Patrick Harvie MSP calls on the UK Government to fix broken energy market
More in Economy
High energy bills are punishing households and families and baking in high rates of inflation for years to come, say the Scottish Greens.
The Scottish Greens have called for UK Labour to listen to climate experts, take urgent action to fix the broken energy market, and end the artificial high price for clean green electricity, which is cheap to generate but expensive to consume.
This comes following the publication of new monthly figures from the Office for National Statistics showing that inflation has jumped to 3.5% in April, the highest level since February last year.
The ONS has revealed that big increases in utility bills – including electricity and gas bills – have impacted inflation, after changes to the Ofgem energy price cap earlier this year sent April rates soaring.
Independent climate advisors have advised that the UK Government must act urgently to make electricity cheaper, through rebalancing prices to remove policy levies from electricity bills.
The Scottish Greens’ climate spokesperson, Patrick Harvie, said:
“At a time when so many are already struggling to make ends meet, households and families across our country are now facing the highest rates of inflation since February last year.
“Labour promised to make energy bills cheaper, but they have only gone up. Keir Starmer and his colleagues must urgently step in to make sure that households get the benefit of the low price of renewable energy, to help get inflation under control.
“This isn’t just about the price cap. Climate experts are clear – out-of-date policy levies on electricity bills are stopping costs from coming down for consumers, and that’s a barrier to people switching away from fossil fuels for heat and transport. So even though home-grown renewable energy is very cheap to generate, that’s not being reflected in the bills people are paying.
“We desperately need to fix the broken energy market that is plunging people into poverty all while keeping our reliance on climate-wrecking fossil fuels.”
Source: People’s Republic of China in Russian – People’s Republic of China in Russian –
Source: People’s Republic of China – State Council News
Moscow, May 21 /Xinhua/ — Work on a memorandum on a future peace treaty between Russia and Ukraine is proceeding dynamically, and no one is interested in delaying the process, Russian presidential press secretary Dmitry Peskov said at a briefing on Wednesday.
“Nobody is interested in delaying the process; everyone is working dynamically,” TASS quotes him as saying.
The Kremlin representative emphasized that most of this work is being conducted in a discrete mode and should not be “open to the public for obvious reasons.” D. Peskov promised to inform about the progress of the document’s preparation.
Russian President Vladimir Putin previously stated that Moscow is ready to work with Kiev on a memorandum on a future peace treaty, which could also include issues of a ceasefire and principles for resolving the conflict. On May 19, he held a telephone conversation with US President Donald Trump, during which they discussed the resumption of direct negotiations between Russia and Ukraine. –0–
Source: Federal Bureau of Investigation FBI Crime News (b)
ALBUQUERQUE – A Shiprock man has been charged with assault with a dangerous weapon following a shooting incident outside a restaurant.
According to court documents, Navajo Nation Police responded to a 911 call reporting that an individual was shot in the hand in front of the Little Caesars Restaurant in Shiprock. Officers located the suspect, identified as TerroldTyler, 35, an enrolled member of the Navajo Nation, near the scene carrying a black backpack that contained a homemade firearm and five live shotgun shells. Tyler was detained without incident.
Investigators determined that Tyler and the victim were involved in an argument behind the restaurant prior to the shooting. Tyler allegedly produced the homemade shotgun and shot the victim in the left hand. Paramedics responded to the scene, but the victim declined medical treatment. A social media video depicting Tyler with the firearm was also recovered as evidence.
Tyler is charged with assault with a dangerous weapon and will remain in custody pending trial, which has not yet been scheduled. If convicted of the current charges, Tyler faces up to 10 years in prison.
U.S. Attorney Ryan Ellison and Philip Russell, Acting Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office made the announcement today.
The Farmington Resident Agency of the Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Navajo Nation Police Department and Navajo Department of Criminal Investigations. Assistant U.S. Attorney Amy Mondragon is prosecuting the case.
A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
For the first time in three years, government has proposed an inflation-linked increase to the general fuel levy.
“For the 2025/26 fiscal year, this is the only new tax proposal that I am announcing. It means from 4 June this year, the general fuel levy will increase by 16 cents per litre for petrol, and by 15 cents per litre for diesel,” Minister of Finance Enoch Godongwana said on Wednesday, in Parliament.
The general fuel levy has remained unchanged for the past three years to provide consumers with relief from high fuel price inflation.
Re-tabling the 2025 Budget Review, Godongwana said unfortunately, this tax measure alone will not close the fiscal gap over the medium term.
“The 2026 Budget will therefore need to propose new tax measures, aimed at raising R20 billion. We have allocated an additional R7.5 billion over the medium-term expenditure framework (MTEF), to increase the effectiveness of the South African Revenue Service (SARS) in collecting more revenue.
“Part of this allocation will be used to increase collections from debts owed to the fiscus. SARS has indicated that this could raise between R20 billion to R50 billion in additional revenue per year,” the Minister said.
Another part of the additional allocation to SARS will be used to improve modernisation.
This will include targeting illicit trade in tobacco and other areas, which should boost revenue over the medium term.
“As SARS utilises this investment to raise additional revenue, which I believe can be at least R35 billion, the R20 billion to close the current revenue gap will not have to be raised through taxes.
“Madam Speaker, let me call on every South African, be they individuals, small business operators or large corporates, to honour their tax obligations and contribute to building a better and more equitable nation,” the Minister said.
He thanked all the taxpayers that continue to pay their taxes while emphasising that government does not take taxpayers for granted.
“As a government, we know that we must earn the taxpayer’s trust every day, by spending public money with care and ensuring that every rand collected is spent on its intended purpose.
“We recognise the urgent need to do more to achieve this goal. We are not deaf to the public’s concern about wasteful and inefficient expenditure.
“Our commitment to collect taxes must be matched by better efficiency in how that money is spent. It must be matched by much stricter oversight that quickly identifies problems and provides timely solutions when things go wrong,” the Minister explained.
Expansion of the zero-rated basket withdrawn
Meanwhile, as a result of the withdrawal of the proposed increases in the VAT rate, the expansion of the zero-rated basket, which was included to cushion poorer households from the VAT rate increase, falls away.
Last month, the Minister requested the Speaker of the National Assembly to maintain the Value-Added Tax (VAT) rate at its current level of 15% , reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.
“Madam Speaker, compared to the March estimates, tax revenue projections have been revised down by R61.9 billion over the three years. This reflects the reversal of the VAT increase and the much weaker economic outlook.
“In this difficult environment, it remains vital that we still take actions to increase revenue to protect and bolster frontline services, while expanding infrastructure investments to drive economic activity,” the Minister said. –SAnews.gov.za
In an ongoing effort to grow the economy, government will continue to implement growth enhancing structural reforms as part of Operation Vulindlela.
“Madam Speaker, a bigger, faster-growing economy, and the larger fiscal resources that come with it, are the key to building up the fiscal room we need to meet more of our developmental goals,” Minister of Finance, Enoch Godongwana, said on Wednesday during the re-tabling of the 2025 Budget Review, in Parliament.
Through the first phase of Operation Vulindlela, bold and far-reaching reforms were implemented in the network sectors and the visa regime.
“As a result, numerous economic bottlenecks have eased, new investments unlocked, and the growth potential of the economy enabled. Yet the economy still faces constraints,” the Minister said.
Operation Vulindlela is a joint initiative of the Presidency and the National Treasury to accelerate the implementation of structural reforms and support economic recovery.
The unit monitors progress and actively supports implementation. Its aim is to fast-track the implementation of high impact reforms, addressing obstacles or delays to ensure execution on policy commitments.
The first phase of Operation Vulindlela aimed to reduce power cuts, fix the transport system, lower data costs, increase water supply, attract skills and support tourism.
The second phase of Operation Vulindlela, launched by President Cyril Ramaphosa earlier this month, will not only prioritise new areas for implementation but will also deepen the implementation of current reforms.
Upcoming reforms will focus on making it easier to find work and hire people – particularly by addressing spatial inequalities, using cities to drive economic activity and improve municipal service delivery.
The second phase will therefore focus on the following areas:
Seeing-through existing reforms in energy, water, logistics and in the visa regime.
Improving the performance of local government. This includes professionalising utilities, appointing suitably qualified people to senior positions, and reviewing the local government fiscal framework.
Harnessing digital transformation, in order to drive the adoption of digital technologies in government and build digital public infrastructure for use by all South Africans.
Addressing the apartheid legacy of spatial inequality. Reforms will include changes to housing policy and accelerating the release of publicly owned land and buildings. This will also entail clearing the backlog of title deeds for affordable housing, and a comprehensive regulatory review aimed at removing barriers to the development of low-cost housing.
This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.
Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.
This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.
The following authors and co-sealers are releasing this CSA:
United States National Security Agency (NSA)
United States Federal Bureau of Investigation (FBI)
United Kingdom National Cyber Security Centre (NCSC-UK)
Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
Czech Republic Military Intelligence (VZ) Vojenské zpravodajství
Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
United States Cybersecurity and Infrastructure Security Agency (CISA)
United States Department of Defense Cyber Crime Center (DC3)
United States Cyber Command (USCYBERCOM)
Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
Canadian Centre for Cyber Security (CCCS)
Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
Estonian Foreign Intelligence Service (EFIS) Välisluureamet
Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions. In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments. Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.
Description of Targets
The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations:
Defense Industry
Transportation and Transportation Hubs (ports, airports, etc.)
Maritime
Air Traffic Management
IT Services
In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].
The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].
The countries with targeted entities include the following, as illustrated in Figure 1:
Bulgaria
Czech Republic
France
Germany
Greece
Italy
Moldova
Netherlands
Poland
Romania
Slovakia
Ukraine
United States
Figure 1: Countries with Targeted Entities
Initial Access TTPs
To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):
The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]
Credential Guessing/Brute Force
Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573].
Spearphishing
GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient.
Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:
Webhook[.]site
FrgeIO
InfinityFree
Dynu
Mocky
Pipedream
Mockbin[.]org
The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].
CVE Usage
Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].
Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE.
Post-Compromise TTPs
After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].
The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:
C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit
Figure 2: Example Active Directory Domain Services command
Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].
Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]
After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].
After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including:
sender,
recipient,
train/plane/ship numbers,
point of departure,
destination,
container registration numbers,
travel route, and
cargo contents.
In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.
Malware
Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:
While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise.
Persistence
In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence.
Exfiltration
GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure.
The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected.
Connections to Targeting of IP Cameras
In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams.
The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.
Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration.
From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:
Table 1: Geographic distribution of targeted IP cameras
Country
Percentage of Total Attempts
Ukraine
81.0%
Romania
9.9%
Poland
4.0%
Hungary
2.8%
Slovakia
1.7%
Others
0.6%
Mitigation Actions
General Security Mitigations
Architecture and Configuration
Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.
Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].
*.000[.]pe
*.1cooldns[.]com
*.42web[.]io
*.4cloud[.]click
*.accesscan[.]org
*.bumbleshrimp[.]com
*.camdvr[.]org
*.casacam[.]net
*.ddnsfree[.]com
*.ddnsgeek[.]com
*.ddnsguru[.]com
*.dynuddns[.]com
*.dynuddns[.]net
*.free[.]nf
*.freeddns[.]org
*.frge[.]io
*.glize[.]com
*.great-site[.]net
*.infinityfreeapp[.]com
*.kesug[.]com
*.loseyourip[.]com
*.lovestoblog[.]com
*.mockbin[.]io
*.mockbin[.]org
*.mocky[.]io
*.mybiolink[.]io
*.mysynology[.]net
*.mywire[.]org
*.ngrok[.]io
*.ooguy[.]com
*.pipedream[.]net
*.rf[.]gd
*.urlbae[.]com
*.webhook[.]site
*.webhookapp[.]com
*.webredirect[.]org
*.wuaze[.]com
Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.
Identity and Access Management
Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques:
Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
Use account throttling or account lockout [D3-ANET]:
Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]
IP Camera Mitigations
The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:
Ensure IP cameras are currently supported. Replace devices that are out of support.
Apply security patches and firmware updates to all IP cameras [D3-SU].
Disable remote access to the IP camera, if unnecessary [D3-ITF].
Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
If supported, enable authenticated RTSP access only [D3-AA].
Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
Configure, tune, and monitor logging—if available—on the IP camera.
Indicators of Compromise (IOCs)
Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.
Utilities and scripts
Legitimate utilities
Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:
ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
wevtutil – A legitimate Windows executable used by threat actors to delete event logs
vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
OpenSSH – The Windows version of a legitimate open source SSH client
schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
whoami – A legitimate Windows executable used to retrieve the name of the current user
tasklist – A legitimate Windows executable used to retrieve the list of running processes
hostname – A legitimate Windows executable used to retrieve the device name
arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
net – A legitimate Windows executable used to retrieve detailed user information
wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
cacls – A legitimate Windows executable used to modify permissions on files
icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
ssh – A legitimate Windows executable used to establish network shell connections
reg – A legitimate Windows executable used to add to or modify the system registry
Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.
Malicious scripts
Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
Hikvision backdoor string: “YWRtaW46MTEK”
Suspicious command lines
While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:
edge.exe “-headless-new -disable-gpu”
ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.
June 2024
July 2024
August 2024
192[.]162[.]174[.]94
207[.]244[.]71[.]84
31[.]135[.]199[.]145
79[.]184[.]25[.]198
91[.]149[.]253[.]204
103[.]97[.]203[.]29
162[.]210[.]194[.]2
31[.]42[.]4[.]138
79[.]185[.]5[.]142
91[.]149[.]254[.]75
209[.]14[.]71[.]127
46[.]112[.]70[.]252
83[.]10[.]46[.]174
91[.]149[.]255[.]122
109[.]95[.]151[.]207
46[.]248[.]185[.]236
83[.]168[.]66[.]145
91[.]149[.]255[.]19
64[.]176[.]67[.]117
83[.]168[.]78[.]27
91[.]149[.]255[.]195
64[.]176[.]69[.]196
83[.]168[.]78[.]31
91[.]221[.]88[.]76
64[.]176[.]70[.]18
83[.]168[.]78[.]55
93[.]105[.]185[.]139
64[.]176[.]70[.]238
83[.]23[.]130[.]49
95[.]215[.]76[.]209
64[.]176[.]71[.]201
83[.]29[.]138[.]115
138[.]199[.]59[.]43
70[.]34[.]242[.]220
89[.]64[.]70[.]69
147[.]135[.]209[.]245
70[.]34[.]243[.]226
90[.]156[.]4[.]204
178[.]235[.]191[.]182
70[.]34[.]244[.]100
91[.]149[.]202[.]215
178[.]37[.]97[.]243
70[.]34[.]245[.]215
91[.]149[.]203[.]73
185[.]234[.]235[.]69
70[.]34[.]252[.]168
91[.]149[.]219[.]158
192[.]162[.]174[.]67
70[.]34[.]252[.]186
91[.]149[.]219[.]23
194[.]187[.]180[.]20
70[.]34[.]252[.]222
91[.]149[.]223[.]130
212[.]127[.]78[.]170
70[.]34[.]253[.]13
91[.]149[.]253[.]118
213[.]134[.]184[.]167
70[.]34[.]253[.]247
91[.]149[.]253[.]198
70[.]34[.]254[.]245
91[.]149[.]253[.]20
Detections
Customized NTLM listener
rule APT28_NTLM_LISTENER {
meta:
description = "Detects NTLM listeners including APT28's custom one"
( any of ($sysinternals_*) and any of ($psexec_*) )
or
( 2 of ($network_*) and 2 of ($psexec_*))
)
}
The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community:
Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.
Further Reference
To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc.
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
Purpose
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
Contact
United States organizations
National Security Agency (NSA)
Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
Department of Defense Cyber Crime Center (DC3)
United Kingdom organizations
Germany organizations
Czech Republic organizations
Poland organizations
Australian organizations
Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.
Canadian organizations
Estonia organizations
French organizations
French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18.
See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.
Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices.
Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target.
External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim.
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php.
Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php.
Appendix C: MITRE D3FEND Countermeasures
Table 16: MITRE D3FEND countermeasures
Countermeasure Title
ID
Details
Network Isolation
Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers.
Access Mediation
Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access.
Inbound Traffic Filtering
Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement.
Resource Access Pattern Analysis
Use automated tools to audit access logs for security concerns and identify anomalous access requests.
Outbound Traffic Filtering
Block NTLM/SMB requests to external infrastructure.
Platform Monitoring
Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers.
System File Analysis
Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly.
Application Hardening
Enable optional security features in Windows to harden endpoints and mitigate initial access techniques.
Application-based Process Isolation
Enable attack surface reduction rules to prevent executable content from email.
Executable Allowlisting
Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%.
Execution Isolation
Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts.
Application Configuration Hardening
Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.).
Process Spawn Analysis
Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters.
URL Reputation Analysis
Use services that provide enhanced browsing services and safe link checking.
Network Access Mediation
Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible.
Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors.
Domain Name Reputation Analysis
Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.
Multi-factor Authentication
Use MFA with strong factors and require regular re-authentication, especially for management accounts.
Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts.
User Account Permissions
Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected.
Token-based Authentication
Reduce reliance on passwords; instead, consider using services like single sign-on.
Credential Hardening
Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts.
Authentication Event Threshholding
Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout.
Strong Password Policy
Use a service to check for compromised passwords before using them.
Credential Rotation
Change all default credentials.
Encrypted Tunnels
Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices.
Software Update
Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life.
Agent Authentication
Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only.
User Behavior Analysis
Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity.
In coordination with the Federal Government of Somalia, U.S. Africa Command (AFRICOM) conducted airstrikes against al Shabaab on May 17, 2025.
The airstrikes occurred approximately 200 km north of Mogadishu near Mabaax, Somalia.
Al Shabaab has proven both its will and capability to attack U.S. forces.
AFRICOM, alongside the Federal Government of Somalia and Somali Armed Forces, continues to take action to degrade al Shabaab’s ability to plan and conduct attacks that threaten the U.S. homeland, our forces, and our citizens abroad.
Specific details about units and assets will not be released to ensure continued operations security.
KUALA LUMPUR, MALAYSIA, May 21, 2025 (GLOBE NEWSWIRE) — TMD Energy Limited (the “Company” or “TMDEL”) (NYSE American: TMDE), together with its subsidiaries is a Malaysia and Singapore based services provider engaged in integrated bunkering services which involves ship-to-ship transfer of marine fuels, ship management services and vessel chartering services, today announced a strategic expansion into oil waste collection, marking a significant enhancement of its Environmental, Social, and Governance (ESG) commitments. This initiative aims to collect sludge oil and used cooking oil and sell to third-party partners for processing into biodiesel, which also helps diversify the Company’s revenue streams.
Following a successful Initial Public Offering, the Company is poised to leverage its extensive logistics network and industry expertise to meet the increasing demand for sustainable waste disposal. It plans to collect residual oils from maritime operators and the food industry, facilitating their conversion into cleaner biodiesel. This circular economy approach not only mitigates greenhouse gas emissions but also supports Malaysia’s national commitment to renewable energy adoption.
Leadership in Sustainable Innovation
The biodiesel market in Malaysia, supported by government incentives, presents substantial growth opportunities. TMDEL’s entry into this sector aligns with evolving regulatory frameworks and the corporate demand for eco-conscious partnerships. “Our expansion signifies a strategic shift toward long-term environmental stewardship,” stated Dato’ Sri Kam Choy Ho, Chairman and CEO of the Company. “By collaborating with businesses, agencies and environmental organizations, we aim to redefine waste as a valuable resource—transforming sustainability commitments into actionable and scalable solutions.”
“This initiative reinforces TMDEL’s dual commitment to operational excellence and ecological responsibility. The Company’s established infrastructure ensures efficient collection, and we target to engage in processing and distribution of biodiesel in the near future, so as to position the Company as a key player in Southeast Asia’s green energy transition.”
“Furthermore, this milestone underscores our vision to lead the bio-green industry while upholding our commitment to exceptional service standards,” added Dato’ Sri Kam Choy Ho. “Every step forward is a step toward a future where economic growth and environmental responsibility coexist.”
About TMD Energy Limited
TMD Energy Limited and its subsidiaries (“TMDEL Group”) are principally involved in marine fuel bunkering services specializing in the supply and marketing of marine gas oil and marine fuel oil of which include high sulfur fuel oil, low sulfur fuel oil and very low sulfur fuel oil, to ships and vessels at sea. TMDEL Group is also involved in the provision of ship management services for in-house and external vessels, as well as vessel chartering. As of today, TMDEL Group operates in 19 ports across Malaysia with a fleet of 15 bunkering vessels. For more information, please visit the Company’s website at: www.tmdel.com.
Forward-Looking Statements
Certain statements in this announcement are forward-looking statements, including but not limited to, the Company’s Offering. These forward-looking statements involve known and unknown risks and uncertainties and are based on the Company’s current expectations and projections about future events that the Company believes may affect its financial condition, results of operations, business strategy and financial needs. Investors can identify these forward-looking statements by words or phrases such as “may”, “could”, “will”, “should”, “would”, “expect”, “plan”, “intend”, “anticipate”, “believe”, “estimate”, “predict”, “potential”, “project” or “continue” or the negative of these terms or other comparable terminology. The Company undertakes no obligation to update or revise publicly any forward-looking statements to reflect subsequent occurring events or circumstances, or changes in its expectations, except as may be required by law. Although the Company believes that the expectations expressed in these forward-looking statements are reasonable, it cannot assure you that such expectations will turn out to be correct, and the Company cautions investors that actual results may differ materially from the anticipated results and encourages investors to review other factors that may affect its future results in the Company’s financial results filings with the SEC.
For investor and media inquiries, please contact: TMD ENERGY LIMITED e-Mail : corporate@tmdel.com
Source: People’s Republic of China – State Council News
Deutsche Grammophon (DG) and Blue Note Records, two of the world’s most iconic classical and jazz labels, launched Chinese branches on May 15 as the country’s audience for these genres continues to expand.
The labels will operate dedicated China imprints in collaboration with Universal Music Greater China, the companies said.
Executives launch Deutsche Grammophon China in Shanghai, May 15, 2025. [Photo courtesy of Universal Music Group]
“For decades, Deutsche Grammophon and Blue Note have held a special place in the hearts of Chinese classical and jazz musicians,” said Timothy Xu, chairman and CEO of Universal Music Greater China.
“These labels have deeply influenced how local artists understand, study and create within these genres. Today marks a new beginning. For the first time, these two iconic brands are establishing dedicated labels in China to engage directly with local artists and communities.”
The new labels will focus on discovering Chinese talent, developing original creative work and connecting local musicians with international audiences, according to company executives.
Xu said DG China and Blue Note Records China “will be fully committed to discovering and supporting the next generation of talent emerging from China.”
“Through these efforts, we hope to contribute to the growth and appreciation of classical and jazz music in China and to help bring the richness of Chinese musical expression into deeper dialogue with the world,” he said.
“By combining the global heritage and artistic leadership of these two iconic labels with the market knowledge and cultural insight of our local team, we are creating a stronger platform to connect Chinese talent with global opportunities,” said Adam Granite, executive vice president for market development at Universal Music Group.
Pianists Lang Lang and Yuja Wang, along with Shanghai Symphony Orchestra Music Director Yu Long, all longtime DG artists, will serve as artistic advisors to DG China, executives announced at the launch event.
Lang Lang said in a video message that “Deutsche Grammophon has been my musical home for many years, and I’m thrilled to see the launch of DG China.”
“I believe DG China will be a key platform for emerging Chinese musicians and help connect classical music with broader audiences,” he said. “I also hope it will bring more Chinese voices to the global stage, a mission I deeply believe in and am proud to support.”
DG China will release its first album, “Bach: The Cello Suites,” performed by cellist Wang Jian on May 23, with plans to record all of Dmitri Shostakovich’s symphonies with the Shanghai Symphony Orchestra by 2029 to mark the orchestra’s 150th anniversary. Yu Long called it “also a powerful expression of the artistry and interpretive depth of Chinese musicians today.”
Executives launch Blue Note Records China in Shanghai, May 15, 2025. [Photo courtesy of Universal Music Group]
Blue Note Records China, a new division of the iconic jazz label known for artists like Miles Davis and Herbie Hancock, will focus on developing local talent while bringing Chinese jazz to international audiences, executives said.
The label’s first signing is INNOUT, an avant-garde jazz duo composed of guitarist Xiao Jun and drummer An Yu. The duo combines jazz with electronic elements and experimental composition in a style that has gained recognition in China’s contemporary jazz scene.
Don Was, president of Blue Note Records, said: “Xiao Jun and An Yu are two of the most talented and visionary musicians I’ve ever met. Their music is going to blow people’s minds all over the world. It’s a thrill and an honor to be able to launch Blue Note Records China with their music.”
Blue Note Records China will also partner with JZ Music, a major player in China’s jazz scene, to develop live performance opportunities, including tours, festivals and venue events. The partnership aims to increase Chinese jazz visibility both locally and internationally.
We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.
He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.
As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.
Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.
This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.
The economist who loved jazz
Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.
In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.
Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.
Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.
The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.
Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.
Morojele on drums for Andile Yenana.
Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.
His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:
The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.
Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.
Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.
I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.
In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.
Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.
There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”
In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.
The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.
The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.
For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.
He was working on his third fiction outing – a collection of short stories – at the time of his death.
The beauty of his work lives on
Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.
Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).
Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
After 18 months of punishing airstrikes, raids and an increasingly restrictive siege in Gaza, the United Nations on May 20, 2025, issued one of its most urgent warnings yet about the ongoing humanitarian crisis: an estimated 14,000 babies were at risk of death within the next 48 hours without an immediate influx of substantial aid, especially food.
The assessment came a day after Israel allowed the first trickle of aid back into Gaza following its nearly three-month total blockade imposed on March 2. But on the first day of that resumption, the U.N. Office for the Coordination of Humanitarian Affairs reported that only nine trucks were allowed into Gaza, when around 500 are required every day. The U.N. called it “a drop in the ocean of what is urgently needed.”
Israel’s control of food and aid into Gaza has been a consistent theme throughout the past 18 months. Indeed, just two weeks after Israel’s massive military campaign in the Gaza Strip began in late 2023, Oxfam International reported that only around 2% of the usual amount of food was being delivered to residents in the territory and warned against “using starvation as a weapon of war.”
Amid the broader destruction to lives and infrastructure, there is now barely a food system to speak of in Gaza.
Since October 2023, Israeli bombs have destroyed homes, bakeries, food production factories and grocery stores, making it harder for people in Gaza to offset the impact of the reduced imports of food.
A handful of trucks loaded with humanitarian aid for the Gaza Strip are seen at the Kerem Shalom crossing in southern Israel on May 20, 2025. AP Photo/Maya Alleruzzo
But as much as things have worsened in the past 18 months, food insecurity in Gaza and the mechanisms that enable it did not start with Israel’s response to the Oct. 7 attack by Hamas.
Multiple factors contributed to this preexisting food insecurity, not least the blockade of Gaza imposed by Israel and enabled by Egypt since 2007. All items entering the Gaza Strip, including food, became subject to Israeli inspection, delay or denial.
Basic foodstuff was allowed, but because of delays at the border, it could spoil before it entered Gaza.
By placing restrictions on food imports, Israel has claimed to be trying to put pressure on Hamas by making life difficult for the people in Gaza. “The idea is to put the Palestinians on a diet, but not to make them die of hunger,” said one Israeli government adviser in 2006.
To enable this, the Israeli government commissioned a 2008 study to work out exactly how many calories Palestinians would need to avoid malnutrition. The report was released to the public only following a 2012 legal battle. Echoes of this sentiment can be seen in the Israeli decision in May 2025 to allow only “the basic amount of food” to reach Gaza to purportedly ensure “no starvation crisis develops.”
The long-running blockade also increased food insecurity by preventing meaningful development of an economy in Gaza.
Displaced Palestinians fleeing amid ongoing Israeli military operations in the Gaza Strip arrive in Jabalia in northern Gaza on May 18, 2025. AP Photo/Jehad Alshrafi
The U.N. cites the “excessive production and transaction costs and barriers to trade with the rest of the world” imposed by Israel as the primary cause of severe underdevelopment in the occupied territories, including Gaza. As a result, in late 2022 the unemployment rate in Gaza stood at around 50%. This, coupled with a steady increase in the cost of food, made affording food difficult for many Gazan households, rendering them dependent on aid, which fluctuates frequently.
Hampering self-sufficency
More generally, the blockade and the multiple rounds of destruction of parts of the Gaza Strip have made food sovereignty in the territory nearly impossible.
Even prior to the latest war, Gaza’s fishermen were regularly shot at by Israeli gunboats if they ventured farther in the Mediterranean Sea than Israel permits. Because the fish closer to the shore are smaller and less plentiful, the average income of a fisherman in Gaza has more than halved since 2017.
Much of Gaza’s farmland has been rendered inaccessible to Palestinians as a result of post-October 2023 actions by Israel.
And the infrastructure needed for adequate food production – greenhouses, arable lands, orchards, livestock and food production facilities – has been destroyed or heavily damaged. International donors hesitate to rebuild facilities, knowing they cannot guarantee their investment will last more than a few years before being bombed again.
The latest ongoing siege has only further crippled the ability of Gaza to be food self-sufficient. By May 2025, nearly 75% of croplands had been destroyed, along with significant amounts of livestock. Less than one-third of agricultural wells used for irrigation remain functional.
Starvation as weapon of war
The use of starvation as a weapon is strictly forbidden under the Geneva Conventions, a set of statutes that govern the laws of warfare. Starvation has been condemned by U.N. Resolution 2417, which decried the use of deprivation of food and basic needs of the civilian population and compelled parties in conflict to ensure full humanitarian access.
Israeli Prime Minister Benjamin Netanyahu has said publicly that Israel was permitting aid now only because allies were pressuring him over “images of mass famine.” This stance suggests that Israel will not soon increase aid beyond what his government deems politically acceptable.
While there is more evidence than ever before that Israel is using food as a weapon of war, there is also, I believe, ample evidence that this was the reality long before Oct. 7, 2023.
In the meantime, the implications for Palestinians in Gaza have never been more dire.
More death is certain to follow. On May 12, the Integrated Food Security Phase Classification, a global system created to track food insecurity, released an alarming report on projections of food insecurity in Gaza.
It warned that by September 2025, half a million people in Gaza – 1 in 5 of the population – will be facing starvation and that the entire population will experience acute food insecurity at crisis level, or worse.
Editor’s note: Parts of this story were originally contained in an article published by The Conversation U.S. on Feb. 15, 2024.
Yara M. Asi does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: The Conversation – USA – By Sharon Tettegah, Professor of Creative Studies, University of California, Santa Barbara
Retention and recruitment efforts designed to boost diversity in engineering programs often fall short of their goals.gorodenkoff/Getty Images
For decades, colleges, government agencies and foundations have experimented with recruitment and retention efforts designed to increase diversity in engineering programs.
However, the efforts have not significantly boosted the number of women, students of color, individuals with disabilities and other underrepresented groups studying and earning degrees in STEM and engineering fields.
Latino, Black, Native American and Alaska Native students are underrepresented among science and engineering degree recipients at the bachelor’s degree level and above. The groups are also underrepresented among STEM workers with at least a bachelor’s degree.
I study equity and social justice in STEM learning. In my recent study, I found that more students from diverse backgrounds could excel in engineering programs if course content were tailored to a wider variety of learning preferences.
Why it matters
Focusing on learning preferences could boost diversity in engineering courses and careers. Morsa Images/Getty Images
During my time as a program officer at the National Science Foundation, an independent federal agency that supports science and engineering, I reviewed plenty of research focused on broadening participation and diversifying student enrollment in STEM fields.
Progress can stall on efforts to boost diversity because college instructors do not consider the synergistic relationship between the content and the learner.
Teachers are the mediators, and it is students’ experiences with the curriculum that matter.
It was long a common belief that students have different learning styles. These included kinesthetic, learning through hands-on experiences and physical activity; auditory, learning by listening to information; and visual, learning by seeing information.
More recent research does not support the idea that teaching students according to their learning style leads to improved learning.
That’s why I prefer the term “learning preferences” rather than learning styles. We all have preferences – whether for ice cream flavors, home decor or how we receive information, including how we learn.
Learning preferences are broader and more flexible, allowing multiple ways of engaging with content.
For example, let’s say a teacher always presented equations in a classroom and the student just could not get it. However, it was the only way the information was presented. To the individual learner, they have failed. Some people would say, “These kids can’t learn,” and subsequently counsel the student out of the class.
Then, years are spent repeating the same cycle.
Students should have opportunities to connect with engineering content in multiple ways. 10’000 hours/Getty Images
However, educators can broaden their viewpoints if they look at the students as customers. If a customer is shopping for a shirt, they look for one that catches their eye. Ultimately, they find one they like.
Instructors need to take the same approach when trying to help students understand what is happening in class. For instance, if I have trouble with equations, I should be provided with options to engage with the lesson in ways that align with my learning preferences.
What’s next?
Learning styles have been heavily researched. However, content preferences have not been well explored.
In a truly democratic education system, curriculum design should reflect the voices of all stakeholders and not just those in positions of power, namely instructors.
Using data mining and artificial intelligence, educators have a variety of options for creating content for the various preferences a learner may want or need. For example, if a student prefers other representational content, such as word problems, graphics or simulations, AI can create diverse representations so that the learner is exposed to a variety of representations.
I argue that future studies need to consider the use of technologies such as adaptive learning applications to understand students’ learning preferences.
Prioritizing diverse learning perspectives in STEM could help create a more inclusive and responsive learning environment.
The Research Brief is a short take on interesting academic work.
Sharon Tettegah received funding from the National Science Foundation for this work. Award Abstract # 1826632
Coordinating Curricula and User Preferences to Increase the Participation of Women and Students of Color in Engineering
For patients hospitalized with chest pain, the amount of time they spend sedentary afterward is linked to a greater risk for more heart problems and death within a year. That’s the key finding of a new peer-reviewed study my colleagues and I published in the journal Circulation: Cardiovascular Quality and Outcomes.
We asked 609 emergency room patients experiencing chest pain — average age of 62 — to wear a physical activity monitor for 30 days after leaving the hospital. The monitor measured movements, sitting time and sleep throughout the day. We then followed patients for one year to track whether they had additional heart problems or died.
We found that patients who averaged more than 15 hours of sedentary behavior daily — which does not include sleep — were more than twice as likely to experience more heart problems or die in the year after discharge than patients who accrued a daily average of 12 hours of sedentary time.
But our goal wasn’t just to document that sitting is harmful. It was also to figure out what patients should do instead to lower their risk.
We found that replacing 30 minutes of sedentary time with moderate or vigorous movement, like brisk walking or running, was most beneficial. It was associated with a 62% lower risk of experiencing more heart problems or dying in the year after discharge. But we also found that replacing 30 minutes of sedentary time with just light movement, such as slow walking or housework, lowered the risk of heart problems and death by 50%.
Sleep was also a healthier option. Replacing 30 minutes of sedentary time with sleep lowered the risk of heart problems and death by 14%.
Clogged arteries could lead to a heart attack. Veronica Zakharova/Science Photo Library via Getty Images
Why it matters
Over 8 million people in the U.S. are admitted to the hospital with chest pain suggestive of acute coronary syndrome. annually. This covers a range of conditions involving reduced blood flow to the heart, including angina and heart attack.
Patients with acute coronary syndrome remain at high risk of having another heart problem even with optimal medical treatment.
The risk also remains high for patients with chest pain who are discharged without a diagnosis of acute coronary syndrome, as their unexplained chest pain may be a precursor to more serious heart problems. Given this risk, there is a need to identify risk factors that can be modified to improve a patient’s prognosis after hospitalization for chest pain.
In previous research, we found that patients with acute coronary syndrome had a fear of exercise and were sedentary, spending over 13 hours a day sitting.
Given that sedentary behavior has been linked to poor heart health in the general population, we were concerned that patients were unknowingly increasing their risk of having another heart problem.
Our latest findings confirm that sedentary time is a harmful behavior for these patients. But beyond telling patients to stop sitting so much, our work provides important guidance: Any movement, regardless of how intense, can be beneficial after hospitalization. This is especially relevant for people recovering from heart problems who may find exercise difficult or scary.
While exercise provides the best “bang for your buck” in terms of health benefits, our findings are good news for patients who may not have the time, ability or desire to exercise. And for those unable to fit in more movement, just getting an extra half hour of sleep is a small, doable step that can make a meaningful difference for your health after hospitalization.
What still isn’t known
Researchers don’t fully understand why sedentary time is harmful. Muscles help regulate blood sugar and lipid levels. It is thought that when muscles aren’t used, such as when patients sit for hours, this can lead to harmful elevations in blood sugar and lipids.
In turn, this can cause inflammation, plaque buildup in the arteries and organ damage. More research is needed to understand the biological mechanisms so that we can determine just how much movement is needed in a day.
What’s next
While our study highlights the potential risks of sedentary behavior after being hospitalized for chest pain, it was an observational study. Clinical trials are needed to confirm that replacing sedentary time with activity or sleep can improve prognosis.
The Research Brief is a short take on interesting academic work.
Keith Diaz receives funding from the National Institutes of Health.
Source: The Conversation – USA – By Andrew Reeves, Professor of Political Science and Director of the Weidenbaum Center, Washington University in St. Louis
At his inauguration on Jan. 20, 2025, Donald Trump swore to ‘preserve, protect and defend the Constitution of the United States.’Morry Gash/POOL/AFP, Getty Images
Lately, the headlines have been clear: President Donald Trump is headed for a showdown with the courts. If he ignores their rulings, the courts have few tools and limited power to make him comply.
But the real contest is not legal. It is political.
But law alone has never been enough to prevent presidents from abusing their power. The law’s force depends on political will. Presidents often follow the law not simply because they must, but to avoid backlash from Congress, the media or the public.
What the United States is witnessing in 2025 is not just a president testing the system. It is a transformation of the presidency into a fully political institution. The president acts until political resistance becomes strong enough to stop him.
President Donald Trump criticizes judges whose decisions he doesn’t like.
Testing the limits
These political constraints are informal and fluid.
They arise from public opinion, media scrutiny, pressure from party leaders and other elected officials, and the threat of electoral consequences. While legal rules rely on institutions, political limits depend on reputation, norms and the willingness of others to resist.
Trump’s presidency operates within this second framework. Legal boundaries are still present, but they are often treated by his administration as optional and without deference.
These are not isolated incidents. Taken together, they reveal a broader pattern.
Trump appears to treat legal rules not as limits but as obstacles to be negotiated or ignored. One recent scholarly paper has described Trump’s approach as “legalistic noncompliance,” where the administration uses the language of law to give the appearance of compliance while defying the substance of court orders.
In a February 2025 national survey by the Weidenbaum Center, a research institute that I head at Washington University, just 21% of Americans said the president should be able to enact major policy without Congress. The public does not support unchecked presidential power: A further 25% of respondents, including more than one-third of Republicans, neither agreed nor disagreed that a president should have this type of unchecked power. Of those with an opinion, a solid 72% of Americans oppose unilateral presidential action, including 90% of Democrats, 76% of independents and 42% of Republicans.
These findings align with nine earlier national surveys conducted during the Obama and Trump administrations. Jon Rogowski and I report these results in our book, “No Blank Check.”
But one important shift stands out in the recent survey. Support for unilateral executive action among the two-thirds of Republicans who expressed an opinion has reached an all-time high, with 58% of them endorsing presidential action without Congress. That is more than 16 points higher than in any previous wave.
Despite that rise in partisan support, Trump’s broader political position remains weak.
Congressional Republicans continue to offer public support, but many are watching their own polling numbers closely as the midterms approach.
If the economy falters and public opinion turns more sharply against the president, political resistance could grow. I believe that’s when legal rules may begin to matter again – not because they carry new force, but because violating them would carry higher political costs.
Real test still ahead
So far, no judge has held the Trump administration in contempt of court. But the signs of erosion are unmistakable. Trump recently accused the Supreme Court of “not allowing me to do what I was elected to do” after it temporarily blocked his administration’s effort to deport migrants with alleged ties to Venezuelan gangs. Treating the judiciary as just another political adversary and ignoring its rulings risks an even deeper constitutional crisis.
The most meaningful check on presidential power will be political.
Courts rely on the broader political system for enforcement. That support can take many forms: elected officials speaking out in defense of the rule of law; Congress using its oversight and funding powers to uphold court rulings; bureaucrats refusing to implement unlawful directives; and a press and public that demand compliance. Without that support, even the clearest legal decisions may be ignored.
The legal fights unfolding today are serious and must be watched closely. But Trump is not focused on the courts. He is focused on politics – on how far he can go, and whether anyone will make him stop.
Andrew Reeves is affiliated with Washington University in St. Louis and the Hoover Institution.
How much do you engage with others when you’re out in public? Lots of people don’t actually engage with others much at all. Think of commuters on public transportation staring down at their phones with earbuds firmly in place.
As a professor of social psychology, I see similar trends on my university campus, where students often put on their headphones and start checking their phones before leaving the lecture hall on the way to their next class.
Curating daily experiences in these ways may appeal to your personal interests, but it also limits opportunities for social connection. Humans are social beings: We desire to feel connected to others, and even connecting with strangers can potentially boost our mood.
At the same time, our attention is increasingly being pulled in varied directions within a highly saturated information environment, now commonly known as the “attention economy.”
It is perhaps not surprising, then, that so many Americans are experiencing a crisis of social connection. Research in social psychology helps to explain how the small behaviors and choices we make as individuals affect our experiences with others in public settings.
Where you focus your attention
One factor shaping people’s experiences in public settings concerns where they focus their attention. Since there is more information out in the world than anyone could ever realistically take in, people are driven to conserve their limited mental resources for those things that seem most crucial to navigating the world successfully. What this means is that every person’s attention is finite and selective: By attending to certain bits of information, you necessarily tune out others, whether you’re aware of doing so or not.
More often than not, the information you deem worthy of attention also tends to be self-relevant. That is, people are more likely to engage with information that piques their interest or relates to them in some way, whereas they tend to ignore information that seems unrelated or irrelevant to their existence.
One unfortunate consequence is that a person may end up treating interactions with other people as transactions, with a primary focus on getting one’s own needs met, or one’s own questions answered. A very different approach would involve seeing interactions with others as opportunities for social connection; being willing to expend some additional mental energy to listen to others’ experiences and exchange views on topics of shared interest can serve as a foundation for building social relationships.
It can feel alienating to be surrounded by people who have basically hung out a ‘do not disturb’ sign. Drazen/E+ via Getty Images
How others interpret your actions
Also, by focusing so much attention on their own individual interests, people may inadvertently signal disinterest to others in their social environments.
As an example, imagine how it would feel to be on the receiving end of those daily commuting rituals. You find yourself surrounded by people whose ears are closed off, whose eyes are down and whose attention is elsewhere – and you might start to feel like no one really cares whether you exist or not.
As social creatures, it’s natural for human beings to want to be seen and acknowledged by other people. Small gestures such as eye contact or a smile, even from a stranger, can foster feelings of connection by signaling that our existence matters. Instead, when these signals are absent, a person may come to feel like they don’t matter, or that they’re not worthy of others’ attention.
How to foster connection in public spaces
For all these reasons, it may prove valuable to reflect on how you use your limited mental resources, as a way to be more mindful and purposeful about what and who garner your attention. As I encourage my students to do, people can choose to engage in what I refer to as psychological generosity: You can intentionally redirect some of your attention toward the other people around you and expend mental resources beyond what is absolutely necessary to navigate the social world.
Engaging in psychological generosity doesn’t need to be a heavy lift, nor does it call for any grand gestures. But it will probably take a little more effort beyond the bare minimum it typically takes to get by. In other words, it will likely involve moving from being merely transactional with other people to becoming more relational while navigating interactions with them.
A few simple examples of psychological generosity might include actions such as:
Tuning in by turning off devices. Rather than default to focusing attention on your phone, try turning off its volume or setting it to airplane mode. See if you notice any changes in how you engage with other people in your immediate environment.
Making eye contact and small talk. As historian Timothy Snyder writes, eye contact and small talk are “not just polite” but constitute “part of being a responsible member of society.”
Smiling and greeting someone you don’t know. Take the principle of “innocent until proven guilty” to the realm of social relations, by showing your willingness to welcome other people rather than displaying disinterest and avoidance. Such simple acts may help to foster feelings of belonging and build a sense of community with others.
Acknowledging another human with a smile, even when using an automated system, can help them feel seen and valued. izusek/E+ via Getty Images
Among the most cynical, examples like these may initially be written off as reflecting pleas to practice the random acts of kindness often trumpeted on bumper stickers. Yet acts like these are far from random – they require intention and redirection of your attention toward action, like any new habit you may wish to cultivate.
Practicing acts of psychological generosity, then, can provide you with opportunities to benefit from social connection, at the same time as these acts can pay dividends to other people and to the social fabric of your community.
Linda R. Tropp does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: United States of America – Department of State (video statements)
Secretary of State Marco A. Rubio testifies before the House Appropriations Committee’s Subcommittee on State, Foreign Operations, and Related Programs on the FY26 Department of State Budget Request on Capitol Hill, on May 21, 2025.
———-
Under the leadership of the President and Secretary of State, the U.S. Department of State leads America’s foreign policy through diplomacy, advocacy, and assistance by advancing the interests of the American people, their safety and economic prosperity. On behalf of the American people we promote and demonstrate democratic values and advance a free, peaceful, and prosperous world.
The Secretary of State, appointed by the President with the advice and consent of the Senate, is the President’s chief foreign affairs adviser. The Secretary carries out the President’s foreign policies through the State Department, which includes the Foreign Service, Civil Service and U.S. Agency for International Development.
Get updates from the U.S. Department of State at www.state.gov and on social media!
Facebook: https://www.facebook.com/statedept
X: https://x.com/StateDept
Instagram: https://www.instagram.com/statedept
Flickr: https://flickr.com/photos/statephotos/
Rumble: https://rumble.com/c/StateDept
Substack: https://statedept.substack.com
Watch on-demand State Department videos: https://video.state.gov/
Subscribe to The Week at State e-newsletter: https://public.govdelivery.com/accounts/USSTATEBPA/signup/32562
State Department website: https://www.state.gov/
Careers website: https://careers.state.gov/
White House website: https://www.whitehouse.gov/
Terms of Use: https://state.gov/tou
Source: United States Senator for New Hampshire Jeanne Shaheen
Published: 05.21.2025
(Washington, DC) – U.S. Senator Jeanne Shaheen (D-NH), Ranking Member of the U.S. Senate Foreign Relations Committee, joined CNN’s The Arena this evening to discuss her questioning of U.S. Secretary of State Marco Rubio earlier in the day and her belief that Russian President Vladimir Putin is playing President Trump. She also sharply criticized Congressional Republicans’ budget proposal that would gut Medicaid and food assistance benefits to finance tax breaks for billionaires and special interest groups. The interview followed Secretary Rubio’s first testimony to the Senate Foreign Relations Committee since his confirmation hearing in January. Click HERE to watch Senator Shaheen’s interview.
Key Quotes from Senator Shaheen:
When asked if she feels Secretary Rubio and President Trump are being played by Putin, Shaheen said: “I do, absolutely. And I said that to Secretary Rubio and we heard it again, what the outcome of this phone call between President Trump and Vladimir Putin yesterday was that now Putin is going to bring in a sheet that outlines what they want to see, to end the war in Ukraine, to get them to the table. Well, he’s just playing for time because he thinks the longer he can delay that, we’re going to get disinterested, that we’re going to not want to continue to support Ukraine in this fight. But what he doesn’t understand is that the President and this administration says the biggest threat to America is China, and China and President Xi are watching what the outcome of this war in Ukraine is. And if we are not tough in Ukraine, if we are not tough on Putin, that he knows that we’re not going to be tough on him when he goes after Taiwan. And so that’s a real problem.”
On Republicans’ budget proposal, Shaheen said: “Well, it’s clear that the Republicans in the House care more about what Donald Trump thinks than they care about what their constituents think. Because constituents in most of this country don’t want to see massive cuts to the Medicaid program, health care that so many Americans rely on, whether it’s for nursing home care or for people with disabilities, people who get their health insurance through the Medicaid program.”
On Republicans threatening cuts to program like Medicaid and SNAP, Shaheen said: “And what they’re actually trying to do with those worker requirements and other changes is to reduce the number of people on Medicaid so they can save money and what they want to do, what they want to do with the money that they’re saving by cutting Medicaid, by cutting food benefits from the Snap program, is to provide a huge tax cut to the wealthiest Americans. 70% of the benefits from the tax cuts are going to go to the wealthiest 1% in this country.”
overnor Kathy Hochul today announced over $10.4 million has been awarded to 30 animal care organizations across the state through the seventh round of the New York State Companion Animal Capital Fund, the first state program in the nation to fund capital projects for animal shelters. The funding will support construction, renovation, and expansion projects that will enhance animal care and health and help ensure adoptions for New York’s dogs and cats. This builds on Governor Hochul’s commitment to securing safe housing and care for sheltered dogs and cats as they await adoption.
“Any pet owner can tell you that companion animals like dogs and cats are more than just furry friends – they’re family,” Governor Hochul said. “Animal shelters and humane societies play an enormous role in keeping companion animals safe and well cared for while they await their new families and forever home. This funding is making a real difference, helping to better equip these vital facilities with the tools they need to improve the quality of care for animals.”
Since the 2017 launch of the Companion Animal Capital Fund program, which is administered by the Department of Agriculture and Markets, the State has dedicated over $38 million to the program. In total, 130 projects have been awarded across New York so far. This round of funding builds on previous rounds of this program that is helping to offset the costs associated with capital projects run by New York State animal shelters, such as renovating dog kennels, improving medical facilities, or building more efficient shelters to reduce overall operational costs. Projects funded this year include updated living spaces for dogs and cats, improved HVAC and heating systems, expansions to facilities to improve medical care, as well as additional infrastructure updates.
Competitive grants were awarded to shelters based on a need assessment, detailed project description, and reasonableness of cost. The following organizations are receiving an award in this round of the program:
City of Oswego – $500,000.00 to replace the kennels, update the HVAC system, seal floors and non-porous areas, create an exclusive outdoor “relief” area, and install new sinks.
Columbia Greene Humane Society – $500,000.00 for a new HVAC system and to expand the clinic to include isolation, treatment room, X-ray and lab, exam rooms and euthanasia space.
Humane Society of Rome – $500,000.00 to install new dog enclosures, two isolation rooms and new cat enclosures.
Jefferson County – $500,000.00 to renovate kennels, upgrade the HVAC system, repair the drainage system, and install resin flooring, concrete walls and sound proofing.
Massena Humane Society – $500,000 for enhanced record keeping equipment, upgrades to the kennels, drainage and HVAC system, radiant floor heat, soundproofing and a new intake area.
Middletown Humane – $500,000 for updates and repairs to interior and exterior, upgrading heating/cooling, updated lighting and electrical systems, replacing roof, insulation and painting, alarm system and perimeter fencing.
Oswego Co. Humane – $500,000.00 for increased cat housing, epoxy flooring, isolation rooms and maternity ward, increased dog housing, a new HVAC and new water piping.
Patricia LeDew Foundation – $500,000.00 to install a new X-ray room with new equipment, expand the surgical area, create a new dental site and design an adoption area specific to senior animals.
Paws Crossed Animal Rescue – $500,000.00 for a new HVAC system, new doors, epoxy flooring and painting in 3 kennels.
Saratoga County – $500,000 for a new heating and cooling system.
Town of Bangor – $500,000.00 to improve record keeping equipment, upgrade cat cages, upgrade drainage and HVAC and soundproofing.
Town of Cheektowaga – $500,000 for upgraded kennels, an upgraded HVAC system, a dedicated isolation area and soundproofing.
Town of Henrietta – $500,000.00 to construct a new municipal shelter.
Town of Olean – $500,000.00 for a new facility.
Ulster Co. SPCA – $500,000.00 to redesign the kennel, replace the floor, repair floors and walls, and renovate the kitchen, grooming room and exam room.
A complete list of the awarded organizations and a brief description of the funded projects is available here.
Governor Hochul’s Fiscal Year 2026 Executive Budget proposed continued funding for this critical program and the final adopted Budget includes $10 million in funding for the next round.
New York State Agriculture Commissioner Richard A. Ball said, “Animal shelters and humane societies are so much more than a port in the storm – they are a true lifeline to the animals who will one day become beloved members of New York families. From providing essential medical care to daily enrichment activities, the hardworking staff at humane societies, shelters, and SPCAs throughout the state work tirelessly to provide the best care for dogs and cats while they wait to be adopted. Through seven rounds of funding, we have seen the direct impact these projects have had on these essential facilities, and I’m proud to see the good work continue.”
New York State Animal Protection Federation Executive Director Libby Post said, “The Companion Animal Capital Fund has been a total game changer for shelters and rescues. This latest round of grants reflects how important the Companion Animal Care Standards Act for Shelters and Rescues is and what organizations are doing to make sure they meet these standards when they kick in on December 15th of this year. This round of grants brings the total investment to just shy of $50 million. Without the leadership of Governor Hochul, Senate and Assembly Agriculture Committee chairs Michelle Hinchey and Donna Lupardo, and our champions in each house, Assemblymember Deborah Glick and State Senator Joseph Addabbo, none of this would have happened. The Department of Agriculture and Markets understands how important this grant program is and the Federation thanks Commissioner Richard Ball for his on-going support.”
State Senator Michelle Hinchey said, “Our local animal shelters and humane societies give animals the care and compassion they deserve while they wait to be adopted by their forever families. The Companion Animal Capital Fund is a vital source of support for these organizations, most of which rely on donations, to improve and modernize their facilities. Securing funding for this program is always a priority, and I’m thrilled that three of our own, Columbia-Greene Humane Society, Dutchess SPCA and Ulster SPCA, have all been awarded grants in the latest funding round.”
Assemblymember Donna Lupardo said, “Since 2017, the Companion Animal Capital fund has helped 128 shelters make much-needed improvements to their facilities. I’m very glad that we are able to support an additional 30 shelters in this latest round of funding. We cannot thank them enough for the important work they do, caring for animals as they wait for their forever homes. I’d like to thank the Governor and my colleagues for continuing to support this important effort. I have seen first-hand how well these funds have been used and how needed these resources are.”
The Department of Agriculture and Markets’ Division of Animal Industry promotes sustainable animal production agriculture and the safety of the animal origin food supply. These goals are accomplished through regulatory and cooperative educational efforts with various agencies, both public and private. The Division has staff in Albany and veterinarians located across the state. In addition to many other responsibilities, the Division regulates dog licensing, sets standards for humane care of seized dogs and the inspection of municipal shelters, administers the contract for the New York State Animal Population Control Program and the Pet Dealer Inspection Program, and provides training and assistance to local enforcement officers in animal welfare cases.
NASHVILLE, Tenn., May 21, 2025 (GLOBE NEWSWIRE) — RightNOW2025 — Having emerged from yet another demanding tax season, accounting professionals now confront heightened client expectations and limited time to pursue innovation and growth.
To help with navigating these persistent obstacles, Rightworks today announced Rightworks Community, its online platform that offers accounting and tax professionals the latest tools, insights, and actionable strategies from the profession’s most trusted advisors to help drive progress and inspire future-forward firms.
Rightworks Community combines the company’s two decades of leadership with its robust network of seasoned in-house and external experts to give members:
Centralized Resources: A growing range of educational content including templates, guides, articles, videos, podcasts, and CPE-eligible courses to enhance firm efficiency and deepen expertise.
Community Engagement: A collaborative space to develop winning strategies with like-minded professionals, benefit from mutual accountability, and receive expert guidance to navigate unique challenges and achieve their goals.
Emerging Best Practices: The latest trends and most effective tactics, featuring live and on-demand events, from mainstage presentations to in-depth workshops and wellness sessions led by top industry leaders, including Jason Staats, Ryan Lazanis, and more.
In early May, Rightworks Community completed its 2025 Tax Season Programming, which included events led by Amy Vetter, CPA, Yogi, and CEO of The B3 Method Institute. The free wellness sessions were designed to support mental clarity and optimize productivity during one of the profession’s most stressful seasons.
“The Rightworks Tax Season Programming, particularly Amy Vetter’s Chair Yoga and Mindful Meditation sessions, genuinely made a difference during a typically high-pressure time. Starting my day with these practices put my mind at ease, reduced stress, and l highly recommend attending a session to anyone seeking a positive way to begin their day,” said Susan Bannwart, CPA and President of Highpoint Advisory Services. “I’m excited to see the Chair Yoga sessions return and hope they’ll be back for next tax season.”
Free 60-Day Membership Offer for RightNOW2025 Attendees
To help turn their conference experience into a year-round actionable plan, Rightworks Community is extending 60 days of free Advantage membership through July 1 to RightNOW2025 attendees. The special offer is designed to enable attendees to continue learning, growing, and connecting with peers post-conference through roundtable events hosted by RightNOW2025 speakers, including Hector Garcia, Will Hill, and John Mitchell.
“We created the Rightworks Community as part of our mission to help advance the accounting profession,” said Joel Hughes, CEO of Rightworks. “The Community is an interactive space where accounting and tax professionals can collaborate with colleagues and trusted experts who understand their challenges. Members have access to comprehensive resources that bridge the gap between traditional practices and modern strategies.”
To learn more about Rightworks Community and to sign up, click here.
About Rightworks Rightworks enables accounting firms and businesses to significantly simplify operations and expand their value to clients via our award-winning intelligent cloud and learning resources. This is possible with Rightworks OneSpace, the only secure cloud platform purpose-built for the accounting and tax profession, and our premier community for firm optimization, growth, and professional development. Founded in 2002, we’ve grown to serve over 10,000 accounting firms in the US—from single practitioners to Top 10 firms. For more information, please visit rightworks.com or follow us on LinkedIn, Facebook, and Instagram.
CHICAGO, May 21, 2025 (GLOBE NEWSWIRE) — Guaranteed Rate Affinity, a leading mortgage provider offering unparalleled lending services through its partnership with Coldwell Banker, has appointed Dino Guadagnino as Regional Vice President of Reverse Mortgages, strengthening its commitment to the reverse mortgage space and the senior borrowers it serves.
With 22 years in the industry and a background in accounting, Guadagnino has specialized in reverse mortgages since 2003. He joins GRA to lead the expansion of its reverse program—bringing more education, opportunity, and tools to agents, loan officers, and senior clients alike.
“I am excited to join Guaranteed Rate Affinity as the Regional Reverse Mortgage Sales Leader,” said Guadagnino. “GRA’s leadership team and their commitment to offering financial solutions to the senior population make this the ideal organization to grow the reverse mortgage program. We’re focused on building a team of reverse loan officers who align with our values and deliver the highest level of service to clients and partners.”
In addition to expanding outreach and education for reverse mortgages, Guadagnino will work closely with traditional loan officers to help them get certified in reverse lending and uncover new opportunities in the reverse for purchase space.
“We’re pleased to welcome Dino to the Guaranteed Rate Affinity family,” said Frank Ciardelli, SVP of Sales Performance. “His knowledge and leadership in reverse lending will be a game changer. Dino’s presence will help grow this business line, expand our offering, and provide seniors with the education and options they deserve.”
About Guaranteed Rate Affinity
Guaranteed Rate Affinity is a joint venture between Guaranteed Rate, Inc. and Anywhere Integrated Services (NYSE: HOUS), which owns some of the industry’s most recognized and respected real estate brands. The innovative JV has funded over $100 billion in loans since its inception. Guaranteed Rate Affinity originates and markets its mortgage lending services to Anywhere’s real estate, brokerage, and relocation subsidiaries.
Guaranteed Rate Affinity provides unmatched support to Anywhere brokers coast-to-coast, ensuring their customers receive fast pre-approvals, appraisals, and loan closings, creating the ability for buyers to move quickly and confidently when purchasing homes in today’s competitive market. The company also provides the same services to the public and other real estate brokerage and relocation companies across the country—helping employers improve their employees’ relocation experience by prioritizing customer service, digital mortgage ease, and competitive rates.
Disclosures: Guaranteed Rate owns a controlling 50.1% stake in Guaranteed Rate Affinity, and Anywhere owns 49.9%. Availability of reverse mortgage products varies by state and may not be offered in all areas. Contact a Guaranteed Rate Affinity loan officer for details on current state availability.
CHICAGO, May 21, 2025 (GLOBE NEWSWIRE) — Chicago-based title insurance underwriter Advocus National Title Insurance Company (Advocus) recently welcomed attorney Nathan Smith to its Underwriting Department. In his new role, Nathan will be responsible for providing underwriting assistance by working with Advocus’ attorney agents. Day to day, his duties will consist of answering questions and providing approval for title matters concerning residential and commercial real estate transactions in the context of Advocus’ ongoing national expansion.
With over a decade of legal experience, Nathan brings a wealth of expertise in claims and underwriting. Most recently, he served as Claims Counsel at Stewart Title Guaranty Company where he managed a portfolio of complex title insurance claims and litigation. Nathan also served as Underwriting Counsel at Fidelity National Title, where he performed risk assessments and provided legal guidance on both residential and commercial transactions.
“Through our tried-and-true procedures and culture of collaboration and consensus-building, Advocus knows how to bring people together,” Smith said. “Advocus stands out for putting attorneys at the center of the process, and I am absolutely thrilled to contribute to a team that has reshaped, and continues to set, the standard for what the process can and should be.”
Smith’s career remains rooted in guiding litigation strategy, negotiating settlements, and overseeing cost control initiatives—all with a focus on delivering timely and effective resolutions for Advocus’ insureds. A certified Illinois State Bar Association arbitrator and mediator, Smith knows the value of discarding adversarial models in favor of getting to “yes.”
“Nathan’s experience at the intersection of claims management, underwriting, and legal operations makes him a perfect fit for Advocus as we continue to build a differentiated model grounded in legal integrity,” said Augie Butera, EVP and General Counsel at Advocus. “His track record of delivering results and educating peers exemplifies the values we bring to our agents and other customers every day.”
To learn more about Advocus and its attorney-centered approach to title insurance, visit advocus.com.
About Advocus Advocus is a national provider of title insurance and settlement services dedicated to preserving the role of lawyers in real estate transactions. Founded in 1964 on the belief that every consumer deserves legal representation and advocacy, Advocus is dedicated to preserving the attorney’s role in real estate transactions and offering attorney-led underwriting expertise. With a growing presence in markets across the United States, Advocus continues to set the standard for excellence in the title insurance industry. For more information, visit www.advocus.com.
SAN ANTONIO, May 21, 2025 (GLOBE NEWSWIRE) — Graphitic Energy (“Graphitic”), formerly known as C-Zero, has entered into a strategic collaboration with the Claremont office of Technip Energies USA to jointly develop and deploy Graphitic’s innovative methane pyrolysis technology. This innovative process utilizes natural gas to produce clean hydrogen and graphite, a crystalline form of carbon used in batteries, lubricants, refractories, and high-temperature industrial processes. The agreement between Technip Energies and Graphitic includes funding dedicated to testing campaigns to support technology advancement. Later this year, the two companies also plan to enter into a licensing collaboration agreement to accelerate the deployment of Graphitic’s technology around the world.
Graphitic Energy’s groundbreaking methane pyrolysis technology enables the production of clean hydrogen and solid carbon with no direct CO2 emissions. The process is low-electricity-intensive and can be scaled to produce 100,000 metric tons of hydrogen per year in a single process train. The collaboration will leverage Technip Energies’ leading positions in hydrogen generation and fluidized bed technology.
“Technip Energies is excited to enter into this cooperation with Graphitic Energy and bring forward our recognized hydrogen production experience and fluidized bed expertise to standardize plants globally for the production of hydrogen and synthetic graphite with minimal direct CO2 emissions. The standardized designs will allow for lower pre-investment costs, accelerated implementation time, high predictability on project economics, and reduced overall capital costs. This cooperation underscores Technip Energies’ commitment to delivering sustainable, innovative, cost-effective low-carbon solutions, strengthening our technology portfolio,” said Mario Tommaselli, Senior Vice President Gas & Low Carbon Energies at Technip Energies.
Unlike other low-carbon hydrogen production paths, Graphitic’s process economics do not require government subsidies to be cost-competitive, and the company can profitably deliver both hydrogen and graphite at current market prices. In addition, the company’s technology can be sited anywhere natural gas or LNG are available, without the need to source renewable electricity or perform geological CO2 sequestration.
“Graphitic’s technology enables the production of two critical products from natural gas. We’ve taken it from an idea, through the lab scale, and into a large pilot generating tonnes of graphitic material. Collaborating with Technip Energies will enable us to get to market faster and provide interested parties with high-quality engineering packages,” said Graphitic’s Co-Founder and CEO Zach Jones.
In March 2025, Graphitic commissioned its pilot plant in San Antonio, TX. This state-of-the-art facility is capable of producing several hundred kilograms of hydrogen and up to 1,000 kg of solid carbon per day, with continuous 24/7 operations. It is expected to operate through the end of 2025. The company’s pilot is supported by a recent $15 million extension of its series A funding, bringing its total investment to over $65 million.
About Technip Energies
Technip Energies is a global technology and engineering powerhouse. With leadership positions in LNG, hydrogen, ethylene, sustainable chemistry, and CO2 management, we are contributing to the development of critical markets such as energy, energy derivatives, decarbonization, and circularity. Our complementary business segments, Technology, Products and Services (TPS) and Project Delivery, turn innovation into scalable and industrial reality.
Through collaboration and excellence in execution, our 17,000+ employees across 34 countries are fully committed to bridging prosperity with sustainability for a world designed to last.
Technip Energies generated revenues of €6.9 billion in 2024 and is listed on Euronext Paris. The Company also has American Depositary Receipts trading over the counter.
For further information: www.ten.com
About Graphitic Energy
Headquartered in Santa Barbara, CA with plant operations in San Antonio, TX, Graphitic Energy has developed a novel methane pyrolysis process for sustainably using natural gas to produce hydrogen and graphite. This delivers low-cost, clean hydrogen alongside high-value, graphitic carbon. Unlike current hydrogen generation technologies, Graphitic’s process converts abundant natural gas into hydrogen and solid carbon with virtually no direct CO2 emissions. The company has raised over $65 million from investors including Breakthrough Energy Ventures, Energy Capital Ventures, Trafigura, SK Gas, Eni, Mitsubishi Heavy Industries, ENGIE, and AP Ventures.
SHANGHAI, May 21, 2025 (GLOBE NEWSWIRE) — Bilibili Inc. (“Bilibili” or the “Company”) (Nasdaq: BILI and HKEX: 9626), an iconic brand and a leading video community for young generations in China, today announced the pricing of its upsized offering (the “Notes Offering”) of US$600 million in aggregate principal amount of convertible senior notes due 2030 (the “Notes”). The Notes have been offered to persons reasonably believed to be qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Securities Act”). The Company has granted the initial purchasers in the Notes Offering an option to purchase up to an additional US$90 million principal amount of the Notes, exercisable for settlement within a 30-day period beginning on, and including, the date on which the Notes are first issued.
The Company plans to use the net proceeds from the Notes Offering to enhance its content ecosystem to facilitate user growth, facilitate IP asset creation, and unleash its inherent potential. The Company also plans to use the net proceeds from the Notes Offering to improve its overall monetization efficiency, fund the Concurrent Repurchase (as defined below), fund future repurchases (from time to time) under its share repurchase program, and for other general corporate purposes.
When issued, the Notes will be senior, unsecured obligations of the Company. The Notes will mature on June 1, 2030, unless repurchased, redeemed or converted in accordance with their terms prior to such date. Holders may convert their Notes at their option at any time prior to the close of business on the seventh scheduled trading day immediately preceding the maturity date. The initial conversion rate of the Notes is 42.1747 Class Z ordinary shares per US$1,000 principal amount of Notes (which is equivalent to an initial conversion price of approximately HK$185.63 per Class Z ordinary share and represents a conversion premium of approximately 27.1% above the closing price HK$146.00 per Class Z ordinary share of the Company on the Hong Kong Stock Exchange on May 21, 2025) and a premium of approximately 32.5% to the clearing share price of the Concurrent Delta Offering of HK$140.10 per Class Z ordinary share of the Company, and is subject to adjustment upon the occurrence of certain events described below. Upon conversion, subject to certain procedures and conditions set forth in the terms of the Notes, the Company will cause to be delivered the Company’s Class Z ordinary shares, par value US$0.0001 per share. Holders may elect to receive the Company’s American depositary shares (“ADS”), each representing one Class Z ordinary share, in lieu of Class Z ordinary shares deliverable upon conversion.
The Company may redeem for cash all or any part of the Notes on or after June 6, 2028 if the last reported sale price of the Class Z ordinary shares has been at least 130% of the conversion price for the Notes then in effect for at least 20 trading days, whether or not consecutive, during any 30 consecutive trading day period preceding the date on which the Company provides notice of redemption (including the last trading day of such period) ending on, and including, the trading day immediately preceding the date on which the Company provides notice of redemption (the “Optional Redemption”). In addition, the Company may redeem for cash all but not part of the Notes at any time if less than 10% of the aggregate principal amount of Notes originally issued remains outstanding at such time (the “Cleanup Redemption”). The Company may also redeem the Notes upon the occurrence of certain tax-related events (the “Tax Redemption”). Holders of the Notes may require the Company to repurchase for cash all or part of their Notes in cash on June 1, 2028, or in the event of certain fundamental changes. In connection with certain corporate events or if the Company issues a notice of Optional Redemption, Cleanup Redemption or Tax Redemption, it will, under certain circumstances, increase the conversion rate for holders who elect to convert their Notes in connection with such corporate event or such Optional Redemption, Cleanup Redemption or Tax Redemption.
The Notes will bear interest at a rate of 0.625% per year, payable semiannually in arrears on June 1 and December 1 of each year, beginning on December 1, 2025.
The Company also announced the pricing of the previously announced concurrent offering of its 10,281,240 Class Z ordinary shares that are being borrowed from non-affiliate third parties and offered in a separate underwritten offering by Goldman Sachs (Asia) L.L.C. and Morgan Stanley Asia Limited (the “Underwriters” and the “Concurrent Delta Offering”, respectively), each acting severally on behalf of itself and/or its respective affiliates, at HK$140.10 per Class Z ordinary share. The Underwriters will use the resulting short position to facilitate hedging transactions by certain investors subscribing for the Notes, who employ a convertible arbitrage strategy (the “Convertible Arbitrage Investors”). The Company has been advised that each Underwriter is concurrently entering into off-market privately negotiated derivative transactions relating to the Class Z ordinary shares, enabling Convertible Arbitrage Investors to establish their initial short positions in the Class Z ordinary shares to hedge market risk in the Notes. The number of Class Z ordinary shares subject to the Concurrent Delta Offering generally corresponds to such initial short positions of the Convertible Arbitrage Investors. No new Class Z ordinary shares will be issued in the Concurrent Delta Offering. Any securities sold in the Concurrent Delta Offering are being offered and sold through a concurrent SEC-registered offering pursuant to a separate prospectus supplement and an accompanying base prospectus. The Company will not receive any proceeds from the Concurrent Delta Offering. The Notes Offering and the Concurrent Delta Offering are contingent upon each other.
The Company will use part of the proceeds from the Notes Offering for the Concurrent Repurchase. The Concurrent Repurchase enables investors to establish some of their initial short positions in the Class Z ordinary shares to hedge market risk in the Notes and reflects the Company’s confidence in its long-term strategy and growth. The repurchased shares will be cancelled.
Other Matters
The Notes, the Class Z ordinary shares deliverable upon conversion of the Notes or the ADSs deliverable in lieu thereof have not been registered under the Securities Act, or any state securities laws. They may not be offered or sold within the United States or to U.S. persons, except in reliance on the exemption from registration under the Securities Act.
This press release shall not constitute an offer to sell or a solicitation of an offer to purchase any of these securities, nor shall there be a sale of the securities in any state or jurisdiction in which such an offer, solicitation, or sale would be unlawful.
This press release contains information about the pending Notes Offering, and there can be no assurance that the Notes Offering will be completed.
Safe Harbor Statement
This announcement contains forward-looking statements. These statements are made under the “safe harbor” provisions of the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as “will,” “expects,” “anticipates,” “aims,” “future,” “intends,” “plans,” “believes,” “estimates,” “confident,” “potential,” “continue,” or other similar expressions. Among other things, the terms of the Notes, whether the Company will complete the Notes Offering, a description of various hedging activities, and statements about Bilibili’s beliefs and expectations, contain forward-looking statements. Bilibili may also make written or oral forward-looking statements in its periodic reports to the U.S. Securities and Exchange Commission, in its interim and annual reports to shareholders, in announcements, circulars or other publications made on the website of The Stock Exchange of Hong Kong Limited (the “Hong Kong Stock Exchange”), in press releases and other written materials and in oral statements made by its officers, directors or employees to third parties. Statements that are not historical facts, including but not limited to statements about Bilibili’s beliefs and expectations, are forward-looking statements. Forward-looking statements involve inherent risks and uncertainties. A number of factors could cause actual results to differ materially from those contained in any forward-looking statement, including but not limited to the following: results of operations, financial condition, and stock price; Bilibili’s strategies; Bilibili’s future business development, financial condition and results of operations; Bilibili’s ability to retain and increase the number of users, members and advertising customers, provide quality content, products and services, and expand its product and service offerings; competition in the online entertainment industry; Bilibili’s ability to maintain its culture and brand image within its addressable user communities; Bilibili’s ability to manage its costs and expenses; PRC governmental policies and regulations relating to the online entertainment industry, general economic and business conditions globally and in China and assumptions underlying or related to any of the foregoing. Further information regarding these and other risks is included in the Company’s filings with the Securities and Exchange Commission and the Hong Kong Stock Exchange. All information provided in this announcement and in the attachments is as of the date of the announcement, and the Company undertakes no duty to update such information, except as required under applicable law.
About Bilibili Inc.
Bilibili is an iconic brand and a leading video community with a mission to enrich the everyday lives of young generations in China. Bilibili offers a wide array of video-based content with All the Videos You Like as its value proposition. Bilibili builds its community around aspiring users, high-quality content, talented content creators and the strong emotional bonds among them. Bilibili pioneered the “bullet chatting” feature, a live comment function that has transformed our users’ viewing experience by displaying the thoughts and feelings of audience members viewing the same video. The Company has now become the welcoming home of diverse interests among young generations in China and the frontier for promoting Chinese culture across the world.
SHANGHAI, May 21, 2025 (GLOBE NEWSWIRE) — Bilibili Inc. (“Bilibili” or the “Company”) (Nasdaq: BILI and HKEX: 9626), an iconic brand and a leading video community for young generations in China, today announced the pricing of the separate SEC-registered underwritten offering of its Class Z ordinary shares, par value US$0.0001 per share (the “Concurrent Delta Offering”).
Concurrently, the Company announced pricing of the upsized offering (the “Notes Offering”) of US$600 million in aggregate principal amount of convertible senior notes due 2030 (the “Notes”) pursuant to Rule 144A under the Securities Act of 1933, as amended. The Company intends to grant the initial purchasers in the Notes Offering a 30-day option to purchase up to an additional US$90 million in principal amount of the Notes.
In connection with the Notes Offering, the Company announced the Concurrent Delta Offering, under which 10,281,240 of the Company’s Class Z ordinary shares, that have been borrowed from non-affiliate third parties are being offered in a separate underwritten offering by Goldman Sachs & Co. LLC and Morgan Stanley Asia Limited (the “Underwriters”), each acting severally on behalf of itself and/or its respective affiliates, at HK$140.10 per Class Z ordinary share. The Underwriters will use the resulting short position to facilitate hedging transactions by certain investors subscribing for the Notes, who employ a convertible arbitrage strategy (the “Convertible Arbitrage Investors”). The Company has been advised that each Underwriter is concurrently entering into off-market privately negotiated derivative transactions relating to the Class Z ordinary shares, enabling Convertible Arbitrage Investors to establish their initial short positions in the Class Z ordinary shares to hedge market risk in the Notes. The number of Class Z ordinary shares subject to the Concurrent Delta Offering generally corresponds to such initial short positions of the Convertible Arbitrage Investors. No new Class Z ordinary shares will be issued in the Concurrent Delta Offering. The Company will not receive any proceeds from the Concurrent Delta Offering. The Notes Offering and the Concurrent Delta Offering are contingent upon each other.
The Company will use part of the proceeds from the Notes Offering for the Concurrent Repurchase. The Concurrent Repurchase enables investors to establish some of their initial short positions in the Class Z ordinary shares to hedge market risk in the Notes and reflects the Company’s confidence in its long-term strategy and growth. The repurchased shares will be cancelled.
The Company has filed an automatic shelf registration statement on Form F-3 (including a prospectus) with the SEC. The Concurrent Delta Offering will be made only by means of a prospectus supplement and the accompanying prospectus. Before you invest, you should read the prospectus supplement and the accompanying prospectus and other documents that the Company has filed with the SEC for more complete information about the Company and the Concurrent Delta Offering. You may obtain these documents by visiting EDGAR on the SEC website at www.sec.gov. Alternatively, a copy of the prospectus supplement and the accompanying prospectus may be obtained from Goldman Sachs & Co. LLC, 200 West Street, New York, New York 10282, Attention: Prospectus Department, Email: Prospectus-ny@ny.email@gs.com, Telephone: 1 (866) 471-2526; or Morgan Stanley Asia Limited, c/o Morgan Stanley & Co. LLC, 180 Varick Street, New York, New York 10014, Attention: Prospectus Department, Email: prospectus@morganstanley.com, Telephone: 1 (866) 718-1649.
Other Matters
This press release shall not constitute an offer to sell or a solicitation of an offer to purchase any of these securities, nor shall there be a sale of the securities in any state or jurisdiction in which such an offer, solicitation, or sale would be unlawful.
This press release contains information about the pending Concurrent Delta Offering and Concurrent Repurchase, and there can be no assurance that the Concurrent Delta Offering and Concurrent Repurchase will be completed.
Safe Harbor Statement
This announcement contains forward-looking statements. These statements are made under the “safe harbor” provisions of the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as “will,” “expects,” “anticipates,” “aims,” “future,” “intends,” “plans,” “believes,” “estimates,” “confident,” “potential,” “continue,” or other similar expressions. Among other things, the terms of the Notes, whether the Company will complete the Notes Offering, whether the Concurrent Delta Offering and/or Concurrent Repurchase will be completed, a description of various hedging activities, and statements about Bilibili’s beliefs and expectations, contain forward-looking statements. Bilibili may also make written or oral forward-looking statements in its periodic reports to the U.S. Securities and Exchange Commission, in its interim and annual reports to shareholders, in announcements, circulars or other publications made on the website of The Stock Exchange of Hong Kong Limited (the “Hong Kong Stock Exchange”), in press releases and other written materials and in oral statements made by its officers, directors or employees to third parties. Statements that are not historical facts, including but not limited to statements about Bilibili’s beliefs and expectations, are forward-looking statements. Forward-looking statements involve inherent risks and uncertainties. A number of factors could cause actual results to differ materially from those contained in any forward-looking statement, including but not limited to the following: results of operations, financial condition, and stock price; Bilibili’s strategies; Bilibili’s future business development, financial condition and results of operations; Bilibili’s ability to retain and increase the number of users, members and advertising customers, provide quality content, products and services, and expand its product and service offerings; competition in the online entertainment industry; Bilibili’s ability to maintain its culture and brand image within its addressable user communities; Bilibili’s ability to manage its costs and expenses; PRC governmental policies and regulations relating to the online entertainment industry, general economic and business conditions globally and in China and assumptions underlying or related to any of the foregoing. Further information regarding these and other risks is included in the Company’s filings with the Securities and Exchange Commission and the Hong Kong Stock Exchange. All information provided in this announcement and in the attachments is as of the date of the announcement, and the Company undertakes no duty to update such information, except as required under applicable law.
About Bilibili Inc.
Bilibili is an iconic brand and a leading video community with a mission to enrich the everyday lives of young generations in China. Bilibili offers a wide array of video-based content with All the Videos You Like as its value proposition. Bilibili builds its community around aspiring users, high-quality content, talented content creators and the strong emotional bonds among them. Bilibili pioneered the “bullet chatting” feature, a live comment function that has transformed our users’ viewing experience by displaying the thoughts and feelings of audience members viewing the same video. The Company has now become the welcoming home of diverse interests among young generations in China and the frontier for promoting Chinese culture across the world.
For more than a decade, the French robotics company Aldebaran has built some of the most popular robots used in academic research. Go to most university robotics departments and you’ll find either Pepper, the iconic three-wheeled humanoid robot, or its smaller two-legged sibling, Nao.
These fast became the robots of choice for many academics for all research into the capabilities and potential of social robots. They are quick to set up and easy to use out of the box, without the need for any programming skills or engineering knowledge.
With base prices at around £17,000 for Pepper and £8,000 for Nao – typically plus a few thousand pounds more for extras, online training sessions, service plans, warranties and so on – the robots could be purchased via university research grants.
With Pepper robots also appearing in customer service jobs, for example in HSBC banks across the US, buyers were attracted by the lure of long-term educational and financial benefits from a state-of-the-art tech supplier. Aldebaran says it has sold approximately 37,000 machines worldwide (20,000 Naos and 17,000 Peppers).
Get your news from actual experts, straight to your inbox.Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.
The uncertainty around the company’s future has stoked fears that it will become impossible to get its robots repaired in future, and that Aldebaran could stop supporting the AI cloud network that the machines need to access to be able to function.
What does this mean for the future of robotics research in universities?
Besides fears about Aldebaran’s future, there have long been issues with Pepper and Nao’s durability. They both have rigid, fragile plastic shells, and the machines sometimes overheat. This means they have to be left to cool down after 20-30 minutes, which has often interfered with experiments and data-gathering – as documented in this 2022 study of Nao.
A spokesperson for Aldebaran agreed that motors can overheat, depending on their use and environment. They said the next generation of Nao, currently in development, has taken this into account in its design.
For repairs, the only option is Aldebaran or an authorised reseller, or you risk voiding your warranty. This typically involves shipping overseas, which can be slow and costly – more so if the replacement parts are out of stock.
One of us (Emilia) encountered this during the COVID pandemic. Nao’s batteries need to be used regularly to keep functioning, which led the university’s machine to fail because it was inaccessible during lockdowns. Aldebaran couldn’t supply replacement batteries quickly, which halted research projects at the university for many months and meant that important submission deadlines were missed.
Meanwhile, software upgrades for Pepper stopped when the company halted development in 2021 (sales stopped in 2024). This robot’s limited processing capabilities make it troublesome to run the large language models (LLMs) that power interfaces like ChatGPT (although these can be run in conjunction with a computer with modifications).
Nao does have an AI edition that can handle LLMs, though this too requires external modifications. Nao’s upgrades also seem to have been limited, which in our experience appears to have made them more error-prone too. Both robots are already considerably less useful for research purposes in our opinion.
Finally, Nao and Pepper were not built with adaptability in mind. Unlike more recent machines like the 3D-printed InMoov, made by French designer Gael Langevin, there’s no way of customising their components or appearance.
Their fixed expressions, gestures and plastic body make them difficult to adapt to different user needs or applications, such as helping at home or in healthcare. This again reduces their usefulness from a research point of view.
Addressing these concerns, the Aldebaran spokesperson said:
Spare parts availability on Nao is very good, [barring] the normal supply chain issues, and these were exacerbated during COVID like the rest of the commercial world. Pepper is more limited as it has not been in production for some time, but we are generally able to solve any customer issues.
Nao is still very active as a product, with production continuing along with software upgrades. We recently launched Nao Activities, a major software upgrade that provides generative AI capabilities for Nao.
The spokesperson added that are were no plans to switch off AI cloud support for Nao or Pepper, and that the robots are not difficult to use in robotics research, “testament of which is the thousands of units being used in that environment”.
What can be done?
If Pepper and Nao do become unusable for research, universities will have to either scrap them or try to redevelop them with custom parts and components. It’s possible they could be hacked and gutted, replacement parts could be 3D-printed, new microprocessors installed and the software made local and open source, which may be enough to get the robots back up and working again.
However, it probably makes sense for researchers to look forwards instead. But towards what? At a time when university finances are very tight, there may be a reluctance to buy new machines with potentially limited shelf lives. Robots from alternative providers such as Futhat and Unitree are supported by similar cloud-based AI systems.
Some institutions may consider reallocating vital funding to other departments, with a significant impact across robotics research and education. Universities are at the heart of robotics research, upholding high ethical standards and rigorously testing machines without the conflicts of interest that manufacturers can have.
Universities can also bring together diverse disciplines like computer science, engineering and cognitive science, fostering collaboration that encourages innovation. With the UK number one globally for research quality in this field, these are the training grounds for the next generation of roboticists at a time when there is a growing skills shortage.
A different way forward would be for universities to start building and programming robots from scratch. For the cost of a new research robot, say £15,000, you could buy several high-spec 3D printers, hardware and components.
This wouldn’t be about building entire humanoid robots but prototypes of key aspects such as facial expressiveness or skin, human gestures or emotions. This would allow students to gain important hands-on engineering and programming skills, while conducting novel research exploring current gaps in the field.
It would make personalising them easier and repairing them quicker and cheaper, if you could 3D-print parts or use parts that could be easily replaced off-the-shelf.
If universities are to remain relevant in this rapidly evolving field, it’s vital that they learn from their difficulties with Pepper and Nao. At a time when robots are starting to be perceived as reliable and cost-effective support for people, this is a cautionary tale for all.
The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.
Source: The Conversation – UK – By Fiona Murphy, Assistant Professor in Refugee and Intercultural Studies, Dublin City University
There’s a particular kind of story that’s rarely executed well – one without heroes, without lessons, without even the cold comfort of a villain you can confidently point at and say: there, that’s the evil. Vincent Delecroix’s Small Boat – a slim, bruising novel translated with quiet precision by Helen Stevenson – is that kind of story.
Small Boat, which was shortlisted for the 2025 International Booker Prize, centres on a real horror: the drowning of 27 people in the English Channel on November 24 2021. They were crowded into an inflatable dinghy in the dark, reaching out over crackling radio lines, asking – in French, in English, in Kurdish – for help. They didn’t get it.
What is known – not imagined in Delecroix’s pages – is that both French and British coastguards received their calls. And both hesitated, passing responsibility back and forth like a poisoned parcel. People died while operators discussed jurisdiction. The Cranston Inquiry, established to examine the failures of that night, is ongoing, its transcripts and testimonies peeling back the layers of bureaucratic neglect.
Delecroix doesn’t give us the migrants’ stories directly. He focuses instead on a fictional French coastguard operator, a woman who spent that night on the radio, doing (or not doing) what her training, her weariness, her own justifications allowed. In the aftermath, she is questioned – not in a court, but in a room filled with mirrors. She faces a policewoman who looks like her, thinks like her, speaks with her same clipped, professional cadence.
She listens back to recordings of her own voice on the rescue line promising help that would not come, offering assurances she did not believe. She is left to reckon with the unbearable fact that someone, somewhere (was it her?) spoke the words: “You will not be saved.”
She isn’t especially monstrous. She’s tired. She’s professional. She has a young daughter at home and an ex-partner who sneers at her work. She runs on the beach to decompress. In one of the novel’s most arresting turns, she compares herself to a mass-produced tin opener: efficient, functional, affectless. Delecroix draws her with enough delicacy that we cannot quite hate her. And that, of course, is far more unsettling.
Reading Small Boat, I thought – as one inevitably does – of Hannah Arendt’s banality of evil. Not evil as grand spectacle or ideology, but as administration, the quiet conviction that one is simply fulfilling a role. Arendt coined the phrase watching the trial of Adolf Eichmann, one of the chief Nazi organisers of the Holocaust. Eichmann organised the trains but claimed never to have hated the passengers. What Arendt saw was not a monster but a functionary – and that, of course, was the point.
I thought too about my own work as an anthropologist researching forced displacement across Ireland, Turkey and Australia. I’ve sat with people whose lives are shaped not by violence in its cinematic form, but by violence as policy: the hotel room without a kitchen, the letter that never arrives, the bed that’s taken away with no warning.
I’ve heard a senior Irish official describe the state’s provision of housing and support for asylum seekers as “sufficient”. Meanwhile people, stateless and waiting, are asked to prove their vulnerability again and again until even their grief is suspect.
Institutional indifference
The institutionalisation of indifference: that’s the real story here. The smugness of protocols. The liturgy of duty rosters and shift reports. It wasn’t evil that let those people drown in the Channel – it was ordinary people in warm offices, citing rules, filling forms, following scripts.
We can see the birth of such indifference in policies like the UK’s abandoned Rwanda plan, which casually proposed outsourcing asylum itself, as if refuge were a commodity.
Delecroix’s brilliance lies in showing how violence at the border is carried out not by villains, but by workers. By women with mortgages, men on night shifts, people who’ve learned to sort calls for help by urgency, credibility, accent. “Sorting,” the narrator explains, “is perhaps the most important part of the job.” Not all distress calls are equal. And the assumption – always lurking, never spoken – is that some lives are more likely to be saved.
At one point, the narrator’s colleague Julien answers calls from migrants by quoting Pascal: “Vous êtes embarqués.” You are already embarked. A fatalist shrug disguised as wisdom. As if to say: you should have thought of all this before you left. The shrug does the work of a policy, the quotation the work of a wall.
And yet, the narrator cannot fully perform indifference. She is haunted by the sea. She remembers loving it as a child. Now, it terrifies her. She feels it watching her, pursuing her, wanting to surge past the shore and swallow the continent whole. She runs along the beach to quiet her mind – a run that is almost the same length as the journey those on the dinghy tried to make.
If Small Boat has a flaw, it’s that it sometimes flirts with making guilt into its own form of lyricism. But this too may be deliberate. It is easier, perhaps, to feel sorry than to feel implicated. And far easier to narrate moral confusion than to prevent its causes.
What Delecroix has written is not a redemption story. It’s not a psychological thriller. It is a chamber piece for one voice and many ghosts. There are no grand gestures here. Just small refusals, small failures. And the small, flickering boats of each human life, drifting toward – or away from – one another in the dark.
In a world ever more brutal towards those who flee war, hunger and despair, Delecroix’s novel is a necessary and merciless indictment. It reminds us that the shipwreck is not theirs alone. It is ours too.
Fiona Murphy does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
For generations, young people have been told the path to opportunity is clear. Study hard, get a degree, and success will follow. This promise – central to the idea of “meritocracy” – has shaped the aspirations and investments of millions (though in reality, access to university and employment is also shaped by factors like family income, schooling and geography).
In terms of the UK economy, this isn’t just a problem of job shortages. It signals a deeper breakdown in the social contract – the long-held promise that education leads to opportunity. And it exposes how the connection between learning and labour is coming undone.
As the focus of employers, higher education providers and the state has shifted towards the notion of “employability” – the skills and attitudes that help people get and keep jobs – labour markets have become highly competitive and spoilt for choice.
At the same time, it’s worth remembering that while employment remains a key concern, the value of education extends far further – shaping personal growth and civic engagement, for example.
This article is part of Quarter Life, a series about issues affecting those of us in our twenties and thirties. From the challenges of beginning a career and taking care of our mental health, to the excitement of starting a family, adopting a pet or just making friends as an adult. The articles in this series explore the questions and bring answers as we navigate this turbulent period of life.
Even with degrees and internships, many young people are finding themselves locked out of meaningful work. Research I undertook with colleagues on education-to-work transitions shows how graduates often invest heavily in becoming employable through a mix of soft skills, adaptability and professionalism. But these efforts now rarely guarantee a job.
The UK government’s Get Britain Working white paper recognises this disconnect. It also highlights the legacy effects of the COVID pandemic, especially among young people aged 16–24 who are not in education, employment or training (Neets) – of which there are now estimated to be 987,000, and rising.
But while the government’s proposed youth guarantee scheme offers basic training and apprenticeships, it does little for those already in the labour market.
Recent increases to employer national insurance contributions and the national minimum wage are putting pressure on payrolls, reducing already limited opportunities for young people.
UK chancellor Rachel Reeves’s 2024 budget contained some shocks for employers. Fred Duval/Shutterstock
This highlights the limits of the popular narrative that effort always leads to reward. The idea that young people just need to try harder collapses under the weight of such constraints.
Businesses are also facing tight margins, as well as the problems that come with high staff turnover due to a lack of career development opportunities, as rising costs make it harder to invest in staff. But our research shows that even highly motivated graduates – those who network, gain skills, take internships and are adaptable – can struggle to get a foot in the door.
The UK employment rights bill, which is making its way through parliament, is designed to curb exploitative labour market practices. But professional bodies and trade associations warn that some employers may respond by cutting staff and reducing flexible work.
While reforms such as reframing the purpose of Jobcentres are critical in making unemployment seem unattractive, they are likely to fall short of creating sustained opportunities.
Policy paradox
All of this reveals a paradox. In trying to clamp down on job precarity, the UK government may be shutting young people out of the entry points they need, skilled or otherwise. Well-intentioned policies such as the youth guarantee and employment rights bill risk failure when the labour market often rewards privilege over merit.
Today’s labour market can penalise young people twice over. First, they’re expected to be employable with the right skillset. Yet even when they are, many find the door shut.
In my view, the way forward is to create new, accessible roles that reflect a broader duty of care on the part of employers, universities and policymakers. This includes building skills pathways along the lines of the Youth Futures Foundation programme, which works in deprived areas to create pathways that connect young people with support and jobs.
It also means embedding hiring practices that ensure a closer focus on someone’s potential, such as blind recruitment or diverse hiring panels.
Government initiatives such as the Trailblazers scheme, which identifies young people at risk of falling out of education or employment, are a good start. But they could be more effective alongside a combination of digital tools that bring together mobile apps for tracking career progress, a skills dashboard, and AI career advice.
Restoring the social contract means sharing responsibility. Our research finds that employers should regularly review how they assess talent and design career pathways.
Universities should collaborate with industry to ensure graduate skills align with employer expectations. And the government must address deep-seated inequalities shaped by region, class, race and institutional prestige.
Ignoring these issues mean they will continue to largely dictate who gets in, who gets ahead, and who gets left out. A collective responsibility ensures that education is recognised not just as a route to employment, but as a cornerstone of a fair, thoughtful and inclusive society.
Farooq Mughal works for the University of Bath. He is also a Trustee and Director in a non-executive capacity for the Bath Royal Literary and Scientific Institution.
Eyelashes help protect our us from infections and debris.FCG/ Shutterstock
Social media is full of bizarre and questionable trends. The latest involves men trimming or shaving off their eyelashes in order to appear more “masculine”.
This is yet another instance where leaving the body to look after itself is probably for the best. Our lashes aren’t just aesthetic. They play an important role in protecting our eyes. Trimming them could put you at greater risk of experiencing infections.
Eyelashes are classed as terminal hair. This means they’re present since birth. We have between 90 and 160 eyelahes on our upper eyelid and around 75 to 80 on our lower lids. They also grow pretty quickly too – at a rate of between 0.12-0.14mm a day.
While most people focus on the aesthetics of the eyelashes – with plenty of products out there claiming to change their colour, length and thickness – eyelashes actually have important functional roles. They keep dirt and particles out of the eyes, and also deflect air away from the cornea.
Get your news from actual experts, straight to your inbox.Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.
This helps stop the outer surface from drying out – preventing irritation and making it so we don’t have to blink as much to keep our eyes moist. The ideal length of an eyelash is about one-third the width of the eye.
Trimming your eyelashes is going to increase the risk of infection. There’s even a risk you may catch an infection while trimming the lashes themselves. Since lashes catch particles on them, if a trimmed lash falls back into your eye it could lead to an infection.
There are cases of this happening even when an eyelash has fallen out naturally, leading to infections and ending up inside compartments of the eye. Rogue eyelashes and the particles on them can cause anything from conjunctivitis (better known as “pink eye”) though to blepharitis (inflammation of the eyelid).
At the base of the lashes are the meibomian glands. These produce an oily substance rich in fat, called meibum. This substance prevents tears from evaporating quickly, keeping the surface of the eye moist. These secretions also run along the lashes, keeping them healthy and helping to catch small particles so they don’t get into the eye.
Cutting your eyelashes will reduce the ability to keep particles out of the eye and potentially disturb how well the meibomian glands function, as there’s less eyelash for meibum to sit on and catch particulates. This disruption increases the risk of infections such as keratitis (inflammation of the cornea).
Other common eyelid infections that can occur are styes or chalazions.
Styes result from an infection in the base of the eyelash (hair) follicle. It presents as a swollen, tender, red lump that may have yellow discharge coming out of it and crustiness along the eyelid. The most common cause of a stye is a staphylococcus aureus, a bacteria that lives on the skin and in the nose of many people.
A chalazion is the blockage of the meibomian gland, these swellings are usually painless and not tender to touch. They are most commonly seen on the upper eyelid.
Any interference with your eyelashes and their length increases the risk of particles getting into the eye and causing an infection or blocking the glands.
Our eyelashes and their length also play an important role in closing our eyes when needed to protect the eyeball. This reflex is activated when the lashes “feel” something touch their very sensitive nerve fibres. Trimming your eyelashes reduces the time that this reflex has to go from detection by the eyelashes, to the brain and then back to the muscles of the eyelid to close it and protect the eyeball. If you cut your eyelashes, you may be at greater risk of things getting in your eye – such as bugs or dust.
Should you ever trim your lashes?
There are some conditions that cause the eyelashes to grow abnormally. And in some cases, they may need to be removed or trimmed to prevent infections.
For instance, some people have abnormally long eyelashes – termed trichomegaly. This is considered where length is more than 12mm or the eyelashes are abnormally curly, pigmented or thick.
It isn’t known if naturally longer lashes increase the chance of eye problems – but extending your lashes artificially increases infection risk due to the chemicals used in the adhesives.
Some people can have double rows of eyelashes – actress Elizabeth Taylor was one. This condition is typically caused by a rare condition called distichiasis, which affects one in 10,000 people. Some people can even grow a third and fourth row of eyelashes.
Distichiasis causes red, watery or irritated eyes, alongside pain, light sensitivity and even scarring of the cornea. Treatment can be anything from plucking the additional lashes through to cryotherapy (freezing the eyelash follicles to prevent future growth) or laser ablation to prevent them growing back entirely.
Trichiasis causes the eyelashes to grow inwards towards the eye. Inward growing eyelashes can cause irritation of the eyeball and, if untreated, permanent damage. It can also cause blepharitis.
In this case, a person would need to use epilation to remove the eyelashes (though they will grow back in four to six weeks). A more permanent solution is laser removal to prevent the eyelashes from regrowing.
Eyelashes play an important part in protecting our eyes. They’re best left alone to do their thing, and should only be removed if a medical condition is causing them to grow abnormally or leading to irritation. But in those instances, it’s best to seek a doctor’s help to avoid causing yourself any harm.
Adam Taylor does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
High electricity consumption from data centers and other sources of rising demand will likely cause further increases in the near future.
The impact on consumers is particularly dramatic in Pennsylvania, where rate hikes are widespread.
For example, the monthly bill for a PECO residential customer who uses 700 kilowatt hours of electricity monthly increased 10% – or US$13.58 – in 2025. These bills will go up another $2.70 each month in 2026.
Retail price adjustments approved by the Pennsylvania Public Utility Commission for most electric distribution utilities effective December 2024 led to higher bills for many customers across the state. In some parts of Pennsylvania, the estimated increases topped an estimated 30%.
But Pennsylvania faces distinct challenges related to its electric grid – the maze of wires and generators – that drive both the growing demand for electricity and the limited supply.
PJM and the electric grid
Pennsylvania power plants produce a lot of electricity. In fact, the Keystone State is the the largest exporter of electricity in the U.S. and has been for many years.
But the electricity Pennsylvania produces doesn’t always stay in state.
That’s because Pennsylvania’s electric grid is managed by a company called PJM. PJM coordinates the flow of electricity through all or parts of 13 states and the District of Columbia, and it ensures the wholesale electricity transmission system operates reliably and safely.
Pennsylvania electric utilities, such as PECO or Duquesne Light, then distribute this wholesale electricity to retail customers, including homeowners and renters.
PJM requires the utilities to ensure ahead of time that they can meet their customers’ future electricity demands, including during heat waves and winter storms. This requirement is met using a market called a “capacity auction,” in which electricity suppliers bid to provide physical infrastructure that will generate electricity in the future.
The prices at the 2025-2026 PJM capacity auction were more than 800% higher than the previous year, in part due to the growing demand for electricity within PJM. This amounts to tens of billions of dollars in extra costs.
Power plants in Pennsylvania can’t simply stop exporting electricity and supply more in-state power because they dispatch their power into the regional grid operated by PJM, and the flow of electricity is dictated by the physical structure of this grid.
Pennsylvania shares an electric grid with northern Virginia, considered the largest data center market in the world. Nathan Howard via Getty Images
Much of this new demand comes from data centers, which support everything from AI applications and data storage – think of the thousands of emails and files backed up on our computers – to sports betting, online retailers such as Amazon, and national security applications such as the North American Aerospace Defense Command.
The increase in electricity demand within PJM is happening at the same time that supply is shrinking.
Many old generating plants in the PJM grid are retiring as they near the end of their useful lives and become less profitable for plant operators, particularly as natural gas and solar become more affordable. Some of these older power plants also emit a lot of pollution and are costly to retrofit to meet current pollution limits.
Beyond the challenge of plant retirements, PJM has been slow to allow hundreds of new proposed power plants – most of them solar- and battery-based – to connect to transmission lines.
This long “interconnection queue” prevents new, needed generation from coming online. This is happening even though companies are eager and ready to build more generation and battery storage.
Aging infrastructure and growing weather extremes
One of the primary recent drivers of high consumer electric bills is that the utilities have been slow to upgrade their aging wires.
In response to rising electricity prices, Pennsylvania Gov. Josh Shapiro filed a legal complaint with the Federal Energy Regulatory Commission against PJM in December 2024. This complaint blamed PJM’s capacity auction design for creating unnecessary costs for consumers.
According to the settlement reached after the complaint, PJM’s price caps will be 35% lower at the next major capacity auction. This reduction in wholesale prices could limit retail price increases.
But this is at best a temporary fix. It doesn’t address the increasing demand, aging power infrastructure battered by extreme weather, or transmission bottleneck.
In order for Pennsylvania residents to see lower electric bills anytime soon, more changes are needed. For example, many expertspreviously observed that PJM needs to fix the queue and get online the many power plants that are ready to build and just waiting for a transmission interconnection.
While PJM has reformed its queue process, the queue is still long. New power plants are not going up fast enough, in part due to additional challenges such as local opposition and supply chain and financing issues.
Hannah Wiseman receives or has recently received funding from the Alfred P. Sloan Foundation, Arnold Ventures, U.S. National Science Foundation, U.S. Department of Energy, Center for Rural Pennsylvania, and the Pennsylvania Department of Environmental Protection. She is a member of the Center for Progressive Reform.
Seth Blumsack receives or has recently received funding from the Alfred P. Sloan Foundation, Heising Simons Foundation, U.S. National Science Foundation, U.S. Department of Energy, NASA, U.S. Federal Aviation Administration, Center for Rural Pennsylvania and the Pennsylvania Department of Environmental Protection.
Birds are drawn to the mirror effect of windows. That can turn deadly when they think they see trees.CCahill/iStock/Getty Images Plus
When wood thrushes arrive in northern Mississippi on their spring migration and begin to serenade my neighborhood with their ethereal, harmonized song, it’s one of the great joys of the season. It’s also a minor miracle. These small creatures have just flown more than 1,850 miles (3,000 kilometers), all the way from Central America.
Other birds undertake even longer journeys — the Swainson’s thrush, for example, nests as far north as the boreal forests of Alaska and spends the nonbreeding season in northern South America, traveling up to 5,600 miles (9,000 kilometers) each way.
These stunning feats of travel are awe-inspiring, making it that much more tragic when they are cut short by a deadly collision with a glass window.
A wood thrush singing. Shared by the American Bird Conservancy.
This happens with alarming regularity. Two recent scientific studies estimate that more than 1 billion birds – and as many as 5.19 billion – die from collisions with sheet glass each year in the United States alone, sometimes immediately but often from their injuries.
These collisions occur on every type of building, from homes to skyscrapers. At the University of Mississippi campus, where I teach and conduct research as an ecologist, my colleagues and I have been testing some creative solutions.
Why glass is so often deadly for birds
Most frequently, glass acts as a mirror, reflecting clear sky or habitat. There is no reason for a bird to slow down when there appears to be a welcoming tree or shrub ahead.
These head-on collisions frequently result in brain injuries, to which birds often succumb immediately.
In other cases, birds are stunned by the collision and eventually fly off, but many of those individuals also eventually perish from brain swelling.
Other injuries, to wings or legs, for example, can leave birds unable to fly and vulnerable to cats or other predators. If you find an injured bird, contact a local wildlife rehabilitator.
Which windows are riskiest
Some windows are much worse than others, depending on their proximity to bushes and other bird habitats, what is reflected in them, and how interior lighting exacerbates or diminishes the mirror effect.
On our campus, some buildings with a great deal of glass surface area kill surprisingly few birds, while other small sets of windows are disproportionately deadly.
A stunned Swainson’s thrush sits on the ground in front of a window on campus. The bird, which likely hit the window, eventually recovered and flew away. Jason Hoeksema/University of Mississippi
One particular elevated walkway with glass on both sides between the chemistry and pharmacy buildings is a notoriously dangerous spot. The glass kills migratory birds each spring and fall as they try to pass between the two buildings on their way to The Grove, the university’s central-campus park area with large old oak trees.
During the pandemic in 2020, student Emma Counce did the heart-heavy work of performing a survey of 11 campus buildings almost daily during spring migration. She found 72 bird fatalities in seven weeks. Five years later, my ornithology students completed a new survey and found 62 mortalities over the course of five weeks in 2025, demonstrating that we still have a lot of work to do to make our campus safe for migratory birds.
The good thing is that everyone can do something to lower the risk.
Films, stickers or strings can be added on the exterior of windows, creating dots or lines, 2 to 4 inches apart, that break up reflections to give the appearance of a barrier.
Exterior screens and blinds work great too. Just adding a few predator silhouette stickers is not effective, by the way – the treatment needs to span the whole window.
Putting film with dots on windows, like this one at the University of Mississippi, can help birds spot the glass and stop in time. Without the dots, the reflection can look like more trees are ahead instead of glass and a hallway. Jason Hoeksema/University of Mississippi
When applied properly, window treatments can make a huge difference. An inspiring example is McCormick Place in Chicago, the country’s largest convention center, which notoriously killed nearly 1,000 birds in a single night in 2023. After workers applied dot film to an area of the building’s windows equivalent to two football fields, bird mortality at the lakeside building has been reduced by 95%.
The Bird Collision Prevention Alliance provides information on options for retrofitting home or office windows to make them more bird friendly.
Options for new windows are also becoming more common. For example, the new Center for Science & Technology Innovation on my campus, which features many windows, mostly used bird-friendly glass with subtle polka dots built into it. This spring, we found that it killed only four birds, despite a very high surface area of glass.
How you can help
When trying to make a difference on your home turf, I suggest starting small. Make note of which specific windows have killed birds in the past, and treat them first.