shock amongst those who live and work here but we can be thankful that no one has been hurt. The fire service did an incredible job in getting to the site quickly and protecting the remainder of the property.

    “Our thoughts are with those who have lost all their possessions and I know the community is keen to pull together and provide support in whatever way it can. We will all be working together to help those impacted by this to get the Barrow Centre back up and running as soon possible.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Register now to avoid missing out on this year’s Sperrins and Killeter Walking Festival

    Source: Northern Ireland – City of Derry

    Register now to avoid missing out on this year’s Sperrins and Killeter Walking Festival

    5 February 2025

    Demand for the annual Sperrins and Killeter Walking Festival is extremely high this year, with one day of the event already sold out.

    This year’s festival will take place on Saturday, 1st and Sunday 2nd March. Part of the Sperrins Walking Programme this event provides a unique chance to discover the breath-taking landscapes of the Sperrins and Killeter, all while supporting physical, mental, and emotional wellbeing. Led by the outdoor experts at Far and Wild in collaboration with Derry City and Strabane District Council, it is a must-attend for every avid walker!

    Due to high demand, the Saturday, 1st March 8km walk, ‘The Moat at the Heart of Glenelly,’ is now sold out. But don’t miss your chance to join the stunning Killeter walk on Sunday, 2nd March ‘Myths & Stories from the Edge of Time’. This moderate 8km walk will take you from Lettercran in Co Donegal to Killeter village in Co Tyrone via the scenic Carrickaholten Forest. This fascinating walk traces the footsteps of emigrants, market-goers, smugglers, and travellers who have crossed the border area throughout history. Along the way, participants will learn stories at key landmarks and hear about the region’s rich cultural heritage.  Registration will begin at 10am at the Killeter Heritage Centre but remember to pre-book your place at www.farandwild.org. The cost is £10.

    A highlight of both days is the incredible community spirit and hospitality shown to all walkers. Whether at registration at Watt’s Bar in Plumbridge on Saturday, 1st March or at the Killeter Heritage Centre on Sunday, 2nd March, and after the walks, participants will experience the warm local welcome the Sperrins and Killeter are famous for. Enjoy refreshments, home-baked scones and bread, and the cosy comfort of open fires to dry off those soggy socks and rest tired feet. It’s the perfect opportunity to relax, swap stories, and enjoy some good craic with fellow walkers.

    Encouraging people to come out and take part in the Killeter walk, the Mayor of Derry City and Strabane District Council, Cllr Lilian Seenoi Barr said: “It’s brilliant to see so many people have already registered for the Glenelly walk, and I’m sure the Killeter walk will sell-out soon. So please make sure and register to take part in the walk today.

    “These walks will take you through the spectacular scenery that is the Sperrins, and it’s right on our doorsteps. We have no excuses, get out and enjoy all that this beautiful area has to offer. As well as experiencing the benefits of a day in the outdoors, you’ll also learn some fascinating facts about the history of the area and meet lots of new people. And when the hard miles are over, you can relax and enjoy a cuppa and a chat among friends.”

    Both walks are part of the Sperrins Walking Programme, offering an excellent chance to discover the area’s scenic beauty and historical depth. While Saturday’s walk is fully booked, don’t miss out on the remaining spaces for Sunday’s event.

    For further information and to book your place visit: www.farandwild.org

    For more information about the whole Sperrins Walking Programme visit: https://sperrinspartnershipproject.com/sperrins-walking/

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: INEOS cuts brutal blow for community

    Source: Scottish Greens

    Local Green MSP reacts to brutal INEOS cuts at Grangemouth

    INEOS has announced redundancies of over 400 staff members at their Grangemouth refinery in central Scotland.

    Gillian Mackay, the Scottish Greens MSP for Central Scotland, grew up just 200 yards from the refinery.

    Ms Mackay said:

    “This is a brutal blow for Scotland, but particularly for the community I grew up in and the workers who I know well. I know how hurt the community feels at this time; my thoughts are with everyone.

    “All of us in the town know somebody who is employed directly or indirectly by the refinery. They’re the ones now suffering. Many people will be extremely worried and possibly angry about what will happen next. I am too, I feel the same.

    “This is the opposite of the just transition that is needed for the site and for Grangemouth. We have known for a long time that change is needed. The workers at Grangemouth are some of the most talented and skilled anywhere in Scotland, they must be at the heart of shaping Scotland’s green industrial future. Scotland deserves better; what is happening in Grangemouth is a warning sign for the lack of government support for the just transition in Scotland.

    “Our community has yet again been let down by both governments. Politicians of all parties need to step up and work with trade unions and the community to do everything they can to support local people.”

    MIL OSI United Kingdom

  • MIL-OSI United Nations: New Permanent Representative of Austria Presents Credentials

    Source: United Nations General Assembly and Security Council

    (Based on information provided by the Protocol and Liaison Service)

    The new Permanent Representative of Austria to the United Nations, Gregor W. Koessler, presented his credentials to UN Secretary-General António Guterres today.

    Between 2020 and his most recent appointment, Mr. Koessler served as Director-General for Bilateral Affairs and European Union Common Foreign Policy in his country’s Ministry of European and International Affairs. He was the Director of the Austrian Foreign Minister’s Cabinet from 2019 to 2020.

    Prior to that, he was his country’s Ambassador to the Kingdom of Saudi Arabia, and Non-resident Ambassador to the Sultanate of Oman and the Republic of Yemen from 2012 to 2019.  From 2009 to 2012, he was Head of the Directorate for Property Management in his country’s Ministry of European and Foreign Affairs, and from 2007 to 2008, he was Head of Cabinet for the State Secretary in that Ministry.

    His other roles included Head of Cabinet for the Special Coordinator of the Stability Pact for South-Eastern Europe from 2002 to 2007 and Director of Cabinet for the High Representative for Bosnia and Herzegovina from 1999 to 2002.

    Mr. Koessler holds master’s degrees in contemporary history and philosophy from the Leopold Franzens University of Innsbruck, Austria, and in international economics and conflict management from the Johns Hopkins University, United States.

    MIL OSI United Nations News

  • MIL-OSI Security: Deputy Attorney General Rod Rosenstein Delivers Remarks at the Interpol 87th General Assembly

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    It is a privilege to join you at this 87th INTERPOL General Assembly.  I am grateful to the United Arab Emirates for hosting our conference. Thank you President Kim Jong Yang for your exceptional leadership and for providing stability to INTERPOL.  

    Our theme this year is innovation.  Many digital innovations affect law enforcement, from the rise of cybercrime, to the increasing importance of electronic evidence, to encryption and the dark net. 

    In addressing these innovations, we must respect the primary value that is constant in our work: the rule of law.  Law provides the framework for civilized people to conduct their lives.  At its best, law reflects moral choices; principled decisions that promote the best interests of society, and protect the fundamental rights of citizens. 

     The term “rule of law” describes the government’s obligation to follow neutral principles and fair processes. The ideal dates at least to the time of Greek philosopher Aristotle, who wrote, “It is more proper that law should govern than any one of the citizens: upon the same principle, if it is advantageous to place the supreme power in some particular persons, they should be appointed to be only guardians, and the servants of the law.”

    The rule of law is indispensable to a thriving and vibrant society.  It shields citizens from government overreach.  It allows businesses to invest with confidence.  It gives innovators protection for their discoveries.  It keeps people safe from dangerous criminals.  And it allows us to resolve differences peacefully through reason and logic.

    When we follow the rule of law, it does not always yield the outcome that we prefer. In fact, one indicator that we are following the law is when we respect a result although we do not agree with it. We respect it because it is required by an objective analysis of the facts and a rational application of the rules.

    The rule of law is not simply about words written on paper.  The culture of a society and the character of the people who enforce the law determine whether the rule of law endures.

    Since we met last year in Beijing, the news media has reported several prominent challenges to the rule of law, including the lawless attacks on Sergei and Yulia Skripal and Jamal Khashoggi.  Last month, international attention focused on INTERPOL, as a result of the disappearance of President Meng Hongwei.  Such events give rise to questions about whether our member countries abide by shared principles.  In evaluating our actions at this General Assembly, observers may ask whether our votes reflect the values that we profess. We must stand for the rule of law.  

    INTERPOL exists to promote international police coordination and discourage departures from the law. We represent diverse forms of government. But if we serve with integrity, each of us functions as a trustee for our fellow citizens.

    When our successors look back on how we dealt with the issues of our era, they will ask whether we honored our fiduciary duties.

    First, did we develop the knowledge to understand our challenges?

    Second, did we inculcate the wisdom to solve them?

    Third, did we demonstrate the courage to defend our principles?

    Fourth, did we maintain the resolve to achieve our goals?

    I traveled here to speak about INTERPOL’s role in responding to the major innovation of our lives: the rise of a cyber-connected world. 

    The Internet holds immeasurable promise as a repository of ideas, and as a forum for speech and commerce.  It connects citizens across cultures and countries.  It is accessible to the rich and the poor, the powerful and the powerless.  It creates efficiencies and innovations that immensely improve our lives.

    But like every innovation that offers opportunities for good, the Internet also can be exploited by wrongdoers. Today, there is a growing divergence between the Internet as it is, and the Internet as it could be.

    Malicious actors use the Internet for evil ends.  Cyber criminals employ modern technologies to damage information systems, steal data, commit fraud, violate privacy, attack critical infrastructure, and sexually exploit children. They also launch misleading schemes to influence people’s opinions, seeking to foment division and disrupt democratic processes.

    The Internet enables attacks on businesses, government agencies, and individual citizens that cause damage costing billions of dollars.  And new technologies allow criminals to conceal themselves, which frustrates law enforcement’s efforts to keep honest citizens safe. 

    We must acknowledge the divergence between the Internet in theory and the Internet in practice. Closing that gap will ensure the viability of an open Internet governed by the rule of law.

    Enforcing the law on the Internet requires rapid and accurate detection of criminal activity; cooperation among law enforcers from different nations; prosecution of accused criminals in judicial systems that provide due process of law; and just punishment of guilty offenders.  It means not tolerating virtual online locations where crime is unchallenged.  It means not condoning physical safe havens for cyber criminals.

    Detecting, disrupting, deterring, and prosecuting malicious cyber activity are among our highest law enforcement priorities in the United States.  The cyber threats we face are varied and evolving, and our resolve to keep our people safe must extend to every corner of the Internet.

    My office recently issued a comprehensive report about our work to combat cybercrime.  It describes the global challenges posed by cyber-enabled crime.  It explains how hostile cyber actors damage computer systems, steal data, engage in cyber fraud, violate personal privacy, infiltrate critical infrastructure, and pursue malign foreign influence operations.  The report also details our efforts to detect and disrupt those threats, and our commitment to inform citizens about the dangers.

    The perceived anonymity of the Internet attracts many criminals, including terrorists and those trafficking in child pornography, illicit weapons, illegal and deadly drugs, murder-for-hire, malware, and stolen identities.  The barriers to entry are low.  Criminal opportunities are on offer for anyone with an Internet browser and an inclination to break the law.  

    Yet our police agencies repeatedly demonstrate that with the support of international partners, we can find and dismantle malign internet operations.  We identify anonymous users who commit illegal activity, seize their infrastructure and proceeds, and pursue criminal charges against them.  Criminals operating on the dark web should be on notice that our investigative tools allow us to expose them.

    We must not allow cybercriminals to hide behind cryptocurrencies.  Virtual currencies have some legitimate uses.  But bad actors are using them to fund crimes and to hide illicit proceeds.  For example, Bitcoin was the exclusive method of payment for the WannaCry ransomware attack that spread around the globe, causing billions of dollars in losses. 

    In addition, fraudsters use the lure of coin offerings and the promise of new currencies to bilk unsuspecting investors, promote scams, and engage in market manipulation.  The challenges of regulating, seizing, and tracing virtual currencies demand a multinational response.  We must work together to make clear that the rule of law can reach the entire blockchain.

    To that end, last year, prosecutors in the United States announced the indictment of Alexander Vinnick and the virtual currency exchange he allegedly operated. That exchange received more than $4 billion of virtual currency. It was designed without any means to control money laundering, so predictably it served as a hub for international criminals seeking to hide and launder ill-gotten gains. 

    We filed criminal charges and assessed a $110 million civil penalty against the exchange for willfully violating our anti-money laundering laws, as well as a $12 million penalty against Vinnick.

    To prevent virtual currency from being abused by criminals, terrorist financiers, or sanctions evaders, all of us must implement policies that mitigate the risks posed by the new technology.  My country includes virtual currencies in our anti-money laundering regulations.  And the Financial Action Task Force urges all nations to make clear that global anti-money laundering standards apply to virtual currency products and service providers. We must guard against abuses of digital currency.

    We also need to protect against abuses of encrypted communications.  Encryption can be useful in the fight against cybercrime.  Encrypting data makes it more safe and secure.  But the proliferation of warrant-proof encryption also poses a challenge to effective law enforcement. 

    Encryption technologies designed to be impervious to legal process impede our ability to access investigative data.  In September, the chief law enforcement officials of the United States, the United Kingdom, Canada, Australia, and New Zealand joined together to issue a “Statement of Principles on Access to Evidence and Encryption.”

    While acknowledging the benefits of encryption, they called for urgent, sustained attention and informed discussion about the increasing difficulty law enforcement agencies face in accessing evidence of criminal conduct.

    We will continue to work closely with technology companies to establish responsible practices that consider both privacy concerns and public safety imperatives.

    On the Internet, data is decentralized, information flows across continents, and online activities are dispersed across global networks. Cybercrime knows no borders.  As a result, international cooperation is indispensable.  INTERPOL is central to that cooperation.

    We must ensure that appropriate criminal laws are enforced.  Each of us must do our part to bring malicious actors to justice.  We rely on international partners to locate, arrest, and extradite cybercriminals so that they may be held accountable.  Cybercriminals should find no safe haven, either on the dark web or within national borders.

    In the United States, we continue to faithfully discharge our responsibility to extradite fugitives. In the last five years, we extradited 95 Americans, honoring inquiries whenever the requesting state presents sufficient evidence of criminality.

    For example, last year the United States sent Shawn Gregory Towner to Ireland.  Towner was arrested in Ireland in 2006 after authorities found him watching images of child sexual abuse on his laptop in Dublin, but he fled to the United States after being released on bail.  My country located Towner and sent him to Ireland to stand trial. 

    We process extraditions without regard to the nationality of the offender. 

    But that cooperation must be reciprocated.

    International cooperation was essential to our successful dismantlement of the Kelihos botnet, a global network of tens of thousands of infected computers.  Criminals used the network to harvest login credentials, distribute hundreds of millions of spam e-mails, and install ransomware and other malicious software. 

    In 2017, prosecutors obtained judicial orders authorizing law enforcement to neutralize the botnet by seizing control of malicious domains and redirecting traffic to servers we controlled. 

    Disabling the botnet was only part of the equation. The criminals responsible for creating and administering the botnet also should be held accountable. American prosecutors charged Peter Levashov of St. Petersburg, Russia for multiple offenses stemming from his control and operation of the Kelihos botnet.  Levashov is a cybercriminal who operated multiple botnets with impunity for nearly two decades. 

    Spanish authorities arrested Levashov and extradited him to the United States. In September, Levashov was found guilty in a fair and public judicial proceeding.

    Levashov’s extradition represented effective coordination with our foreign partners.  Unfortunately, not every case is a success story.  In some instances, nations shield their citizens from the rule of law with schemes that waste resources, cause needless delay, thwart investigative efforts, and undermine justice. 

    Consider the prosecution of accused hacker Aleksey Belan.  Belan is a Russian national who was indicted in the United States for massive computer breaches on American companies.  After the United States issued an arrest warrant, Belan was reportedly arrested in 2013.  But he was permitted to return to Russia. 

    A second indictment alleges that in 2014, after Belan returned to Russia, Russian intelligence agents recruited him to carry out one of the largest data breaches in history, stealing information from more than 500 million individual email accounts of people around the world. 

    The rule of law suffers when cybercriminals are given safe havens.  The United States will continue to promote the rule of law by identifying, exposing, and seeking to extradite perpetrators who harm innocent people.  And we will continue to support legitimate investigations and prosecutions conducted by our INTERPOL partners. 

    At the same time, we will expose schemes to manipulate the extradition process.  We will identify nations that routinely block the fair administration of justice and fail to act in good faith, with a sincere commitment to holding criminals accountable.

    As cyber threats grow in scale and sophistication, we increasingly need to search throughout the world for evidence, witnesses, and defendants.  Our responses must be as innovative as the criminal activity. We depend on expeditious international cooperation and coordination in dismantling malicious criminal operations. 

    Child exploitation cases provide a useful model for international coordination.  INTERPOL’s International Child Sexual Exploitation image and video database uses image and video comparison software to identify and locate child sexual exploitation victims and their abusers.  The database has led to the arrest of nearly 6,300 offenders. Recently, it helped authorities rescue five victims in Spain.  That is a superb example of innovative law enforcement.

    In my country, we play a leading role by identifying cases in which child exploitation materials are generated from or hosted in other countries.  Then we disseminate the information to the appropriate INTERPOL member countries. Our partners often request follow-up information to assist in their own investigations. Last year, almost nine million investigative leads were distributed through this program, resulting in many arrests and prosecutions. 

    Children around the world are safer when our law enforcement agencies work together – quickly, and with methods like those pioneered by INTERPOL.

    Finally, I am proud that the United States takes seriously our responsibility to help secure evidence that our international partners need for their investigations.  We receive thousands of requests for mutual legal assistance each year, and we do all that we can to comply.  We employ expert attorneys and staff dedicated to assisting with foreign requests for electronic evidence.  We devote additional resources when necessary to meet your needs.

    We call upon each of you to do the same.  By devoting appropriate resources to international cooperation efforts, we can properly address the increasing threat of cybercrime.

    My country recently enacted a new law to remove legal impediments to compliance with foreign court orders in cases that involve serious crimes.  The legislation demonstrates our commitment to the vision of the Budapest Convention on Cybercrime, the primary treaty for harmonizing national interests and enhancing international cooperation against cybercrime.  Sixty-one nations have fully ratified the treaty, agreeing that national laws should include authority to compel providers to disclose data they control, even when it is held elsewhere. 

    New cyber conventions are sometimes proposed that would limit the free flow of information between nations. But that would dangerously impede efforts to investigate cybercrime. It would protect criminals and allow cyber threats to proliferate and grow in scale and sophistication.  That is untenable in a world in which criminals using computers shielded by layers of anonymity can harm innocent victims in any one of our nations, anywhere in the world. Such limitations would be a step backward, not an innovative law enforcement approach.

    No nation should exempt itself from just and reasonable law enforcement cooperation. No nation will be more prosperous, more secure, or more respected because it supports cybercriminals. 

    My fellow delegates, there is a parable about three stonecutters asked to describe what they are doing.  They answer in varying ways. The first stonecutter focuses on how the job benefits him. He says, “I am earning a living.” The second man narrowly describes his personal task: “I am cutting stone.” The third man has a very different perspective. Instead of focusing solely on his work, he explains what it means to others: “I am helping these stonecutters build a shrine.”

    Similarly, each of us helps to construct a legacy. INTERPOL delegates should always support leaders and policies that promote international police coordination and preserve the rule of law – in practice, and not just in theory. We must uphold the rule of law, so it will be there for us when we need it.

    When our successors speak of our time here, give them reason to say that we understood the challenges; we found the solutions; we defended our principles, and we stayed the course to support liberty and justice for all. 

    I am honored to work with you in advancing the INTERPOL mission and making the world safer and more prosperous for all law-abiding citizens. Shukran.  Thank you very much.

    MIL Security OSI

  • MIL-OSI Security: Acting Attorney General Matthew Whitaker Delivers Remarks to the Joint Terrorism Task Force

    Source: United States Attorneys General 13

    NOTE: The remarks originally included a case that was scheduled to be sentenced but was continued, and so that case was removed from the speech. However, a reference to the case was inadvertently left in. As such, there is no extradition relating to the Chelsea bomber case.

    Remarks as prepared for delivery

    Thank you, Geoff (Berman), for that kind introduction, and thank you for your leadership as United States Attorney for the Southern District of New York. And thank you also to United States Attorney Richard Donoghue from the Eastern District of New York.

    It is wonderful to be in New York during the holiday season.  I’m told that this is the best time of year to visit—but I must say I am looking forward to Thanksgiving in Des Moines.

    But before I say anything else, I want to take a moment to acknowledge that the law enforcement community is in mourning today.

    Chicago police officer Samuel Jimenez was shot and killed during Monday’s shooting at Mercy hospital. Officer Jimenez had just joined the force in 2017 and he was only 28 years old.  He leaves behind a wife—his high school sweetheart—and three young children.

    Officer Jimenez was on his way to respond to a different call when he heard of shots fired at the hospital.  Then he did what police officers do every day in America: he went toward the danger, so that the rest of us could run away from it.  He and his fellow officers saved a lot of lives that day.

    This tragedy is another reminder of both the danger and the nobility of police work.  Today, as we prepare for Thanksgiving Day, we should all be especially grateful for our police officers.

    It is an honor to be here in the J.O.C., where so many consequential law enforcement decisions have been made—so many decisions that have saved American lives.

    This is where a number of terrorism investigations have begun—and it’s where security is monitored for events like the Thanksgiving Day parade or New Year’s Eve.

    And it is an even greater honor to be with some of the most respected law enforcement leaders in the world.  Thank you to:

    • Commissioner O’Neill,
    • FBI Assistant Director in Charge, William Sweeney,
    • Deputy Commissioner Miller,
    • NYPD Chief Paul Ciorra,
    • Chief Owen Monaghan,
    • Ashan Benedict of ATF,
    • Michael Greco with the Marshals Service,
    • Troy Miller with CBP,
    • Director Frank Russo,
    • Phil Bartlett and our Postal Inspectors, and
    • Scott Sarafian with Secret Service.

    It is an honor to be with all of you.

    NYPD in particular has earned a reputation as perhaps the greatest police department on Earth.

    There are more NYPD officers than there are members of the military in entire nations, like Belgium or Ireland.

    But even more impressive than the quantity of your officers is the quality of your officers.

    You are known all over the country for your Compstat program, which enables you to monitor crime rates in real time and to quickly reallocate officers when crime begins to rise.

    And over the past three decades, your achievements have been staggering.  In 1990, there were 2,245 murders in New York City.  Last year there were 292.  Since 2000, burglaries are down by nearly two-thirds and robberies have been cut in half.  One weekend in October there were zero murders or shootings in New York City for the first time in 25 years.

    These results are a testament to the effectiveness of NYPD, and of many people in this room.  You’ve been able to start a virtuous cycle of safety, prosperity—and more safety.  That is what we want to achieve all across America.

    President Donald Trump is a lifelong New Yorker.  He invested in this city when its future was in doubt.  He bet on this city—and that proved to be a smart bet. 

    The President witnessed New York’s transformation firsthand. I think that made his support for law enforcement even stronger.

    One of his very first Executive Orders was to tell the Department of Justice to improve the safety of state and local law enforcement officers.  And over these past two years, we have followed that order.

    Today I am announcing our next step to carry out that order.  Today I am announcing that the Department of Justice is providing $56 million in grant funding to support law enforcement all across America.

    That includes $29 million for bulletproof vests, $12.2 million for body-worn cameras, and $2 million in health and safety research.

    This is just a small way of saying thank you to the officers who take care of us every day.  We understand the sacrifices that you make—and so we want you to have the right equipment and the right training.

    If anybody out there doesn’t appreciate the role of law enforcement officers in our society, then I would tell them to come to New York.

    Earlier today I visited the 9/11 Memorial.  It was an extremely moving experience.

    We all remember where we were when we heard the news.  I know I do.

    Some of you were here.  Some of you were at Ground Zero.

    It was the worst terrorist attack in American history and the most shocking attack on our soil since Pearl Harbor.  It led to the largest investigation in FBI history.

    None of us have ever been the same.  Speaking for myself, 9/11 strengthened my appreciation for our servicemembers and our first responders and law enforcement officers.

    More than 70 police officers were killed in New York City that day.  Dozens more died of illnesses related to their service at Ground Zero.  Some of you knew them.

    The Department of Justice honors their memory and law enforcement holds them up as examples of our highest ideals.  They died in a rescue mission that saved thousands of lives.

    We are indescribably proud of our federal officers.  But we recognize that the vast majority of the officers in American law enforcement is at the state and local levels.  We cannot succeed without you.

    We’re at our best when we work together—and that’s what the JTTF is all about.

    This is the oldest JTTF in America.  Today there are more than 100 JTTFs nationwide, including at least one in each of our FBI field offices.  The vast majority of these were created in response to 9/11.

    This JTTF set the model for the rest to follow.  You bring together 500 employees from 50 different partner agencies.

    And you’ve achieved so much for this city and for this country.

    You investigated the 2007 JFK bomb plot, the 2009 Subway bomb plot, and the 2010 attempted bombing of Times Square.

    And I am well aware that, under this administration, you’ve continued to have success in investigating terrorism.

    Three times a week, I receive a threat briefing where the FBI and the National Security Division tell me about the national security investigations that we are working on in our United States Attorneys’ offices.  We’ve talked about the work done here.

    People in this room have achieved successes that have made this country safer.

    This February, prosecutors in Geoff’s office secured a life sentence for the Chelsea bomber, Ahmad Rahimi. He planted nine improvised explosive devices in New Jersey and New York, including two not far from here in Chelsea.  He detonated one of them and injured more than 30 people.  The bomb was so powerful that it launched a 100-pound dumpster more than 120 feet.  It shattered windows 400 feet away and three stories above ground level.

    Another bomb here in Chelsea was rendered safe by law enforcement before it was detonated.

    That investigation started right here in this room.

    And so to all of the agents, officers, and the AUSAs who worked on this case—Emil Bove, Andrew DeFilippis, and Shawn Crowley—thank you for this outstanding work.

    People in this room also worked to convict the Bangladeshi national who detonated a bomb near the Port Authority bus terminal last December. The explosion was caught on surveillance video and the defendant was found lying on the ground with parts of a pipe bomb on and around his body.  After he was arrested, he admitted that he detonated the bomb to express his support for ISIS.  He attempted to make the bomb as dangerous as he could and to target a public place during rush hour.

    Just two weeks ago, thanks to the hard work of Geoff’s Assistant U.S. Attorneys Shawn Crowley, Rebekah Donaleski, and George Turner, he was convicted on six counts.  Now he is facing a potential life sentence.

    These are terrific accomplishments.  The dangerous terrorists in these cases can’t hurt anyone now—and that’s because of your hard work.

    But these cases are also a reminder that the terrorist threat is not going away on its own.  Sadly, our work is not finished.

    Terrorists are going to continue to target us.  So we’ve got to keep targeting them—during this holiday season and all year round.

    And so I want to assure all of you that this work remains the top priority of the Department of Justice.  We will not let up.

    We will continue to support you with resources—like the grant funding that I mentioned—with personnel, and with intelligence.

    I want to conclude with something a mentor of mine used to say every time he spoke to law enforcement, and I believe it too: we have your back, and you have our thanks.

    MIL Security OSI

  • MIL-OSI Security: Deputy Attorney General Rod J. Rosenstein Delivers Remarks at the “SamSam” Ransomware Press Conference

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Good morning. I am joined by Criminal Division Assistant Attorney General Brian Benczkowski, New Jersey U.S. Attorney Craig Carpenito, and FBI Executive Assistant Director Amy Hess.

    Also on stage are the two prosecutors handling this matter: Assistant U.S. Attorney Justin Herring, and Computer Crimes and Intellectual Property Section Senior Counsel William Hall Jr.

    A federal grand jury in New Jersey indicted two Iranian citizens for a three-year scheme that involved hacking into computers of hospitals, municipalities, public institutions, and businesses. It involved a high-tech, sophisticated extortion plot.

    The defendants allegedly hijacked victims’ computer systems and shut them down until the victims paid a “ransom.”

    The conspirators collected more than $6 million in extortion payments and caused more than $30 million in losses.

    Many of the victims were public agencies with missions that involve saving lives and performing other critical functions for the American people. 

    The indictment was returned on November 26, and unsealed today in Newark, New Jersey. It alleges that Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri used sophisticated software to execute their computer hacking and extortion scheme.

    Acting from inside Iran, the men developed and deployed a form of ransomware that they named “SamSam.”  Ransomware is a destructive computer code that encrypts victims’ computers and then holds the computers “hostage” until a “ransom” fee is paid.

    Starting in January 2016, the defendants gained access to victims’ computers by exploiting cyber security weaknesses.  After gaining access to the computers, they remotely installed ransomware.  The ransomware encrypted computer data, crippling the ability of the victims to operate their businesses and provide critical services to the public. 

    The victims included two major municipalities – the City of Atlanta, Georgia and the City of Newark, New Jersey.  The defendants also sought to interrupt critical transportation infrastructure by infiltrating the Port of San Diego, California, and the Colorado Department of Transportation. 

    In addition, the defendants infected the computers of six health-care related entities from across the country, impairing the ability of these businesses to provide health care to sick and injured people. 

    The defendants chose to focus their scheme on public entities, hospitals, and municipalities.  They knew that shutting down those computer systems could cause significant harm to innocent victims.

    The indictment alleges that the defendants demanded payment from their victims in the form of the virtual currency known as Bitcoin.  Bitcoin contributes to the increasing sophistication of criminal schemes.  It is a common currency for criminal schemes, including websites that distribute child pornography and deadly opioid drugs, and ransomware and other tools of extortion.

    The defendants allegedly communicated with victims using Tor, an encrypted computer network designed to facilitate anonymous communication over the Internet. 

    We support the use of encryption to safeguard private information and strengthen cybersecurity.  But this case highlights another example of the challenges posed to law enforcement by encryption designed to resist law enforcement. 

    Sophisticated encryption technologies like the Tor network are used by cybercriminals to commit serious offenses.  These sophisticated technologies pose a real threat to the government’s ability to keep people safe and ensure that criminals and terrorists are caught and brought to justice.

    Every sector of our economy is a target of malicious cyber activity.  But the events described in this Indictment highlight the urgent need for municipalities, public utilities, health care institutions, universities and other public organizations to enhance their cyber security. 

    Publicly revealing this nefarious hacking scheme makes it harder for the perpetrators, and others like them, to do business in the future.  As a result of the Indictment, the defendants are now fugitives from justice.  They face arrest and extradition to the United States in many nations that honor the rule of law. 

    We call on all civilized nations to prevent their citizens from using the internet to perpetrate fraud schemes in foreign countries.

    By making clear that criminal actions have consequences, we deter schemes to victimize the United States government, businesses, and citizens, and we help to protect foreign allies.

    This case demonstrates the Department of Justice’s commitment to identifying and prosecuting cybercriminals, regardless of where they base their operations. 

    We are grateful for outstanding work and collaboration between American and international law enforcement partners in this investigation.  In particular, I want to thank two United Kingdom agencies – the National Crime Agency, and the West Yorkshire Police – and two Canadian agencies, the Calgary Police Service, and the Royal Canadian Mounted Police. 

    Our National Security Division and our Criminal Division’s Office of International Affairs also provided critical support.

    Next, I want to invite Assistant Attorney General Brian Benczkowski to provide some remarks. 

    MIL Security OSI

  • MIL-OSI United Kingdom: Devolution revolution: six areas to elect Mayors for first time

    Source: United Kingdom – Executive Government & Departments

    Deputy Prime Minister brings six areas onto the Devolution Priority Programme with Mayors to be elected by May 2026 plus four new devolved institutions created.

    A major package of devolution has been announced today – with six new areas confirmed to join the government’s Devolution Priority Programme. 

    Delivering on the government’s commitment to widen devolution, areas will be given sweeping new powers, putting them on the fast track to deliver growth, opportunities, transport and housing for local communities.  

    The programme – one of the largest ever single packages of mayoral devolution in England – will support the areas to move towards devolution at pace, becoming mayor-led strategic authorities by May next year if they proceed.

    Today’s measures brings another 8.8m people under mayoral devolution – or another 15.38% of the population – bringing the total population who will see the benefit from devolution to over 44 million – close to 80% of the country.

    Greater devolution is key to unlocking regional growth, delivering on the government’s Plan for Change and putting more money into working people’s pockets, while also empowering them to direct change in their communities.

    For too long, political power has been hoarded in Whitehall. That’s why the government set out its proposals in the landmark English Devolution White Paper.

    The following areas agreed to join the programme:

    • Cumbria
    • Cheshire & Warrington
    • Norfolk & Suffolk
    • Greater Essex
    • Sussex & Brighton
    • Hampshire & Solent

    These six successful areas will now work to an ambitious devolution timetable, with full government backing, with consultations set to launch shortly. 

    In a further step forward for devolution being delivered at pace, today legislation comes into force to establish four new devolution institutions – as a result of devolution agreements confirmed by the Deputy Prime Minister last year

    This includes establishing two new mayoral authorities in Greater Lincolnshire and Hull and East Yorkshire, and the formation of combined county authorities in Devon and Torbay, and Lancashire.

    The government is also focused on fixing the foundations of local government, with simpler and more effective structures and a reduction in unnecessary layers of bureaucracy. Through a national programme of ambitious local government reform, the government will cut waste and improve accountability, ensuring taxpayers get value for money from their services. To achieve this, all councils in two-tier areas and small neighbouring unitary authorities are now being formally invited to develop unitary proposals – which will bring together lower and upper tier local government services in new unitary councils.   

    Deputy Prime Minister and Secretary of State for Housing, Communities and Local Government Angela Rayner said:

    The truth is that for all the promises of levelling up, central government’s first instinct is all too often to hoard power and hold our economy back. Too many decisions affecting too many people are made by too few.

    We promised to achieve a devolution revolution by overseeing the greatest transfer of power from Westminster in a generation, and today’s announcement will help raise living standards, improve public services and build the homes we so desperately need.

    By taking a common-sense approach to reorganisation, boosted by our reforms to give mayors a suite of vital new powers, we will make sure areas can truly deliver on our Plan for Change.

    Minister of State for Local Government and English Devolution, Jim McMahon OBE MP said:

    In December, we asked areas to come forward to be part of our Devolution Priority Programme. The response was clear—this country is ready for change.

    While devolution can be hard to understand sometimes, the aims of this programme are simple: it puts more money in people’s pockets,  leads to quicker, better, cheaper transport, designed with local people in mind and puts politics back in the service of working people.

    Today’s announcements come just weeks after plans were set out in the English Devolution White Paper to grant mayors control over key areas including strategic planning, housing, transport and skills.

    This will equip these local leaders with the tools they need to deliver for their communities, putting England’s regions centre stage in the government’s Plan for Change missions to grow the economy, deliver 1.5 million homes, and boost opportunity across the country.

    The English Devolution Bill – which is due to be brought forward later this year – will also hardwire proposed new mayoral powers into law.

    In order to allow areas to deliver devolution to this ambitious timetable, the government has carefully considered requests from local councils to postpone a number of May 2025 local elections.

    The bar to postpone elections has been extremely high, and the government has been clear that delays will only be agreed where there is strong justification set out by the local authority. The government has agreed to half of these requests, and will postpone elections due in May 2025 until May 2026 for nine local councils. These councils made the strongest possible case that this is strictly necessary to deliver both reorganisation and devolution to the most ambitious timeframe.

    There is an established precedent, including in the cases of North Yorkshire, Cumbria and Somerset elections, and Buckinghamshire district councils elections, under the previous government when reorganisation happened there. The legislation to enable this  will shortly be laid, subject to Parliamentary timetables. 

    In North Yorkshire, unitarisation enacted in 2023 has enabled the council to manage financial pressures though structural changes and service transformation, which is expected to achieve more than £40m in savings by March 2026. 

    Ministers will also continue to work with Lancashire, which is in a unique position as it is establishing a non-mayoral institution and is committed to reviewing its future devolution arrangements by the autumn, including steps to deepen devolution. This review will consider all options available for the area, including aligning with the Devolution Priority Programme when it concludes. 

    Also, given the urgency of creating sustainable unitary local government for Surrey, we will postpone the county election for that area from May 2025 to May 2026, helping to speed up reorganisation and deliver the local ambitions for devolution with the benefits it will bring.

    Updates to this page

    Published 5 February 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Ukraine has every right to determine its own future: UK Statement to the OSCE

    Source: United Kingdom – Executive Government & Departments

    UK Military Advisor, Joby Rimmer, says Russia’s war of aggression has achieved little except the catastrophic loss of life, the loss of Russia’s military credibility, and the loss of Russia’s international reputation.

    Thank you, Mr Chair. Sadly, we have started this year like the last, and the overwhelming concern of this forum remains: Russia’s ongoing war of aggression against Ukraine. The UK remains resolutely committed to supporting the people of Ukraine as they defend their homeland. Since the start of the full-scale invasion, the UK has provided over £3 billion per year in military, humanitarian and financial assistance, and this support will continue for as long as necessary to ensure Ukraine’s sovereignty and territorial integrity are fully restored.

    What has Russia accomplished so far? Russia’s full-scale invasion has been nothing short of a disaster. The Russian state’s bold assertion that the subjugation of Ukraine would be accomplished within a matter of days was made almost three years ago. Having failed in pursuit of its own strategic aims, the campaign has achieved little except the catastrophic loss of life on both sides, the loss of Russia’s military credibility, and the loss of Russia’s international reputation.

    The UN estimates that more than 12,000 Ukrainian civilians and some 43,000 Ukrainian soldiers have been killed as a direct result of Russian aggression. Independent reports suggest approximately 830,000 Russian casualties, a number that demonstrates President Putin’s disregard for his own countrymen sent to fight in a war they did not choose. On 29th January alone, the Russian military lost 1,670 men with Russian casualties for January averaging over 1,500 per day. At the current rate of loss, Russia will have suffered over 1 million casualties by June 2025. As Russian casualties mount, Russian recruitment in Moscow has reduced, with military recruitment currently at 40 personnel a day, five times lower than the Summer-Autumn 2024 average of 200 recruits a day. Half of these recruits are reportedly indebted Russians and foreign nationals. The direct participation of DPRK troops in combat operations is another dangerous expansion of Putin’s illegal war. Of the 11,000 DPRK troops deployed in Kursk, reporting indicates that 4,000 are already casualties, including 1,000 fatalities.

    What has Russia accomplished militarily? Reports from the region paint a stark image of Russian military mediocrity. Russia has reportedly now lost over 3,700 Main Battle Tanks, over 8,000 armoured vehicles and 1,800 pieces of artillery. Any marginal Russian gains around Donetsk, Toretsk and Pokrovsk have been extremely costly, with progress augmented through the cynical use of glide bombs, drone and missile attacks, causing widespread damage to local housing, medical facilities and critical infrastructure. Independent reports state that Russia launched over 1,250 aerial bombs and over 1,000 attack drones into Ukraine in the last week of January. Nearly all resulted in civilian casualties.

    Last week, the Ukrainian army’s general staff reported that Russian forces bombed a boarding school in an area of Kursk under Ukrainian control, where civilians were sheltering and preparing to evacuate. Four people were killed and dozens injured. Russia’s continued disregard for human life cannot, and will not, be overlooked.

    Russia is also suffering the cost to its international reputation. The war in Ukraine clearly violates the UN Charter and contravenes our shared commitments of the Helsinki Final Act – respecting sovereignty, territorial integrity and the non-use of force. This full-scale invasion is not just an illegal act that contravenes international law; it is a serious miscalculation and one that fundamentally represents loss; most appallingly, the loss of human life, the loss of Russia’s international reputation, and the loss of Russia’s military credibility.

    Finally, the UK remains firm in its belief that any path to peace must be grounded in a position of strength for Ukraine. Ukraine must not be coerced into peace talks under duress or pressure from the aggressor. Ukraine has every right to determine its future, and its right to self-determination must be upheld. The UK is proud to be a steadfast friend of Ukraine and will not rest until Ukraine achieves peace on its own terms – Russia must cease hostilities in Ukraine and remove its forces from Ukraine’s internationally recognised borders. Thank you, Mr Chair.

    Updates to this page

    Published 5 February 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: National Apprenticeship Week shines spotlight on opportunities for city residents

    Source: City of Wolverhampton

    The theme is Skills for Life, helping apprentices forge career pathways and secure permanent jobs.

    City of Wolverhampton Council is hosting a drop-in event at The Mander Centre on Saturday 15 February as part of National Apprenticeship Week (NAW) 2025.

    Those interested in learning how to ‘earn while you learn’ can turn up to the event between 10am and 2pm. It is on the ground floor, near TJ Hughes and is being held in partnership with Wolverhampton Black Country Careers HUB.

    Register in advance at Eventbrite and you could win one of four £25 Enjoy Wolverhampton gift cards.

    Since January last year the council has recruited another 32 apprentices, alongside upskilling staff and supporting city partners to develop apprenticeships.

    City of Wolverhampton Council’s Cabinet Member for City Development, Jobs and Skills, Councillor Chris Burden, said: “National Apprenticeship Week shines a spotlight on the benefits of apprenticeships in putting local people into good jobs and training, which in turn helps to deliver a thriving economy in the city.

    “Apprenticeships can change lives, helping people find employment, improve their skills and gain qualifications, while providing valuable alternative recruitment options for employers.

    “I encourage anyone with an interest in apprenticeships to come and get involved in the event at the Mander Centre and find out more about how you can earn while you learn.”

    Council apprentice Jude Aston recently gained a distinction in his Public Relations and Communications Level 4 Public Health Apprenticeship.

    He said: “I was nervous about how I was going to apply all my learning, but the best piece of advice I would give is trust the apprenticeship process, because it has worked and is a great way to develop your knowledge and skills.”

    Former library assistant Lucy Barford had a career change to become a Level 7 Solicitor Apprentice through Damar Training and the council and has been named the Damar Apprentice Champion Award.

    She said: “Changing careers to start an apprenticeship in law changed my life and opened possibilities I hadn’t previously considered.

    “My first apprenticeship was to become a certified paralegal, and I’m now working through a second apprenticeship training to be a solicitor. I’m proud and grateful to Damar and the council for such wonderful opportunities.”

    Esha Dadral, Level 3 Digital Content Apprentice, said: “I always wanted to kickstart my career in marketing, so when this opportunity came up it was a no brainer for me. In my opinion, an apprenticeship is the best way to gain the essential skills and knowledge for the career of your choice.”

    There are many types of apprenticeships on offer with employers in Wolverhampton. The different levels of qualification are Level 2 Intermediate Apprenticeship (GCSE equivalent), Level 3 Advanced Apprenticeship (A-Level equivalent), Level 4 or 5 Higher Apprenticeship (Foundation degree and above equivalent) and Level 6 or 7 Degree Apprenticeship (Bachelor’s or Master’s degree equivalent).

    Help is available through Wolves at Work which offers free, one to one employment support and advice for local people. If you are interested in finding out more about apprenticeship opportunities at the City of Wolverhampton Council email OD.Team@wolverhampton.gov.uk.

    MIL OSI United Kingdom

  • MIL-OSI: Avid Bioservices poised for significant growth with new partners GHO Capital and Ampersand Capital Partners

    Source: GlobeNewswire (MIL-OSI)

    Avid Bioservices poised for significant growth with new partners GHO Capital and
    Ampersand Capital Partners

    • Acquisition of biologics Contract Development and Manufacturing Organisation Avid Bioservices now completed
    • GHO and Ampersand’s deep experience in CDMO investing to support Avid’s next stage of rapid growth including expanded offerings, talent investment and greater geographic reach

    London, UK, Boston, MA and Tustin, CA, February 5, 2025 — GHO Capital Partners LLP (“GHO”), the European specialist investor in global healthcare, and Ampersand Capital Partners (“Ampersand”), a private equity firm specialising in growth equity investments in the life sciences and healthcare sectors, today announced the successful closing of the previously announced acquisition of Avid Bioservices (“Avid” or the “Company”), a dedicated biologics Contract Development and Manufacturing Organisation (“CDMO”) working to improve patient lives by providing high quality development and manufacturing services to biotechnology and pharmaceutical companies.

    Avid has experienced significant growth in recent years, offering its clients full lifecycle capabilities—from concept to commercial supply. With substantial investment already made by the Company in its capacity at its state-of-the art facilities and its expertise in bioprocess optimisation, analytical testing, and regulatory compliance, Avid delivers high-quality, industry leading complex biologics to a roster of international customers.

    GHO has considerable expertise in the CDMO sector through investments in its portfolio in companies like Ardena, Sterling Pharma Solutions, RoslinCT, and Alcami Corporation. Its strategy focuses on expanding technological capabilities, driving acquisitions, and supporting transatlantic expansion across the CDMO value chain, from early-stage development to commercial manufacturing. Leveraging its healthcare expertise and network, GHO transforms CDMOs to enhance their services and market reach, ultimately delivering better, faster and more accessible healthcare.

    Alan MacKay and Mike Mortimer, Managing Partners of GHO, commented: “We are delighted to start 2025 with the completion of this transaction, our first public to private deal. GHO has a deep understanding of the CDMO sector and Avid perfectly exemplifies a company that is operating in high growth markets supporting the growing biotech sector in research and development and big pharma and large biotech for the commercialisation of cutting-edge biologics. Avid’s recent investments, both in capacity and its exemplary team, have created a strong foundation for future growth. We look forward to partnering closely with the Avid team to unlock the business’s full potential.”

    Nick Green, President and CEO of Avid, said: “Avid has succeeded by evolving and adapting to meet our customers’ complex development and manufacturing needs. The completion of this transaction marks an exciting milestone as we move forward with new owners in GHO Capital and Ampersand who will provide us with access to resources that will accelerate our growth. With their support, we are well-positioned to enhance our capabilities, expand our service offerings, and deliver even greater value to our customers in this next phase of our journey.”

    David Anderson, General Partner of Ampersand, added: “Avid has earned its reputation as a leader in biopharmaceutical development and manufacturing through technical excellence, customised solutions, and consistent regulatory compliance. By combining our deep industry expertise with Avid’s established capabilities, we are positioned to deliver enhanced value and accelerate innovation for clients globally.”

    On 7 November 2024, GHO and Ampersand entered into a definitive merger agreement for Avid to be acquired by funds managed by GHO and Ampersand in an all-cash transaction valued at approximately $1.1 billion. With the completion of the transaction, Avid’s stockholders are entitled to receive $12.50 per share in cash. The Company’s common stock has ceased trading and will be delisted from Nasdaq.

    Advisors
    William Blair served as buyside financial advisers, Ropes & Gray served as legal counsel, ClearView Healthcare Partners served as commercial advisor and Alvarez & Marsal served as financial advisors to GHO and Ampersand.

    Contacts:

    GHO Capital

    Amber Fennell / Kris Lam
    ICR Healthcare
    +44 7739658783
    ghocapital@icrhealthcare.com

    Avid Bioservices

    Stephanie Diaz
    Vida Strategic Partners
    415-675-7401
    sdiaz@vidasp.com

    Tim Brons
    Vida Strategic Partners
    415-675-7402
    tbrons@vidasp.com

    Aaron Palash / Allison Sobel
    Joele Frank, Wilkinson Brimmer Katcher
    (212) 355-4449

    About GHO Capital

    Global Healthcare Opportunities, or GHO Capital Partners LLP, is a leading specialist healthcare investment advisor based in London. GHO Capital applies global capabilities and perspectives to unlock high growth healthcare opportunities, targeting Pan-European and transatlantic internationalisation to build market leading businesses of strategic global value. GHO Capital’s proven investment track record reflects the unrivalled depth of our industry expertise and network. GHO Capital partners with strong management teams to generate long-term sustainable value, improving the efficiency of healthcare delivery to enable better, faster, more accessible healthcare. For further information, please visit www.ghocapital.com.

    About Avid Bioservices, Inc.

    Avid Bioservices is a dedicated CDMO focused on development and CGMP manufacturing of biologics. The Company provides a comprehensive range of process development, CGMP clinical and commercial manufacturing services for the biotechnology and biopharmaceutical industries. With more than 30 years of experience producing biologics, Avid’s services include CGMP clinical and commercial drug substance manufacturing, bulk packaging, release and stability testing and regulatory submissions support. For early-stage programs the Company provides a variety of process development activities, including cell line development, upstream and downstream development and optimization, analytical methods development, testing and characterization. The scope of our services ranges from standalone process development projects to full development and manufacturing programs through commercialization. www.avidbio.com

    About Ampersand Capital Partners

    Ampersand Capital Partners, founded in 1988, is a middle-market private equity firm with $3 billion of assets under management, dedicated to growth-oriented investments in the healthcare sector. With offices in Boston, MA, and Amsterdam, Netherlands, Ampersand leverages a unique blend of private equity and operating experience to build value and drive long-term performance alongside its portfolio company management teams. Ampersand has helped build numerous market-leading companies across each of the firm’s core healthcare sectors. For additional information, visit www.ampersandcapital.com or follow us on LinkedIn.

    The MIL Network

  • MIL-OSI: Double Your Deposit and Get $50 Bonus with 100x Leverage Crypto Trading at BexBack – No KYC!

    Source: GlobeNewswire (MIL-OSI)

    SINGAPORE, Feb. 05, 2025 (GLOBE NEWSWIRE) — With the price of bitcoin once again trading below $100,000, many analysts believe it will enter a long period of high volatility. Holding spot positions may not continue to generate profits in the short term. BexBack Exchange is stepping up its efforts to provide traders with irresistible preferential packages. The platform now offers a 100% deposit bonus, a $50 welcome bonus for new users, and a 100x leverage on cryptocurrency trading, creating unparalleled opportunities for investors.

    What Is 100x Leverage and How Does It Work?

    Simply put, 100x leverage allows you to open larger trading positions with less capital. For example:

    Suppose the Bitcoin price is $100,000 that day, and you open a long contract with 1 BTC. After using 100x leverage, the transaction amount is equivalent to 100 BTC.

    One day later, if the price rises to $105,000, your profit will be (105,000 – 100,000) * 100 BTC / 100,000 = 5 BTC, a yield of up to 500%.

    With BexBack’s deposit bonus

    BexBack offers a 100% deposit bonus. If the initial investment is 2 BTC, the profit will increase to 10 BTC, and the return on investment will double to 1000%.

    Note: Although leveraged trading can magnify profits, you also need to be wary of liquidation risks.

    How Does the 100% Deposit Bonus Work?
    The deposit bonus from BexBack cannot be directly withdrawn but can be used to open larger positions and increase potential profits. Additionally, during significant market fluctuations, the bonus can serve as extra margin, effectively reducing the risk of liquidation.

    About BexBack?

    BexBack is a leading cryptocurrency derivatives platform that offers 100x leverage on BTC, ETH, ADA, SOL, and XRP futures contracts. It is headquartered in Singapore with offices in Hong Kong, Japan, the United States, the United Kingdom, and Argentina. It holds a US MSB (Money Services Business) license and is trusted by more than 500,000 traders worldwide. Accepts users from the United States, Canada, and Europe. There are no deposit fees, and traders can get the most thoughtful service, including 24/7 customer support.

    Why recommend BexBack?

    No KYC Required: Start trading immediately without complex identity verification.

    100% Deposit Bonus: Double your funds, double your profits.

    High-Leverage Trading: Offers up to 100x leverage, maximizing investors’ capital efficiency.

    Demo Account: Comes with 10 BTC in virtual funds, ideal for beginners to practice risk-free trading.

    Comprehensive Trading Options: Feature-rich trading available via Web and mobile applications.

    Convenient Operation: No slippage, no spread, and fast, precise trade execution.

    Global User Support: Enjoy 24/7 customer service, no matter where you are.

    Lucrative Affiliate Rewards: Earn up to 50% commission, perfect for promoters.

    Take Action Now—Don’t Miss Another Opportunity!

    If you missed the previous crypto bull run, this could be your chance. With BexBack’s 100x leverage and 100% deposit bonus and $50 bonus for new users (complete one trade within one week of registration), you can be a winner in the new bull run.

    Sign up on BexBack now, claim your exclusive bonus and start accumulating more BTC today!

    Website: www.bexback.com

    Contact: business@bexback.com

    Contact:
    Amanda
    business@bexback.com

    Disclaimer: This content is provided by BexBack. The statements, views and opinions expressed in this column are solely those of the content provider. The information provided in this press release is not a solicitation for investment, nor is it intended as investment advice, financial advice, or trading advice. It is strongly recommended you practice due diligence, including consultation with a professional financial advisor, before investing in or trading cryptocurrency and securities. Please conduct your own research and invest at your own risk.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/2d7570e1-dd49-41f2-bb56-fdde6bb57717

    https://www.globenewswire.com/NewsRoom/AttachmentNg/b704fe83-5d72-424f-8e4d-faedb85932fd

    https://www.globenewswire.com/NewsRoom/AttachmentNg/b1489dbf-1cba-4388-8bb7-dd56cd0dd96f

    https://www.globenewswire.com/NewsRoom/AttachmentNg/3653b677-5659-44e3-b40f-346380acd8ca

    The MIL Network

  • MIL-OSI: VelocityEHS Recognized as a Best Places to Work

    Source: GlobeNewswire (MIL-OSI)

    CHICAGO, Feb. 05, 2025 (GLOBE NEWSWIRE) — VelocityEHS®, the global leader in EHS & ESG software solutions, is honored to be named as one of Built In’s 2025 Best Places to Work. The company has been recognized in both the Midsize and Remote categories, reflecting its commitment to fostering an exceptional workplace culture.

    Built In’s annual awards program honors companies of all sizes—from startups to enterprises—and celebrates top employers in major tech markets across the U.S., including remote-first organizations.

    “At VelocityEHS, we believe that our people are the heart of our success,” said Rachel Kaiser, SVP Chief People Officer, VelocityEHS. “This recognition reflects our commitment to creating a collaborate workplace where every employee feels valued, supported, and empowered to grow—both personally and professionally.”

    To align with the benefits candidates increasingly value through Built In, the program celebrates companies that offer the best compensation and total rewards packages. It evaluates key factors such as remote and flexible work opportunities, initiatives that promote engagement and belonging, and a culture that prioritizes people-first values.

    “Being recognized as a Best Place to Work is a testament to these companies’ commitment to building a workplace where individuals and innovation thrive,” says Built In CEO and Founder, Maria Christopoulos Katris. “At Built In, we understand that great companies are powered by great teams, and this achievement showcases their dedication to fostering a culture of growth and excellence. Congratulations on this well-deserved honor.”

    Read more news and insights on the VelocityEHS press page.

    About VelocityEHS

    Relied on by more than 10 million users worldwide to drive operational excellence and achieve outstanding outcomes, VelocityEHS is the global leader in true SaaS enterprise EHS & ESG technology. The VelocityEHS Accelerate® Platform is the definitive gold standard, delivering best-in-class software solutions for managing Safety, Ergonomics, Chemical Management, and Operational Risk. In addition, Velocity offers world-class applications for Contractor Safety & Permit to Work, Environmental Compliance, and ESG.

    The VelocityEHS team includes unparalleled industry expertise, with more certified experts in health, safety, industrial hygiene, ergonomics, sustainability, the environment, AI, and machine learning than any other EHS software provider. Recognized by the EHS industry’s top independent analysts as a Leader in the Verdantix 2025 Green Quadrant Analysis, VelocityEHS is committed to industry thought leadership and to accelerating the pace of innovation through its software solutions and vision. Its privacy and security protocols, which include SOC2 Type II attestation, are among the most stringent in the industry.

    VelocityEHS is headquartered in Chicago, Illinois, with locations in Ann Arbor, Michigan; Tampa, Florida; Oakville, Ontario; London, England; Perth, Western Australia; and Cork, Ireland. For more information, visit www.EHS.com. 

    ABOUT BUILT IN
    Built In is the “always on” recruiting platform that reaches the tech professionals that other leading recruiting platforms don’t. Designed to help companies hire expert tech talent, Built In continuously drives brand awareness with content. Monthly, millions of the industry’s most in-demand global tech professionals visit our site to stay ahead of tech trends and news, learn skills to accelerate their careers, find the right job opportunities and get hired. Thousands of companies, from fast-growing startups to the largest enterprises rely on Built In. By putting their stories in front of our uniquely engaged audience, we help them hire otherwise hard-to-reach technical and expert talent. www.builtin.com

    Media Contact:
    Jennifer Sinkwitts
    VelocityEHS
    jsinkwitts@ehs.com

    The MIL Network

  • MIL-OSI Video: UK E-petition debate relating to career breaks for parents of ill children – Monday 3 February

    Source: United Kingdom UK Parliament (video statements)

    The Petitions Committee has scheduled a debate relating to career breaks for parents of ill children

    Robbie Moore MP, has been asked by the Committee to open the debate. The Government will send a Minister to respond.

    Read the petition:
    https://petition.parliament.uk/archived/petitions/638449

    Find petitions you agree with, and sign them: https://petition.parliament.uk/

    What are petition debates?

    Petition debates are ‘general’ debates which allow MPs from all parties to discuss the important issues raised by one or more petitions, and put their concerns to Government Ministers.

    Petition debates don’t end with a vote to implement the request of a petition. This means that MPs will not vote on the issues raised in the petition at the end of the debate.

    The Petitions Committee can only schedule debates on petitions to parliament started on petition.parliament.uk

    Find out more about how petition debates work: https://committees.parliament.uk/committee/326/petitions-committee/content/194347/how-petitions-debates-work/

    Stay up-to-date
    Follow the Committee on Twitter for real-time updates on its work: https://www.twitter.com/hocpetitions

    Thumbnail image ©UK Parliament / Jessica Taylor

    https://www.youtube.com/watch?v=6Vwk9YTWQpQ

    MIL OSI Video

  • MIL-OSI: E Ink to Showcase 75” E Ink Kaleido™ 3 Outdoor Large Area Color Signage at Integrated Systems Europe 2025

    Source: GlobeNewswire (MIL-OSI)

    BILLERICA, Mass., Feb. 05, 2025 (GLOBE NEWSWIRE) — E Ink (8069.TWO), the originator, pioneer, and global commercial leader in ePaper technology, today announced they will be showing their largest color signage offering to date, a 75” E Ink Kaleido™ 3 Outdoor, at the Integrated Systems Europe 2025 (ISE) show in Barcelona starting February 4. Attendees of ISE can experience the 75” display at the Fira Barcelona from February 4 through February 7 in the Samsung Electronics booth (#3F500), LG Electronics booth (#3K100), the DynaScan booth (#3C700) and the Agile Display Solutions booth (#4A500).

    “As more countries look to reduce their carbon footprint and increase the sustainability of their communities, the benefits of an E Ink display, with its low power consumption and non-light pollution characteristics, can bring real change to indoor and outdoor DOOH signage,” said Dr. F.Y. Gan, President of E Ink. “Our largest E Ink Kaleido display to date offers a compelling solution to address the need for a dynamic display that also provides environmental solutions.”

    The 75” E Ink Kaleido 3 Outdoor display offers print-color ePaper designed specifically for Digital Out-of-Home (DOOH) advertising signage market, and it is suitable for outdoor use in varying temperature ranges. It offers dynamic color display capabilities, poster-like visual quality, and a low-carbon and eco-friendly display solution.

    E Ink Kaleido Outdoor 3 is based on print-color ePaper technology and utilizes an RGB color filter array on black and white electronic paper film to create a warm and colorful display, offering 4,096 colors and clear text, providing a comfortable and non-irritating color digital content viewing experience with a visual impact close to that of color printed paper signage. E Ink Kaleido 3 Outdoor’s operating temperature range is between -15°C to 65°C, which allows it to operate in extremely cold or hot areas without the need for expensive, high-energy-consuming heating or cooling devices, reducing additional power consumption.

    Many European countries are facing an energy crisis and new regulations have been put in place to limit the operating hours of digital signage. However, E Ink Kaleido 3 Outdoor uses very little power, and can even run on renewable energy from solar panels, without relying on electricity from the grid. That means it can replace energy-hungry digital signage and conform to the new restrictions. When used for outdoor information displays, E Ink Kaleido 3 Outdoor color ePaper allows for quick and easy updates of information. It’s much more functional and environmentally friendly than traditional paper posters and display boards.

    E Ink adheres to its commitment to sustainable development by leveraging its unique PESG framework to provide low-carbon display solutions, contributing to the realization of a net-zero society. According to FTSE Russell’s assessment, 99.9% of E Ink’s product sales revenue qualifies as green revenue. Additionally, Moody’s Ratings has issued a Second Party Opinion (SPO) on E Ink’s green loans, confirming their compliance with the Green Loan Principles (2023) and assigning a high sustainability score of “SQS2 Very Good,” recognizing the exceptional environmental contributions and international standards compliance of E Ink’s ePaper products.

    E Ink is dedicated to providing energy-efficient, light-pollution-free, eco-friendly, and visually beneficial products for smart cities and broader communities. Research from the Harvard T.H. Chan School of Public Health highlights that ePaper, operating without self-lighting and emitting no blue light, does not harm human eyes, and provides up to three times better eye health compared to LCD displays. Furthermore, ePaper is the first display technology globally to receive certification from the International Dark-Sky Association. Compared to paper and LCD displays, ePaper offers significant energy savings and low-carbon benefits. For example, ePaper used in smart bus stop signage, powered by solar energy systems, enables 100% renewable energy usage without requiring connection to the power grid, making it an ideal solution for achieving global net-zero carbon goals.

    About E Ink
    E Ink Holdings Inc. (8069.TWO), based on technology from MIT’s Media Lab, provides an ideal display medium for applications spanning eReaders and eNotes, retail, home, hospital, transportation, logistics, and more, enabling customers to put displays in locations previously impossible. E Ink’s electrophoretic display products make it the worldwide leader for ePaper. Its low power displays enable customers to reach their sustainability goals, and E Ink has pledged using 100% renewable energy in 2030 and reaching net zero carbon emissions by 2040. E Ink has been recognized for their efforts by receiving, validation from Science-Based Targets (SBTi) and is listed in both the DJSI World and DJSI Emerging Indexes. Listed in Taiwan’s Taipei Exchange (TPEx) and the Luxembourg market, E Ink Holdings is now the world’s largest supplier of ePaper displays. For more information please visit www.eink.com. E Ink. We Make Surfaces Smart and Green.

    Contacts
    V2 Communications on behalf of E Ink
    eink@v2comms.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/83d1ff0d-018c-459d-87fe-b2295ec0050e

    The MIL Network

  • MIL-OSI: Regarding the approval of INVL Technology prospectus

    Source: GlobeNewswire (MIL-OSI)

    INVL Technology (hereinafter – the Company) informs that under the provision of the Law on Collective Investment Undertakings of the Republic of Lithuania (hereinafter – CIU), the Company operating under the CIU is under an obligation to have a valid prospectus (hereinafter – the Prospectus) prepared in accordance with the requirements of the CIU or of the Law on Securities of the Republic of Lithuania (hereinafter – LS).

    In order to meet the above-mentioned requirement, in August 2019 the Company’s management company INVL Asset Management, UAB (hereinafter – the Management company) prepared a Prospectus in compliance with CIU. Considering that at the time of publication of the information there are no grounds that the Company should prepare and own a prospectus complying with the requirements of the LS, on 5 February 2025, the Management company of the Company approved the updated version of the Prospectus and approved its publication.

    The Prospectus was submitted to the Bank of Lithuania in accordance with the CIU. 

    The person authorized to provide additional information:
    Kazimieras Tonkūnas
    INVL Technology Managing Partner
    E-mail k.tonkunas@invltechnology.lt

    Attachment

    The MIL Network

  • MIL-OSI: Rapid7 Launches New Global PACT Partner Program

    Source: GlobeNewswire (MIL-OSI)

    BOSTON, Feb. 05, 2025 (GLOBE NEWSWIRE) — Rapid7, Inc. (NASDAQ: RPD), a leader in extended risk and threat detection, today announced that it has launched a new PACT Partner Program to equip partners with tools, training, and resources to meet the expanding security needs of customers in an increasingly complex global threat landscape.

    The new PACT Program will deliver a supportive and structured program for partners to help customers take command of their attack surface. Working with the full channel community, including resellers, distributors, systems integrators and service providers, Rapid7 enables thousands of partners around the globe through a modernized Partner Portal, tailored engagement programs and specializations, and an all-new Partner Training Academy.

    “Today’s PACT Program launch is the result of listening to and working collaboratively with our global partner community to best understand their business challenges and opportunities,” said Alex Page, vice president of global channel sales at Rapid7 and 2025 CRN Channel Chief. “We made this significant program update to ensure our partners were enabled and supported to drive maximum impact in line with their near and long-term business objectives. Together, we know we can provide our joint customers the most robust solutions to help them take command of their attack surface.”

    The PACT Program includes new tiers and classifications, designed to empower and unite all partner types under a single, dynamic program. This innovative approach offers tailored engagement opportunities and sets clear performance expectations. Furthermore, valuable tier benefits will recognize and reward success, enhancing profitability and growth.

    Key elements of the new program include:

    • Modernized Partner Portal: Rapid7’s modernized and expanded Partner Portal offers partners deeper engagement and seamless, real-time collaboration with Rapid7 via a redesigned interface that provides training and automation to support the entire customer lifecycle. From self-service quote access and renewal dashboards, to learning paths aligned to specific points in the sales process and customer lifecycle.
    • Tailored Engagement Programs and Specializations: Rapid7’s unified platform seamlessly combines proactive and reactive cyber risk management solutions so they can be efficiently scaled and customized to meet customer requirements. Partners can also benefit from two new PACT specializations, MSSP Specialization and Service Delivery Specialization, for an enhanced suite of tech resources and operational efficiencies with simplified pricing models launching later this year.
    • All-New Partner Training Academy: The new Partner Training Academy equips partners with practical skills and technical knowledge to enhance customer value. With a mission to elevate partners’ confidence in positioning solutions to match customer needs, the Partner Training Academy offers a variety of competency-based courses and certifications. Courses are tailored to the sales and pre-sales technical roles, as well as specialized curriculum, to enable partners to deliver their own post-sales services.

    “Over the past few years, we’ve experienced excellent growth with Rapid7 as they’ve redefined their channel strategy—and the new PACT Partner Program marks yet another exciting step forward,” said Mark Thornberry, senior vice president, vendor management at GuidePoint Security. “As digital ecosystems become increasingly complex, attack surfaces grow, and threats evolve, the need for robust Managed Detection & Response (MDR) has never been greater. The enhancements to their 2025 Partner Program not only underscore Rapid7’s dedication to growth and innovation, but also enable us to continue delivering comprehensive SecOps strategies to our customers.”

    “Our partnership with Rapid7 has been nothing short of exceptional. Over the years, we have built a strong and collaborative relationship that has fuelled remarkable growth across the UK & Ireland (UK&I). Rapid7’s cutting-edge solutions and unwavering support have been instrumental in expanding our cybersecurity offerings, empowering us to deliver world-class protection to our clients,” said Nick Brownrigg, group director, solutions architecture, Integrity360. “Beyond the UK&I, Rapid7 has played a crucial role in helping us establish a strong presence in the Nordics and successfully launch our cybersecurity services in emerging regions such as Italy, Spain, and South Africa. Their commitment to innovation and partnership has enabled us to stay ahead of evolving threats and provide best-in-class security solutions to businesses worldwide. We are proud to partner with Rapid7 and look forward to continued success together in securing organizations across the globe.”

    For further information on the new Rapid7 PACT Partner Program please click HERE.

    About Rapid7
    Rapid7, Inc. (NASDAQ: RPD) is on a mission to create a safer digital world by making cybersecurity simpler and more accessible. We empower security professionals to manage a modern attack surface through our best-in-class technology, leading-edge research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help more than 11,000 global customers unite cloud risk management with threat detection and response to reduce attack surfaces and eliminate threats with speed and precision. For more information, visit our website, check out our blog, or follow us on LinkedIn or X.

    Rapid7 Media Relations
    Alice Randall
    Director, Global Communications
    press@rapid7.com
    (857) 216-7804

    Rapid7 Investor Contact
    Elizabeth Chwalk
    Sr. Director, Investor Relations
    investors@rapid7.com
    (617) 865-4277

    The MIL Network

  • MIL-OSI: Zero Hash expands stablecoin offerings with addition of Ripple USD (RLUSD)

    Source: GlobeNewswire (MIL-OSI)

    CHICAGO, Feb. 05, 2025 (GLOBE NEWSWIRE) — Zero Hash, the leading crypto and stablecoin infrastructure platform, today announced it has expanded its stablecoin support by integrating Ripple USD (RLUSD), a new regulated stablecoin issued by Ripple. This integration allows Zero Hash customers to access RLUSD on both the XRP Ledger and Ethereum networks.

    Zero Hash’s API and SDK infrastructure now supports over 65 digital assets, including 5 stablecoins, across multiple chains, reinforcing its position as the comprehensive solution for platforms seeking to design and build new ways to store, exchange and move value globally. RLUSD is now part of Zero Hash’s stablecoin engine, powering leading FinTechs and start ups across:

    • Payments
      • Remittances
      • Payins
      • Payouts
      • Account Funding
      • Tokenization payment rails
      • AI agent payments
    • Trading
      • Swaps
      • Onramp / offramp
      • Custody
      • Deposits and withdrawals
    • Treasury

    “The addition of RLUSD to our ecosystem demonstrates Zero Hash’s commitment to providing our customers with access to the most innovative and regulated stablecoin technologies,” said Edward Woodford, Founder and CEO at Zero Hash. “Zero Hash now offers RLUSD to all partners who can seamlessly embed through our API and SDK. Zero Hash offers the tech stack that powers use cases spanning payouts including Stripe, on-ramping including Shift4 and tokenization payment rails including Franklin Templeton.”

    RLUSD is designed to meet the growing demand for a reliable, compliant stablecoin in the digital asset space. Key features1 of RLUSD include: (i) One-to-one backing with US dollars held in reserve; (ii) issuance by a New York State-regulated trust company; (iii) Monthly reserve attestations by an independent certified public accountant; and, (iv) native issuance on both the XRP Ledger and Ethereum networks.

    1Ripple USD

    About Zero Hash

    Zero Hash is the leading crypto and stablecoin infrastructure provider that seamlessly connects fiat, crypto and stablecoins in one platform, enabling a better way to move and transfer value globally.

    Through its embeddable infrastructure, start-ups, enterprises and Fortune 500 companies build a diverse range of use cases: cross-border payments, commerce, trading, remittance, payroll, tokenization, wallets and on and off-ramps.

    Zero Hash Holdings is backed by investors, including Point72 Ventures, Bain Capital Ventures, and NYCA.

    Zero Hash LLC is a FinCen-registered Money Service Business and a regulated Money Transmitter that can operate in 51 US jurisdictions. Zero Hash LLC and Zero Hash Liquidity Services LLC are licensed to engage in virtual currency business activity by the New York State Department of Financial Services. In Canada, Zero Hash LLC is registered as a Money Service Business with FINTRAC.

    Zero Hash Australia Pty Ltd. is registered with AUSTRAC as a Digital Currency Exchange Provider, with DCE registered provider number DCE100804170-001. This registration enables Zero Hash to offer its crypto services in Australia. Zero Hash Australia Pty Ltd. is registered on the New Zealand register of financial service providers, with Financial Service Provider (FSP) number FSP1004503. A FSP in New Zealand is a registration and does not mean that Zero Hash Australia Pty Ltd. is licensed by a New Zealand regulator to provide crypto services. Zero Hash Australia Pty Ltd.’s registration on the New Zealand register of financial service providers does not mean that Zero Hash Australia is subject to active regulation or oversight by a New Zealand regulator. Zero Hash Europe B.V. is registered as a Virtual Asset Services Provider (VASP) registration by the Dutch Central Bank (Relation number: R193684). Zero Hash Europe Sp. Zoo is registered as a VASP by the Tax Administration Chamber of Poland in Katowice (Registration number RDWW – 1212).

    Connect with Zero Hash

    Website | Twitter | LinkedIn | Medium

    Zero Hash Contact
    Shaun O’keeffe
    (855) 744-7333
    media@zerohash.com

    Zero Hash Disclosures

    Zero Hash services and product offerings, including the availability of certain chains/networks for supported stabletoken and crypto assets, may not be available in all jurisdictions. Zero Hash accounts are not subject to FDIC or SIPC protections, or any such equivalent protections that may exist outside of the US. Zero Hash’s technical support and enablement of any asset is not an endorsement of such asset and is not a recommendation to buy, sell, or hold any crypto asset. The value of any cryptocurrency, including digital assets pegged to fiat currency, commodities, or any other asset, may go to zero. Zero Hash is not registered with the SEC or FINRA. Zero Hash does not provide any securities services and is not a custodian of securities, including security tokens, on behalf of customers.

    The MIL Network