Category: Finance

  • MIL-OSI Security: #StopRansomware: Ghost (Cring) Ransomware

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

    Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

    Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.

    Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.

    The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 16.1. See the MITRE ATT&CK Tactics and Techniques section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Initial Access

    The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [T1190]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), servers running Adobe ColdFusion (CVE-2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE-2021-34473CVE-2021-34523, and CVE-2021-31207— commonly referred to as the ProxyShell attack chain).

    Execution

    Ghost actors have been observed uploading a web shell [T1505.003] to a compromised server and leveraging Windows Command Prompt [T1059.003] and/or PowerShell [T1059.001] to download and execute Cobalt Strike Beacon malware [T1105] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.

    Persistence

    Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [T1136.001] and domain accounts [T1136.002] and change passwords for existing accounts [T1098]. In 2024, Ghost actors were observed deploying web shells [T1505.003] on victim web servers.

    Privilege Escalation

    Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [T1134.001].

    Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [T1068] such as “SharpZeroLogon,” “SharpGPPPass,” “BadPotato,” and “GodPotato.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials. 

    See Table 1 for a descriptive listing of tools.

    Credential Access

    Ghost actors use the built in Cobalt Strike function “hashdump” or Mimikatz [T1003] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.

    Defense Evasion

    Ghost actors used their access through Cobalt Strike to display a list of running processes [T1057] to determine which antivirus software [T1518.001] is running so that it can be disabled [T1562.001]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are: Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.

    Discovery

    Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [T1087.002], open-source tools such as “SharpShares” for network share discovery [T1135], and “Ladon 911” and “SharpNBTScan” for remote systems discovery [T1018]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.

    Lateral Movement

    Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [T1047] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with: powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA… [T1132.001][T1564.003].

    This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.

    In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.

    Exfiltration

    Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked. The FBI has observed limited downloading of data to Cobalt Strike Team Servers [T1041]. Victims and other trusted third parties have reported limited uses of Mega.nz [T1567.002] and installed web shells for similar limited data exfiltration. Note: The typical data exfiltration is less than hundreds of gigabytes of data.

    Command and Control

    Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [T1071.001]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example, http://xxx.xxx.xxx.xxx:80/Google.com where xxx.xxx.xxx.xxx represents the C2 server’s IP address.

    For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [T1573] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.

    Note: Table 2 contains a list of Ghost ransom email addresses.

    Impact and Encryption

    Ghost actors use Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [T1486]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.

    These ransomware payloads clear Windows Event Logs [T1070.001], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [T1490]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [T1486].

    The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.

    Indicators of Compromise (IOC)

    Table 1 lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.

    Note: Authors of these tools generally state that they should not be used in illegal activity.

    Table 1: Tools Leveraged by Ghost Actors
    Name Description Source
    Cobalt Strike Cobalt Strike is penetration testing software. Ghost actors  use an unauthorized version of Cobalt Strike. N/A
    IOX Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device. github[.]com/EddieIvan01/iox
    SharpShares.exe SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery. github[.]com/mitchmoser/SharpShares
    SharpZeroLogon.exe SharpZeroLogon.exe attempts to exploit CVE-2020-1472 and is run against a target Domain Controller. github[.]com/leitosama/SharpZeroLogon
    SharpGPPPass.exe SharpGPPPass.exe attempts to exploit CVE-2014-1812 and targets XML files created through Group Policy Preferences that may contain passwords. N/A
    SpnDump.exe SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration. N/A
    NBT.exe A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration. github[.]com/BronzeTicket/SharpNBTScan
    BadPotato.exe BadPotato.exe is an exploitation tool used for privilege escalation. github[.]com/BeichenDream/BadPotato
    God.exe God.exe is a compiled version of GodPotato and is used for privilege escalation. github[.]com/BeichenDream/GodPotato
    HFS (HTTP File Server) A portable web server program that Ghost actors use to host files for remote access and exfiltration. rejitto[.]com/hfs
    Ladon 911 A multifunctional scanning and exploitation tool, often used by Ghost actors with the MS17010 option to scan for SMB vulnerabilities associated with CVE-2017-0143 and CVE-2017-0144. github[.]com/k8gege/Ladon
    Web Shell A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access. Slight variation of github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx
    Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity
    File name MD5 File Hash
    Cring.exe c5d712f82d5d37bb284acd4468ab3533
    Ghost.exe

    34b3009590ec2d361f07cac320671410

    d9c019182d88290e5489cdf3b607f982

    ElysiumO.exe

    29e44e8994197bdb0c2be6fc5dfc15c2

    c9e35b5c1dc8856da25965b385a26ec4

    d1c5e7b8e937625891707f8b4b594314

    Locker.exe ef6a213f59f3fbee2894bd6734bbaed2
    iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3
    x86.log (IOX)

    c3b8f6d102393b4542e9f951c9435255

    0a5c4ad3ec240fbfd00bdc1d36bd54eb

    sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5
    main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9
    isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d
    sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090

    Ransom Email Addresses

    Table 3 is a subset of ransom email addresses that have been included in Ghost ransom notes.

    Table 3: Ransom Email Addresses
    Email Addresses
    asauribe@tutanota.com ghostbackup@skiff.com rainbowforever@tutanota.com
    cringghost@skiff.com ghosts1337@skiff.com retryit1998@mailfence.com
    crptbackup@skiff.com ghosts1337@tuta.io retryit1998@tutamail.com
    d3crypt@onionmail.org ghostsbackup@skiff.com rsacrpthelp@skiff.com
    d3svc@tuta.io hsharada@skiff.com rsahelp@protonmail.com
    eternalnightmare@tutanota.com just4money@tutanota.com sdghost@onionmail.org
    evilcorp@skiff.com kellyreiff@tutanota.com shadowghost@skiff.com
    fileunlock@onionmail.org kev1npt@tuta.io shadowghosts@tutanota.com
    fortihooks@protonmail.com lockhelp1998@skiff.com summerkiller@mailfence.com
    genesis1337@tutanota.com r.heisler@skiff.com summerkiller@tutanota.com
    ghost1998@tutamail.com rainbowforever@skiff.com webroothooks@tutanota.com

    Ransom Notes

    Starting approximately in August 2024, Ghost actors began using TOX IDs in ransom notes as an alternative method for communicating with victims. For example: EFE31926F41889DBF6588F27A2EC3A2D7DEF7D2E9E0A1DEFD39B976A49C11F0E19E03998DBDA and E83CD54EAAB0F31040D855E1ED993E2AC92652FF8E8742D3901580339D135C6EBCD71002885B.

    MITRE ATT&CK Tactics and Techniques

    See Table 4 to Table 13 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, version 16.1, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 4: Initial Access
    Technique Title  ID Use
    Exploit Public-Facing Application T1190 Ghost actors exploit multiple vulnerabilities in public-facing systems to gain initial access to servers.
    Table 5: Execution
    Technique Title  ID Use
    Windows Management Instrumentation T1047 Ghost actors abuse WMI to run PowerShell scripts on other devices, resulting in their infection with Cobalt Strike Beacon malware.
    PowerShell T1059.001 Ghost actors use PowerShell for various functions including to deploy Cobalt Strike.
    Windows Command Shell T1059.003 Ghost actors use the Windows Command Shell to download malicious content on to victim servers.
    Table 6: Persistence
    Technique Title  ID Use
    Account Manipulation T1098 Ghost actors change passwords for already established accounts.
    Local Account T1136.001 Ghost actors create new accounts or makes modifications to local accounts.
    Domain Account T1136.002 Ghost actors create new accounts or makes modifications to domain accounts.
    Web Shell T1505.003 Ghost actors upload web shells to victim servers to gain access and for persistence.
    Table 7: Privilege Escalation
    Technique Title  ID Use
    Exploitation for Privilege Escalation T1068 Ghost actors use a suite of open source tools in an attempt to gain elevated privileges through exploitation of vulnerabilities.
    Token Impersonation/Theft T1134.001 Ghost actors use Cobalt Strike to steal process tokens of processes running at a higher privilege.
    Table 8: Defense Evasion
    Technique Title  ID Use
    Application Layer Protocol: Web Protocols T1071.001 Ghost actors use HTTP and HTTPS protocols while conducting C2 operations. 
    Impair Defenses: Disable or Modify Tools T1562.001 Ghost actors disable antivirus products.
    Hidden Window T1564.003 Ghost actors use PowerShell to conceal malicious content within legitimate appearing command windows.
    Table 9: Credential Access
    Technique Title  ID Use
    OS Credential Dumping T1003 Ghost actors use Mimikatz and the Cobalt Strike “hashdump” command to collect passwords and password hashes.
    Table 10: Discovery
    Technique Title  ID Use
    Remote System Discovery T1018 Ghost actors use tools like Ladon 911 and ShapNBTScan for remote systems discovery.
    Process Discovery T1057 Ghost actors run a ps command to list running processes on an infected device.
    Domain Account Discovery T1087.002 Ghost actors run commands such as net group “Domain Admins” /domain to discover a list of domain administrator accounts.
    Network Share Discovery T1135 Ghost actors use various tools for network share discovery for the purpose of host enumeration.
    Software Discovery T1518 Ghost actors use their access to determine which antivirus software is running.
    Security Software Discovery T1518.001 Ghost actors run Cobalt Strike to enumerate running antivirus software.
    Table 11: Exfiltration
    Technique Title  ID Use
    Exfiltration Over C2 Channel T1041 Ghost actors use both web shells and Cobalt Strike to exfiltrate limited data.
    Exfiltration to Cloud Storage T1567.002 Ghost actors sometimes use legitimate cloud storage providers such as Mega.nz for malicious exfiltration operations.
    Table 12: Command and Control
    Technique Title  ID Use
    Web Protocols T1071.001 Ghost actors use Cobalt Strike Beacon malware and Cobalt Strike Team Servers which communicate over HTTP and HTTPS.
    Ingress Tool Transfer T1105 Ghost actors use Cobalt Strike Beacon malware to deliver ransomware payloads to victim servers.
    Standard Encoding T1132.001 Ghost actors use PowerShell commands to encode network traffic which reduces their likelihood of being detected during lateral movement.
    Encrypted Channel T1573 Ghost actors use encrypted email platforms to facilitate communications. 
    Table 13: Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486 Ghost actors use ransomware variants Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe to encrypt victim files for ransom.
    Inhibit System Recovery T1490 Ghost actors delete volume shadow copies.

    Mitigations

    The FBI, CISA, and MS-ISAC recommend organizations reference their #StopRansomware Guide and implement the mitigations below to improve cybersecurity posture on the basis of the Ghost ransomware activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    • Maintain regular system backups that are known-good and stored offline or are segmented from source systems [CPG 2.R]. Ghost ransomware victims whose backups were unaffected by the ransomware attack were often able to restore operations without needing to contact Ghost actors or pay a ransom.
    • Patch known vulnerabilities by applying timely security updates to operating systems, software, and firmware within a risk-informed timeframe [CPG 1.E].
    • Segment networks to restrict lateral movement from initial infected devices and other devices in the same organization [CPG 2.F].
    • Require Phishing-Resistant MFA for access to all privileged accounts and email services accounts.
    • Train users to recognize phishing attempts.
    • Monitor for unauthorized use of PowerShell. Ghost actors leverage PowerShell for malicious purposes, although it is often a helpful tool that is used by administrators and defenders to manage system resources. For more information, visit NSA and CISA’s joint guidance on PowerShell best practices.
      • Implement the principle of least privilege when granting permissions so that employees who require access to PowerShell are aligned with organizational business requirements.
    • Implement allowlisting for applications, scripts, and network traffic to prevent unauthorized execution and access [CPG 3.A].
    • Identify, alert on, and investigate abnormal network activity. Ransomware activity generates unusual network traffic across all phases of the attack chain. This includes running scans to discover other network connected devices, running commands to list, add, or alter administrator accounts, using PowerShell to download and execute remote programs, and running scripts not usually seen on a network. Organizations that can successfully identify and investigate this activity are better able to interrupt malicious activity before ransomware is executed [CPG 3.A].
      • Ghost actors run a significant number of commands, scripts, and programs that IT administrators would have no legitimate reason for running. Victims who have identified and responded to this unusual behavior have successfully prevented Ghost ransomware attacks.
    • Limit exposure of services by disabling unused ports such as, RDP 3398, FTP 21, and SMB 445, and restricting access to essential services through securely configured VPNs or firewalls.
    • Enhance email security by implementing advanced filtering, blocking malicious attachments, and enabling DMARC, DKIM, and SPF to prevent spoofing [CPG 2.M].

    Validate Security Controls

    In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 3 to Table 13).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    Reporting

    Your organization has no obligation to respond or provide information back to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.

    The FBI is interested in any information that can be shared, to include logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, and/or decryptor files.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, date of infection, date detected, initial attack vector, and host and network-based indicators.

    The FBI, CISA, and MS-ISAC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and the MS-ISAC.

    Version History

    February 19, 2025: Initial version.

    MIL Security OSI

  • MIL-OSI: Highclere Capital Launches a New and Transformational Mortgage Company

    Source: GlobeNewswire (MIL-OSI)

    Where Deals Get Done

    TORONTO, Feb. 19, 2025 (GLOBE NEWSWIRE) —

    Highclere Capital Corporation, a new residential mortgage lender who intends to transform the Canadian mortgage industry, today announced its impending launch. The company will offer dynamic mortgage products to Mortgage Brokers across Canada funded by Global Capital Markets Solutions and underpinned by a Loan Origination System powered by AI technology.

    Highclere Capital is actively reaching out to Canadian Mortgage Brokers interested in partnering with an experienced team of lending professionals. Highclere Capital Corporation. plans to provide a range of diversified mortgage solutions—from competitive Prime mortgage products to flexible Alternative options—delivered through a network of reputable Mortgage Brokers and agents committed to empowering Canadian homeowners throughout their journey.

    The company was founded by Leon Dadoun and Paul Grewal, both of which are seasoned and experienced entrepreneurs. The company is led by Leon Dadoun (CEO), a banking professional with 40 years of expertise in Global Debt Capital Markets, International Securitization, and Regulatory Public Policy Formation. Paul Grewal (President) is a well-respected Financial Services Executive in the Canadian Mortgage industry with a proven track record of growing a Mortgage Finance Company and Bank Mortgage Portfolios.

    They have assembled an enthusiastic, experienced team dedicated to supporting Highclere Capital at all levels. In forming this new company, the priority has been on Capital Markets solutions, mortgage technology, product innovation and customer service to ensure that, even in its early stages, Highclere Capital provides reliable, forward-thinking choices to its Canadian partners.

    In a statement, Leon Dadoun, C.E.O., said that “Highclere intends to power its growth, by offering a wide range of residential mortgage products to brokers by innovating in how those mortgages are funded. AI and machine learning technologies will also be at the center of what we do to make sure service levels and adjudication are at the top of the industry. This new system is designed to advance qualified applications more quickly by removing common roadblocks and delays, significantly streamlining the process of securing funding. We will offer flexible solutions tailored to fit unique situations, helping more Canadians achieve their homeownership dreams.”

    Highclere will begin accepting client applications at the end of April 2025

    About Highclere Capital Corporation

    Highclere Capital Corporation is a newly formed Canadian Mortgage Finance Company that specializes in leveraging technology to improve the mortgage process and using internationally sourced capital markets funding to expand mortgage product solutions at competitive rates. In doing so, Highclere intends to empower their partners and clients with innovative approaches that foster long-term success.

    For additional information about Highclere, please visit https://www.highclere.ca.

    Empowering Your Journey

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/f65e1c51-02c4-4cf1-a8af-5137759d49fd

    https://www.globenewswire.com/NewsRoom/AttachmentNg/1489550c-beb5-430e-870b-18d619be0e8f

    The MIL Network

  • MIL-OSI Security: Anchorage Man Sentenced to Over 11 Years for Attempting to Coerce a Minor

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    ANCHORAGE, Alaska – An Anchorage man was sentenced today to over 11 years in prison and will serve the rest of his life on supervised release for attempting to coerce and entice a minor in 2023.

    According to court documents, in early July 2023, Benjamin Roundy, aka “Aleks” or “Alekzander Marko,” 43, responded to a public group chat post on an internet-based app by an individual who identified herself as a 13-year-old living in Anchorage. The group chat post was actually made by an undercover agent.

    Court documents explain that Roundy communicated with the undercover agent for nearly a month, first on the app and then via text message, and he initiated sexual conversations. Roundy discussed sexual acts he wanted to perform on the individual, who be believed to be a child, and made repeated requests for explicit photos of her.

    On Aug. 4, 2023, Roundy asked the undercover agent to meet in person at the parking lot of a grocery store in Anchorage. The undercover agent told Roundy she was going to walk home from a friend’s house, and Roundy asked what street the friend lived on. Shortly after learning the fictional address of the friend, the defendant left his home to meet the undercover agent, who he thought was a minor.

    Court documents further explain that Roundy texted the undercover agent instructions on where to meet him. When he received no response to his instructions, Roundy drove to a parking lot where he could see the street of the fictitious friend. Law enforcement arrested Roundy in the parking lot shortly thereafter and discovered a new bottle of personal lubricant and condoms in his vehicle.

    The investigation revealed thousands of images and videos depicting child sexual abuse on Roundy’s electronic devices and data detailing his online presence, which included searches for child sexual abuse materials (CSAM) and related terms.

    On April 25, 2024, Roundy pleaded guilty to one count of attempted coercion and enticement of a minor.

    “Mr. Roundy’s conduct was heinous, as he tried to meet with who he believed was an underage girl in Anchorage to engage in sex, sought explicit images of the child, and obtained graphic images and videos depicting the sexual abuse of other minors for years,” said First Assistant U.S Attorney Kathryn R. Vogel for the District of Alaska. “Our office’s commitment to safeguarding Alaska’s children from those who seek to exploit their innocence is unwavering. We will relentlessly pursue justice by working with law enforcement to identify, investigate and hold accountable anyone who targets children.”

    “The defendant posed a significant threat to children in Alaska and abroad, as demonstrated by his disturbing pattern of conduct involving child exploitation,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “Even in the darkest corners of the Internet, the FBI’s Child Exploitation and Human Trafficking Task Force will find a way to seek justice for our most vulnerable.”

    The FBI and Anchorage Police Department investigated this case as part of the FBI’s Child Exploitation and Human Trafficking Task Force.

    Assistant U.S. Attorney Adam Alexander of the District of Alaska and Trial Attorney Rachel L. Rothberg of the Criminal Division’s Child Exploitation and Obscenity Section (CEOS) prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    ###

    MIL Security OSI

  • MIL-OSI Security: Twenty Years Later, FBI Continues to Pursue Information on the Disappearance of Danielle Imbo and Richard Petrone, Jr.

    Source: Federal Bureau of Investigation FBI Crime News (b)

    The FBI continues to seek the public’s assistance as we investigate the disappearance of Danielle (Ottobre) Imbo and Richard Petrone, Jr., 20 years ago today.

    Imbo and Petrone were last seen in the late evening hours of Saturday, February 19, 2005, leaving a bar on Philadelphia’s South Street for Petrone’s black 2001 Dodge Dakota pickup truck with the license plate YFH 2319.

    An extensive investigation to date has generated some promising leads; however, neither they nor the vehicle have ever been located.

    Danielle was last seen wearing a dark colored jacket, cream colored sweater, and blue jeans and carrying a two-handle black purse at the time of her disappearance. She has worked as a loan mortgage processor.

    Richard was last seen wearing a gray Polo brand sweatshirt and blue jeans. He has a tattoo of the word “Angela” on his left arm and a tattoo of clowns on his right arm.

    “Today marks a somber 20 years since this tragic disappearance and their case exemplifies that the passage of time does not diminish our pursuit of justice,” said Wayne A. Jacobs, Special Agent in Charge of FBI Philadelphia. “Our office remains unwavering in seeking justice for Danielle and Richard, their loved ones, and our city.”

    The FBI is offering a reward of up to $15,000 for information leading to the arrest and conviction of anyone involved in the disappearance of Richard Petrone and Danielle Imbo.

    If you have any information concerning this person, please contact your local FBI office or the nearest American Embassy or Consulate.

    FBI Philadelphia can be reached at (215) 418-4000.

    MIL Security OSI

  • MIL-OSI Global: Ne Zha 2: the record-breaking Chinese animated film showcases China’s ambition on the global stage

    Source: The Conversation – UK – By Ming Gao, Research Scholar of East Asia Studies in History Division, Lund University

    Ne Zha is a legendary child warrior from Chinese mythology, often depicted as a rebellious deity who defies fate to carve out his own destiny. Born as a demon, feared for his supernatural powers and doomed to live only three years, he struggles to overcome his destiny and forge his own path.

    A new Chinese film about the warrior has broken several box office records, including becoming the highest-grossing animated film of all time (beating Pixar’s Inside Out 2).

    Ne Zha 2 is a Chinese animated fantasy adventure film. That it is breaking so many records might seem surprising. It’s a sequel to a film that didn’t do as well, it’s not American and it’s not in English. But its record-breaking run seems to show no signs of slowing down. After debuting during the Chinese Lunar New Year, its success has seen it premiere abroad in regions such as wider Asia, North America and Australia.

    For years, Hollywood has dominated China’s box offices, but the release of Ne Zha 2 marks a significant milestone in China’s cinematic and cultural expansion. Its unprecedented box office performance seems to signal a shifting dynamic in the global film industry.


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    It showcases China’s ambition and ability to produce world-class content that competes with western animation giants, like Disney and Pixar. It also plays a role in enhancing cultural confidence and soft power projection, which President Xi Jinping has emphasised for years.

    Capturing a feeling

    The story of Ne Zha, and its many adaptations, have long captivated Chinese people of all ages – including me. I fondly recall watching the 1979 version on a black-and-white TV with my family when I was little. The story originates from the Ming dynasty (1368 to 1644) novel Fengshen Yanyi (Investiture of the Gods) and over the centuries, it has been reinterpreted in various cultural forms of religion and literature.

    The original plotline of Ne Zha revolves around his rebellion against feudal patriarchal authority. This struggle is set against a backdrop of familial conflicts and even attempted patricide. In contrast, today’s reinterpretation recasts this mythological unruly child as a dutiful deity who fights for his clan’s interests by forging alliances, confronting rival factions and challenging the existing order.

    Ne Zha 2 trailer.

    As a commercial film, it has astutely tapped into the emotional needs of contemporary Chinese audiences in a society facing various challenges, such as economic downturn and rising unemployment. Themes of familial love and supportive parenting have struck a deep chord with Chinese audiences, offering both cultural and sentimental reassurance in uncertain times.

    Another clear resonance with domestic audiences lies in the themes of Chinese technological success and cultural excellence. This has cultivated a strong sense of cultural identity and national pride among Chinese people.

    In China, no words currently seem to better capture the feelings after watching the movie than “pride” and a sense of patriotism – both for the film’s visually striking animation techniques and for its depiction of China’s rich cultural traditions. However, the film needs to be understood within the broader contexts of China’s domestic landscape and its evolving position on the global stage.

    ‘Cultural confidence’

    Beyond entertainment, Ne Zha 2’s success fits within President Xi Jinping’s ideas on “cultural confidence,” which can be succinctly defined as a nation’s firm belief in the strength and vitality of its own culture. Since the film’s record-breaking performance, state media and various state-owned outlets have been actively echoing this narrative.

    People’s Daily, the official newspaper of the Communist Party of China, equates Ne Zha to China’s cultural confidence as a means to expand soft power and navigate uncharted territory. This emphasis on cultural confidence, however, is not merely state-driven.

    Ne Zha.
    Enlight Pictures

    The film’s director, Jiao Zi, has expressed his confidence in China’s traditional culture, stating: “China’s stories don’t need to deliberately cater to the west.” Instead, he believes that traditional Chinese culture is a vast treasure trove of inspiration, which is interesting to all.

    Indeed, Ne Zha is not an isolated success in drawing inspiration from traditional Chinese culture. Last year’s Black Myth: Wukong, a record-breaking gaming blockbuster, gained global attention at the 2024 Game Awards (the Oscars of the video games industry). Like Ne Zha, it’s based on another legendary 16th-century Chinese novel Xiyouji (Journey to the West). China’s official news agency, Xinhua, characterised the enduring popularity of these ancient tales as “part of a broader cultural renaissance”.

    Ne Zha’s success is emerging as a key example of China’s growing cultural identity, aligning with the cultural confidence discourse. A foreign ministry spokesperson has described Ne Zha as “a new bridge for exchanges” and “a fresh window for the world to see China”.

    Whether Ne Zha 2 achieves lasting international success remains to be seen. But one thing is clear – Chinese animation is no longer just for domestic audiences. The film’s popularity reflects China’s broader ambitions to expand its soft power alongside its growing economic and strategic influence.

    Ming Gao receives funding from the Swedish Research Council. This research was produced with support from the Swedish Research Council grant “Moved Apart” (nr. 2022-01864). Ming Gao is a member of Lund University Profile Area: Human Rights.

    ref. Ne Zha 2: the record-breaking Chinese animated film showcases China’s ambition on the global stage – https://theconversation.com/ne-zha-2-the-record-breaking-chinese-animated-film-showcases-chinas-ambition-on-the-global-stage-249899

    MIL OSI – Global Reports

  • MIL-OSI USA: Subsidiary of Chinese State-Owned Entity to Pay $14.2M to Resolve False Claims Act Allegations Relating to Paycheck Protection Program Loan

    Source: US State of North Dakota

    YAPP USA Automotive Systems Inc., a corporation with its principal place of business in Michigan, has agreed to pay $14,208,496 to resolve allegations that it violated the False Claims Act by submitting false claims to obtain a Paycheck Protection Program (PPP) loan for which it was not eligible.

    Congress created the PPP in March 2020 to provide emergency financial assistance to Americans suffering from the economic effects of the COVID-19 pandemic. Under the PPP, eligible businesses could receive forgivable loans guaranteed by the Small Business Administration (SBA). Regulations provide various eligibility requirements for the PPP, including limitations on the number of employees and exclusions for certain types of businesses, like those that are owned by government entities. In their loan applications, borrowers were required to certify that they were eligible for the PPP and that the information they provided was accurate.

    YAPP USA’s ultimate parent company is State Development and Investment Corp. Ltd, a company owned and controlled by the People’s Republic of China. Through common ownership and management, YAPP USA is affiliated with dozens of other companies worldwide. In applying for a first-draw PPP loan, YAPP USA represented that it was eligible for the PPP, and it received a first-draw PPP loan in the amount of $9,598,462, which the SBA later forgave. The United States alleged that YAPP USA was not eligible under the SBA rules for a PPP loan because YAPP USA, singly and together with its affiliates, employed more individuals than permitted by SBA’s size standard for its industry. The United States also contended that YAPP USA was not eligible because it is owned by a government entity. YAPP USA will pay $14,208,496 to the United States to resolve these allegations.

    YAPP USA cooperated with the United States’ investigation by identifying individuals involved in or responsible for the conduct and disclosing facts and documents gathered during YAPP USA’s own investigation. As a result, YAPP USA received credit under the department’s guidelines for taking disclosure, cooperation and remediation into account in False Claims Act cases.

    “PPP loans were intended to help small businesses in the United States,” said Deputy Assistant Attorney General Michael D. Granston of the Justice Department’s Civil Division. “The Department remains committed to pursuing those who violated the requirements of this taxpayer funded program.”

    “Congress and the SBA designed the PPP to help small businesses and their employees during the pandemic, not large companies owned by foreign governments,” said Acting U.S. Attorney Richard G. Frohling for the Eastern District of Wisconsin. “This settlement demonstrates that our office will continue to hold accountable those businesses and individuals who abused this vital program.”

    “The favorable settlement in this case is the product of enhanced efforts by federal agencies such as the SBA working with the Department of Justice, SBA’s Office of Inspector General, and other Federal law enforcement agencies, as well as private individuals who uncover fraudulent conduct to recover the product of this fraud as well as penalties,” said SBA General Counsel Wendell Davis.

    The civil settlement includes the resolution of claims brought under the qui tam or whistleblower provisions of the False Claims Act, which permit private parties to file an action on behalf of the United States and receive a portion of any recovery. The qui tam lawsuit was filed by GNGH2 Inc; GNGH2 Inc. will receive $1,420,849 in connection with this settlement.

    The resolution obtained in this matter was the result of a coordinated effort between the Justice Department’s Civil Division, Commercial Litigation Branch, Fraud Section, and the U.S. Attorney’s Office for the Eastern District of Wisconsin, with assistance from the SBA’s Office of General Counsel and Office of the Inspector General.

    Trial Attorney Lindsey Roberts of the Justice Department’s Civil Division and Assistant U.S. Attorney Michael Carter for the Eastern District of Wisconsin handled the matter, with assistance from Christopher J. McClintock of the SBA.

    The claims resolved by the settlement are allegations only. There has been no determination of liability.

    MIL OSI USA News

  • MIL-OSI Security: Fifty-Two-Month Prison Sentence for a D.C. Convicted Felon Who Traveled to the Jersey Shore to Rob an Overnight Pharmacy

    Source: Federal Bureau of Investigation (FBI) State Crime News

               WASHINGTON – Ashawntea Henderson, 32, of Washington, D.C., was sentenced today in U.S. District Court in Washington D.C. to 52 months in federal prison for participating in an early morning robbery of a drug store at the Jersey Shore. During the May 2020 robbery, he and his co-conspirators jumped the counter, overpowered the night pharmacist, stole thousands of prescription narcotics, and then – as they attempted to flee to the District – crashed into a responding police cruiser.

               The sentencing was announced U.S. Attorney Edward R. Martin, FBI Special Agent in Charge Sean Ryan of the Washington Field Office Criminal and Cyber Division, and FBI Special Agent in Charge Terence Reilly of the Newark Field Office.

                Henderson pleaded guilty on October 30, 2024, to interference of commerce by robbery (Hobbs Act robbery). In addition to the 52-month prison sentence, Judge Amy Berman Jackson ordered Henderson to serve three years of supervised release.

    According to court documents, Henderson and his co-conspirators researched potential targets including Walgreens and CVS pharmacies which were open all night. On May 9, 2020, Henderson and others drove more than 200 miles from Washington, D.C. to a Walgreens Pharmacy on State Road 33, in Neptune, New Jersey.

    At 3:09 a.m., Henderson and two others dressed in masks and gloves entered the Walgreens. All three jumped over the pharmacy counter and demanded codeine, Adderall, and Percocet. One of the co-conspirators grabbed the night pharmacist, demanded that he open the locked cabinets containing additional pills, and forced the pharmacist to assist them. After grabbing thousands of prescription medicines – including Oxycodone, morphine, amphetamine, and Nucynta – Henderson and the two co-conspirators fled in a black Nissan Altima operated by a fourth co-conspirator. At one point, the Nissan collided with a responding police officer’s patrol car but continued at high speed back to Washington D.C.

    After returning to the District, as they celebrated at a hotel, one of the co-conspirators received a text from a known drug distributor asking the price for a drug of the same type stolen from Neptune, New Jersey. The co-conspirator and the drug distributor continued to exchange texts about the sale of drugs for the following weeks.

               Henderson is currently serving a five-year prison sentence in Maryland in connection with his 2022 possession of a firearm. 

               The case was investigated by the FBI Washington Field Office’s Violent Crimes Task Force and the Neptune Township Police Department. The matter is being prosecuted by AUSAs Justin Song, Sarah Martin and Cameron Tepfer.

    23cr190

    MIL Security OSI

  • MIL-OSI Security: Subsidiary of Chinese State-Owned Entity to Pay $14.2M to Resolve False Claims Act Allegations Relating to Paycheck Protection Program Loan

    Source: United States Attorneys General

    YAPP USA Automotive Systems Inc., a corporation with its principal place of business in Michigan, has agreed to pay $14,208,496 to resolve allegations that it violated the False Claims Act by submitting false claims to obtain a Paycheck Protection Program (PPP) loan for which it was not eligible.

    Congress created the PPP in March 2020 to provide emergency financial assistance to Americans suffering from the economic effects of the COVID-19 pandemic. Under the PPP, eligible businesses could receive forgivable loans guaranteed by the Small Business Administration (SBA). Regulations provide various eligibility requirements for the PPP, including limitations on the number of employees and exclusions for certain types of businesses, like those that are owned by government entities. In their loan applications, borrowers were required to certify that they were eligible for the PPP and that the information they provided was accurate.

    YAPP USA’s ultimate parent company is State Development and Investment Corp. Ltd, a company owned and controlled by the People’s Republic of China. Through common ownership and management, YAPP USA is affiliated with dozens of other companies worldwide. In applying for a first-draw PPP loan, YAPP USA represented that it was eligible for the PPP, and it received a first-draw PPP loan in the amount of $9,598,462, which the SBA later forgave. The United States alleged that YAPP USA was not eligible under the SBA rules for a PPP loan because YAPP USA, singly and together with its affiliates, employed more individuals than permitted by SBA’s size standard for its industry. The United States also contended that YAPP USA was not eligible because it is owned by a government entity. YAPP USA will pay $14,208,496 to the United States to resolve these allegations.

    YAPP USA cooperated with the United States’ investigation by identifying individuals involved in or responsible for the conduct and disclosing facts and documents gathered during YAPP USA’s own investigation. As a result, YAPP USA received credit under the department’s guidelines for taking disclosure, cooperation and remediation into account in False Claims Act cases.

    “PPP loans were intended to help small businesses in the United States,” said Deputy Assistant Attorney General Michael D. Granston of the Justice Department’s Civil Division. “The Department remains committed to pursuing those who violated the requirements of this taxpayer funded program.”

    “Congress and the SBA designed the PPP to help small businesses and their employees during the pandemic, not large companies owned by foreign governments,” said Acting U.S. Attorney Richard G. Frohling for the Eastern District of Wisconsin. “This settlement demonstrates that our office will continue to hold accountable those businesses and individuals who abused this vital program.”

    “The favorable settlement in this case is the product of enhanced efforts by federal agencies such as the SBA working with the Department of Justice, SBA’s Office of Inspector General, and other Federal law enforcement agencies, as well as private individuals who uncover fraudulent conduct to recover the product of this fraud as well as penalties,” said SBA General Counsel Wendell Davis.

    The civil settlement includes the resolution of claims brought under the qui tam or whistleblower provisions of the False Claims Act, which permit private parties to file an action on behalf of the United States and receive a portion of any recovery. The qui tam lawsuit was filed by GNGH2 Inc; GNGH2 Inc. will receive $1,420,849 in connection with this settlement.

    The resolution obtained in this matter was the result of a coordinated effort between the Justice Department’s Civil Division, Commercial Litigation Branch, Fraud Section, and the U.S. Attorney’s Office for the Eastern District of Wisconsin, with assistance from the SBA’s Office of General Counsel and Office of the Inspector General.

    Trial Attorney Lindsey Roberts of the Justice Department’s Civil Division and Assistant U.S. Attorney Michael Carter for the Eastern District of Wisconsin handled the matter, with assistance from Christopher J. McClintock of the SBA.

    The claims resolved by the settlement are allegations only. There has been no determination of liability.

    MIL Security OSI

  • MIL-OSI United Nations: Amid Rising Living Costs, Climate Change, Secretary-General Tells Second Food Systems Summit Stocktake ‘All Hands on Deck’ Needed to Create Healthy, Resilient Structure

    Source: United Nations 4

    Following are UN Deputy Secretary-General Amina Mohammed’s opening remarks, as delivered, at the Member States’ briefing on the second Food Systems Summit Stocktake, in New York today:

    It is a real pleasure to join our permanent representatives and welcome you all today.

    As you all know transforming our food systems is essential to driving progress across the Sustainable Development Goals (SDGs) and delivering for everyone, everywhere — sufficient, nutritious food — now and in the future, particularly as we go towards the five years to deliver on the 2030 Agenda for Sustainable Development.

    That is why, in 2021, the UN Secretary-General convened the UN Food Systems Summit.  This established the foundation for a new, integrated approach to food systems — placing food at the heart of our efforts to address poverty, zero hunger, inequality, climate change and biodiversity loss.  It has reshaped the global narrative, building an engine of transformation that recognizes food systems as a key lever to accelerate and reinforce SDG progress.

    Building on this momentum, the first Summit Stocktake, hosted by the Government of Italy in 2023, reaffirmed strong political will among nations.  Countries pledged to increase the pace of their efforts towards sustainable, inclusive and resilient food systems transformation.

    But, it also highlighted persistent gaps and challenges.  Among them, an urgent need to enhance public-private-community partnerships, and strengthen private sector engagement.

    These crucial issues identified at the first stocktake, resulted in the UN Secretary-General’s Call to Action.  The Call identified six critical areas for concerted action, including: securing concessional finance, investments, budget support and debt restructuring.  It also emphasized addressing food security in crisis situations.

    The proposed SDG Stimulus — of $500 billion a year — was recognized as a game-changer, offering fiscal space and resources, including through Special Drawing Rights rechannelling.  Finance was emphasized as a critical component of food systems transformation, along with support of our multilateral development banks in unlocking investments in this field.

    Given the global context riddled with challenges of rising living costs, social inequalities, climate change and geopolitical tensions, we will need all hands on deck to reach food systems transformations with the impact to advance on the 2030 Agenda.

    Now, in just over five months, Addis Ababa will host the second United Nations Food Systems Summit Stocktake.

    We are grateful to the Government of Ethiopia for hosting this important event and for making our commitment to take the second stocktake to a developing country, a reality.  Worth noting also is its leadership and extensive work on its policy environment, infrastructure development and the production of food that engages small holder farmers across the country.  We are grateful to Italy, which has agreed to co-host, for its legacy and continued leadership and support to food systems transformation.  It is important that we see leadership and sustainability of that support at the country level.

    The Stocktake will be different — it has to be — in response to many of the requests for us to have more focus and impact.

    First, we will be reflecting on progress since 2023, with a report from the system, but also a shadow report from our stakeholders.  Second, we will be partnering to track commitments and outcomes through national food systems pathways to accelerate SDG implementation.  And third, unlocking investments to sustain and scale transformative initiatives aligned with the SDGs.

    In preparations for the Stocktake, we are committed to an inclusive, cross-sectoral efforts and consultations.  We will hold a second briefing in Nairobi next week engaging UN headquarters in Nairobi, Rome and Geneva.  In addition, we will hold five regional briefings, on the margins of the United Nations Regional Forums on Sustainable Development, from March to May.

    We will also be engaging all our resident coordinators in UN country teams, at the country level so that they are fully engaged with our Member States in bringing to Addis Ababa the progress, and of course, the challenges and opportunities.

    At the same time, we will push progress towards food systems transformation, including through important gatherings this year — the fourth Financing for Development Conference in Spain, thirtieth Conference of the Parties to the United Nations Framework Convention on Climate Change (COP30) in Brazil, the second World Summit on Social Development in Qatar and the third United Nations Ocean Conference in France.

    These are all critical platforms to drive progress, harness collective action and create new investment opportunities.

    As Member States, you are at the forefront of this transformation.  Your leadership and coordination will be instrumental in ensuring that the Stocktake inspires real action at the national level.  The United Nations is with you — committed to creating sustainable, inclusive, healthy and resilient food systems everywhere, across all our regions, reaching everyone.

    We thank you for this important opportunity that will help us to shape the Stocktake in Addis Ababa in July.

    MIL OSI United Nations News

  • MIL-OSI Security: Convicted Drug Trafficker Found Guilty Of Distributing Fentanyl That Resulted In The Deaths Of Two Hillsborough County Men

    Source: Office of United States Attorneys

    Tampa, Florida – Acting United States Attorney Sara C. Sweeney announces that a federal jury has found Marquis Lamar McCullough (39, Tampa) guilty of two counts of distribution of fentanyl and one count of possession with intent to distribute fentanyl. For both counts of distribution of fentanyl, the jury also found that the death of a person resulted from the use of the fentanyl that McCullough had distributed. McCullough, who was previously convicted of trafficking in cocaine, faces mandatory sentences of life imprisonment. 

    According to testimony and evidence presented at trial, on April 22, 2021, deputies from the Hillsborough County Sheriff’s Office (HCSO) responded to the residence of K.K. to conduct a wellness check. They found K.K. dead when they entered his apartment, standing with his feet on the floor and his head and torso on top of the bathroom counter. Deputies found two baggies with small quantities of a substance, suspected to be heroin or fentanyl, in K.K.’s residence. Detectives reviewed K.K.’s cellphone and found communications with a woman who appeared to help K.K. purchase fentanyl the previous evening. The woman—who was a heroin user and not a dealer—was arrested on an unrelated charge and interviewed by detectives. She told them that K.K. could not get heroin from his usual source, so he asked her to buy heroin for him from her source, and she agreed to do it if she got to keep a bag for herself. The woman arranged a meeting with her supplier, “Slim,” and K.K. took her to meet Slim. With money provided by K.K., the woman bought several bags from Slim, provided most of them to K.K., and kept a couple of bags for herself.

    On April 28, 2021, HCSO detectives conducted a controlled purchase during which detectives observed “Slim” deliver fentanyl and identified him as Marquis Lamar McCullough.

    On May 6, 2021, the son of N.M. found his father dead, lying in his bed, and called 911 to report the death. HCSO deputies and detectives responded to the residence, and inside N.M.’s wallet they found a baggie with a small amount of a substance suspected to be heroin or fentanyl. While reviewing calls and texts on N.M.’s phone, a detective who had participated in the surveillance operation eight days earlier recognized that the last three calls placed by N.M. were to McCullough’s phone number, and the call and text history indicated that McCullough was N.M.’s supplier. Later that day, HCSO detectives planned for another purchase of heroin or fentanyl from McCullough, using N.M.’s cellphone to set up the meeting. When McCullough arrived at the meeting location, he tried to call N.M., but when his calls went unanswered, McCullough fled the area. An arrest team pursued his vehicle and took McCullough into custody.

    The Drug Enforcement Administration laboratory determined that the substances found at the residences of K.K. and N.M., and the substances purchased from McCullough on April 28, 2021, all contained fentanyl. The Hillsborough County Medical Examiner’s Office investigated both deaths and determined that the use of fentanyl caused the deaths of K.K. and N.M. 

    This case was investigated by the Federal Bureau of Investigation, the Drug Enforcement Administration, the Hillsborough County Sheriff’s Office, and the Hillsborough County Medical Examiner’s Office. It is being prosecuted by Assistant United States Attorneys Michael Sinacore and Ross Roberts.

    This case was part of an Organized Crime Drug Enforcement Task Force (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at www.justice.gov/OCDETF.

    MIL Security OSI

  • MIL-OSI Security: Providence Man Admits to Role in Bank Fraud Conspiracy

    Source: Office of United States Attorneys

    PROVIDENCE – A Providence man has admitted to a federal judge that he participated in a conspiracy to defraud banks by creating and depositing  tens-of-thousands of dollars’ worth of bogus checks, announced Acting United States Attorney Sara Miron Bloom.

    Jarrod Smith, 43, pleaded guilty on Tuesday to a charge of conspiracy to commit bank fraud.

    Smith admitted to the court that he engaged in a fraud scheme that used information from stolen checks, primarily business checks, to create bogus checks that were then deposited into bank accounts of individuals that he or other members of the conspiracy recruited and enticed, often times via social media. Shortly after the checks were deposited, Smith or another member of the conspiracy withdrew the proceeds from the bank accounts. As part of the conspiracy, the person’s whose bank account was used was also paid  for the use of their bank account.

    Smith is scheduled to be sentenced on August 19, 2025. The defendant’s sentence will be determined by a federal district judge after consideration of the U.S. Sentencing Guidelines and other statutory factors.

    The case is being prosecuted by Assistant United States Attorneys Christine Lowell and Taylor Dean.

    The matter was investigated by the Federal Bureau of Investigation.

    ###

    MIL Security OSI

  • MIL-OSI Security: Winter Park Man Pleads Guilty To Possessing A Firearm As A Convicted Felon

    Source: Office of United States Attorneys

    Orlando, Florida – Acting United States Attorney Sara C. Sweeney announces that Bailey Joseph Friese (23, Winter Park) has pleaded guilty to possession of a firearm by a convicted felon. Friese faces a maximum penalty of 15 years in federal prison. Friese has also agreed to forfeit the Glock firearm involved in the offense. A sentencing date has not yet been set. 

    According to the plea agreement, Friese sold a Glock firearm in December 2023. At the time Friese sold the firearm, he had a previous felony conviction for burglary. As a previously convicted felon, he is prohibited from possessing firearms or ammunition under federal law.

    This case was investigated by the Bureau of Alcohol, Tobacco, Firearms and Explosives and the Seminole County City County Investigative Bureau. It is being prosecuted by Assistant United States Attorney Richard Varadan.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Security: Leader of Large-Scale Drug Trafficking Organization Pleads Guilty in Federal Court

    Source: Office of United States Attorneys

    CONCORD – A Boston man pleaded guilty yesterday in federal court in Concord to conspiring to distribute fentanyl and cocaine in New Hampshire, Acting U.S. Attorney Jay McCormack announces.

    Juan Ramon Soto Baez, 55, pleaded guilty to one count of conspiracy to distribute controlled substances, namely, cocaine and fentanyl.  U.S. District Court Judge Samantha Elliott scheduled sentencing for May 29, 2025.  On April 26, 2023, the defendant was charged along with 20 other defendants. To date, 10 defendants involved in the conspiracy have been convicted.

    According to the plea agreement and statements made in court, the defendant was the leader of a Massachusetts-based drug trafficking organization that distributed large quantities of fentanyl and cocaine in New Hampshire, particularly Manchester, between September of 2019 and April of 2023.  The organization was run like a business, operating “dispatch” telephone lines where customers could call in to order narcotics. The defendant or a trusted member of the conspiracy working for him would take customer orders on the phone, and then he would either deliver the order himself or send a runner to conduct the drug sale at an arranged meeting location.

    During the timeframe of the conspiracy, law enforcement agents observed and recorded the defendant and his co-conspirators selling fentanyl and cocaine on nineteen occasions. On the day of the defendant’s arrest, a search of a residence associated with the conspiracy yielded $15,000 and drug ledgers.  A search of a vehicle used by the drug trafficking organization yielded roughly 94 grams of fentanyl and 196 grams of cocaine packaged in small baggies for distribution.

    The charging statute provides a sentence of no greater than 20 years in prison, at least three (3) years of supervised release, and a maximum fine of $1,000,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    The Federal Bureau of Investigation and the Drug Enforcement Administration led the investigation. Valuable assistance was provided by the Manchester Police Department. Assistant U.S. Attorney Aaron Gingrande is prosecuting the case. 

    This effort is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    ###

     

    MIL Security OSI

  • MIL-OSI Security: Oregon Man Pleads Guilty in Swatting and Bomb Threats Scheme That Targeted Jewish Hospitals in New York City and Long Island

    Source: Office of United States Attorneys

    One Hospital Entered Lockdown and Partially Evacuated After Defendant’s Bomb Hoax

    Earlier today in federal court in Brooklyn, Domagoj Patkovic pleaded guilty to conspiring to make threats concerning explosives and conveying false information concerning explosives.  The proceeding was held before United States District Judge Ramon E. Reyes.  When sentenced, Patkovic faces up to 15 years in prison.  Patkovic was charged in August 2024. 

    John J. Durham, United States Attorney for the Eastern District of New York and James E. Dennehy, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI), announced the guilty plea.

    “As he admitted today, the defendant intentionally targeted Jewish hospitals and care centers in our District with bomb threats.  In doing so, he needlessly endangered patients and staff and diverted critical law enforcement resources from their core mission of keeping our community safe,” stated United States Attorney Durham.  “We will prosecute dangerous bomb threats and swatting schemes to the fullest extent of the law.”

    Mr. Durham expressed his appreciation to the Federal Bureau of Investigation, New York Field Office, the New York City Police Department, Nassau County Police Department and the U.S. Attorney’s Office for the District of Oregon for their assistance on the case.

    As set forth in the indictment and in court filings, beginning at least as early as May 2021, the defendant and others made anonymous phone calls in which they made violent threats, including threats to detonate explosive devices, to Jewish hospitals and care centers within the Eastern District of New York, among other targets throughout the United States.

    The defendant himself made threats in at least six separate calls to hospitals and on a call with local law enforcement who had responded to a 911 notification from one of the hospitals.  The defendant livestreamed the calls to others on an online social media and electronic communications service.  On several occasions, local police responded to the scene and conducted bomb sweeps. On at least one occasion in September 2021, the hoax bomb threat resulted in a partial evacuation and lockdown of an entire hospital on Long Island.  No explosive devices were ultimately found in any of the locations.

    The government’s case is being handled by the Office’s National Security & Cybercrime Section.  Assistant United States  Attorneys Alexander A. Solomon, Laura Zuckerwise and Andrew D. Reich are in charge of the prosecution, with assistance from Trial Attorney James Donnelly of the National Security Division’s Counterterrorism Section and Paralegal Specialist Wayne Colon. 

    The Defendant:

    DOMAGOJ PATKOVIC 
    Age: 31
    Portland, Oregon

    E.D.N.Y. Docket No. 24-CR-317 (RER)

    MIL Security OSI

  • MIL-OSI: FPSO Almirante Tamandaré producing and on hire

    Source: GlobeNewswire (MIL-OSI)

    Amsterdam, February 19, 2025

    SBM Offshore announces that FPSO Almirante Tamandaré is formally on hire as of February 16, 2025 after achieving first oil and the completion of a 72-hour continuous production test leading to Final Acceptance.

    FPSO Almirante Tamandaré is the largest oil producing unit in Brazil with a processing capacity of 225,000 barrels of oil and 12 million m3 of gas per day. This FPSO has an estimated greenhouse gas (GHG) emission intensity below 10 kgCO2e/boe1 and benefits from emission reduction technologies such as the closed flare technology which increases gas utilization, preventing it from being burnt into the atmosphere. FPSO Almirante Tamandaré is the first unit in Brazil to receive a Sustainability-1 Notation2 certification reflecting the Company’s efforts to reduce emissions over the lifecycle of the vessel.

    FPSO Almirante Tamandaré is owned and operated by special purpose companies owned by affiliated companies of SBM Offshore (55%) and its partners (45%). The FPSO will operate under a 26.25-year charter and operation services contracts with Petróleo Brasileiro S.A. (Petrobras).

    FPSO Almirante Tamandaré is installed at the Búzios unitized field located in the Santos Basin, approximately 180 kilometers offshore Rio de Janeiro in Brazil. The Búzios unitized field is operated by Petrobras (88.99%) in partnership with CNODC (3.67%) and CNOOC (7.34%).

    Corporate Profile

    SBM Offshore is the world’s deepwater ocean-infrastructure expert. Through the design, construction, installation, and operation of offshore floating facilities, we play a pivotal role in a just transition. By advancing our core, we deliver cleaner, more efficient energy production. By pioneering more, we unlock new markets within the blue economy. 
    More than 7,400 SBMers collaborate worldwide to deliver innovative solutions as a responsible partner towards a sustainable future, balancing ocean protection with progress.
    For further information, please visit our website at www.sbmoffshore.com.

    Financial Calendar   Date Year
    Full Year 2024 Earnings   February 20 2025
    Annual General Meeting   April 9 2025
    First Quarter 2025 Trading Update   May 15 2025
    Half Year 2025 Earnings   August 7 2025
    Third Quarter 2025 Trading Update   November 13 2025

    For further information, please contact:

    Investor Relations

    Wouter Holties
    Corporate Finance & Investor Relations Manager

    Media Relations

    Giampaolo Arghittu
    Head of External Relations

    Market Abuse Regulation
    This press release may contain inside information within the meaning of Article 7(1) of the EU Market Abuse Regulation.

    Disclaimer
    Some of the statements contained in this release that are not historical facts are statements of future expectations and other forward-looking statements based on management’s current views and assumptions and involve known and unknown risks and uncertainties that could cause actual results, performance, or events to differ materially from those in such statements. These statements may be identified by words such as ‘expect’, ‘should’, ‘could’, ‘shall’ and similar expressions. Such forward-looking statements are subject to various risks and uncertainties. The principal risks which could affect the future operations of SBM Offshore N.V. are described in the ‘Impact, Risk and Opportunity Management’ section of the 2023 Annual Report.

    Should one or more of these risks or uncertainties materialize, or should underlying assumptions prove incorrect, actual results and performance of the Company’s business may vary materially and adversely from the forward-looking statements described in this release. SBM Offshore does not intend and does not assume any obligation to update any industry information or forward-looking statements set forth in this release to reflect new information, subsequent events or otherwise. 

    This release contains certain alternative performance measures (APMs) as defined by the ESMA guidelines which are not defined under IFRS. Further information on these APMs is included in the Half-Year Management Report accompanying the Half Year Earnings 2024 report, available on our website https://www.sbmoffshore.com/investors/financial-disclosures.

    Nothing in this release shall be deemed an offer to sell, or a solicitation of an offer to buy, any securities. The companies in which SBM Offshore N.V. directly and indirectly owns investments are separate legal entities. In this release “SBM Offshore” and “SBM” are sometimes used for convenience where references are made to SBM Offshore N.V. and its subsidiaries in general. These expressions are also used where no useful purpose is served by identifying the particular company or companies.

    “SBM Offshore®“, the SBM logomark, “Fast4Ward®”, “emissionZERO®” and “F4W®” are proprietary marks owned by SBM Offshore.


    1 Calculated based on nameplate capacity.
    2 This sustainability certification from Bureau Veritas recognizes the Company’s efforts in minimizing environmental impacts over the lifecycle of the FPSO, from design to construction and operations.

    Attachment

    The MIL Network

  • MIL-OSI: SBM Offshore announces changes in Supervisory Board

    Source: GlobeNewswire (MIL-OSI)

    Amsterdam, February 19, 2025

    SBM Offshore today announces that Bernard Bajolet has, for personal reasons, decided to step down as member of the Supervisory Board after the 2025 Annual General Meeting, following seven years of service. Bernard Bajolet will continue to be involved with the Company as advisor.

    Roeland Baan says: “We thank Bernard Bajolet for the valuable contribution to the Company as Supervisory Board member and look forward to his continued involvement as advisor.”

            

    Corporate Profile

    SBM Offshore is the world’s deepwater ocean-infrastructure expert. Through the design, construction, installation, and operation of offshore floating facilities, we play a pivotal role in a just transition. By advancing our core, we deliver cleaner, more efficient energy production. By pioneering more, we unlock new markets within the blue economy. 
    More than 7,400 SBMers collaborate worldwide to deliver innovative solutions as a responsible partner towards a sustainable future, balancing ocean protection with progress.
    For further information, please visit our website at www.sbmoffshore.com.

    Financial Calendar   Date Year
    Full Year 2024 Earnings   February 20 2025
    Annual General Meeting   April 9 2025
    First Quarter 2025 Trading Update   May 15 2025
    Half Year 2025 Earnings   August 7 2025
    Third Quarter 2025 Trading Update   November 13 2025

    For further information, please contact:

    Investor Relations

    Wouter Holties
    Corporate Finance & Investor Relations Manager

    Media Relations

    Giampaolo Arghittu
    Head of External Relations

    Market Abuse Regulation
    This press release may contain inside information within the meaning of Article 7(1) of the EU Market Abuse Regulation.

    Disclaimer
    Some of the statements contained in this release that are not historical facts are statements of future expectations and other forward-looking statements based on management’s current views and assumptions and involve known and unknown risks and uncertainties that could cause actual results, performance, or events to differ materially from those in such statements. These statements may be identified by words such as ‘expect’, ‘should’, ‘could’, ‘shall’ and similar expressions. Such forward-looking statements are subject to various risks and uncertainties. The principal risks which could affect the future operations of SBM Offshore N.V. are described in the ‘Impact, Risk and Opportunity Management’ section of the 2023 Annual Report.
    Should one or more of these risks or uncertainties materialize, or should underlying assumptions prove incorrect, actual results and performance of the Company’s business may vary materially and adversely from the forward-looking statements described in this release. SBM Offshore does not intend and does not assume any obligation to update any industry information or forward-looking statements set forth in this release to reflect new information, subsequent events or otherwise. 
    This release contains certain alternative performance measures (APMs) as defined by the ESMA guidelines which are not defined under IFRS. Further information on these APMs is included in the Half-Year Management Report accompanying the Half Year Earnings 2024 report, available on our website https://www.sbmoffshore.com/investors/financial-disclosures.
    Nothing in this release shall be deemed an offer to sell, or a solicitation of an offer to buy, any securities. The companies in which SBM Offshore N.V. directly and indirectly owns investments are separate legal entities. In this release “SBM Offshore” and “SBM” are sometimes used for convenience where references are made to SBM Offshore N.V. and its subsidiaries in general. These expressions are also used where no useful purpose is served by identifying the particular company or companies.
    “SBM Offshore®“, the SBM logomark, “Fast4Ward®”, “emissionZERO®” and “F4W®” are proprietary marks owned by SBM Offshore.

    Attachment

    The MIL Network

  • MIL-OSI: FN2/2025 Kapitalforhøjelse – Nye aktier

    Source: GlobeNewswire (MIL-OSI)

    NASDAQ FIRST NORTH GROWTH MARKET MEDDELELSE NR. 2/2025

    København, den 19. februar 2025

    FN2/2025 Kapitalforhøjelse – Nye aktier

    I forlængelse af FN1 vedrørende kapitalforhøjelsen meddeler selskabet hermed, at de nye aktier (i alt 49.257 stk.) er ansøgt optaget til handel på Nasdaq First North Growth Market Denmark hurtigst muligt. 

    Yderligere oplysninger

    FastPassCorp A/S, administrerende direktør Anders Meyer, am@fastpasscorp.com

    Certified Adviser

    Baker Tilly Corporate Finance P/S, Poul Bundgaards Vej 1, DK-2500 Valby, Tlf.: +45 33 45 10 00,

    www.bakertilly.dk

    The MIL Network

  • MIL-OSI Security: Spring Hill Man Sentenced for Dog Fighting

    Source: Office of United States Attorneys

    Tampa, FL — Jose Miguel Carrillo, of Spring Hill, Florida, was sentenced yesterday to 84 months in prison after pleading guilty to conspiring to violate the dog fighting prohibitions of the federal Animal Welfare Act and being a felon in possession of a firearm.

    According to court filings, Carrillo conspired with others to purchase, acquire, and breed dogs for use in dog fights. Carillo also staged dog fights at his home and traveled to dog fights in Massachusetts, Florida, and Connecticut.

    A June 2023 search warrant was executed at Carrillo’s home and led to the seizure of 10 pit bull-type dogs, most of which were later adopted by new owners, as well as a firearm and ammunition. Carrillo also possessed dog fighting paraphernalia including a bloodstained dog fighting box, a skin stapler, syringes, and injectable veterinary medications.

    “To its core, dog fighting is a cruel and criminal exploitation of animals for entertainment,” said Principal Deputy Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division. “Today’s sentence sends a strong deterrent message that the Justice Department will vigorously prosecute these cases.”

    “Exploiting and endangering the welfare of animals for personal gain is cruel and abhorrent,” said Acting U.S. Attorney Sara C. Sweeney for the Middle District of Florida. “Because of the hard work of our law enforcement partners, justice was served.”

    “The Office of Inspector General is committed to working with all of our law enforcement and prosecutorial partners in pursuing individuals who choose to participate in animal fighting activities and engage in violations involving animal welfare, while also committing other serious offenses in our communities,” said Special Agent in Charge Charmeka Parker of the U.S. Department of Agriculture’s Office of Inspector General (USDA-OIG).

    Photo of dogs at Carrillo’s home, from court documents in United State v. Jose Carrillo, number 8:23-CR-00222, in U.S. District Court for the Middle District of Florida.

    Photo of a bloodstained dog fighting pit at Carrillo’s home, from court documents in United State v. Jose Carrillo, number 8:23-CR-00222, in U.S. District Court for the Middle District of Florida.

    To report animal fighting crimes, please contact your local law enforcement or the USDA-OIG’s complaint hotline at: usdaoig.oversight.gov/hotline or 1-800-424-9121.

    The USDA-OIG; Bureau of Alcohol, Tobacco, Firearms, and Explosives; Pasco (Florida) Sheriff’s Office and the Fitchburg (Massachusetts) Police Department investigated the case. Assistance was provided by the U.S. Marshals Service, Massachusetts State Police, New Hampshire State Police, Animal Rescue League of Boston’s Law Enforcement Division, U.S. Coast Guard Investigative Service, Homeland Security Investigations and U.S. Customs and Border Protection.

    Senior Trial Attorney Matthew T. Morris of the Environment and Natural Resources Division’s Environmental Crimes Section and Assistant U.S. Attorneys Erin Favorit and Tiffany Fields for the Middle District of Florida prosecuted the case. Trial Attorney Caitlyn Cook of the Environment and Natural Resources Division’s Wildlife and Marine Resources Section assisted with the transfer of the seized dogs to new owners.

    MIL Security OSI

  • MIL-OSI Security: McKees Rocks Resident Pleads Guilty to Possession of Child Sexual Abuse Materials

    Source: Office of United States Attorneys

    PITTSBURGH, Pa. – A resident of McKees Rocks, Pennsylvania, pleaded guilty in federal court on February 18, 2025, to a charge of child exploitation, Acting United States Attorney Troy Rivetti announced today.

    Brandon Jennings, 38, pleaded guilty before Senior United States District Judge Joy Flowers Conti to one count of possession of material depicting the sexual exploitation of a minor.

    In connection with the guilty plea, the Court was advised that, in and around March 2021 and July 2021, Jennings possessed 926 images and 803 videos depicting the sexual exploitation of minors, some of whom were prepubescent.

    Judge Flowers Conti scheduled sentencing for June 25, 2025. The law provides for a maximum total sentence of up to 20 years in prison, a fine of up to $250,000, or both. Under the federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offense and the prior criminal history, if any, of the defendant.

    Assistant United States Attorney V. Joseph Sonson is prosecuting this case on behalf of the government.

    The Federal Bureau of Investigation and Allegheny County Police Department conducted the investigation that led to the prosecution of Jennings.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.
     

    MIL Security OSI

  • MIL-OSI: DTEX Systems Announces Collaboration with AWS Generative AI Innovation Center

    Source: GlobeNewswire (MIL-OSI)

    SAN JOSE, Calif., Feb. 19, 2025 (GLOBE NEWSWIRE) — DTEX Systems, the trusted leader of insider risk management, today announced that it has been selected to collaborate with Amazon Web Services (AWS), on its ​​Generative AI Innovation Center. This collaboration will allow DTEX to accelerate the availability of its generative AI capabilities to proactively prevent and detect insider threats, while preserving user privacy.

    Through this collaboration, DTEX’s Ai³ Risk Assistant will achieve general availability on Amazon Bedrock, making it one of the first risk generative AI assistant partners to be available on the service. DTEX and AWS will also work together to fast-track a new generative AI and insider risk prototype that will scale semantic search for insider risk analysts, allowing analysts to focus on high-value tasks rather than manual data exploration.

    “We at DTEX are committed to using emerging technologies, such as generative AI, to combat the ever-evolving insider threat landscape,” said Marshall Heilman, CEO of DTEX Systems. “Working closely alongside the expert data scientists and developers at AWS, we are further cementing our status as the leading insider risk and data loss prevention solution that is powered by AI.”

    The AWS Generative AI Innovation Center supports companies, such as DoorDash, PGA TOUR, and Thomas Reuters, to progress and bring their corresponding generative AI technologies to market, with assistance from leading AWS data scientists and developers to fast-track the timeline. Support from AWS also includes the building of prototypes and embedding advanced capabilities into DTEX’s generative AI offerings.

    “Very excited about AWS’s Generative AI Innovation Center collaboration with DTEX Systems to transform the cybersecurity industry,” said Sri Elaprolu, Director at the AWS Generative AI Innovation Center. “DTEX Systems is launching Ai³ (A.I. Assisted Insider Risk Investigations), a platform that helps analysts interact with their data in a conversational manner while automating and streamlining the investigation workflow. Ai³ leverages Bedrock, Claude, and OpenSearch Serverless to automate analyst’s work, including surfacing relevant dashboards, retrieving summaries of and generating risk profiles, and running regular risk assessments to provide the summarized insights to analysts for final decision-making. A powerful example of how generative AI can remove manual, repetitive tasks so employees can focus on strategic, high value actions.”

    In February 2024, DTEX announced the launch of the Ai³ Risk Assistant, making them the first organization to leverage generative AI as a tool to proactively combat and detect insider threats. As a feature within the InTERCEPT™ platform, it processes natural language to provide insights into potential insider risk and intent.

    To learn more about DTEX Systems, please visit www.dtexsystems.com.

    About DTEX Systems
    As the trusted leader of insider risk management, DTEX transforms enterprise security by displacing reactive tools with a proactive solution that stops insider risks from becoming data breaches. DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforce. Backed by behavioral science, powered by AI, and used by governments and organizations around the world, DTEX is the trusted authority for protecting data and people at scale with privacy by design.

    To learn more about DTEX, please visit dtexsystems.com

    Connect with DTEX: LinkedIn | Twitter | YouTube

    Media Contact
    Mariah Gauthier
    dtex@highwirepr.com

    The MIL Network

  • MIL-OSI: Northern Horizon Capital A/S appoints Christoffer Abramson as the Group CEO

    Source: GlobeNewswire (MIL-OSI)

    Northern Horizon Capital AS, the management company of Baltic Horizon Fund, hereby informs of changes in the leadership of Northern Horizon Capital A/S (the parent company of Northern Horizon Capital AS).

    After leading Northern Horizon group for almost 7 years, Milda Darguzaite will step aside from her CEO position to assume the role as Member of the Board of Directors of Northern Horizon Capital A/S.

    Christoffer Abramson shall assume the position as Group Chief Executive Officer of Northern Horizon Capital A/S effective 4 March 2025.

    Christoffer Abramson is a seasoned international executive and real estate investment expert. Most recently, Christoffer Abramson was President and CEO of Catella AB (publ.). Prior to this role, Christoffer Abramson spent seven years based in the US at EF Education First where he helped create and build a significant global Real Estate business. He has also worked General Electric across the globe for 10 years, ending his GE career as the CFO of GE Real Estate based in London.

    “We are confident that Christoffer, with his extensive experience, Nordic background and strategic thinking, is the right person to lead the company and drive our next chapter of growth. On behalf of the Board of Directors, I would also like to extend our sincere gratitude to Milda for her dedicated leadership. We are privileged that she has accepted to become a Member of the Board. Her expertise will be invaluable as we continue to grow our platform,” Lars Ohnemus, Chairman of the Board of Directors of Northern Horizon Capital A/S, commented.

    For additional information, please contact:

    Tarmo Karotam
    Baltic Horizon Fund manager
    E-mail tarmo.karotam@nh-cap.com
    www.baltichorizon.com

    The Fund is a registered contractual public closed-end real estate fund that is managed by Alternative Investment Fund Manager license holder Northern Horizon Capital AS. 

    Distribution: GlobeNewswire, Nasdaq Tallinn, Nasdaq Stockholm, www.baltichorizon.com

    To receive Nasdaq announcements and news from Baltic Horizon Fund about its projects, plans and more, register on www.baltichorizon.com. You can also follow Baltic Horizon Fund on www.baltichorizon.com and on LinkedIn, FacebookX and YouTube.

    The MIL Network

  • MIL-OSI: Coop Pank AS establishes an EUR 750,000,000 Covered Bond Programme

    Source: GlobeNewswire (MIL-OSI)

    Coop Pank AS (Bank) has established an EUR 750,000,000 Covered Bond Programme (Programme). The Central Bank of Ireland has approved the base prospectus (Base Prospectus) for the Programme on 19 February 2025. The Base Prospectus will be available on the website of Euronext Dublin at www.ise.ie and on the Bank’s website at https://www.cooppank.ee/en/investor.

    Establishment of the Programme is one of the preparatory steps in the commencement of issuance of covered bonds by the Bank. According to initial forecasts, the first issuance is expected to take place in the first half of 2025. The Bank will notify the market with a separate stock exchange announcement once the exact timing and conditions of the issuance are determined. The covered bonds to be issued under the Programme are expected to be rated (P)Aa2 by Moody’s Investors Service Ltd.

    Coop Pank, based on Estonian capital, is one of the five universal banks operating in Estonia. The number of clients using Coop Pank for their daily banking reached 209,500. Coop Pank aims to put the synergy generated by the interaction of retail business and banking to good use and to bring everyday banking services closer to people’s homes. The strategic shareholder of the bank is the domestic retail chain Coop Eesti, comprising of 320 stores. 

    Additional information:
    Paavo Truu
    CFO
    Phone: +372 5160 231
    E-mail: paavo.truu@cooppank.ee

    The MIL Network

  • MIL-OSI Security: Former Reno Police Officer Indicted for Civil Rights Violations

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    RENO – A former Reno Police Department officer made his initial court appearance today for allegedly depriving two individuals of their civil rights under color of law by violating their right to be free from unreasonable search and seizure.

    A federal grand jury returned an indictment charging Tyler Michael Baehr, 30, of Reno, with two counts of depravation of rights under color of law. Baehr appeared before United States Magistrate Judge Craig S. Denney who scheduled a jury trial to begin April 8, 2025, before United States District Judge Miranda M. Du.

    According to allegations contained in the indictment and statements made in court, on December 31, 2023, Baehr willfully deprived an individual of the right to be free from unreasonable search and seizure by taking her cellular phone during a routine traffic stop and unlawfully seizing sexually explicit photos of her from her phone. On August 12, 2024, Baehr willfully deprived another individual of the right to be free from unreasonable search and seizure by taking her cellular phone during a routine traffic stop and unlawfully searching through her private photos and messages.

    If convicted, Baehr faces the maximum statutory penalty of 2 years in prison. A federal district court judge will determine any sentence based on the U.S. Sentencing Guidelines and other statutory factors.

    Acting United States Attorney Sue Fahami and Acting Special Agent in Charge Jeremy N. Schwartz for the FBI made the announcement.

    This case was investigated by the FBI and Sparks Police Department. Assistant United States Attorney Andolyn Johnson is prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

     

    MIL Security OSI

  • MIL-OSI United Kingdom: Local Plan takes another step closer to unlocking York’s development and growth ambitions

    Source: City of York

    City of York Council is set to consider the adoption of its Local Plan following the findings of the Inspector’s Report on the Examination of City of York’s Local Plan.

    The Local Plan will be presented for consideration at Full Council on Thursday 27 February.

    City of York Council is set to consider the adoption of its Local Plan following the findings of the Inspector’s Report on the Examination of City of York’s Local Plan, which will be presented for consideration at Full Council on Thursday 27 February.  

    Once adopted, this Plan will be the city’s first comprehensive development framework since 1956 and will guide York’s growth for the next decade, marking a pivotal milestone in the city’s future development and growth ambitions, whilst establishing the city’s green belt and historic setting for the first time. 

    The Local Plan outlines the vision for sustainable housing, economic development, and infrastructure in York. It addresses key priorities such as affordable housing, environmental sustainability, and the protection of York’s historic character. The Plan provides a policy framework for decisions on development, shaping the city’s future spatial development until 2038. 

    As part of the adoption process, the Council will review the Inspector’s recommendations and the main modifications to housing allocations, green belt boundaries, and transport infrastructure planning. The final decision on whether to formally adopt the Local Plan will be made at the Full Council meeting on Thursday 27 February. 

    Cllr Claire Douglas, Leader of the Council, said: 

    “The Local Plan is an historic step in shaping York’s bright future, and we’re excited about what it means for our city. We welcome the Inspector’s findings and are confident that their modifications will strengthen the Plan, ensuring it supports York’s vision for a sustainable, inclusive city for all. The Plan provides us with a clear roadmap for how our city will develop and grow over the next decade – meeting the needs of our residents and businesses.  

    “A huge thank you to everyone who has worked so hard to bring this Plan to life. We truly appreciate your dedication and commitment to York’s future.” 

    Cllr Katie Lomas, Executive Member for Finance, Performance, Major Projects, Human Rights, Equality, and Inclusion, added: 

    “This Local Plan is designed to support the growth of York while promoting equality, accessibility, and sustainability. We are particularly focused on ensuring that affordable housing remains a central component of this Plan, along with infrastructure that meets the needs of all residents, including those from the most disadvantaged groups. This is a long-term investment in creating a fairer, greener York for future generations.” 

    Cllr. Michael Pavlovic, Executive Member for Housing, Planning and Safer Communities, commented: 

    “The Local Plan represents the outcome of 7 years extensive consultation, public hearings, and thorough examination. The Plan outlines significant investments in housing, transport, and employment opportunities, which will help drive York’s economy and provide much-needed infrastructure. For York to prosper we need to be ambitious, and this Plan unlocks the potential to make those ambitions a reality.” 
     
    Inspector’s Report and Next Steps 

    The Inspector’s Report, published following extensive independent examination, recognised that the Local Plan meets all statutory duties to cooperate and aligns with national planning policies. However, the Report also identified certain areas requiring modifications to ensure the Plan’s soundness, particularly regarding the housing supply, green belt boundaries, and infrastructure delivery.  

    The Council has already responded to the Inspector’s recommendations, requesting main modifications that will address these deficiencies. Full Council will be asked to adopt the plan with the Inspectors’ modifications. 

    The Local Plan in Brief 

    The Local Plan will provide a comprehensive strategy for:
     
    •    Delivering 20,000 new homes over the duration of the plan, including a significant proportion of affordable housing.

     
    •    Allocating sites for economic growth, including areas for employment and retail expansion. 

    •    Investing in sustainable transport infrastructure, including improved bus routes, cycling paths, and EV charging stations. 

    •    Mitigating and adapting to climate change with enhanced green infrastructure, flood defences, and energy-efficient building standards. 

    •    Safeguarding York’s historic and cultural heritage while ensuring new development respects the city’s unique character. 

    •    Setting the city’s green belt and protecting the historic setting for the first time. 

    The adoption of the Local Plan represents a turning point in York’s growth, ensuring that development is sustainable, well-planned, and consistent with local priorities. 

    For more details on the Inspector’s Report and the upcoming Full Council meeting, visit the City of York Council website at www.york.gov.uk/LocalPlanInspectorsReport

    Full Council takes place on Thursday 27 February, the agenda is available to view online at https://democracy.york.gov.uk/ieListDocuments.aspx?CId=331&MId=15004 and the meeting will be available to view live or on demand at www.york.gov.uk/webcasts.   
     

    MIL OSI United Kingdom

  • MIL-OSI: Dassault Systèmes: disclosure of trading in own shares

    Source: GlobeNewswire (MIL-OSI)

    Press Release
    VELIZY-VILLACOUBLAY, FranceFebruary 19, 2025

    DISCLOSURE OF TRADING IN OWN SHARES
    (Repurchase program decided by the General Meeting of
    Shareholders of May 22, 2024)

    Issuer: Dassault Systèmes (Euronext Paris: FR0014003TT8, DSY.PA)
    Type of securities: Ordinary shares
    Period: From February 11 to February 14, 2025

    Detailed information (presentation by day and by market and transaction-by-transaction details) can be consulted on the website of Dassault Systèmes: https://investor.3ds.com/regulated-information/permanent-information

    Presentation of the trading in own shares by day and by market

    Name of issuer Identification code of the issuer Date of trading Identification code of the financial instrument Daily total volume
    (in number of shares)
    Daily weighted average acquisition price of the shares* Market
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 11-Feb-25 FR0014003TT8 17 669 39,9992 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 11-Feb-25 FR0014003TT8 10 507 39,9990 DXE
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 11-Feb-25 FR0014003TT8 2 952 39,9900 TQE
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 11-Feb-25 FR0014003TT8 4 000 39,9900 AQE
    DASSAULT SYSTEMES 9695002I9DJHZ3449O66 11-Feb-25 FR0014003TT8 46 773 40,0000 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 12-Feb-25 FR0014003TT8 287 836 39,9865 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 12-Feb-25 FR0014003TT8 61 161 39,9939 DXE
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 12-Feb-25 FR0014003TT8 11 649 39,9922 TQE
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 12-Feb-25 FR0014003TT8 10 039 39,9933 AQE
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 12-Feb-25 FR0014003TT8 34 419 39,9966 DXE
    DASSAULT SYSTEMES 9695002I9DJHZ3449O66 12-Feb-25 FR0014003TT8 208 462 40,0000 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 13-Feb-25 FR0014003TT8 55 259 40,0000 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 13-Feb-25 FR0014003TT8 20 327 40,0000 DXE
    DASSAULT SYSTEMES 9695002I9DJHZ3449O66 13-Feb-25 FR0014003TT8 56 509 40,0000 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 14-Feb-25 FR0014003TT8 8 496 39,9932 XPAR
    DASSAULT SYSTEMES 96950065LBWY0APQIM86 14-Feb-25 FR0014003TT8 5 105 39,9890 DXE

    (*)The weighted average unit price is a rounded price

    ###

    ABOUT DASSAULT SYSTÈMES

    Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 350 000 customers of all sizes, in all industries, can collaborate, imagine and create sustainable innovations that drive meaningful impact. For more information, visit www.3ds.com

    Dassault Systèmes Investor Relations Team                FTI Consulting
    Béatrix Martinez :                                        Arnaud de Cheffontaines: +33 1 47 03 69 48
    +33 1 61 62 40 73                                        Jamie Ricketts : +44 20 3727 1600
    investors@3ds.com                                        

    Dassault Systèmes Press Contacts
    Corporate / France        
    Arnaud Malherbe: +33 1 61 62 87 73
    arnaud.malherbe@3ds.com        

    © Dassault Systèmes. All rights reserved. 3DEXPERIENCE, the 3DS logo, the Compass icon, IFWE, 3DEXCITE, 3DVIA, BIOVIA, CATIA, CENTRIC PLM, DELMIA, ENOVIA, GEOVIA, MEDIDATA, NETVIBES, OUTSCALE, SIMULIA and SOLIDWORKS are commercial trademarks or registered trademarks of Dassault Systèmes, a European company (Societas Europaea) incorporated under French law, and registered with the Versailles trade and companies registry under number 322 306 440, or its subsidiaries in the United States and/or other countries. All other trademarks are owned by their respective owners. Use of any Dassault Systèmes or its subsidiaries trademarks is subject to their express written approval.

     ; 

    Attachment

    The MIL Network

  • MIL-OSI: DDB Miner Announces New High-Yield Investment Plans for 2025

    Source: GlobeNewswire (MIL-OSI)

    BIRMINGHAM, United Kingdom, Feb. 19, 2025 (GLOBE NEWSWIRE) — DDB Miner, a leading cryptocurrency mining platform, has launched new investment plans designed to maximize earnings while ensuring sustainability and efficiency. With its advanced technology and renewable energy-powered mining operations, DDB Miner offers a seamless and profitable way for investors to generate passive income. The latest investment options allow users to earn up to $9,999 per day with minimal effort.

    New Investment Plans for 2025

    DDB Miner introduces flexible investment options tailored to different levels of investors, ranging from beginners to experienced traders. These plans offer daily returns and include a principal return upon contract expiration. The updated plans include:

    • Starter Plan
      • Investment: $12
      • Daily Return: $0.50
      • Includes a $12 welcome bonus
    • Boosted Hash Power
      • Investment: $100
      • Daily Return: $6
      • Designed for steady profits
    • Top Hash Power
      • Investment: $500
      • Daily Return: $31.50
      • Ideal for long-term growth
    • Premium Contracts
      • Investments range from $8,000 to $50,000
      • Increasing returns based on contract size

    These investment opportunities ensure daily payouts, reliable earnings, and a secure method to grow wealth passively.

    Why Choose DDB Miner?

    Since its founding in 2017, DDB Miner has grown to accommodate over 9 million members worldwide. The platform is recognized for its advanced infrastructure, transparency, and strong commitment to sustainable mining. Here’s what makes DDB Miner stand out:

    • Solar-Powered Mining – Utilizing renewable energy, reducing costs, and minimizing environmental impact
    • Secure and Transparent Operations – Protecting user assets with advanced SSL encryption
    • User-Friendly Interface – A simple and intuitive platform, suitable for both beginners and experienced investors
    • Fast & Reliable Payouts – Investors receive guaranteed daily earnings
    • 24/7 Customer Support – A dedicated team is available to assist users at any time

    How to Get Started?

    Getting started with DDB Miner is quick and easy. Investors can begin earning by following these simple steps:

    1. Sign Up & Get a $12 Bonus – Register on DDB Miner’s official website and receive an instant welcome bonus.
    2. Select an Investment Plan – Choose a contract that aligns with your financial goals and budget.
    3. Start Earning Daily – Once your contract is active, the mining process begins automatically, generating passive income with no manual effort required.

    A Secure and Profitable Future

    As cryptocurrency continues to evolve, DDB Miner remains at the forefront of providing secure, transparent, and high-yield investment opportunities. Whether you’re a newcomer exploring passive income options or an experienced investor looking for steady returns, these new plans offer an excellent way to capitalize on cryptocurrency mining.

    DDB Miner’s commitment to sustainability, security, and profitability makes it a top choice for those looking to enhance their financial future. With a trusted platform, innovative mining technology, and a focus on user satisfaction, DDB Miner is paving the way for a new era of crypto investments.

    Sign up now, claim your $12 bonus, and start your journey to financial freedom. Visit the official website for more details: https://ddbminer.com/

    Media Contact:
    Katerina Audrey
    DDB Miner Media Relations
    Email: info@ddbminer.com

    Disclaimer: This press release is provided by DDB Miner. The statements, views, and opinions expressed in this content are solely those of the sponsor and do not necessarily reflect the views of this media platform. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. This content is for informational purposes only and should not be considered as financial, investment, or trading advice. Investing in cloud mining and related opportunities involves significant risks, including the potential loss of capital. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/1c2f09cc-02cf-45fd-887e-db8a15e701bc

    https://www.globenewswire.com/NewsRoom/AttachmentNg/9d5f2fe4-b799-4736-904c-23ff4a781b15

    https://www.globenewswire.com/NewsRoom/AttachmentNg/5d5d0768-9947-4a65-9331-bfc2475e3d73

    https://www.globenewswire.com/NewsRoom/AttachmentNg/8266c1a6-b8dd-4457-9091-41f63d0dec0a

    The MIL Network

  • MIL-OSI USA: ICE, US Border Patrol nab Venezuelan illegal alien with alleged child sexually abusive material

    Source: US Immigration and Customs Enforcement

    DETROIT — U.S. Immigration and Customs Enforcement and U.S. Border Patrol apprehended a Venezuelan illegal alien who is now facing charges for the alleged production of child sexually abusive material with a toddler-aged minor.

    Gibraltar Border Patrol Station agents arrested Luis Angel Alvarez-Alvarez, an ICE fugitive with a final order of removal, Feb. 11 in the River Rouge suburb of Detroit.

    During a subsequent search of his cellular device, officers discovered the alleged child sexually abusive material and contacted ICE Homeland Security Investigations.

    ICE HSI agents’ investigation determined the material depicted the sexual abuse of a child. Alvarez-Alvarez was arrested and charged with production and possession of child pornography.

    Alvarez-Alvarez remains in custody pending the disposition of his charges.

    This case is being prosecuted by the United States Attorney’s Office for the Eastern District of Michigan.

    Defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

    Members of the public can report immigration crimes or suspicious activity by dialing the ICE Tip Line at 866-DHS-2-ICE (866-347-2423) or completing the online tip form.

    Learn more about ICE Detroit’s mission to increase public safety in our Michigan and Ohio communities on X at @ERODetroit and @HSIDetroit.

    MIL OSI USA News

  • MIL-OSI USA: Florida Man Sentenced for Dog Fighting

    Source: US State Government of Utah

    Jose Miguel Carrillo, of Spring Hill, Florida, was sentenced yesterday to 84 months in prison after pleading guilty to conspiring to violate the dog fighting prohibitions of the federal Animal Welfare Act and being a felon in possession of a firearm.

    According to court filings, Carrillo conspired with others to purchase, acquire, and breed dogs for use in dog fights. Carillo also staged dog fights at his home and traveled to dog fights in Massachusetts, Florida, and Connecticut.

    A June 2023 search warrant was executed at Carrillo’s home and led to the seizure of 10 pit bull-type dogs, most of which were later adopted by new owners, as well as a firearm and ammunition. Carrillo also possessed dog fighting paraphernalia including a bloodstained dog fighting box, a skin stapler, syringes, and injectable veterinary medications.

    “To its core, dog fighting is a cruel and criminal exploitation of animals for entertainment,” said Principal Deputy Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division. “Today’s sentence sends a strong deterrent message that the Justice Department will vigorously prosecute these cases.”

    “Exploiting and endangering the welfare of animals for personal gain is cruel and abhorrent,” said Acting U.S. Attorney Sara C. Sweeney for the Middle District of Florida. “Because of the hard work of our law enforcement partners, justice was served.”

    “The Office of Inspector General is committed to working with all of our law enforcement and prosecutorial partners in pursuing individuals who choose to participate in animal fighting activities and engage in violations involving animal welfare, while also committing other serious offenses in our communities,” said Special Agent in Charge Charmeka Parker of the U.S. Department of Agriculture’s Office of Inspector General (USDA-OIG).

    To report animal fighting crimes, please contact your local law enforcement or the USDA-OIG’s complaint hotline at: usdaoig.oversight.gov/hotline or 1-800-424-9121.

    The USDA-OIG; Bureau of Alcohol, Tobacco, Firearms, and Explosives; Pasco County (Florida) Sheriff’s Office and the Fitchburg (Massachusetts) Police Department investigated the case. Assistance was provided by the U.S. Marshals Service, Massachusetts State Police, New Hampshire State Police, Animal Rescue League of Boston’s Law Enforcement Division, U.S. Coast Guard Investigative Service, Homeland Security Investigations and U.S. Customs and Border Protection.

    Senior Trial Attorney Matthew T. Morris of the Environment and Natural Resources Division’s Environmental Crimes Section and Assistant U.S. Attorneys Erin Favorit and Tiffany Fields for the Middle District of Florida prosecuted the case. Trial Attorney Caitlyn Cook of the Environment and Natural Resources Division’s Wildlife and Marine Resources Section assisted with the transfer of the seized dogs to new owners. 

    MIL OSI USA News

  • MIL-OSI Africa: UTM Offshore Chief Executive Officer (CEO) to Join Industry Leaders at Invest in African Energy (IAE) 2025

    Source: Africa Press Organisation – English (2) – Report:

    PARIS, France, February 19, 2025/APO Group/ —

    As a leader in offshore energy, Julius Rone, CEO of UTM Offshore, is confirmed to speak at the upcoming Invest in African Energy (IAE) 2025 Forum in Paris. UTM Offshore is currently playing a pivotal role in Nigeria’s energy sector, including the development of the country’s first floating LNG (FLNG) facility, along with broader investments in Africa’s energy future.

    The company’s $5 billion UTM FLNG project continues to progress, with significant milestones achieved in design, construction and timeline for production. The 2.8 MTPA facility is poised to make a substantial contribution to Nigeria’s LNG capacity, strengthening the country’s position in the global energy market. In September 2024, UTM Offshore received the license from the Nigerian Federal Government to construct the project, bringing it one step closer to making a final investment decision, which is expected in 2025.

    IAE 2025 (apo-opa.co/3Qlfj69) is an exclusive forum designed to facilitate investment between African energy markets and global investors. Taking place May 13-14, 2025 in Paris, the event offers delegates two days of intensive engagement with industry experts, project developers, investors and policymakers. For more information, please visit www.Invest-Africa-Energy.com. To sponsor or participate as a delegate, please contact sales@energycapitalpower.com.

    The UTM FLNG facility serves as a prime example of the steps required to secure significant funding for large-scale gas projects, including diversifying funding sources, securing off-take agreements and gaining government support. According to Rone, UTM Offshore signed an MOU with the African Export-Import Bank in 2021 to raise up to $2 billion for the project. The bank has since received preliminary approval to invest $350 million, while UTM has secured contracts with JGC Corp and KBR Inc. for the facility’s design. Additionally, Vitol Group has entered into an LNG off-take agreement, and last year, UTM signed a deal with the Nigerian National Petroleum Company for it to acquire a 20% stake in the project.

    UTM Offshore’s participation at IAE 2025 underscores the company’s commitment to maximizing returns on investment in Africa’s energy sector, particularly through projects like UTM FLNG that connect the global investment community to Africa’s emerging energy opportunities. As Africa becomes an increasingly important player in the global energy landscape, UTM Offshore’s initiatives represent the continent’s growing capacity to provide sustainable energy solutions while fostering collaboration with international investors and stakeholders.

    MIL OSI Africa

  • MIL-OSI Africa: 6 tips on how to run a company in turbulent times – lessons from emerging markets

    Source: The Conversation – Africa – By Felipe Monteiro, Senior Affiliate Professor of Strategy, INSEAD

    Global risks are rising, and many companies are struggling with how to adapt. The World Economic Forum’s 2025 Global Risks Report makes it clear that challenges like escalating global tensions and conflicts, climate change, economic instability and supply chain disruptions are interconnected and build on one another. And they’re here to stay.

    Meanwhile, US president Donald Trump’s tariff threats are creating more unpredictability in global trade.

    Companies – mostly medium sized and large companies – have no choice but to constantly adjust their strategies. For several companies in emerging markets, this way of thinking is second nature. Firms often operate in environments with fragile institutions, volatile currencies, unreliable infrastructure and political instability. They have become used to designing strategies with turbulence in mind.

    Instead of assuming every piece of global supply chains will fall into place as planned, and just-in-time strategies will always deliver, these companies have diversified and distributed their operations across multiple regions. They have been quick to build flexible, global supply chains, ensuring that if one part of the supply chain is disrupted, other regions can pick up the slack.

    While this may seem like common sense, many companies are still finding it difficult to reorganise and adapt to a less predictable and reliable world.

    So, how can companies look to build resilience and operate in uncertainty? By taking inspiration from those that have long navigated instability.

    Over the past 17 years of teaching global strategic management, I’ve developed and taught case studies on numerous companies in developing countries that have successfully adapted and reworked their strategies in times of uncertainty. Many of these examples – from Embraer in Brazil, to Haier in China – are featured in my book, Global Strategic Management (Fifth Edition), with more to come in the upcoming sixth edition.

    Based on these insights, I explore six key lessons companies can learn from firms in emerging markets.

    Six ways resilient firms adapt to disruption

    1. Learn, humbly, and adapt at lightning speed.

    Companies in emerging markets have always had to be more adaptable. They are fast learners and quick to pivot, starting from the understanding that things may not always go as planned. As a result, they design their operations to be resilient from the start. They anticipate disruptions rather than wait for them to happen.

    A classic example of this is M-Pesa. The mobile payments platform was first launched in Kenya in 2007. Initially it aimed to provide microloans to people without bank accounts. However, when users began using it for money transfers and bill payments, the company quickly adapted to meet this new demand. This ability to learn fast and change direction helped M-Pesa become a leader in mobile payments. It now serves as a global benchmark for success in the industry.

    Humility is essential for this kind of swift and effective adaptation. Companies that often face tough, unpredictable conditions tend to approach challenges with a humble mindset. Instead of assuming they have all the answers, they remain open to learning and adjusting.

    2. Lean on local partnerships.

    When entering unfamiliar or unpredictable markets, firms often approach operations with a transactional mindset – focusing on short-term, one-off exchanges – rather than forming deep partnerships with local stakeholders. This limits their ability to understand and deal with political or social disruptions.

    Natura & Co, the Brazilian cosmetics giant, offers helpful lessons. It has long focused on localising production and sourcing materials from nearby suppliers. Its focus is in the Amazon region, where it works with local communities to sustainably harvest raw materials like açaí (purple berries from South American palm trees) and Brazil nut oil. This approach:

    • reduces reliance on distant sources

    • increases flexibility, allowing the company to quickly adapt to regional challenges

    • builds trust which in turn stabilises supply chains and helps firms gain on-the-ground intelligence.

    3. Make room for redundant infrastructure.

    Firms often delay investments in redundant infrastructure until after a crisis exposes vulnerabilities. For instance, firms may rely on a single data centre or power grid, assuming infrastructure reliability.

    For companies like MTN Group, a telecommunications giant based in South Africa, redundancy is a necessity, not a luxury. Investing in backup power solutions and alternative communication links is essential to ensure MTN can maintain services during frequent power outages.

    In critical sectors like telecommunications and technology, parallel networks, alternative energy sources and backup systems ensure uninterrupted operations in the face of infrastructure failures, climate risks or other unforeseen disturbances.

    4. In unstable environments, build your own stability.

    In unpredictable markets, companies have to take matters into their own hands to ensure their operations run smoothly. They fill “institutional voids” common in such markets by forming diversified business groups. These provide critical support, such as internal financing, talent development and logistical infrastructure, to work around the challenges of their operating environments.

    The Tata Group, which operates across multiple industries from steel to software, is perhaps the most prominent example of this.

    Another great example is MercadoLibre, Latin America’s leading e-commerce platform, which faced the challenge of fragmented transport networks that made 24- or 48-hour deliveries near impossible. The only way to improve delivery speed was for the company to build its own logistics network. By doing so, it gained greater control over its supply chain, improved its ability to scale and greatly improved delivery reliability.

    5. Localise production, sustainably.

    Localised production reduces reliance on complex, long-distance global supply chains and helps minimise the environmental impact of transportation. When production and sourcing are local, companies are able to cut emissions and are less vulnerable to external shocks, as they are not reliant on the smooth functioning of distant suppliers or transport routes.

    Dilmah Tea took this hands-on approach by owning tea gardens, factories and packaging facilities in Sri Lanka. The company controls every step of the process, ensuring high-quality, single-origin Ceylon tea while cutting costs and emissions.

    This localised approach minimises dependence on external suppliers, protecting them from problems that can arise in global supply chains, like delays or shortages.

    6. Empower employees to be agile and responsive to change.

    Giving employees greater responsibility can make a big difference in how well a company handles unexpected changes. Chinese home appliances and electronics company Haier took this to the next level by famously transforming into an organisation of thousands of micro-enterprises, each responsible for decision-making, resource management and profit generation.

    This decentralised approach allows teams to swiftly adapt their strategies when disruptions arise. For instance, during the COVID pandemic, Haier maintained operational efficiency by enabling employees at local and product levels to make rapid, informed decisions.

    By staying close to users and gathering constant feedback, Haier’s micro-enterprises are able to anticipate potential disruptions before they become major threats and develop products and services that satisfy evolving needs.

    While it might not always be possible to completely shift power to individual teams, when people have the freedom to make decisions and take ownership of their work, they can respond quickly to new challenges and come up with creative solutions.

    Anticipation and adaptation

    The challenges that seem new and overwhelming are simply part of the daily reality for those in emerging economies. For decades, companies in these regions have been anticipating and adapting. As risks grow and intertwine, companies can learn from the resilience built by businesses in emerging markets.

    It all begins with a shift in mindset – recognising these challenges as the new reality and accelerating our own pace of learning and adaptation accordingly.

    – 6 tips on how to run a company in turbulent times – lessons from emerging markets
    – https://theconversation.com/6-tips-on-how-to-run-a-company-in-turbulent-times-lessons-from-emerging-markets-248914

    MIL OSI Africa