Category: Internet Communications Technology

  • MIL-OSI USA: Hartford, Stamford Campuses Open ‘Innovate Labs’ Where Technology, Fun, and New Skills Connect

    Source: US State of Connecticut

    Freshman Barbara Hawke Lopez was the captain of her high school robotics team and enjoys coding and emerging technology.

    When she discovered that Innovate Labs was opening a facility on the UConn Stamford campus, with hands-on learning opportunities in emerging technology, she was intrigued.

    Today, Hawke Lopez is employed as a lab assistant there, teaching her peers how to experiment with new technology, and helping them develop their confidence in the automation of the future.

    “When you come into the lab, there is almost always someone playing a game using virtual reality,’’ said Hawke Lopez, who is studying journalism and cognitive science. “Other students come in to 3D print everything from pop culture-inspired objects to fidget-spinner toys. There’s a good mix of activities.’’

    “The lab is very new-user friendly and there are always two or three people there to help you if you get stuck,’’ she said. The lab, which opened in September 2024, is located in Room 310.
    “People are excited when they discover it, and I think it is a good addition to our campus and the overall business environment. It is helping student develop confidence and career skills,’’ she said.

    Hartford Campus Debuted Lab Last Week

    But Stamford students aren’t the only ones with new experiences. Innovate Labs opened another facility in Hartford last week. This newest Lab can be found on the first floor of the Graduate Business Learning Center in Hartford, at 100 Constitution Plaza. All students, regardless of major, as well as faculty and staff are welcome to explore the Lab.

    On the opening day, Feb. 10, student workers demonstrated 3D pens, VR headsets and circuitry that can track a user’s heart rate. The event drew students and staff from the GBLC, Storrs, and the nearby Hartford Times Building.

    A festive balloon arch welcomed students and faculty to the first-floor center that includes stations featuring the Internet of Things (IoT) devices, virtual and augmented reality, 3D printing and modeling, voice and smart technology, drones, robotic, and circuitry and sensors. Both the Stamford and Hartford Innovate Labs are modeled after the original lab located in the School of Business in Storrs.

    Lucy Ledesma, a junior majoring in the dual-degree MEM program and a Lab Outreach Specialist in Storrs, traveled to Hartford to demonstrate the technology. “I think it’s great that students on other campuses are getting to have the experiences we have,’’ she said.

    Innovate Labs Tech Manager, Sophia Hatzis, a sophomore majoring in sociology and mechanical engineering, said initially some students are reluctant to experiment.

    “At first they might not know how to get started, but there is always someone there to walk them through it and build their confidence to try more advanced things,’’ she said.

    Bringing Energy and Excitement to Campus

    Innovate Labs is part of the Digital Frontiers Initiative (DFI) at the School of Business. The program bridges academia and industry through cutting-edge research, innovation, and partnerships. DFI operates under the umbrella of the Connecticut Information Technology Institute at UConn.

    “Our goal is to create an opportunity for students to develop new skills that will foster the next generation of learners, leaders, entrepreneurs and innovators,’’ said OPIM professor Jon Moore, who is also the Executive Director of DFI. He created and oversees all three labs.

    The original Innovate Lab opened in Storrs eight years ago, after some recent graduates said they would have liked more emerging technology skills as they entered the workforce.

    “People can start where they are comfortable,’’ Moore said. “We encourage people to push themselves out of their comfort zone but also to acquire skills that match their career interests. Not only is it valuable but keeps students on campus and engaged but it brings energy and excitement to campus.’’

    OPIM professor Wei Chen, the Academic Director of the DFI, agreed.

    “The Innovate Labs are a vibrant space where students can explore emerging technologies and bring their ideas to life,’’ he said. “It’s an incredible opportunity for them to experiment, collaborate, and gain hands-on experience with the latest tools shaping the future.’’

    Students Can Advance to Local Makerspaces

    Another advantage of the regional Innovate Labs is that once students get comfortable with the technology there, they can expand their ideas at nearby makerspaces.

    Stamford students have access to GE’s CoCreate, a 65,000-square-foot maker space, that welcomes everyone from chefs to designers to contractors or homeowners to use their equipment and explore the “community playground.’’

    The Digital Frontiers Initiative is in conversation with GE CoCreate about joint workshops, events, and projects.

    In Hartford, DFI is building a dynamic relationship with MakerSpace CT, which is just a short walk from both Hartford campuses. Students have an opportunity to earn three months of free membership to this space by participating in a one of Innovate Labs’ non-credit programs, Innovate2Create. This program is designed to help students turn their idea into a marketable prototype. The nine-week program includes guest speakers from MakerspaceCT, and will conclude with a pitch presentation there in the spring.

    For UConn students who are interested, Innovate Labs offer employment opportunities, with students having the choice of working on the tech team (which oversees inventory and learning), the outreach team (which leads workshops, clubs, and classes), or the marketing team. Lab workers from all three campuses collaborate, and live-feed cameras allow them to share ideas, solve problems, or just say hello from across the state.

    Moore is now working towards offering workshops for non-UConn students, particularly elementary, middle and high school students in the area.

    If you would like to learn more about DFI, or take a guided tour of one of the Innovate Labs, please contact Katherine Lorange at Katherine.Lorange@uconn.edu.

    MIL OSI USA News

  • MIL-OSI Russia: IMF Executive Board Concludes 2024 Article IV Consultation with Thailand

    Source: IMF – News in Russian

    February 20, 2025

    Washington, DC: On February 11, The Executive Board of the International Monetary Fund (IMF) concluded the Article IV consultation[1] with Thailand and endorsed the staff appraisal without a meeting on a lapse-of-time basis.

    Thailand’s economy is gradually recovering, but at a slower pace than peers. Economic activity expanded modestly by 1.9 percent in 2023 and 2.3 percent in the first three quarters of 2024, driven by private consumption growth and a rebound in tourism. Inflation remained subdued, averaging 0.4 percent (y/y) annually in 2024, well below the Bank of Thailand’s target range of 1 to 3 percent. External factors such as the decline in global energy and food prices, lower import prices have played a role, but domestic factors such as energy subsidies, price controls, and the unwinding of pandemic-related fiscal support have also contributed to the lower inflation. The current account balance strengthened to 1.4 percent of GDP in 2023, from -3.5 percent of GDP in 2022, and continues to register a moderate surplus as of November 2024, supported by the continued recovery in tourism and higher exports.

    A gradual cyclical recovery is expected to continue. Real GDP is projected to grow by 2.7 percent in 2024 and to increase to 2.9 percent in 2025. This is underpinned by the expansionary fiscal stance envisaged under the 2025 budget, which includes additional cash transfers of 1.0 percent of GDP and a rebound in public investment. Tourism-related sectors are expected to continue to support growth, as well as private consumption that will be further boosted by the authorities’ cash transfers. As growth continues to firm up, inflation is expected to pick up but remain in the bottom half of the target range in 2025. The current account balance is expected to improve further in 2024 and 2025, driven by the ongoing recovery in tourist arrivals.

    Risks to Thailand’s economic outlook are tilted to the downside. On the external front, an escalation of global trade tensions or deepening geoeconomic fragmentation could disrupt Thailand’s export recovery and dampen FDI inflows, while increased commodity price volatility could affect growth and lead to inflation spikes, and potentially tighter-for-longer global financial conditions. The intensification of regional conflicts could disrupt trade and travel flows while more frequent extreme climate events would adversely impact growth prospects. On the domestic front, the private sector debt overhang could impair financial institutions’ balance sheets and further decrease credit supply, negatively affecting growth. Renewed political uncertainty could hinder policy implementation and undermine confidence.

    Executive Board Assessment[2]

    In concluding the 2024 Article IV consultation with Thailand, Executive Directors endorsed the staff’s appraisal, as follows:

    Thailand’s economic recovery is ongoing, but it has been relatively slow and uneven. Economic activity expanded modestly in 2024, driven by private consumption and a rebound in tourism-related activities, while delayed budget implementation slowed the pace of public investment. The slow recovery, compared to ASEAN peers, is also rooted in Thailand’s longstanding structural weaknesses, while emerging external and domestic headwinds have also contributed to subdued inflation. The outlook remains highly uncertain with significant downside risks.

    As economic slack narrows, the focus should shift to rebuilding fiscal space. A less expansionary fiscal stance than envisaged under the FY25 budget would still provide impulse to support the recovery while helping to preserve policy space. Alternatively, reallocating part of the planned cash transfers toward productivity-enhancing investments or social protection would enable stronger inclusive growth and help reduce the public debt-to-GDP ratio. Starting in FY26, a revenue-based medium-term fiscal consolidation is needed to bring down public debt and rebuild buffers.

    Thailand’s fiscal framework can be further strengthened. This would require strengthening fiscal rules to better support the debt anchor by introducing a risk-based rules approach. Costs associated with quasi-fiscal operations such as energy price caps should be adequately accounted for, and fiscal risks closely monitored. Improving data provision for government finance statistics and SOEs is important.

    Staff welcomes the BOT’s decision to cut the policy rate in October and recommends a further reduction in the policy rate to support inflation and also translate into improvements in borrowers’ debt-servicing capacity with limited risk of additional leverage amid tight lending. Given remaining high uncertainty in the outlook, the authorities should stand ready to adjust their monetary policy stance in a data and outlook-dependent manner. Central bank independence with clear communication of policy moves is key to maintaining the credibility and effectiveness of monetary policy in anchoring inflation expectations.

    Effective coordination across policy tools, underpinned by adequate buffers, is essential for managing adverse scenarios. While the flexible exchange rate should continue to act as a shock absorber, the complementary use of FXI might alleviate policy trade-offs by smoothing destabilizing premia when large non-fundamental shocks render the FX market dysfunctional. Further liberalization of the FX ecosystem and phasing out of remaining capital flow management measures would help deepen the FX market and limit the need for FXI over time.

    A comprehensive package of prudential and legal measures needs to be deployed to facilitate an orderly private deleveraging. Staff welcomes the measures already implemented to address both the existing household debt stock and the buildup of new leverage. However, simultaneous and forceful implementation of personal debt workouts via more effective bankruptcy proceedings is essential to lower the existing household debt stock.

    The external position in 2024 was moderately stronger than warranted by fundamentals and desirable policy settings. Policies aimed at promoting investment, enhancing social safety nets, liberalizing the services sector, and minimizing tax incentives and subsidies that distort competition would facilitate external rebalancing.

    Resolute structural reforms are needed to boost productivity and competitiveness. Reform priorities include facilitating competition and openness, upgrading physical and ICT infrastructure, upskilling/reskilling the labor force, increasing export sophistication by leveraging digitalization, and strengthening governance. Providing an adequate social protection floor to vulnerable households could help enhance their resilience to shocks and address structural drivers of household debt accumulation.

    Table 1. Thailand: Selected Economic Indicators, 2019–30

    Per capita GDP (2023): US$7,338

    Exchange Rate (2023): 34.8 Baht/USD

    Unemployment rate (2023): 1 percent

    Poverty headcount ratio at national poverty line (2021): 6.3 percent

    Net FDI (2023): US$ -7.16 billion

    Population (2023): 70.18 million

                       

    Actual

    Projections

    2019

    2020

    2021

    2022

    2023

    2024

    2025

    2026

    2027

    2028

    2029

    2030

    Real GDP growth (y/y percent change) 1/

    2.1

    -6.1

    1.6

    2.5

    1.9

    2.7

    2.9

    2.6

    2.7

    2.7

    2.7

    2.7

    Consumption

    3.4

    -0.3

    1.3

    4.8

    4.6

    4.3

    4.0

    2.9

    2.1

    2.3

    2.6

    2.6

    Gross fixed investment

    2.0

    -4.8

    3.1

    2.3

    1.2

    0.1

    4.1

    2.1

    1.8

    2.3

    2.4

    2.5

    Inflation (y/y percent change)

                           

    Headline CPI (end of period)

    0.9

    -0.3

    2.2

    5.9

    -0.8

    1.2

    1.3

    1.5

    1.5

    1.7

    1.7

    1.8

    Headline CPI (period average)

    0.7

    -0.8

    1.2

    6.1

    1.2

    0.4

    1.0

    1.3

    1.5

    1.6

    1.7

    1.8

    Core CPI (end of period)

    0.5

    0.2

    0.3

    3.2

    0.6

    0.8

    1.3

    1.0

    1.2

    1.4

    1.4

    1.6

    Core CPI (period average)

    0.5

    0.3

    0.2

    2.5

    1.3

    0.6

    1.1

    1.2

    1.1

    1.3

    1.4

    1.5

    Saving and investment (percent of GDP)

                           

    Gross domestic investment

    23.8

    23.8

    28.6

    27.8

    22.5

    20.8

    21.9

    22.2

    22.0

    21.8

    21.8

    21.6

    Private

    16.9

    16.8

    16.9

    17.3

    17.3

    16.7

    16.6

    16.4

    16.3

    16.1

    16.1

    16.0

    Public

    5.7

    6.4

    6.5

    6.1

    5.6

    5.6

    5.9

    5.8

    5.7

    5.7

    5.7

    5.7

    Change in stocks

    1.2

    0.5

    5.1

    4.5

    -0.4

    -1.5

    -0.6

    0.0

    0.0

    0.0

    0.0

    0.0

    Gross national saving

    30.8

    27.9

    26.5

    24.4

    24.0

    22.6

    24.0

    24.5

    24.4

    24.4

    24.5

    24.4

    Private, including statistical discrepancy

    25.8

    26.2

    26.8

    22.6

    21.0

    19.8

    21.8

    21.9

    21.7

    21.7

    21.8

    21.6

    Public

    5.0

    1.8

    -0.3

    1.7

    3.0

    2.8

    2.2

    2.5

    2.7

    2.7

    2.7

    2.8

    Foreign saving

    -7.0

    -4.2

    2.1

    3.5

    -1.4

    -1.8

    -2.2

    -2.3

    -2.4

    -2.6

    -2.7

    -2.8

    Fiscal accounts (percent of GDP) 2/

                           

    General government balance 3/

    0.4

    -4.5

    -6.7

    -4.5

    -2.0

    -2.2

    -3.6

    -3.2

    -2.9

    -2.8

    -2.8

    -2.8

      SOEs balance

    0.4

    0.6

    -0.3

    -0.6

    -0.7

    -0.1

    -0.2

    -0.1

    -0.1

    -0.1

    -0.1

    0.0

    Public sector balance 4/

    0.8

    -3.9

    -7.1

    -5.1

    -2.7

    -2.3

    -3.8

    -3.3

    -3.0

    -2.9

    -2.9

    -2.8

    Public sector debt (end of period) 4/

    41.1

    49.4

    58.3

    60.5

    62.4

    63.3

    64.7

    65.4

    66.0

    66.1

    66.4

    66.4

    Monetary accounts (end of period, y/y percent change)

               

    Broad money growth

    3.6

    10.2

    4.8

    3.9

    1.9

    2.3

    3.7

    3.5

    3.2

    3.8

    3.2

    3.7

    Narrow money growth

    5.7

    14.2

    14.0

    3.1

    4.2

    5.9

    3.2

    4.7

    4.2

    5.1

    4.3

    4.9

    Credit to the private sector (by other depository corporations)

    2.4

    4.5

    4.5

    2.5

    1.5

    0.1

    1.0

    1.6

    1.8

    2.1

    2.3

    2.5

    Balance of payments (billions of U.S. dollars)

                           

    Current account balance

    38.3

    20.9

    -10.7

    -17.2

    7.4

    9.5

    11.9

    13.2

    14.6

    16.5

    18.2

    19.4

    (In percent of GDP)

    7.0

    4.2

    -2.1

    -3.5

    1.4

    1.8

    2.2

    2.3

    2.4

    2.6

    2.7

    2.8

    Exports of goods, f.o.b.

    242.7

    227.0

    270.6

    285.2

    280.7

    293.6

    301.8

    312.5

    327.2

    343.1

    359.0

    375.5

    Growth rate (dollar terms)

    -3.3

    -6.5

    19.2

    5.4

    -1.5

    4.6

    2.8

    3.6

    4.7

    4.9

    4.6

    4.6

            Growth rate (volume terms)

    -3.7

    -5.8

    15.4

    1.2

    -2.7

    2.1

    1.9

    2.7

    3.5

    3.6

    3.2

    3.2

    Imports of goods, f.o.b.

    216.0

    186.6

    238.6

    271.6

    261.4

    274.9

    284.6

    295.1

    309.1

    324.1

    339.1

    354.9

    Growth rate (dollar terms)

    -5.6

    -13.6

    27.9

    13.8

    -3.8

    5.2

    3.5

    3.7

    4.7

    4.9

    4.6

    4.7

            Growth rate (volume terms)

    -5.8

    -10.4

    18.0

    1.0

    -4.1

    3.7

    3.5

    3.3

    3.4

    3.3

    3.3

    3.3

    Capital and financial account balance 5/

    -24.7

    -2.6

    3.6

    6.9

    -4.9

    -9.5

    -11.9

    -13.2

    -14.6

    -16.5

    -18.2

    -19.4

    Overall balance

    13.6

    18.4

    -7.1

    -10.2

    2.6

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    Gross official reserves (including net forward position, end of period) (billions of U.S. dollars)

    259.0

    286.5

    279.2

    245.8

    254.6

    262.5

    262.5

    262.5

    262.5

    262.5

    262.5

    262.5

    (Months of following year’s imports)

    16.7

    14.4

    12.3

    11.3

    11.1

    11.1

    10.7

    10.2

    9.7

    9.3

    8.9

    8.5

    (Percent of short-term debt) 6/

    338.0

    315.3

    291.2

    236.3

    242.7

    239.6

    231.7

    222.5

    213.7

    206.2

    199.6

    252.3

    (Percent of ARA metric)

    252.5

    278.3

    263.3

    222.3

    233.2

    231.8

    226.4

    219.2

    212.3

    205.4

    199.3

    200.0

    Exchange rate (baht/U.S. dollar)

    31.0

    31.3

    32.0

    35.1

    34.8

    35.3

    NEER appreciation (annual average)

    7.2

    -0.3

    -4.5

    -1.8

    3.9

    REER appreciation (annual average)

    5.8

    -2.6

    -5.7

    -1.1

    1.2

    External debt

                           

    (In percent of GDP)

    31.7

    38.0

    38.9

    40.6

    38.2

    38.4

    38.5

    38.6

    38.7

    38.7

    38.8

    38.8

    (In billions of U.S. dollars)

    172.7

    190.1

    196.9

    201.4

    196.5

    202.4

    213.1

    223.8

    233.8

    245.9

    257.0

    270.0

    Public sector 7/

    38.0

    37.2

    41.5

    41.2

    35.8

    38.4

    40.8

    43.3

    45.6

    48.1

    50.8

    53.7

    Private sector

    134.0

    152.9

    155.4

    160.3

    160.7

    164.5

    172.9

    181.1

    188.8

    198.3

    206.8

    217.0

    Medium- and long-term

    74.6

    79.4

    82.3

    82.3

    80.3

    80.7

    86.5

    91.1

    95.3

    101.5

    107.1

    114.0

    Short-term (including portfolio flows)

    59.4

    73.5

    73.1

    78.0

    80.4

    83.8

    86.4

    90.0

    93.5

    96.8

    99.7

    103.0

    Debt service ratio 8/

    7.8

    7.5

    6.3

    7.3

    7.9

    7.8

    7.8

    7.3

    8.3

    9.3

    10.3

    10.3

    Memorandum items:

                           

    Nominal GDP (billions of baht)

    16889.2

    15661.3

    16188.6

    17378.0

    17922.0

    18603.0

    19371.2

    20282.2

    21143.0

    22211.7

    23164.5

    24307.8

    (In billions of U.S. dollars)

    544.0

    500.5

    506.3

    495.6

    515.0

    527.1

    553.9

    580.2

    604.8

    635.4

    662.7

    695.4

    Output Gap (in percent of potential output)

    0.2

    -4.2

    -4.1

    -2.0

    -1.5

    -0.7

    0.0

    0.1

    0.0

    0.0

    0.0

    0.0

    Sources: Thai authorities; CEIC Data Co. Ltd.; and IMF staff estimates and projections.

    1/ This series reflects the new GDP data based on the chain volume measure methodology, introduced by the Thai authorities in May 2015.

    2/ On a fiscal year basis. The fiscal year ends on September 30.

    3/ Includes budgetary central government, extrabudgetary funds, and local governments.

    4/ Includes general government and SOEs.

    5/ Includes errors and omissions.

    6/ With remaining maturity of one year or less.

    7/ Excludes debt of state enterprises.

    8/ Percent of exports of goods and services.

                                                             

    [1] Under Article IV of the IMF’s Articles of Agreement, the IMF holds bilateral discussions with members, usually every year. A staff team visits the country, collects economic and financial information, and discusses with officials the country’s economic developments and policies. On return to headquarters, the staff prepares a report, which forms the basis for discussion by the Executive Board.

    [2] The Executive Board takes decisions under its lapse-of-time procedure when the Board agrees that a proposal can be considered without convening formal discussions.

    IMF Communications Department
    MEDIA RELATIONS

    PRESS OFFICER: Pavis Devahasadin

    Phone: +1 202 623-7100Email: MEDIA@IMF.org

    https://www.imf.org/en/News/Articles/2025/02/20/pr25040-thailand-imf-executive-board-concludes-2024-article-iv-consultation-with-thailand

    MIL OSI

    MIL OSI Russia News

  • MIL-OSI Security: Sacramento Man Pleads Guilty to Production of Child Sexual Abuse Material

    Source: Office of United States Attorneys

    SACRAMENTO, Calif. —Jordan Anthony Hughes, 24, of Sacramento, pleaded guilty today to production of child sexual abuse materials, Acting U.S. Attorney Michele Beckwith announced.

    According to court documents, in September 2022, Hughes knowingly used a child under the age of 12 to engage in sexually explicit conduct for the purpose of producing visual depictions of that conduct, in Sacramento. Hughes committed hands-on violations of the minor victim and took videos and pictures of that abuse. Hughes’ abuse of the child dated back to at least 2017. In addition, Hughes used the internet to convince other underage victims to send him images and videos depicting themselves engaging in sexually explicit conduct. Hughes did this in part by posing as an underage male himself. Hughes also distributed images of child sexual abuse conduct, often under the guise of helping or teaching his victims how to perform certain sexual acts. At the time of his arrest, Hughes possessed voluminous child sexual abuse materials.

    This case is the product of an investigation by the Internet Crimes Against Children Unit of the Sacramento Valley Hi-Tech Crimes Task Force, which includes the Sacramento County Sheriff’s Department as well as Homeland Security Investigations. Assistant U.S. Attorney Shea J. Kenny is prosecuting the case.

    Hughes is in custody and is scheduled to be sentenced by U.S. District Judge Daniel J. Calabretta on July 10, 2025. Hughes faces a mandatory statutory minimum of 15 years in prison and a maximum penalty of 30 years in prison, and a $250,000 fine. The actual sentence, however, will be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute those who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc. Click on the “resources” tab for information about internet-safety education.

    MIL Security OSI

  • MIL-OSI Security: Halloween getaway driver convicted

    Source: Office of United States Attorneys

    VICTORIA, Texas – A federal jury sitting in Victoria has returned a guilty verdict against a 27-year-old Houston man for armed robbery and being a felon in possession of a firearm, announced U.S. Attorney Nicholas J. Ganjei.

    The jury deliberated for less than two hours before convicting Jordan Javon Ashton following a three-day trial.

    The robbery took place at the Morelos Supermercardos in Victoria Oct. 31, 2023, and involved a stolen vehicle with stolen plates and a stolen gun.

    On that Halloween evening, Latrayveon McNeal and Jerrell Potts – wearing masks and brandishing firearms – entered the supermarket and approached the Barri money services counter. They pointed weapons and yelled at the cashier, store employees and customers. Fearing for their lives, the employees complied with demands and provided U.S. currency and a large amount of cashed checks.   

    McNeal and Potts fled in a stolen white truck and met up with Ashton who was armed and waiting for them a few blocks away from the store. Ashton then drove the robbers from the scene leaving the white truck in the middle of the road with the motor still running.

    The jury saw numerous exhibits to include several photographs and surveillance video from the supermarket, the weapons used in the crime and heard excerpts of 911 calls made on that day.

    They also heard that Ashton had previously been convicted of a felony and was on parole during the commission of this crime.

    The defense attempted to convince the jury that he withdrew from the conspiracy. They did not believe those claims and found Ashton guilty as charged.

    McNeal, 26, and Potts, 25, both of Houston, previously pleaded guilty for their roles in the crime. Potts received 87 months in federal prison, while McNeal is pending sentencing.

    U.S. District Judge David S. Morales presided over trial and set sentencing for May 29. At that time, Ashton faces up to 20 and 15 years for the robbery and the firearms charges, respectively, as well as a possible $250,000 maximum fine.

    He will remain in custody pending that hearing.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives conducted the investigation with the assistance of Victoria Police Department, Victoria County Sheriff’s Office and Victoria County District Attorney’s Office. Assistant U.S. Attorney Patti Hubert Booth is prosecuting the case.

    MIL Security OSI

  • MIL-OSI USA: Beware of Illegally Marketed Diabetes Treatments, Fraudulent Pharmacies

    Source: US Food and Drug Administration

    Español

    As the number of people diagnosed with diabetes continues to grow, an increasing number of products marketed under the guise of “dietary supplements” or “over-the-counter drugs” promising to prevent, treat, and even cure diabetes are being sold illegally.

    The U.S. Food and Drug Administration advises consumers not to use such products – for many reasons. For example, they may contain harmful ingredients or no active ingredients at all. They may also be improperly marketed as nonprescription (over-the-counter) drugs or dietary supplements when they have hidden prescription drugs in the product. 

    These products carry an additional risk if they cause people to delay or discontinue effective treatments for diabetes. 

    More than 38 million people in the U.S. have diabetes, and almost 1-in-4 adults don’t know they have it, according to the Centers for Disease Control and Prevention. Additionally, approximately 96 million adults have pre-diabetes, meaning they have higher than normal blood sugar levels and can reduce their risks of developing diabetes through lifestyle changes, including diet and exercise.

    People with diabetes are at a greater risk for developing serious health complications, including:

    • Death
    • Heart disease
    • Chronic kidney disease, 
    • Nerve damage, 
    • Foot health, 
    • Oral health, 
    • Hearing loss, 
    • Vision loss, 
    • Mental health

    A Far-Reaching Problem

    Products that promise an easy fix might be tempting, but you are gambling with your health if you choose an unapproved, unregulated, or fraudulent product. 

    Diabetes is a chronic disease but is generally manageable. You can lower your risk for developing complications by following treatments prescribed by health care professionals, carefully monitoring blood sugar levels, and sticking to an appropriate diet and exercise program.

    Unfortunately, “snake-oil peddlers” still prey on people with chronic or incurable diseases, such as diabetes. 

    Bogus products for diabetes are particularly troubling because there are effective options available to help manage this serious disease rather than risk exposing patients to unapproved or dangerous products.

    One way to tell if a diabetes product is unsafe or ineffective is if it is marketed as a nonprescription product or dietary supplement. 

    FDA-approved diabetes drugs are only available by prescription. Additionally, there are no dietary supplements that treat or cure diabetes. In fact, the FDA requires dietary supplement products to be labeled with a disclaimer saying the product is not intended to “diagnose, treat, cure or prevent any disease.” You can read more about how to identify fraudulent products at 6 Tip-offs to Rip-offs: Don’t Fall for Health Fraud Scams.

    To protect the public health, the FDA investigates consumer complaints and monitors the marketplace for fraudulent products, including those promising to treat diabetes and its complications.

    Unapproved Diabetes Drugs

    The FDA issues warning letters to various companies marketing products for diabetes in violation of federal law. These products are often marketed as:

    • Dietary supplements
    • Alternative medicines 
    • Over-the-counter or nonprescription drugs
    • Homeopathic products

    In September 2021, the FDA and the Federal Trade Commission issued warning letters to 10 companies for illegally selling dietary supplements claiming to cure, treat, mitigate, or prevent diabetes.

    FDA laboratories find some “all-natural” diabetes products contain hidden active ingredients found in approved prescription drugs used to treat diabetes. You may ask, what the harm is if the products contain these undeclared active ingredients? Don’t be fooled, these are illegal products and can be dangerous. 

    If consumers, and their health care professionals, are unaware of the actual active ingredients in the products they are taking, these products may interact in dangerous ways with other medications. One possible complication: patients may end up taking a larger combined dose of the diabetic drugs than they intended. This may cause a significant and unsafe drop in blood sugar levels, a condition known as hypoglycemia.

    Fraudulent Pharmacies

    The FDA also monitors the internet for illegal marketing of prescription drugs or potentially unsafe products by fraudulent online pharmacies. 

    Buying medicines from unsafe online pharmacies may put consumers at risk. These websites often sell unapproved, counterfeit, or otherwise unsafe medicines outside of safeguards followed by licensed pharmacies. The products sold, while being passed off as authentic or effective, may contain the wrong ingredients, contain too little, too much, or no active ingredient at all, or contain other harmful ingredients.

    Additionally, consumers cannot be certain the manufacturing or handling of these drugs follows U.S. laws or meets other necessary safeguards, such as storing the medicine at the right temperature, which is extremely important for diabetes medicine, such as insulin, to ensure it doesn’t lose or have decreased effectiveness.  

    Visit BeSafeRx for more information about the potential dangers of buying drugs from unsafe websites, tips for purchasing medicines online safely and how to report unlawful sales. 

    The FDA maintains a list of Internet Pharmacy Warning Letters issued to companies for:

    • Selling illegally marketed products
    • Selling counterfeit drugs
    • Offering prescription drugs without a prescription
    • Offering prescription drugs without adequate directions for safe use
    • Offering prescription drugs without FDA-required consumer warnings about the serious health risks associated with the prescription drug

    Identifying Legitimate Online Pharmacies

    To help ensure you select a safe, licensed online pharmacy, look for one that requires you to have a valid prescription to purchase prescription drugs, provides a physical business address in the U.S., is licensed by a state pharmacy board, and provides a state-licensed pharmacist to answer your questions. You can find your state’s pharmacy board using the FDA’s Locate a State-Licensed Online Pharmacy webpage.

    Talk to your health care professional if you have any questions about your diabetes treatment or if a specific online pharmacy is safe to use. 

    How to Report

    If you believe you have found a website that may be illegally selling human drugs, dietary supplements, or other medical products, we encourage you to submit the information through the Reporting Unlawful Sales of Medical Products on the Internet available on the FDA website.

    Health care professionals and consumers should report any problems or reactions—often referred to as potential adverse reactions—to FDA’s MedWatch program at www.fda.gov/Medwatch/report.htm. Or, you can call 800-FDA-1088 (800-332-1088), send a fax to 800-FDA-0178, or mail FDA form 3500 (available on the MedWatch “Download Forms” page) to the address on the pre-addressed form.

    back to top

    MIL OSI USA News

  • MIL-OSI USA: Summary of the Joint NASA LCLUC–SARI Synthesis Meeting

    Source: NASA

    Introduction
    The NASA Land-Cover and Land-Use Change (LCLUC) is an interdisciplinary scientific program within NASA’s Earth Science program that aims to develop the capability for periodic global inventories of land use and land cover from space. The program’s goal is to develop the mapping, monitoring and modeling capabilities necessary to simulate the processes taking place and evaluate the consequences of observed and predicted changes. The South/Southeast Asia Research Initiative (SARI) has a similar goal for South/Southeast Asia, as it seeks to develop innovative regional research, education, and capacity building programs involving state-of-the-art remote sensing, natural sciences, engineering, and social sciences to enrich land use/cover change (LUCC) science in South/Southeast Asia. Thus it makes sense for these two entities to periodically meet jointly to discuss their endeavors.
    The latest of these joint meetings took place January 1–February 2, 2024, in Hanoi, Vietnam. A total of 85 participants attended the three-day, in-person meeting—see Photo.  A total of 85 participants attended the three-day, in-person meeting. The attendees represented multiple international institutions, including NASA (Headquarters and Centers), the University of Maryland, College Park (UMD), other American academic institutions, the Vietnam National Space Center (VNSC, the event host), the Vietnam National University’s University of Engineering and Technology, and Ho Chi Minh University of Technology, the Japanese National Institute of Environmental Studies (NIES), Center for Environmental Sciences, and the University of Tokyo. In addition, several international programs participated, including GEO Global Agricultural Monitoring (GEOGLAM), the System for Analysis, Research and Training (START), Global Observation of Forest and Land-use Dynamics (GOFC–GOLD), and NASA Harvest.

    Meeting Overview
    The purpose of the 2024 NASA LCLUC–SARI Synthesis meeting was to discuss LUCC issues – with a particular focus on their impact on Southeast Asian countries. Presenters highlighted ongoing projects aimed to advance our understanding of the spatial extent, intensity, social consequences, and impacts on the environment in South/Southeast Asian countries. While presenters reported on specific science results, they also were intentional to review and synthesize work from other related projects going on in Southeast Asia. 
    Meeting Goal
    The meeting’s overarching goal was to create a comprehensive and holistic understanding of various LUCC issues by examining them from multiple angles, including: collating information; employing interdisciplinary approaches; integrating research; identifying key insights; and enhancing regional collaborations. The meeting sought to bring the investigators together to bridge gaps, promote collaborations, and advance knowledge regarding LUCC issues in the region. The meeting format also provided ample time between sessions for networking to promote coordination and collaboration among scientists and teams. 
    Meeting and Summary Format
    The meeting consisted of seven sessions that focused on various LUCC issues. The summary report that follows is organized by day and then by session. All presentations in Session I and II are summarized (i.e., with all speakers, affiliations, and appropriate titles identified). The keynote presentation(s) from Sessions III–VI are summarized similarly. The technical presentations in each of these sessions are presented as narrative summaries. Session VII consisted of topical discussions to close out the meeting and summaries of these discussions are included herein. Sessions III–VI also included panel discussions, but to keep the article length more manageable, summaries of these discussions have been omitted. Readers interested in learning more about the panel discussions or viewing any of these presentations in full can access the information on the Joint LCLUC–SARI Synthesis meeting website.
    DAY ONE
    The first day of the meeting included welcoming remarks from the U.S. Ambassador to Vietnam (Session I), program executives of LCLUC and SARI,  as well as from national space agencies in South and Southeast Asia (Session II), and other LCLUC-thematic/overview presentations (Session III).
    Session 1: Welcoming Remarks
    Garik Gutman [NASA Headquarters—LCLUC Program Manager], Vu Tuan [VNSC’s Vietnam Academy of Science and Technology (VAST)—Vice Director General], Chris Justice [University of Maryland, College Park (UMD)—LCLUC Program Scientist], Matsunaga Tsuneo [National Institute of Environmental Studies (NIES), Japan], and Krishna Vadrevu [NASA’s Marshall Space Flight Center—SARI Lead] delivered opening remarks that highlighted collaborations across air pollution, agriculture, forestry, urban development, and other LUCC research areas. While each of the speakers covered different topics, they emphasized common themes, including advancing new science algorithms, co-developing products, and fostering applications through capacity building and training.
    After the opening remarks, special guest Marc Knapper [U.S. Ambassador to Vietnam] gave a presentation in which he emphasized the value of collaborative research between U.S. and Vietnamese scientists to address environmental challenges – especially climate change and LUCC issues. He expressed appreciation to the meeting organizers for promoting these collaborations and highlighted the joint initiatives between NASA and the U.S. Agency for International Development (USAID) to monitor environmental health and climate change, develop policies to reduce emissions, and support adaptation in agriculture. The U.S.–Vietnam Comprehensive Strategic Partnership emphasizes the commitment to address climate challenges and advance bilateral research. He concluded by encouraging active participation from all attendees and stressed the need for ongoing international collaboration to develop effective LUCC policies.
    Session-II: Programmatic and Space Agency Presentations
    NOTE: Other than Ambassador Knapper, the presenters in Session I gave welcoming remarks and programmatic and/or space agency presentations in Session II,.
    Garik Gutman began the second session by presenting an overview of the LCLUC program, which aims to enhance understanding of LUCC dynamics and environmental implications by integrating diverse data sources (i.e., satellite remote sensing) with socioeconomic and ecological datasets for a comprehensive view of land-use change drivers and consequences. Over the past 25 years, LCLUC has funded over 325 projects involving more than 800 researchers, resulting in over 1500 publications. The program’s focus balances project distribution that spans detection and monitoring, and impacts and consequences, including drivers, modeling, and synthesis. Gutman highlighted examples of population growth and urban expansion in Southeast Asia, resulting in environmental and socio-economic impacts. Urbanization accelerates deforestation, shifts farming practices to higher-value crops, and contributes to the loss of wetlands. This transformation alters the carbon cycle, degrades air quality, and increases flooding risks due to reduced rainwater absorption. Multi-source remote sensing data and social dimensions are essential in addressing LUCC issues, and the program aims to foster international collaborations and capacity building in land-change science through partnerships and training initiatives. (To learn more about the recent activities of the LCLUC Science Team, see Summary of the 2024 Land Cover Land Use Change Science Team Meeting.)
    Krishna Vadrevu explained how SARI connects regional and national projects with researchers from the U.S. and local institutions to advance LUCC mapping, monitoring, and impact assessments through shared methodologies and data. The initiative has spurred extensive activities, including meetings, training sessions, publications, collaborations, and fieldwork. To date, the LCLUC program has funded 35 SARI projects and helped build collaborations with space agencies, universities, and decision-makers worldwide. SARI Principal Investigators have documented notable land-cover and land-use transformations, observing shifts in land conversion practices across Asia. For example, the transition from traditional slash-and-burn practices for subsistence agriculture to industrial oil palm and rubber plantations in Southeast Asia. Rapid urbanization has also reshaped several South and Southeast Asian regions, expanding both horizontally in rural areas and vertically in urban centers. The current SARI solicitation funds three projects across Asia, integrating the latest remote sensing data and methods to map, monitor, and assess LUCC drivers and impacts to support policy-making.
    Vu Tuan provided a comprehensive overview of Vietnam’s advances in satellite technology and Earth observation capabilities, particularly through the LOTUSat-1 satellite (name derived from the “Lotus” flower), which is equipped with an advanced X-band Synthetic Aperture Radar (SAR) sensor capable of providing high-resolution imagery [ranging from 1–16 m (3–52 ft)]. This satellite is integral to Vietnam’s efforts to enhance disaster management and climate change mitigation, as well as to support a range of applications in topography, agriculture, forestry, and water management, as well as in oceanography and environmental monitoring. The VNSC’s efforts are part of a broader strategy to build national expertise and self-reliance in satellite technology, such as developing a range of small satellites (e.g., NanoDragon, PicoDragon, and MicroDragon) that progress in size and capability. Alongside satellite development, the VNSC has established key infrastructure, facilities, and capacity building in Hanoi, Nha Trang, and Ho Chi Minh City to support satellite assembly, integration, testing, and operation. Tuan showcased the application of remotely sensed LUCC data to map and monitor urban expansion in Ha Long city from 2000–2023 and the policies needed to manage these changes sustainably – see Figure 1.

    Tsuneo Matsunaga provided a detailed overview of Japan’s Greenhouse Gases Observing Satellite (GOSAT) series of satellites, data from which provide valuable insights into global greenhouse gas (GHG) trends and support international climate agreements, including the Paris Agreement.
    Matsunaga reviewed the first two satellites in the series: GOSAT and GOSAT-2, then previewed the next satellite in the series: GOSAT-GW, which is scheduled to launch in 2025. GOSAT-GW will fly the Total Anthropogenic and Natural Emissions Mapping Observatory–3 (TANSO-3) – an improved version of TANSO-2, which flies on GOSAT-2. TANSO-3 includes a Fourier Transform Spectrometer (FTS-3) that has improved spatial resolution [10.5 km (6.5 mi)] over TANSO-FTS-2 and precision that matches or exceeds that of its predecessor. TANSO-FTS-3 will allow estimates with precision better than 1 ppm for carbon dioxide (CO2) and 10 ppb for methane (CH4), as well as enabling nitrogen dioxide (NO2) measurements. GOSAT–GW will also fly the Advanced Microwave Scanning Radiometer (AMSR3) that will monitor water cycle components (e.g., precipitation, soil moisture) and ocean surface winds. AMSR3 builds on the heritage of three previous AMSR instruments that have flown on NASA and Japan Aerospace Exploration Agency (JAXA) missions.
    Matsunaga also highlighted the importance of ground-based validation networks, such as the Total Carbon Column Observing Network, COllaborative Carbon Column Observing Network, and the Pandora Global Network, to ensure satellite data accuracy.
    Son Nghiem [NASA/Jet Propulsion Laboratory (JPL)] addressed dynamic LUCC in Cambodia, Laos, Thailand, Vietnam, and Malaysia. The synthesis study examined the factors that evolve along the rural–urban continuum (RUC). Nghiem showcased this effort using Synthetic Aperture Radar (SAR) data from the Copernicus Sentinel-1 mission to map a typical RUC in Bac Lieu, Vietnam – see Figure 2.

    Nghiem described the study, which examined the role of rapid urbanization, agricultural conversion, climate change, and environment–human feedback processes in causing non-stationary and unpredictable impacts. This work illustrates how traditional trend analysis is insufficient for future planning. The study also examined whether slower or more gradual changes could inform policy development. To test these hypotheses, his research will integrate high-resolution radar and hyperspectral data with socioeconomic analyses. The study highlights the need for policies that are flexible and responsive to the unique challenges of different areas, particularly in “hot-spot” regions experiencing rapid changes.
    Peilei Fan [Tufts University] presented a study that synthesizes the complex patterns of LUCC, identifying both the spatial and temporal dynamics that characterize transitions in urban systems. The study explores key drivers, including economic development, population growth, urbanization, agricultural expansion, and policy shifts. She emphasized the importance of understanding these drivers for sustainable land management and urban planning. For example, the Yangon region of Myanmar has undergone rapid urbanization – see Figure 3. Her work reveals the need for integrated approaches that consider both urban and rural perspectives to manage land resources effectively and mitigate negative environmental and social impacts. Through a combination of case studies, statistical analysis, and policy review, Fan and her team aim to provide a nuanced understanding of the interactions between human activities and environmental changes occurring in the rapidly transforming landscapes of Southeast Asia.

    Session III: Land Cover/Land Use Change Studies
    Tanapat Tanaratkaittikul [Geo-Informatics and Space Technology Development Agency (GISTDA), Thailand] highlighted GISTDA activities, which play a crucial role in advancing Thailand’s technological capabilities and addressing both national and global challenges, including Thailand Earth Observation System (THEOS) and its successors: THEOS-2 and THEOS-2A. THEOS-1, which launched in 2008, provides 2-m (6-ft) panchromatic and 15-m (45-ft) multispectral resolution with a 26-day revisit cycle, which can be reduced to 3 days with off-nadir pointing. Launched in 2023, THEOS-2 includes two satellites – THEOS-2A [a very high-resolution satellite with 0.5-m (1.5-ft) panchromatic and 2-m (6-ft) multispectral imagery] and THEOS-2B [a high-resolution satellite with 4-m (12-ft) multispectral resolution] – with a five-day revisit cycle. GISTDA also develops geospatial applications for drought assessment, flood prediction, and carbon credit calculations to support government decision-making and climate initiatives. GISTDA partners with international collaborators on regional projects, such as the Lancang-Mekong Cooperation Special Fund Project.
    Eric Vermote [NASA’s Goddard Space Flight Center] presented a keynote that focused on atmospheric correction of land remote sensing data and related algorithm updates. He highlighted the necessity of correcting surface imaging for atmospheric effects, such as molecular scattering, aerosol scattering, and gaseous absorption, which can significantly distort the satellite spectral signals and lead to potential errors in applications, such as land cover mapping, vegetation monitoring, and climate change studies.
    Vermote explained that the surface reflectance algorithm uses precise vector radiative transfer modeling to improve accuracy by incorporating atmospheric parameter inversion. It also adjusts for various atmospheric conditions and aerosol types – enhancing corrections across regions and seasons. He explained that SkyCam – a network of ground-based cameras – provides real-time assessments of cloud cover that can be used to validate cloud masks, while the Cloud and Aerosol Measurement System (CAMSIS) offers additional ground validation by measuring atmospheric conditions. He said that together, SkyCam and CAMSIS improve satellite-derived cloud masks, supporting more accurate climate models and environmental monitoring. Vermote’s work highlights the ongoing advancement of atmospheric correction methods in remote sensing.
    Other presentations in this session included one in which the speaker described how Yangon, the capital city in Myanmar, is undergoing rapid urbanization and industrial growth. From 1990–2020, the urban area expanded by over 225% – largely at the expense of agricultural and green lands. Twenty-nine industrial zones cover about 10.92% of the city, which have attracted significant foreign direct investment, particularly in labor-intensive sectors. This growth has led to challenges with land confiscations, inadequate infrastructure, and environmental issues (e.g., air pollution). Additionally, rural migration for employment has resulted in informal settlements, emphasizing the need for comprehensive urban planning that balances economic development with social equity and sustainability.
    Another presentation highlighted varying LUCC trends across Vietnam. In the Northern and Central Coastal Uplands, for example, swidden systems are shifting toward permanent tree crops, such as rubber and coffee. Meanwhile, the Red River Delta is seeing urban densification and consolidation of farmland – transitioning from rice to mixed farming with increased fruit and flower production. Similarly, the Central Coastal Lowlands and Southeastern regions are experiencing urban growth and a shift from coastal agriculture – in this case, to shrimp farming – leading to mangrove loss. The Central Highlands is moving from swidden to tree crops, particularly fruit trees, while the Mekong River Delta is increasing rice cropping and aquaculture. These changes contribute to urbanization, altered farming practices, and biodiversity loss. Advanced algorithms (e.g., the Time-Feature Convolutional Neural Network model) are being used to effectively map these varied LUCC changes in Vietnam.
    Another presenter explained how 10-m (33-ft) resolution spatially gridded population datasets are essential to address LUCC in environmental and socio-demographic research. There was also a demonstration of PopGrid, which is a collaborative initiative that provides access to various global-gridded population databases, which are valuable for regional LUCC studies and can support informed decision-making and policy development.
    DAY TWO
    The second day’s presentations centered around urban LUCC (Session IV) as well as interconnections between agriculture and water resources. (Session V).
    Session IV: Urban Land Cover/Land Use Change
    Gay Perez [Philippines Remote Sensing Agency (PhilSA)] presented a keynote focused on PhilSA’s mission to advance Philippines as a space-capable country by developing indigenous satellite and launch technologies. He explained that PhilSA provides satellite data in various categories, including sovereign, commercial, open-access, and disaster-activated. He noted that the ground infrastructure – which includes three stations and a new facility in Quezon – supports efficient data processing. For example, Perez stated that in 2023, PhilSA produced over 10,000 maps for disaster relief, agricultural assessments, and conservation planning.
    Perez reviewed PhilSA’s Diwata-2 mission, which launched in 2018 and operates in a Sun-synchronous orbit around 620 km (385 mi) above Earth. With a 10-day revisit capability, it features a high-precision telescope [4.7 m (15ft) resolution], a multispectral imager with four bands, an enhanced resolution camera, and a wide-field camera. Since launch, Diwata-2 has captured over 100,000 global images, covering 95% of the Philippines. Looking to the near future, Perez reported that PhilSA’s launch of the Multispectral Unit for Land Assessment (MULA) satellite is planned for 2025. He explained that MULA will capture images with a 5-m (~16-ft) resolution and 10–20-day revisit time, featuring 10 spectral bands for vegetation, water, and urban analysis.
    Perez also described the Drought and Crop Assessment and Forecasting project, which addresses drought risks and mapping ground motion in areas, e.g., Baguio City and Pangasinan. Through partnerships in the Pan-Asia Partnership for Geospatial Air Pollution Information (PAPGAPI) and the Pandora Asia Network, PhilSA monitors air quality across key locations, tracking urban pollution and cross-border particulate transport. PhilSA continues to strengthen Southeast Asian partnerships to drive sustainable development in the region.
    Jiquan Chen [Michigan State University] presented the second keynote address, which focused on the Urban Rural Continuum (URC). Chen emphasized the importance of synthesizing studies that explore factors such as population dynamics, living standards, and economic development in the URC. Key considerations include differentiating between two- and three-dimensional infrastructures and understanding constraints from historical contexts. Chen highlighted critical variables from his analysis including net primary productivity, household income, and essential infrastructure elements, such as transportation and healthcare systems. He advocated for integrated models that combine mechanistic and empirical approaches to grasp the dynamics of URC changes, stressing their implications for urban planning, environmental sustainability, and social equity. He concluded with a call for collaboration to enhance these models and tackle challenges arising from the changing urban–rural landscape.
    Tep Makathy [Cambodian Institute For Urban Studies] discussed urbanization in Phnom Penh, Cambodia. He explained that significant LUCC and infrastructure developments have been fueled by direct foreign investment; however, this development has resulted in environmental degradation, urban flooding, and infrastructure strain. Tackling pollution, congestion, preservation of green spaces, and preserving the historical heritage of the city will require sustainable urban planning efforts.
    Nguyen Thi Thuy Hang [Vietnam Japan University, Vietnam National University, Hanoi] explained how flooding poses a significant annual threat to infrastructure and livelihoods in Can Tho, Vietnam. Therefore, it is essential to incorporate climate change considerations into land-use planning by enhancing the accuracy of vegetation layer classifications. Doing so will improve the representation of land-cover dynamics in models that decision-makers use when planning urban development. In addition, Hang reported that a more comprehensive survey of dyke systems will improve flood protection and identify areas needing reinforcement or redesign. These studies could also explore salinity intrusion in coastal agricultural areas that could impact crop yields and endanger food security.
    In this session, two presenters highlighted how SAR data, which uses high backscatter to enhance the radar signal, is being used to assist with mapping urban areas in their respective countries. The phase stability and orientation of building structures across SAR images aid in consistent monitoring and backscatter, producing distinct image textures specific to urban settings. Researchers can use this heterogeneity and texture to map urban footprints, enabling automated discrimination between urban and non-urban areas. The first presenters showed how Interferometric Synthetic Aperture Radar techniques, such as Small Baseline Subset (SBAS) and Persistent Scatterer (PS) have been highly effective for mapping and monitoring land subsidence in coastal and urban areas in Vietnam. This approach has been applied to areas along the Saigon River as well as in Ho Chi Minh, Vietnam. The second presenter described an approach (using SAR data with multitemporal coherence and the K-means classification method) that has been used effectively to study urban growth in the Denpasar Greater Area of Indonesia between 2016 and 2022. The technique identified the conversion of 4376 km2 (1690 mi2) of rural to built-up areas, averaging 72.9 hectares (0.3 mi2) per year. Urban sprawl was predominantly observed in the North Kuta District, where the shift from agricultural to built-up land use has been accompanied by severe traffic congestion and other environmental issues.
    Another presenter showed how data from the QuikSCAT instrument, which flew on the Quick Scatterometer satellite, and from the Sentinel-1 C-band SAR can be combined to measure and analyze urban built-up volume, specifically focusing on the vertical growth of buildings across various cities. By integrating these datasets, researchers can assess urban expansion, monitor the development of high-rise buildings, and evaluate the impact of urbanization on infrastructure and land use. This information is essential for urban planning, helping city planners and policymakers make informed decisions to accommodate growing populations and enhance sustainable urban development.
    Session V – LUCC, Agriculture, and Water Resources
    Chris Justice presented the keynote for this session, in which he addressed the GEOGLAM initiative and the NASA Harvest program. GEOGLAM, initiated by the G20 Agriculture Ministers in 2011, focuses on agriculture and food security to increase market transparency and improve food security. These efforts leverage satellite-based Earth observations to produce and disseminate timely, relevant, and actionable information about agricultural conditions at national, regional, and global scales to support agricultural markets and provide early warnings for proactive responses to emerging food emergencies. NASA Harvest uses satellite Earth observations to benefit global food security, sustainability, and agriculture for disaster response, climate risk assessments, and policy support. Justice also emphasized the use of open science and open data principles, promoting the integration of Earth observation data into national and international agricultural monitoring systems. He also discussed the development and application of essential agricultural variables, in situ data requirements, and the need for comprehensive and accurate satellite data products.
    During this session, another presentation focused on how VNSC is engaged in several agricultural projects, including mapping rice crops, estimating yields, and assessing environmental impacts. VNSC has created high-accuracy rice maps for different seasons that the Vietnamese government uses to monitor and manage agricultural production. Current initiatives involve using satellite data to estimate CH4 emissions from rice paddies, biomass mapping, and monitoring rice straw burning. For example, in the Mekong Delta, numerous environmental factors, including climate change-induced stress (e.g., sea-level rise), flooding, drought, land subsidence, and saltwater intrusion, along with human activities like dam construction, sand mining, and groundwater extraction, threaten the sustainability of rice farming and farmer livelihoods. To address these challenges, sustainable agricultural practices are essential to improving rice quality, diversify farming systems, adopt low-carbon techniques, and enhance water management.
    Presentations highlighted the importance of both optical and SAR data for LUCC studies, particularly in mapping agricultural areas. A study using Landsat time-series data demonstrated its value in monitoring agricultural LUCC in Houa Phan Province, Laos, and Son La Province, Vietnam. Land cover types were classified through spectral pattern analysis, identifying distinct classes based on Landsat reflectance values. The findings revealed significant natural forest loss alongside increases in cropland and forest plantations due to agricultural expansion. High-resolution imagery validated these results, indicating the scalability of this approach for broader regional and global land-cover monitoring. Another study showcased the effectiveness of SAR data from the Phased Array type L-band Synthetic Aperture Radar-2 (PALSAR-2) on the Japanese Advanced Land Observing Satellite-2 (ALOS-2) for mapping and monitoring agricultural land use in Suphanburi, Thailand. This data proved particularly useful for capturing seasonal variations and diverse agricultural practices. Supervised machine learning methods, such as Random Forest classifiers, combined with innovative spatial averaging techniques, achieved high accuracy in distinguishing various agricultural conditions.
    In the session, presenters also discussed the use of Sentinel-1 SAR data for mapping submerged and non-submerged paddy soils was highlighted, demonstrating its effectiveness in understanding water management issues see – Figure 4. Additionally, large-scale remote sensing data and cloud computing were shown to provide unprecedented opportunities for tracking agricultural land-use changes in greater detail. Case studies from India and China illustrated key challenges, such as groundwater depletion in irrigated agriculture across the Indo-Ganges region and the impacts on food, water, and air quality in both countries.

    The session also focused on Water–Energy–Food (WEF) issues related to the Mekong River Basin’s extensive network of hydroelectric dams, which present both benefits and challenges. While these dams support sectors such as irrigated agriculture and hydropower, they also disrupt vital ecosystem services, including fish habitats and biodiversity. Collaborative studies integrating satellite and ground data, hydrological models, and socio-economic frameworks highlight the need to balance these benefits with ecological and social costs. Achieving sustainable management requires cross-sectoral and cross-border cooperation, as well as the incorporation of traditional knowledge to address WEF trade-offs and governance challenges in the region.
    DAY THREE
    The third day included a session that explored the impacts of fire, GHG emissions, and pollution (Session VI) as well as a summary discussion on synthesis (Session VII).
    Session VI: Fires, Greenhouse Gas Emissions, and Pollution
    Chris Elvidge [Colorado School of Mines] presented a keynote on the capabilities and applications of the Visible Infrared Imaging Radiometer Suite (VIIRS) Nightfire [VNF] system, an advanced satellite-based tool developed by the Earth Observation Group. VIIRS Nightfire uses four near- and short-wave infrared channels, initially designed for daytime imaging, to detect and monitor infrared emissions at night. The system identifies various combustion sources, including both flaming and non-flaming activities (e.g., biomass burning, gas flaring, and industrial processes). It calculates the temperature, source area, and radiant heat of detected infrared emitters using physical laws to enable precise monitoring of combustion events and provide insight into exothermic and endothermic processes.
    Elvidge explained that VNF has been vital for near-real-time data in Southeast Asia. The system has been used to issue daily alerts for Vietnam, Thailand, and Indonesia. Recent updates in Version 4 (V4) include atmospheric corrections and testing for secondary emitters with algorithmic improvements – with a 50% success rate in identifying additional heat sources. The Earth Observation Group maintains a multiyear catalog of over 20,000 industrial infrared emitters available through the Global Infrared Emitter Explorer (GIREE) web-map service. With VIIRS sensors expected to operate until about 2040 on the Joint Polar Satellite System (JPSS) platforms, this system ensures long-term, robust monitoring and analysis of global combustion events, proving essential for tracking the environmental impacts of industrial activities and natural combustion processes on the atmosphere and ecosystems.
    Toshimasa Ohara [Center for Environmental Science, Japan—Research Director] continued with the second keynote and provided an in-depth analysis of long-term trends in anthropogenic emissions across Asia. The regional mission inventory in Asia encompasses a range of pollutants and offers detailed emissions data from 1950–2020 at high spatial and temporal resolutions. The study employs both bottom-up and top-down approaches for estimating emissions, integrating satellite observations to validate data and address uncertainties. Notably, emissions from China, India, and Japan have shown signs of stabilization or reduction, attributed to stricter emission control policies and technological advancements. Ohara also highlighted Japan’s effective air pollution measures and the importance of extensive observational data in corroborating emission trends. His presentation emphasized the need for improved methodologies in emission inventory development and validation across Asia, aiming to enhance policymaking and environmental management in rapidly industrializing regions.
    Several presenters during this session focused on innovative approaches to understand and mitigate GHG emissions and air pollution. One presenter showed how NO2 data from the TROPOspheric Monitoring Instrument (TROPOMI) on the European Sentinel-5 Precursor have been validated against ground-based observations from Pandora stations in Japan, highlighting the influence of atmospheric conditions on measurement accuracy. Another presenter described an innovative system that GISTDA used to combine satellite remote sensing data with Artificial Intelligence (AI). This system was used to monitor and analyze the concentration of fine particulate matter (PM) in the atmosphere in Thailand. (In this context fine is defined as particles with diameters ≤ 2.5 µm, or PM2.5.) These applications, which are accessible through online, cloud-based platforms and mobile applications for iOS and Android devices, allow users, including citizens, government officers, and policymakers, to access PM2.5 data in real-time through web and mobile interfaces.
    A project under the United Nations Economic and Social Commission for Asia and the Pacific in Thailand is focused on improving air quality monitoring across the Asia–Pacific region by integrating satellite and ground-based data. At the core of this effort, the Pandora Asia Network, which includes 30 ground-based instruments measuring pollutants such as NO₂ and sulfur dioxide (SO₂), is complemented by high-resolution observations from the Geostationary Environment Monitoring Spectrometer (GEMS) aboard South Korea’s GEO-KOMPSAT-2B (GK-2B) satellite. The initiative also provides training sessions to strengthen regional expertise in remote sensing technologies for air quality management and develops decision support systems for evidence-based policymaking, particularly for monitoring pollution sources and transboundary effects like volcanic eruptions. Future plans include expanding the Pandora network and enhancing data integration to support local environmental management practices.
    PM2.5 levels in Vietnam are influenced by both local emissions and long-range pollutant transport, particularly in urban areas.The Vietnam University of Engineering and Technology, in conjunction with VNSC, continues to map and monitor PM2.5 using satellites and machine learning while addressing data quality issues that stem from missing satellite data and limited ground monitoring stations – see Figure 5.
    In addition to mapping and monitoring pollutants, another presentater explained that significant research is underway to address their health impacts. In Hanoi, exposure to pollutants ( e.g., PM2.5, PM10, and NO2) has led to increased rates of respiratory diseases (e.g., pneumonia, bronchitis, and asthma) among children,  as well as elevated instances of cardiovascular diseases among adults. A substantial mortality burden is attributable to fine particulate matter – particularly in densely populated areas like Hanoi. Compliance with stricter air quality guidelines could potentially prevent thousands of premature deaths. For example, preventive measures enacted during the COVID-19 pandemic resulted in reduced pollution levels that were associated with a decrease in avoidable mortality rates. In response to these challenges, Vietnam has implemented air quality management policies, including national technical regulations and action plans aimed at controlling emissions and enhancing monitoring; however, current national standards still fall short of the more stringent guidelines recommended by the World Health Organization. Improved air quality standards and effective policy interventions are needed to mitigate the health risks associated with air pollution in Vietnam.

    Another presenter explained how food production in Southeast Asia contributes about 40% of the region’s total GHG emissions – with rice and beef production identified as the largest contributors for plant-based and animal-based emissions, respectively. Another presentation focused on a study that examined GHG emissions from agricultural activities, which suggests that animal-based food production – particularly beef – generates substantially higher GHG emissions per kg of food produced compared to plant-based foods, such as wheat and rice. Beef has an emission intensity of about 69 kg of CO2 equivalent-per-kg, compared to 2 to 3 kg of CO2 equivalent-per-kg for plant-based foods. The study points to mitigation strategies (e.g., changing dietary patterns, improving agricultural practices) and adopting sustainable land management. Participants agreed that a comprehensive policy framework is needed to address the environmental impacts of food production and reduce GHG emissions in the agricultural sector.
    In another presentation, the speaker highlighted the fact that Southeast Asian countries need an advanced monitoring, reporting, and verification system to track GHG emissions – particularly within high-carbon reservoirs like rice paddies. To achieve this, cutting-edge technologies (e.g., satellite remote sensing, low-cost unmanned aerial vehicles, and Internet of Things devices) can be beneficial in creating sophisticated digital twin technology for sustainable rice production and GHG mitigation.
    Another presentation featured a discussion about pollution resulting from forest and peatland fires in Indonesia, which is significantly impacting air quality. Indonesia’s tropical peatlands – among the world’s largest and most diverse – face significant threats from frequent fires. Repeated burning has transformed forests into shrubs and secondary vegetation regions, with fires particularly affecting forest edges and contributing to a further retreat of intact forest areas. High-resolution data is essential to map and monitor changes in forest cover, including pollution impacts.
    Another speaker described a web-based Geographic Information Systems (GIS) application that has been developed to support carbon offsetting efforts in Laos – to address significant environmental challenges, e.g., deforestation and climate change. Advanced technologies (e.g., remote sensing, GIS, and Global Navigation Satellite Systems) are used to monitor land-use changes, carbon sequestration, and ecosystem health. By integrating various spatial datasets, the web GIS app enhances data collection precision, streamlines monitoring processes, and provides real-time information to stakeholders for informed decision-making. This initiative fosters collaboration among local communities, government agencies, and international partners, while emphasizing the importance of government support and international partnerships. Ultimately, the web GIS application represents a significant advancement in Laos’s commitment to environmental sustainability, economic growth, and the creation of a greener future.
    Session VII. Discussion Session on Synthesis
    The meeting concluded with a comprehensive discussion on synthesizing themes related to LUCC. The session focused on three themes: LUCC, agriculture, and air pollution. The session focused on trends and projections as well as the resulting impacts in the coming years. It also highlighted research related to these topics to inform more sustainable land use policies. A panel of experts from different Southeast Asian countries addressed these topics. A summary of the key points shared by the panelists for each theme during the discussion is provided below.
    LUCC Discussions
    This discussion focused on the challenges of balancing economic development with environmental sustainability in Southeast Asian countries, e.g., mining in Myanmar, agriculture in Vietnam, and rising land prices in Thailand. More LUCC research is needed to inform decision-making and improve land-use planning during transitions from agriculture to industrialization while ensuring food security. The panelists also discussed urban sprawl and infrastructure development along main roads in several Southeast Asian countries, highlighting the social and environmental challenges arising from uncoordinated growth. It was noted that urban infrastructure lags behind population increases, resulting in traffic congestion, pollution, and social inequality. Cambodia, for example, has increased foreign investments, which presents similar dilemmas of economic growth accompanied by significant environmental degradation. Indonesia is another example of a Southeast Asian nation facing rapid urbanization and inadequate spatial planning, leading to flooding, groundwater depletion, and pollution. These issues further highlight the need for integrated satellite monitoring to inform land-use policies. Finally, recognizing the importance of public infrastructure in growth management, it was reported that the Thai government is already using technology to manage urban development alongside green spaces.
    Panelists agreed that LUCC research is critical for guiding policymakers toward sustainable land-use practices – emphasizing the necessity for improved communication between researchers and policymakers. While the integration of technologies (e.g., GIS and remote sensing) is beginning to influence policy decisions, room for improvement remains. In summary, the discussions stressed the importance of better planning, technology integration, and policy-informed research to reconcile economic growth with sustainability. Participants also highlighted the need to engage policymakers, non-government organizations, and the private sector in using scientific evidence for sustainable development. Capacity building in Laos, Cambodia, and Myanmar, where GIS and remote sensing technologies are still developing, is crucial. Community involvement is essential for translating research findings into actionable policies to address real-world challenges and social equity.
    Agriculture Discussions
    These discussions explored the intricate relationships between agricultural practices, economic growth, and environmental sustainability in Southeast Asia. As an example, despite national policies to manage the land transition in Vietnam, rapid conversions from forest to agricultural land and further to residential and industrial continue. While it is recognized that strict land management plans may hinder future adaptability, further regulation is needed. These rapid shifts in land use have increased land for economic development – especially in industrial and residential sectors – and contribute to environmental degradation, e.g., pollution and soil erosion. In Thailand, land is distributed among agriculture (50%), forest (30%), and urban (20%) areas. Despite a long history of agricultural practices, Vietnam faces new challenges from climate change and extreme weather.
    Thailand, meanwhile, is exploring carbon credits to incentivize sustainable farming practices – although this requires significant investment and time. The nation is well-equipped with a robust water supply system, and ongoing efforts to enhance crop yields on Vietnam’s Mekong Delta, salinity levels, and flooding intensity have increased as a result of the rise in incidents of extreme weather, prompting advancements in rice farming mechanization to be implemented that are modeled after practices that have been successfully used in the Philippines.
    Despite these advances, issues (e.g., over-application of rice seeds) remain. The dominant land cover type in Malaysia is tropical rainforest, although agriculture – particularly oil palm plantations – also plays a significant role in land use. While stable, it shares environmental concerns with Indonesia. The country is integrating solar energy initiatives, placing solar panels on former agricultural lands and recreational areas, which raises coastal environmental concerns. In Taiwan, substantial land use changes have stemmed from solar panel installations to support green energy goals but have led to increased temperatures and altered wind patterns.
    All panelists agreed that remote sensing technologies are vital to inform agricultural policy across the region. They emphasized the need to transition from academic research to actionable insights that directly inform policy. Panelists also discussed the challenge of securing funding for actionable research – underlining the importance of recognizing the transition required for research to inform operational use. Some countries (e.g., Thailand) have established operational crop monitoring systems, while others (e.g., Vietnam) primarily depend on research projects. Despite progress in Malaysia’s monitoring of oil palm plantations, a comprehensive operational monitoring system is still lacking in many areas. The participants concluded that increased efforts are needed to promote the wider adoption of remote sensing technologies for agricultural and environmental monitoring, with emphasis on developing operational systems that can be integrated into policy and decision-making processes.
    Air Pollution Discussions
    The discussion on air pollution focused on various sources in Southeast Asia, which included both local and transboundary factors. Panelists highlighted that motor vehicles, industrial activities, and power plants are major contributors to pollutants, such as PM2.5, NO2, ozone (O3), and carbon monoxide (CO). Forest fires in Indonesia – particularly from South Sumatra and Riau provinces – are significantly impacting neighboring countries, e.g., Malaysia. A study found that most PM2.5 pollution in Kuala Lumpur originates from Indonesia. During the COVID-19 pandemic, pollution levels dropped sharply due to reduced economic activity; however, data from 2018–2023 shows that PM2.5 levels have returned to pre-pandemic conditions.
    The Indonesian government is actively working to reduce deforestation and emissions, aiming for a 29% reduction by 2030. Indonesia is also participating in carbon markets and receiving international payments for emission reductions. Indonesia’s emissions also stem from energy production, industrial activities, and land-use changes, including peat fires. The Indonesian government reports anthropogenic sources – particularly from the energy sector and industrial activities, forest and peat fires, waste, and agriculture – continue to escalate. While Indonesia is addressing these issues, growing population and energy demands continue to drive pollution levels higher.
    Vietnam and Laos are facing similar challenges related to air pollution – particularly from agricultural residue burning. Both governments are working on expanding air quality monitoring, regulating waste burning, and developing policies to mitigate pollution. Vietnam has been developing provincial air quality management plans and expanding its monitoring network. Laos has seen increased awareness of pollution, accompanied by government measures aimed at restricting burning and improving waste management practices.
    The panelists agreed that collaborative efforts for regional cooperation are essential to address air pollution. This will require collaboration in research and data sharing to inform policy decisions. There is a growing interest in leveraging satellite technology and modeling approaches to enhance air quality forecasting and management. To ensure that research translates into effective policy, communication of scientific findings to policymakers is essential – particularly by clearly communicating complex research concepts in accessible formats. All panelists agreed on the importance of improving governance, transparency, and scientific communication to better translate research into policy actions, highlighting collaborations with international organizations – including NASA – to address air quality issues. While significant challenges related to air pollution persist in Southeast Asia, noteworthy efforts are underway to improve awareness, research, and collaborative governance aimed at enhancing air quality and reducing emissions.
    Conclusion
    The LCLUC–SARI Synthesis meeting fostered collaboration among researchers and provided valuable updates on recent developments in LUCC research, exchange of ideas, integration of new data products, and discussions on emerging science directions. This structured dialogue (particularly the discussions in each session) helped the attendees identify priorities and needs within the LUCC community. All panelists and meeting participants commended the SARI leadership for their proactive role in facilitating collaborations and discussions that promote capacity-building activities across the region. SARI activities have significantly contributed to enhancing the collective ability of countries in South and Southeast Asia to address pressing environmental challenges. The meeting participants emphasized the importance of maintaining and expanding these collaborative efforts, which are crucial for fostering partnerships among governments, research institutions, and local communities. They urged SARI to continue organizing workshops, training sessions, and knowledge-sharing platforms that can equip stakeholders with the necessary skills and resources to tackle environmental issues such as air pollution, deforestation, climate change, and sustainable land management.
    Krishna VadrevuNASA’s Marshall Space Flight Centerkrishna.p.vadrevu@nasa.gov
    Vu TuanVietnam National Science Center, Vietnamvatuan@vnsc.org.vn
    Than NguyenVietnam National University Engineering and Technology, Vietnamthanhntn@vnu.edu.vn
    Son NghiemJet Propulsion Laboratoryson.v.nghiem@jpl.nasa.gov
    Tsuneo MatsunagaNational Institute of Environmental Studies, Japanmatsunag@nies.go.jp
    Garik GutmanNASA Headquartersggutman@nasa.gov
    Christopher JusticeUniversity of Maryland College Parkcjustice@umd.edu

    MIL OSI USA News

  • MIL-OSI Security: Indian National Indicted for Possession of Child Sexual Abuse Material

    Source: Office of United States Attorneys

    NEW ORLEANS, LOUISIANA – Acting U.S. Attorney Michael M. Simpson announced that on February 6, 2025, ASHISH KAPOOR, a/k/a Romy Kapoor,” (“KAPOOR) age 28, a national of India, was indicted for Possession of Child Pornography, in violation of Title 18, United States Code, Sections 2252(a)(4)(B) and (b)(2).

    If convicted, KAPOOR faces a maximum sentence of 20 years imprisonment, a fine of up to 250,000.00, a period of supervised release up to life, and a mandatory special assessment fee of $100.00.

    According to the indictment, on or about December 20, 2024, KAPOOR possessed digital videos and computer images containing visual depictions of prepubescent minors engaging in sexually explicit conduct.

    Acting U.S. Attorney Simpson reiterated that the indictment is merely a charge and that the guilt of the defendant must be proven beyond a reasonable doubt.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice.  Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    The case was investigated by the United States Department of Homeland Security, the United States Customs and Border Protection, and the New Orleans Police Department.  It is being prosecuted by Assistant United States Attorney Maria Carboni of the Financial Crimes Unit.

    MIL Security OSI

  • MIL-OSI: Bitget’s CEO Gracy Chen Joins Consensus Hong Kong 2025

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Feb. 20, 2025 (GLOBE NEWSWIRE) — Bitget, the leading cryptocurrency exchange and Web3 company will be attending Consensus 2025, set to be held in Hong Kong, scheduled from February 18 to 20 at the Hong Kong Convention & Exhibition Centre. Consensus’ expansion into Hong Kong highlights Asia’s growth as a global powerhouse for Web3, with millions of crypto users, blockchain developers, and industry leaders. Serving as the most influential crypto event, Hong Kong sees itself strategically positioned as a pivotal digital assets hub, uniting East and West for pivotal conversations and plans that will define what’s next for the future of technology.

    Bitget CEO, Gracy Chen, will be a distinguished speaker at the event, sharing her insights on a panel titled ‘Beyond Trading: How Crypto is Shaping the Market‘ on the Mainstage on Wednesday, 19 February, at 2:30 PM HKT. Since assuming the role of CEO in May 2024, Gracy has been instrumental in driving Bitget’s global strategy, leading to a fourfold increase in the company’s user base and establishing strategic partnerships, including collaborations with big names like Lionel Messi and LALIGA. Her leadership has propelled Bitget into the ranks of the top global exchanges. 

    “One trend that I observed is the integration of centralized exchange and decentralized exchange. All of the strongest exchanges have put a lot of resources into building their DEX service, not just focusing on the CEX service. In 2024, we saw great growth in our DEX, Bitget Wallet, which hit 45 million users,” said Gracy Chen, CEO at Bitget. “For trash time in the market, it is the best time to be more focused on our own product and really create value for our targeted users and community. That’s probably how we survived in the last bear market.”

    On February 18th, Bitget held the BGB Builders Night, an exclusive event celebrating BGB’s all-time high. The event promises networking with fellow BGB holders, industry influencers, and project founders and was opened by Bitget CEO Gracy, who shed light on Bitget’s future developments. Attendees engaged with key members of the BGB and Bitget Wallet teams, participated in the ‘BGB Hunt’ for a chance to win $BGB, and exchanged ideas with Bitget CEO, Gracy. 

    Participation in Consensus Hong Kong 2025 shows Bitget’s dedication to creating a collaborative environment to drive innovation within the crypto community. This event will convene the industry’s brightest minds, serving as a launchpad for meaningful discussions, networking, and the forging of partnerships that will influence the trajectory of the digital asset landscape.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 100 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin priceEthereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a world-class multi-chain crypto wallet that offers an array of comprehensive Web3 solutions and features including wallet functionality, token swap, NFT Marketplace, DApp browser, and more.

    Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    For more information, users can visit: Website | Twitter | Telegram | LinkedIn | Discord | Bitget Wallet

    For media inquiries, users can contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, users can refer to the Terms of Use.

    Contact

    Simran Alphonso

    media@bitget.com

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/961f8995-8b0c-4f27-8793-17ca12645372

    https://www.globenewswire.com/NewsRoom/AttachmentNg/c97f743b-d88d-41ef-b337-8668848a682b

    The MIL Network

  • MIL-OSI: Quantum Computing Solutions Big Influence on Commercial & Military Drone Applications Drastically Improving Operations

    Source: GlobeNewswire (MIL-OSI)

    PALM BEACH, Fla., Feb. 20, 2025 (GLOBE NEWSWIRE) — FN Media Group News Commentary – Recent reports on the quantum computing market all seem to project substantial growth for years to come and will enter into a multitude of uses… including drones. A recent International Conference of Intelligent Computing & Optimization Conference paper, titled “Enhancing Privacy and Security for UAV and IoT Enabled Drones an Intelligent Integration of Blockchain, AI, and Quantum Computing” had this to say, in part: “Unmanned aerial vehicles (UAVs) and drones have seen an upsurge in their usage in various industries due to the advancement of the Internet of Things (IoT). Nevertheless, the extensive use of these technologies has given rise to concerns over privacy, data integrity, and security. This research presents a pioneering approach to tackle these challenges by amalgamating Blockchain technology, artificial intelligence (AI), and quantum computing. By virtue of its decentralized and immutable nature, blockchain can safeguard data integrity for UAVs and drones. A blockchain-based system can store all drone data transfers on distributed ledgers, thus enhancing transparency and reducing the risk of malicious tampering. The use of AI can significantly benefit drone operations and decision-making. AI systems empower drones to dynamically reroute themselves, predict potential security hazards, and adapt to new situations. Furthermore, AI’s real-time data processing can enhance anomaly detection and response times. Quantum computing, although still in its nascent stages, furnishes unparalleled processing capability. Drone data encryption is almost unfeasible to decrypt using conventional computing methods, as per quantum-enhanced security protocols that can be devised owing to quantum physics.”   Active Companies in the markets today include ZenaTech, Inc. (NASDAQ: ZENA), D-Wave Quantum Inc. (NYSE: QBTS), Quantum Computing Inc. (NASDAQ: QUBT), IonQ (NYSE: IONQ), Quantum Corporation (NASDAQ: QMCO).

    The article continued: “Additionally, quantum computing can expedite complex route enhancements, thereby considerably augmenting drone output. The amalgamation of Blockchain, AI, and Quantum Computing has provided a comprehensive solution to the privacy and security apprehensions concerning UAVs and IoT-enabled drones. The forthcoming drone operations are expected to reap the benefits of the most promising features of these technologies, thereby elevating the benchmark for efficiency, openness, and safety. This study’s investigation provides insights into the advantages… of these integration mechanisms. An Abstract from yet another scholarly paper on ScienceDirect.com titled: “Futuristic view of the Internet of Quantum Drones: Review, challenges and research agenda”, said this: “The disruptive technology of unmanned aerial vehicles (UAVs), or drones, is a trend with increasing applications and practical relevance in the current and future society. Despite the common interest in drones for commercial deliveries, the use of this disruptive technology can be examined in the contexts of other world strategic demands such as climate change issues and traffic management. As of very recently, some drone-related futuristic disruptive technologies, including quantum drones (QD), the Internet of Quantum Drones (IoQDs), and a constellation of quantum satellites (CQS), are expected to be a breakthrough technology in strategic areas of society.”

    ZenaTech (NASDAQ:ZENA) Quantum Computing “Sky Traffic” Project Demonstrates High Accuracy in Initial Testing Leading to Expansion of Team and AI Drone Applications for Commercial and Defense – ZenaTech, Inc. (FSE: 49Q) (BMV: ZENA) (“ZenaTech”), a technology company specializing in AI (Artificial Intelligence) drones, Drone as a Service (DaaS), enterprise SaaS and Quantum Computing solutions, announces positive results from initial testing and an update on its Quantum Computing Sky Traffic project. An initial test using the Company’s AI algorithms and quantum computing to predict weather has resulted in a high level of accuracy for the parameters tested including actual temperatures verses predicted temperatures in the test which used 2016 data.

    Due in part to these encouraging results, ZenaTech is now growing its internal team over the next two months. As part of the ramp up, the Company is adding additional quantum, AI and hardware engineers, and optimization specialists and is engaged in recruiting staff from physics facilities at international universities, including researchers, instructors, and Ph.D. candidates.

    “The Sky Traffic project leverages AI and quantum computing to process vast data streams to improve the accuracy and speed of weather forecasting that can also apply to the innovation of many other commercial and defense applications utilizing drones. Our hiring strategy focuses on assembling a multidisciplinary team of quantum and AI specialists, and hardware and aerospace engineers to help us revolutionize autonomous drones. By combining quantum algorithms with advanced machine learning, we can optimize navigation, decision-making, and real-time data processing for next-generation aerial intelligence,” said CEO Shaun Passley, Ph.D.

    ZenaTech launched the Sky Traffic project in November 2024, which will utilize its AI drones, quantum computing, and specialized quantum and AI teams to develop and test advanced applications for traffic management, weather forecasting, wildfire management and defense applications using large datasets, Amazon Web Services, and computing devices and platforms.

    AI Drones are used in weather forecasting to collect real-time atmospheric data from hard-to-reach areas, such as storm systems or remote regions, providing valuable input for weather models. Quantum computers can then analyze this vast and complex data much faster and more accurately, improving weather predictions and enhancing the ability to forecast extreme events like hurricanes, tornadoes, or wildfires.

    AI and quantum computing can work together to make defense drones smarter, faster, and more efficient using a single drone or a swarm of multiple drones. AI helps drones analyze data, recognize objects, and make decisions on their own, while quantum computing can process massive amounts of information much faster than regular computers. For example, a defense drone using AI can detect enemy movement, but adding quantum computing allows it to analyze complex battlefield data instantly and find the best flight path or strategy in real time. This combination improves reaction speed, mission accuracy, and overall drone performance, making them more effective for surveillance, reconnaissance, and security operations.

    Quantum computing is an emergent field of cutting-edge computer science harnessing the unique qualities of quantum mechanics to solve problems beyond the ability of even the most powerful classical computers of today, to process massively complicated mathematical problems and data at orders of magnitude faster speeds.

    The ZenaDrone 1000 is a multifunction autonomous drone, in a VTOL (Vertical Takeoff and Landing) quadcopter design with eight rotors; it is considered a medium-sized drone measuring 12X7 feet in size. It is designed for stable flight, maneuverability, heavy lift capabilities up to 40 kilos, incorporating innovative software technology, AI, sensors, and purpose-built attachments, along with compact and rugged hardware engineered for industrial and defense use for a variety of inspection, surveillance or tracking applications.   Continued… Read this full release by visiting: https://www.financialnewsmedia.com/news-zena/

    Other recent developments in the markets include:

    D-Wave Quantum Inc. (NYSE: QBTS) and the Julich Supercomputing Centre (“JSC”) at Forschungszentrum Julich (“FZJ”) have recently announced that FZJ has purchased a D-Wave quantum computer, becoming the first high-performance computing (HPC) center in the world to own a D-Wave Advantage(TM) annealing quantum computing system.

    With the purchase of the world’s largest quantum computer and Europe’s first quantum computer with more than 5,000 qubits and 15-way connectivity, the Julich UNified Infrastructure for Quantum computing (JUNIQ), a public quantum computing user facility deployed by JSC, gains complete access to all aspects of the system. This will allow it to integrate the D-Wave system with Julich’s JUPITER exascale supercomputer in the future, potentially enabling breakthroughs in areas such as artificial intelligence (AI) and quantum optimization. JSC’s system will be upgraded to D-Wave’s next-generation Advantage2 processor once available. The Advantage2 system is expected to deliver significant performance gains with doubled coherence, increased connectivity and a 40 percent boost to the energy scale for advanced problem solving.

    Quantum Computing Inc. (NASDAQ: QUBT) recently announced it has received a fifth purchase order for its thin film lithium niobate (TFLN) photonic chip foundry. The latest order comes from a research group based in Canada to support its research efforts on quantum photonics.

    As part of the order, QCi will provide the research group with custom test structures based on its TFLN photonic integrated circuit (PIC) chip technology. These test structures will serve as a baseline for advanced designs, such as periodically poled lithium niobate (PPLN) components, which are essential for generating entangled photons and optical frequency conversion. Under this order agreement, the research group will also receive priority access and preferred rates for future multi-project wafer (MPW) runs offered by QCi.

    IonQ (NYSE: IONQ) and General Dynamics Information Technology (GDIT), a business unit of General Dynamics, recently announced a partnership to bring the power of quantum computing to government and defense sectors.

    IonQ and GDIT are partnering to combine GDIT’s deep technical and government agency mission expertise with IonQ’s pioneering quantum technology. Together, the companies will co-develop and market advanced quantum processing and networking applications to address high-impact use cases, including quantum AI extensions, resource optimization, and anomaly detection. This collaboration aims to deliver transformative capabilities for federal, and state governments, meeting critical challenges with cutting-edge solutions.

    Quantum Corporation (NASDAQ: QMCO) recently announced scalability enhancements to its Quantum Myriad® all-flash file system, making it the first solution to offer incremental, in-place system scaling with dynamic, automatic data leveling. These advancements deliver unmatched flexibility and adaptability in a modern, all-flash file system so customers can meet their evolving storage requirements in the era of AI.

    The new scalability features enable customers to start with as few as five partially populated NVMe Storage Server nodes, then expand in increments of one or more nodes at a time with the additional storage available in minutes, with no need for admin intervention, and no impact or interruption to user operation. Customers will be able to continue adding nodes as their needs grow, increasing capacity while maintaining linear performance with automatic data leveling across all nodes as new Storage Server nodes are added.

    About FN Media Group:

    At FN Media Group, via our top-rated online news portal at www.financialnewsmedia.com, we are one of the very few select firms providing top tier one syndicated news distribution, targeted ticker tag press releases and stock market news coverage for today’s emerging companies. #tickertagpressreleases #pressreleases

    Follow us on Facebook to receive the latest news updates: https://www.facebook.com/financialnewsmedia

    Follow us on Twitter for real time Market News: https://twitter.com/FNMgroup

    Follow us on Linkedin: https://www.linkedin.com/in/financialnewsmedia/

    DISCLAIMER:  FN Media Group LLC (FNM), which owns and operates FinancialNewsMedia.com and MarketNewsUpdates.com, is a third party publisher and news dissemination service provider, which disseminates electronic information through multiple online media channels.  FNM is NOT affiliated in any manner with any company mentioned herein.  FNM and its affiliated companies are a news dissemination solutions provider and are NOT a registered broker/dealer/analyst/adviser, holds no investment licenses and may NOT sell, offer to sell or offer to buy any security.  FNM’s market updates, news alerts and corporate profiles are NOT a solicitation or recommendation to buy, sell or hold securities.  The material in this release is intended to be strictly informational and is NEVER to be construed or interpreted as research material.  All readers are strongly urged to perform research and due diligence on their own and consult a licensed financial professional before considering any level of investing in stocks.  All material included herein is republished content and details which were previously disseminated by the companies mentioned in this release.  FNM is not liable for any investment decisions by its readers or subscribers.  Investors are cautioned that they may lose all or a portion of their investment when investing in stocks.  For current services performed FNM has been compensated fifty four hundred dollars for news coverage of the current press releases issued by ZenaTech, Inc. by the Company.  FNM HOLDS NO SHARES OF ANY COMPANY NAMED IN THIS RELEASE.

    This release contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E the Securities Exchange Act of 1934, as amended and such forward-looking statements are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. “Forward-looking statements” describe future expectations, plans, results, or strategies and are generally preceded by words such as “may”, “future”, “plan” or “planned”, “will” or “should”, “expected,” “anticipates”, “draft”, “eventually” or “projected”. You are cautioned that such statements are subject to a multitude of risks and uncertainties that could cause future circumstances, events, or results to differ materially from those projected in the forward-looking statements, including the risks that actual results may differ materially from those projected in the forward-looking statements as a result of various factors, and other risks identified in a company’s annual report on Form 10-K or 10-KSB and other filings made by such company with the Securities and Exchange Commission. You should consider these factors in evaluating the forward-looking statements included herein, and not place undue reliance on such statements. The forward-looking statements in this release are made as of the date hereof and FNM undertakes no obligation to update such statements.

    Contact Information:
    Media Contact email: editor@financialnewsmedia.com – +1(561)325-8757

    SOURCE: FN Media Group

    The MIL Network

  • MIL-OSI Global: Our research on dark web forums reveals the growing threat of AI-generated child abuse images

    Source: The Conversation – UK – By Simon Bailey, Chair, International Policing and Public Protection Research Institute, Anglia Ruskin University

    Ventura/Shutterstock

    The UK aims to be the first country in the world to create new offences related to AI-generated sexual abuse. New laws will make it illegal to possess, create or distribute AI tools designed to generate child sexual abuse material (CSAM), punishable by up to five years in prison. The laws will also make it illegal for anyone to possess so-called “paedophile manuals” which teach people how to use AI to sexually abuse children.

    In the last few decades, the threat against children from online abuse has multiplied at a concerning rate. According to the Internet Watch Foundation, which tracks down and removes abuse from the internet, there has been an 830% rise in online child sexual abuse imagery since 2014. The prevalence of AI image generation tools is fuelling this further.

    Last year, we at the International Policing and Protection Research Institute at Anglia Ruskin University published a report on the growing demand for AI-generated child sexual abuse material online.

    Researchers analysed chats that took place in dark web forums over the previous 12 months. We found evidence of growing interest in this technology, and of online offenders’ desire for others to learn more and create abuse images.

    Horrifyingly, forum members referred to those creating the AI-imagery as “artists”. This technology is creating a new world of opportunity for offenders to create and share the most depraved forms of child abuse content.

    Our analysis showed that members of these forums are using non-AI-generated images and videos already at their disposal to facilitate their learning and train the software they use to create the images. Many expressed their hopes and expectations that the technology would evolve, making it even easier for them to create this material.

    Dark web spaces are hidden and only accessible through specialised software. They provide offenders with anonymity and privacy, making it difficult for law enforcement to identify and prosecute them.

    The Internet Watch Foundation has documented concerning statistics about the rapid increase in the number of AI-generated images they encounter as part of their work. The volume remains relatively low in comparison to the scale of non-AI images that are being found, but the numbers are growing at an alarming rate.

    The charity reported in October 2023 that a total of 20,254 AI generated imaged were uploaded in a month to one dark web forum. Before this report was published, little was known about the threat.

    The harms of AI abuse

    The perception among offenders is that AI-generated child sexual abuse imagery is a victimless crime, because the images are not “real”. But it is far from harmless, firstly because it can be created from real photos of children, including images that are completely innocent.

    While there is a lot we don’t yet know about the impact of AI-generated abuse specifically, there is a wealth of research on the harms of online child sexual abuse, as well as how technology is used to perpetuate or worsen the impact of offline abuse. For example, victims may have continuing trauma due to the permanence of photos or videos, just knowing the images are out there. Offenders may also use images (real or fake) to intimidate or blackmail victims.

    These considerations are also part of ongoing discussions about deepfake pornography, the creation of which the government also plans to criminalise.




    Read more:
    Deepfake porn: why we need to make it a crime to create it, not just share it


    All of these issues can be exacerbated with AI technology. Additionally, there is also likely to be a traumatic impact on moderators and investigators having to view abuse images in the finest details to identify if they are “real” or “generated” images.

    What can the law do?

    UK law currently outlaws the taking, making, distribution and possession of an indecent image or a pseudo-photograph (a digitally-created photorealistic image) of a child.

    But there are currently no laws that make it an offence to possess the technology to create AI child sexual abuse images. The new laws should ensure that police officers will be able to target abusers who are using or considering using AI to generate this content, even if they are not currently in possession of images when investigated.

    New laws on AI tools should help investigators crack down on offenders even if they do not have images in their possession.
    Pla2na/Shutterstock

    We will always be behind offenders when it comes to technology, and law enforcement agencies around the world will soon be overwhelmed. They need laws designed to help them identify and prosecute those seeking to exploit children and young people online.

    It is welcome news that the government is committed to taking action, but it has to be fast. The longer the legislation takes to enact, the more children are at risk of being abused.

    Tackling the global threat will also take more than laws in one country. We need a whole-system response that starts when new technology is being designed. Many AI products and tools have been developed for entirely genuine, honest and non-harmful reasons, but they can easily be adapted and used by offenders looking to create harmful or illegal material.

    The law needs to understand and respond to this, so that technology cannot be used to facilitate abuse, and so that we can differentiate between those using tech to harm, and those using it for good.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Our research on dark web forums reveals the growing threat of AI-generated child abuse images – https://theconversation.com/our-research-on-dark-web-forums-reveals-the-growing-threat-of-ai-generated-child-abuse-images-249067

    MIL OSI – Global Reports

  • MIL-OSI Europe: Chipping in with €1 billion

    Source: European Investment Bank

    With a background in physics and fluid mechanics, Dirkzwager spent almost a decade in central engineering at Philips in the Netherlands, before moving to Hong Kong, where he was inspired by the city’s entrepreneurial energy and eagerness to grow.

    “The approach was all about trial and error,” he says. “Trying things quickly, seeing what worked and moving on to the next idea.” NXP Semiconductors was born with this mindset, as a spinoff from Philips’s semiconductor division in 2006. “That’s when we shifted our focus to customers beyond Philips, serving the global market,” says Dirkzwager. “It was an exciting, hectic time.”

    According to a McKinsey study, the global market for semiconductors could reach more than $1 trillion by 2030, up from $600 billion in 2021.

    Today, more than half of NXP’s chip design, manufacturing and distribution serves the automotive market. About 25% goes to industrial and Internet of Things customers, and 17% to the mobile sector, including smartphones and tablets.

    NXP’s research and development in chips for the automotive sector will be ready to be used in the market in about five years, and the work on post-quantum encryption will be ready for the market in 10 to 20 years. The semiconductor industry’s focus on the future ties in well with the long-term investment preference of the European Investment Bank, making the loan a good fit for both parties.

    “The Bank was fast, efficient and competitive,” Dirkzwager says. “It’s a good feeling.”

    MIL OSI Europe News

  • MIL-OSI: Bitget’s Liquidity Depth Analysis Highlights Competitive Edge in Crypto Trading

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Feb. 20, 2025 (GLOBE NEWSWIRE) — Bitget, the leading cryptocurrency exchange and Web3 company, has collaborated with CryptoRank to conduct an in-depth comparative analysis of liquidity depth among the top five global centralized cryptocurrency exchanges (CEXs): Binance, Bitget, Bybit, MEXC, and OKX. The research offers valuable insights into each platform’s ability to handle large market orders with minimal price impact, a critical factor for traders seeking efficient trade execution.

    Top key findings of the report highlight Spot and Futures market liquidity. Bitget secured a second position among the top five global exchanges, showing substantial liquidity depth in major trading pairs such as BTC/USDT and ETH/USDT. This positions Bitget as a competitive choice for traders seeking efficient trade execution in high-volume markets.

    In the futures market, Bitget ranked fourth with strong liquidity across key pairs, reflecting its growing presence and capability in the derivatives trading sector.

    The analysis evaluated liquidity depth at around 2% price range from the mid-market price, a critical metric for assessing an exchange’s ability to handle large market orders with minimal slippage. Bitget’s performance in this area highlights its dedication to maintaining a liquid and stable trading environment for its users.

    The study reveals significant variations in liquidity depth across major centralized crypto exchanges in both spot and futures markets. Binance’s dominance in the spot market and MEXC’s leadership in the futures market highlight the diverse strengths of these platforms. Bitget’s strong performance in both markets aligns with the exchange’s market performance, which has made it the fastest-growing CEX in the top 10. These insights assist investors in selecting the most suitable exchange for their trading activities, considering factors such as liquidity depth and market focus.

    Recently, Forbes listed Bitget as one of the top most trusted crypto exchanges worldwide. In 2024, Bitget expanded its user base by 400%, from 20M in January to 100M in December. Spot trading surged from $160B in Q1 to $600B in Q4; daily volumes doubled to $20B. The high-paced updates and top performance amongst CEXs has pushed Bitget to the top #3 exchanges in derivatives trading while strengthening its positioning amongst the top #5 on Spot. Keeping the momentum going, Bitget continues to expand its offerings and improve platform features, maintaining high liquidity to support seamless trading for its vast user base.

    For more information, please find the Cryptorank report here.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 100 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin price, Ethereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a world-class multi-chain crypto wallet that offers an array of comprehensive Web3 solutions and features including wallet functionality, token swap, NFT Marketplace, DApp browser, and more.

    Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    For more information, visit: Website | Twitter | Telegram | LinkedIn | Discord | Bitget Wallet

    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/ad78461a-18f9-42bb-8720-fab1af7d2f47

    The MIL Network

  • MIL-OSI: MEXC Launches PAIN (PAIN) Airdrop+ with Spot and Futures Trading, Offering 270,000 USDT in Bonuses

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Feb. 20, 2025 (GLOBE NEWSWIRE) — MEXC, the world’s leading cryptocurrency trading platform, announced the listing of the PAIN (PAIN) on both spot and futures markets, scheduled for February 20, 2025, at 01:05 (UTC). The launch on MEXC will be accompanied by Airdrop+ rewards of 270,000 USDT.

    Unleashes the Power of PAIN: The Meme That Took Over the Internet Goes Crypto

    Inspired by the legendary “Hide the Pain Harold” meme, which has entertained the internet for over 14 years, PAIN represents more than just a token—it embodies resilience, humor, and the idea that what doesn’t kill you makes you stronger. PAIN’s meme identity is rooted in the viral images of András István Arató, a retired Hungarian electrical engineer whose iconic awkward yet polite smile became a universal symbol of concealed struggle. Over the years, Arató has embraced his internet fame, securing brand deals with Coca-Cola, starring in TV shows, and even hosting Hungary’s annual sports awards. Now, PAIN makes its mark in the crypto world, connecting its long-standing internet legacy with the rapidly growing meme coin sector.

    As a global leader in digital asset trading, MEXC’s listing of PAIN highlights the growing influence of meme culture in Web3 and the expanding role of community-driven tokens. By offering strong liquidity, broad market access, and dedicated trading support, MEXC provides the perfect environment for PAIN to thrive.

    To celebrate the listing, MEXC is also launching a $270,000 reward pool across two major activities, allowing users to engage with PAIN, explore the meme-powered economy, and be part of one of the most entertaining narratives in the digital asset space.

    Celebrate the PAIN Launch with a prize pool of 270,000 USDT

    In a significant show of support for PAIN and its expansive ecosystem, MEXC is set to list the new PAIN token. This move not only underscores MEXC’s commitment to pioneering blockchain projects but also connects users with a dynamic network that fuels cutting-edge initiatives.

    MEXC, known for quickly listing trending tokens, expands its offerings with PAIN (PAIN). The PAIN/USDT trading market officially launched in the Innovation Zone on February 20, 2025, at 01:05 (UTC), followed by the introduction of the PAIN USDT perpetual futures at 01:23 (UTC), offering adjustable leverage from 1x to 50x with both cross and isolated margin modes.

    To celebrate the listing of PAIN (PAIN) on MEXC Spot and Futures on February 20, MEXC is launching a series of exclusive activities starting on February 20, 2025, at 07:00 (UTC). Participants will have the chance to win USDT bonuses, and other exciting rewards, with opportunities available for both new and experienced users.

    These activities include:

    • Event 1: Airdrop+

    Benefit 1: Deposit and share 200,000 USDT in Futures bonus (New user exclusive).
    Benefit 2: Futures Challenge — Trade to share 50,000 USDT in Futures bonus (Open all users).
    Benefit 3: Invite new users and share 20,000 USDT in Futures bonus (Open to all users).

    • Event 2: Spread the Word and Win 1,000 USDT in Bonus.

    Your Easiest Way to Trending Tokens

    MEXC aims to become the go-to platform offering the widest range of valuable crypto assets. The platform has grown its user base to 30 million by providing a diverse selection of tokens, high-frequency airdrops, and simple participation processes. In 2024, MEXC launched a total of 2,376 new tokens, including 1,716 initial listings and 605 memecoins, with total airdrop rewards exceeding $136 million.

    About MEXC

    Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto”. Serving over 30 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, frequent airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding.
    MEXC Official WebsiteXTelegramHow to Sign Up on MEXC

    Contact:
    Lucia Hu
    PR Manager
    lucia.hu@mexc.com

    Disclaimer: This content is provided by MEXC. The statements, views, and opinions expressed in this content are solely those of the sponsor and do not necessarily reflect the views of this media platform. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. This content is for informational purposes only and should not be considered as financial, investment, or trading advice. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before investing in or trading cryptocurrency and securities. Please conduct your own research and invest at your own risk.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/7a0aa8f2-bfba-4145-9b11-4629db3d330c

    The MIL Network

  • MIL-OSI: Bitget Wallet Maximizes Pi Airdrop Utility with Full Mainnet Support

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Feb. 20, 2025 (GLOBE NEWSWIRE) — Bitget Wallet, a leading Web3 non-custodial wallet, has announced full support for the Pi airdrop as its mainnet launches on February 20 at 8:00 (UTC), 2025. As one of the first multi-chain wallets to integrate Pi’s mainnet, Bitget Wallet offers a secure platform for users to claim, store, and swap Pi tokens, ensuring seamless participation in its expanding ecosystem.

    Pi Network (PI) is a cryptocurrency project focused on accessibility, allowing users to mine tokens directly from their mobile devices without expensive hardware. Pi Network has attracted over 100 million participants with its mobile-first mining model, highlighting the potential of community-driven adoption. Its mainnet launch represents a pivotal transition from a closed system to an open blockchain infrastructure, where the viability of Pi’s ecosystem will be tested through real-world use cases and network scalability.

    Beyond simple transactions, Pi tokens can be used for peer-to-peer transfers, payments in merchant marketplaces, and staking for network security and governance. These functions provide practical applications for users looking to maximize the value of their Pi holdings. However, as Pi transitions to an open blockchain, its mainnet launch will serve as the first real test of whether these utilities can be fully realized at scale. The success of Pi’s ecosystem will depend on how well it supports active transactions, sustainable incentives, and broader adoption beyond speculation.

    Bitget Wallet enhances Pi holders’ ability to utilize their tokens efficiently. Users can securely store and trade Pi, stake tokens for passive income, and make real-world payments. The wallet’s low transaction fees, instant swaps with no slippage, and ability to trade without mainnet gas fees create a seamless user experience. Additionally, Bitget Wallet’s bank-grade security, including multi-signature cold storage and 2FA verification, ensures asset protection. Multi-chain support allows users to swap Pi across networks, including Solana, BSC, Ethereum and more.

    To drive adoption, Bitget Wallet is launching dedicated campaigns to enhance liquidity and encourage broader participation. As part of its initiatives, Bitget Wallet will host an X Space AMA session “PI Launches: What’s Next for PI?“, inviting the community to discuss Pi’s future while offering users a chance to win rewards. Participants who drop screenshots of their Pi holdings in Bitget Wallet will be eligible to share a $314 USDT prize pool. With Pi’s momentum continuing to grow, Bitget Wallet is positioning itself as the go-to platform for Pi holders looking to maximize their assets and expand their onchain activities.

    “Pi Network’s mainnet launch is a defining moment—not just for Pi, but for the broader Web3 movement,” said Alvin Kan, COO of Bitget Wallet. “While its limited market supply and strong network effects may drive early interest, its long-term success will depend on real-world utility beyond speculation. The challenge is building an ecosystem where users hold, transact, and find lasting value. At Bitget Wallet, we are committed to equipping users with the right tools to navigate this evolving landscape.”

    For more details, please visit Bitget Wallet blog.

    About Bitget Wallet
    Bitget Wallet is the home of Web3, uniting endless possibilities in one non-custodial wallet. With over 60 million users, it offers comprehensive onchain services, including asset management, instant swaps, rewards, staking, trading tools, live market data, a DApp browser, an NFT marketplace and crypto payment. Supporting over 100 blockchains, 20,000+ DApps, and 500,000+ tokens, Bitget Wallet enables seamless multi-chain trading across hundreds of DEXs and cross-chain bridges, along with a $300+ million protection fund to ensure safety of users’ assets. Experience Bitget Wallet Lite to start a Web3 journey.

    For more information, visit: XTelegramInstagramYouTubeLinkedInTikTokDiscordFacebook
    For media inquiries, please contact media.web3@bitget.com

    The MIL Network

  • MIL-OSI Australia: Solar Pools and Libraries with First $50 million for bill busting upgrades

    Source: Australian Ministers for Infrastructure and Transport

    Batteries to soak up excess solar at a council childcare centre, solar panels to cut bills for the local library and the community pool going all-electric are just some of the projects the Albanese Government is backing with its $100 million Community Energy Upgrades Fund (CEUF).

    Today 58 local government bodies around the nation will get on with bringing down their energy bills for good, with $50 million in grants for energy upgrades going out the door.

    Whether it’s the neighbourhood sports club, the community hall, the local pool or library, local government brings us together and keeps us thriving. Each year 8 million people use community sporting infrastructure, including local councils. Now the Albanese Government is working with councils, so they can save on their bills and invest more into their communities.

    One-off grants of between $25,000 to $2.5 million have been awarded through the merit-based program, with local government providing at least 50 per cent of project costs.

    Successful funding applications include 31 upgrades to local aquatic centres and five grants for smart electric vehicle charging infrastructure for local government vehicles.

    In Melbourne, Collingwood Leisure Centre will go electric, with its air, pool and hot water system using 100% renewable energy and storage.

    In Western Sydney, council-owned early learning centres will free up funding to invest more into our next generation by cutting bills with batteries that soak up excess solar to be used across their own and other community buildings. While in Broken Hill they’ll unlock their sunny skies with the council installing solar panels over the car park and replacing gas heating with electric heat pumps.

    Meanwhile in Darwin, the Casuarina Library will be cooler this summer with an energy upgrade, while further upgrades to Parap Pool and West Lane carpark will see the council save $83,500 a year.

    In Tasmania, a local council will ensure people keep on moving, installing smart electric vehicle chargers and dynamic load management to support electrification and decarbonisation of its vehicle fleet.

    The highly popular Albanese Labor Government initiative saw Round 1 oversubscribed, with 165 applications overall for the first $50 million package of funding. Round 2 is expected to open shortly, with unsuccessful applicants from round 1 warmly encouraged to reapply.

    Quotes attributable to Minister for Climate Change and Energy Chris Bowen:

    “Local councils run many of the sport and public facilities that keep our communities and clubs thriving. We want facilities that Australians know and love, like cricket grounds and local pools, to be able to save on their energy bills and spend more on the things they do best.

     “The Albanese Government is not just providing short term relief on power bills, with our Community Energy Upgrades Fund and Energy Savings Package, we’re helping communities bring down bills for good.”

     Quotes attributable to Minister for Local Government Kristy McBain:

     “We’ve heard loud and clear from councils about the need to upgrade ageing facilities with more energy-efficient technology, to bring down their overheads and to lower their emissions – which is exactly why we launched the Community Energy Upgrades Fund.

     “We now have transparent grant programs that every postcode can apply for, we’ve delivered record funding increases for local roads, and we’ve brought local councils back to the table as a trusted delivery partner after a decade of neglect – with this program a real testament to what we can achieve for our communities when we work together.”

    Quotes attributable to Assistant Minister for Climate Change and Energy Josh Wilson:

     “The Albanese government is investing in energy efficiency measures for community facilities because it has a triple-whammy effect of cutting emissions, cutting running costs, and allowing those savings to be used for other local services.

     “These projects are helping to deliver a cheaper, cleaner energy future for Australians.”

    BACKGROUND: 

    STATE SUCCESSFUL COUNCILS TOTAL GRANT FUNDING
    NSW

    17

    Blue Mountains City Council, Campbelltown City Council, Coolamon Shire Council, Council of the City of Broken Hill, Cowra Shire Council, Dubbo Regional Council, Inner West Council, Junee Shire Council, Ku-Ring-Gai Council, Leeton Shire Council, Lockhart Shire Council, Mid-Western Regional Council, Northern Beaches Council, Parkes Shire Council, Port Macquarie Hastings Council, Wagga Wagga City Council, Wingecarribee Shire Council,

    $15.3 million
    VICTORIA

    15

    Ballarat City Council, Banyule City Council, Cardinia Shire Council, City of Maribyrnong, Colac Otway Shire, Corangamite Shire Council, Glen Eira City Council, Mansfield Shire Council, Melbourne City Council, Merri-Bek City Council, Mildura Rural City Council, Surf Coast Shire, Wyndham City Council, Yarra City Council, Yarra Ranges Shire Council

    $23.9 million
    QUEENSLAND 7
    Aurukun Shire Council, Brisbane City Council, Cassowary Coast Regional Council, Mackay Regional Council, Maranoa Regional Council, Murweh Shire Council, Paroo Shire Council
    $4.5 million
    SOUTH AUSTRALIA

    7

    Barunga West Council, City of West Torrens, Corporation of the City of Unley, District Council of Loxton Waikerie, Rural City of Murray Bridge, The Barossa Council, The Flinders Rangers Council,

    $2.3 million
    WESTERN AUSTRALIA

    5

    City of Armadale, City of Melville, City of Swan, Town of East Fremantle, Town of Port Hedland

    $2.8 million
    TASMANIA 5
    Brighton Council, Clarence City Council, Devonport City Council,  Huon Valley Council, Launceston City Council,
    $674,011
    NORTHERN TERRITORY 2
    Central Desert Regional Council, City Darwin
    $580,528

    Note: This media release was originally published by the Climate and Energy portfolio: Solar pools and libraries with first $50 million for bill busting upgrades (https://minister.dcceew.gov.au)

    MIL OSI News

  • MIL-OSI New Zealand: Universities – Power struggles: The psychology behind workplace energy use – UoA

    Source: University of Auckland (UoA)

    Do you ever take the stairs instead of the lift or print double-sided – not for fitness, or to stretch the last few sheets of paper, but to save energy?
      
    An international study co-authored by researchers from the University of Auckland looks at how businesses can support these kinds of everyday choices, often overlooked in corporate sustainability plans.

    Published in Renewable and Sustainable Energy Reviews, the study analyses 70 research papers on employee energy-saving behaviours and shows that a combination of personal attitudes, social norms, habits, organisational culture and peer feedback shapes employees’ willingness to save energy.
       
    It suggests that businesses looking to cut energy use should focus on engagement rather than enforcement.

    Employees who feel encouraged, rather than monitored or penalised, are more likely to develop lasting energy-saving habits.
       
    “A work environment that recognises the value of energy-saving behaviour and employees with intentions to save energy are very effective,” says Business School Professor Sholeh Maani.

    The economics professor says businesses that integrate energy-saving behaviours into workplace policies and culture see greater engagement from staff.

    For example, giving employees control over lighting and temperature settings and regular feedback on energy use, combined with positive reinforcement, can motivate staff to save energy. 

    Digital tools like Internet of Things (IoT) sensors and gamified apps can help staff track their energy use, says Maani, encouraging autonomy and responsibility.

    And while many businesses rely on employee education campaigns to encourage energy conservation, the research suggests that providing information alone is not enough, and in some cases, it may even backfire if it’s seen as personal monitoring.

    One study the researchers point out took place at a university in Canada and surveyed 595 employees in 24 buildings. The results found that feedback and peer education reduced energy use by seven percent and four percent respectively, while energy consumption increased by four percent in the buildings that educated employees on how and why to save energy.

    Another study in the Netherlands examined a 13-week energy-saving initiative at an environmental consulting firm with 83 employees across five departments. Employees received weekly rewards for saving energy, with some receiving monetary incentives and others getting positive public  recognition. The results were clear: public feedback was more effective than financial incentives.
       
    These results and others highlight that awareness alone won’t necessarily drive change – practical interventions that reinforce personal and group habits, such as social incentives and feedback can be effective, say Maani and co-author Dr Le Wen.

    If businesses want to reduce energy waste, they need to focus on building a workplace culture that supports and normalises energy-saving behaviours, says Maani.

    “Employees are more likely to conserve energy when they see their colleagues doing the same, receive regular feedback on workplace energy use, and feel supported to make changes and take control.

    “And when managers and colleagues actively participate in energy-saving initiatives, other employees are far more likely to follow suit.”

    With rising electricity costs and increasing pressure to cut carbon emissions, New Zealand businesses have a lot to gain from empowering employees to be part of the solution, says Maani.
      
    “In a country where sustainability is a priority, reducing workplace energy waste is a low-cost, high-impact way for businesses to reach their environmental goals.”  

    MIL OSI New Zealand News

  • MIL-OSI: First Capital, Inc. Announces Quarterly Dividend

    Source: GlobeNewswire (MIL-OSI)

    CORYDON, Ind., Feb. 19, 2025 (GLOBE NEWSWIRE) — The Board of Directors of First Capital, Inc. (NASDAQ: FCAP) has declared a quarterly cash dividend of $0.29 (twenty-nine cents) per share of common stock, according to Michael C. Frederick, President and Chief Executive Officer. The dividend will be paid on March 28, 2025 to shareholders of record as of March 14, 2025.

    First Capital, Inc. is the holding company for First Harrison Bank. First Harrison currently has eighteen offices in the Indiana communities of Corydon, Edwardsville, Greenville, Floyds Knobs, Palmyra, New Albany, New Salisbury, Jeffersonville, Salem, Lanesville and Charlestown and the Kentucky communities of Shepherdsville, Mt. Washington and Lebanon Junction. Access to First Harrison Bank accounts, including online banking and electronic bill payments, is available anywhere with Internet access through the Bank’s website at www.firstharrison.com. For more information and financial data about First Capital, Inc., please visit Investor Relations at First Harrison Bank’s aforementioned website.

    Contact:
    Joshua P. Stevens
    Chief Financial Officer
    812-738-1570

    The MIL Network

  • MIL-OSI Security: Lake Station Man Sentenced to 360 Months in Prison

    Source: Office of United States Attorneys

    HAMMOND – Matthew A. Bugielski, 26 years old, of Lake Station, Indiana, was sentenced by United States District Court Judge Gretchen S. Lund after pleading guilty to Sexual Exploitation of Children, announced Acting United States Attorney Tina L. Nommay.

    Bugielski was sentenced to 360 months in prison, followed by 15 years of supervised release, and ordered to pay restitution to the victim of the offense.

    According to documents in the case, on or about June 19, 2023, Bugielski produced a sexually explicit image of a minor by employing, using, and inducing the minor to engage in sexually explicit conduct for the purpose of producing a visual depiction of such conduct. Further, Bugielski distributed that sexually explicit image to others over the internet. On occasions separate from June 19, 2023, Bugielski distributed other images and videos of child sexual abuse materials over the internet to others.

    This case was investigated by Homeland Security Investigations, with assistance from the Indiana Internet Crimes Against Children Task Force, the Indiana State Police, the Indiana State Police Digital Forensics Unit, the Roanoke Police Department, the Huntington County Sheriff’s Office, the Indianapolis Metropolitan Police Department, the Lake Station Police Department, and the New Chicago Police Department. The case was prosecuted by Assistant United States Attorney Emily Morgan.

    The case was brought as part of Project Safe Childhood. In 2006, the Department of Justice created Project Safe Childhood, a nationwide initiative designed to protect children from exploitation and abuse. Led by the U.S. Attorneys’ Offices and the DOJ’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who exploit children, as well as identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI USA: #StopRansomware: Ghost (Cring) Ransomware

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

    Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

    Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.

    Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.

    The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 16.1. See the MITRE ATT&CK Tactics and Techniques section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Initial Access

    The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [T1190]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), servers running Adobe ColdFusion (CVE-2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207— commonly referred to as the ProxyShell attack chain).

    Execution

    Ghost actors have been observed uploading a web shell [T1505.003] to a compromised server and leveraging Windows Command Prompt [T1059.003] and/or PowerShell [T1059.001] to download and execute Cobalt Strike Beacon malware [T1105] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.

    Persistence

    Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [T1136.001] and domain accounts [T1136.002] and change passwords for existing accounts [T1098]. In 2024, Ghost actors were observed deploying web shells [T1505.003] on victim web servers.

    Privilege Escalation

    Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [T1134.001].

    Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [T1068] such as “SharpZeroLogon,” “SharpGPPPass,” “BadPotato,” and “GodPotato.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials. 

    See Table 1 for a descriptive listing of tools.

    Credential Access

    Ghost actors use the built in Cobalt Strike function “hashdump” or Mimikatz [T1003] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.

    Defense Evasion

    Ghost actors used their access through Cobalt Strike to display a list of running processes [T1057] to determine which antivirus software [T1518.001] is running so that it can be disabled [T1562.001]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are: Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.

    Discovery

    Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [T1087.002], open-source tools such as “SharpShares” for network share discovery [T1135], and “Ladon 911” and “SharpNBTScan” for remote systems discovery [T1018]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.

    Lateral Movement

    Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [T1047] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with: powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA… [T1132.001][T1564.003].

    This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.

    In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.

    Exfiltration

    Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked. The FBI has observed limited downloading of data to Cobalt Strike Team Servers [T1041]. Victims and other trusted third parties have reported limited uses of Mega.nz [T1567.002] and installed web shells for similar limited data exfiltration. Note: The typical data exfiltration is less than hundreds of gigabytes of data.

    Command and Control

    Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [T1071.001]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example, http://xxx.xxx.xxx.xxx:80/Google.com where xxx.xxx.xxx.xxx represents the C2 server’s IP address.

    For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [T1573] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.

    Note: Table 2 contains a list of Ghost ransom email addresses.

    Impact and Encryption

    Ghost actors use Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [T1486]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.

    These ransomware payloads clear Windows Event Logs [T1070.001], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [T1490]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [T1486].

    The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.

    Indicators of Compromise (IOC)

    Table 1 lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.

    Note: Authors of these tools generally state that they should not be used in illegal activity.

    Table 1: Tools Leveraged by Ghost Actors
    Name Description Source
    Cobalt Strike Cobalt Strike is penetration testing software. Ghost actors  use an unauthorized version of Cobalt Strike. N/A
    IOX Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device. github[.]com/EddieIvan01/iox
    SharpShares.exe SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery. github[.]com/mitchmoser/SharpShares
    SharpZeroLogon.exe SharpZeroLogon.exe attempts to exploit CVE-2020-1472 and is run against a target Domain Controller. github[.]com/leitosama/SharpZeroLogon
    SharpGPPPass.exe SharpGPPPass.exe attempts to exploit CVE-2014-1812 and targets XML files created through Group Policy Preferences that may contain passwords. N/A
    SpnDump.exe SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration. N/A
    NBT.exe A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration. github[.]com/BronzeTicket/SharpNBTScan
    BadPotato.exe BadPotato.exe is an exploitation tool used for privilege escalation. github[.]com/BeichenDream/BadPotato
    God.exe God.exe is a compiled version of GodPotato and is used for privilege escalation. github[.]com/BeichenDream/GodPotato
    HFS (HTTP File Server) A portable web server program that Ghost actors use to host files for remote access and exfiltration. rejitto[.]com/hfs
    Ladon 911 A multifunctional scanning and exploitation tool, often used by Ghost actors with the MS17010 option to scan for SMB vulnerabilities associated with CVE-2017-0143 and CVE-2017-0144. github[.]com/k8gege/Ladon
    Web Shell A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access. Slight variation of github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx
    Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity
    File name MD5 File Hash
    Cring.exe c5d712f82d5d37bb284acd4468ab3533
    Ghost.exe

    34b3009590ec2d361f07cac320671410

    d9c019182d88290e5489cdf3b607f982

    ElysiumO.exe

    29e44e8994197bdb0c2be6fc5dfc15c2

    c9e35b5c1dc8856da25965b385a26ec4

    d1c5e7b8e937625891707f8b4b594314

    Locker.exe ef6a213f59f3fbee2894bd6734bbaed2
    iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3
    x86.log (IOX)

    c3b8f6d102393b4542e9f951c9435255

    0a5c4ad3ec240fbfd00bdc1d36bd54eb

    sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5
    main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9
    isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d
    sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090

    Ransom Email Addresses

    Table 3 is a subset of ransom email addresses that have been included in Ghost ransom notes.

    Table 3: Ransom Email Addresses
    Email Addresses
    asauribe@tutanota.com ghostbackup@skiff.com rainbowforever@tutanota.com
    cringghost@skiff.com ghosts1337@skiff.com retryit1998@mailfence.com
    crptbackup@skiff.com ghosts1337@tuta.io retryit1998@tutamail.com
    d3crypt@onionmail.org ghostsbackup@skiff.com rsacrpthelp@skiff.com
    d3svc@tuta.io hsharada@skiff.com rsahelp@protonmail.com
    eternalnightmare@tutanota.com just4money@tutanota.com sdghost@onionmail.org
    evilcorp@skiff.com kellyreiff@tutanota.com shadowghost@skiff.com
    fileunlock@onionmail.org kev1npt@tuta.io shadowghosts@tutanota.com
    fortihooks@protonmail.com lockhelp1998@skiff.com summerkiller@mailfence.com
    genesis1337@tutanota.com r.heisler@skiff.com summerkiller@tutanota.com
    ghost1998@tutamail.com rainbowforever@skiff.com webroothooks@tutanota.com

    Ransom Notes

    Starting approximately in August 2024, Ghost actors began using TOX IDs in ransom notes as an alternative method for communicating with victims. For example: EFE31926F41889DBF6588F27A2EC3A2D7DEF7D2E9E0A1DEFD39B976A49C11F0E19E03998DBDA and E83CD54EAAB0F31040D855E1ED993E2AC92652FF8E8742D3901580339D135C6EBCD71002885B.

    MITRE ATT&CK Tactics and Techniques

    See Table 4 to Table 13 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, version 16.1, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 4: Initial Access
    Technique Title  ID Use
    Exploit Public-Facing Application T1190 Ghost actors exploit multiple vulnerabilities in public-facing systems to gain initial access to servers.
    Table 5: Execution
    Technique Title  ID Use
    Windows Management Instrumentation T1047 Ghost actors abuse WMI to run PowerShell scripts on other devices, resulting in their infection with Cobalt Strike Beacon malware.
    PowerShell T1059.001 Ghost actors use PowerShell for various functions including to deploy Cobalt Strike.
    Windows Command Shell T1059.003 Ghost actors use the Windows Command Shell to download malicious content on to victim servers.
    Table 6: Persistence
    Technique Title  ID Use
    Account Manipulation T1098 Ghost actors change passwords for already established accounts.
    Local Account T1136.001 Ghost actors create new accounts or makes modifications to local accounts.
    Domain Account T1136.002 Ghost actors create new accounts or makes modifications to domain accounts.
    Web Shell T1505.003 Ghost actors upload web shells to victim servers to gain access and for persistence.
    Table 7: Privilege Escalation
    Technique Title  ID Use
    Exploitation for Privilege Escalation T1068 Ghost actors use a suite of open source tools in an attempt to gain elevated privileges through exploitation of vulnerabilities.
    Token Impersonation/Theft T1134.001 Ghost actors use Cobalt Strike to steal process tokens of processes running at a higher privilege.
    Table 8: Defense Evasion
    Technique Title  ID Use
    Application Layer Protocol: Web Protocols T1071.001 Ghost actors use HTTP and HTTPS protocols while conducting C2 operations. 
    Impair Defenses: Disable or Modify Tools T1562.001 Ghost actors disable antivirus products.
    Hidden Window T1564.003 Ghost actors use PowerShell to conceal malicious content within legitimate appearing command windows.
    Table 9: Credential Access
    Technique Title  ID Use
    OS Credential Dumping T1003 Ghost actors use Mimikatz and the Cobalt Strike “hashdump” command to collect passwords and password hashes.
    Table 10: Discovery
    Technique Title  ID Use
    Remote System Discovery T1018 Ghost actors use tools like Ladon 911 and ShapNBTScan for remote systems discovery.
    Process Discovery T1057 Ghost actors run a ps command to list running processes on an infected device.
    Domain Account Discovery T1087.002 Ghost actors run commands such as net group “Domain Admins” /domain to discover a list of domain administrator accounts.
    Network Share Discovery T1135 Ghost actors use various tools for network share discovery for the purpose of host enumeration.
    Software Discovery T1518 Ghost actors use their access to determine which antivirus software is running.
    Security Software Discovery T1518.001 Ghost actors run Cobalt Strike to enumerate running antivirus software.
    Table 11: Exfiltration
    Technique Title  ID Use
    Exfiltration Over C2 Channel T1041 Ghost actors use both web shells and Cobalt Strike to exfiltrate limited data.
    Exfiltration to Cloud Storage T1567.002 Ghost actors sometimes use legitimate cloud storage providers such as Mega.nz for malicious exfiltration operations.
    Table 12: Command and Control
    Technique Title  ID Use
    Web Protocols T1071.001 Ghost actors use Cobalt Strike Beacon malware and Cobalt Strike Team Servers which communicate over HTTP and HTTPS.
    Ingress Tool Transfer T1105 Ghost actors use Cobalt Strike Beacon malware to deliver ransomware payloads to victim servers.
    Standard Encoding T1132.001 Ghost actors use PowerShell commands to encode network traffic which reduces their likelihood of being detected during lateral movement.
    Encrypted Channel T1573 Ghost actors use encrypted email platforms to facilitate communications. 
    Table 13: Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486 Ghost actors use ransomware variants Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe to encrypt victim files for ransom.
    Inhibit System Recovery T1490 Ghost actors delete volume shadow copies.

    Mitigations

    The FBI, CISA, and MS-ISAC recommend organizations reference their #StopRansomware Guide and implement the mitigations below to improve cybersecurity posture on the basis of the Ghost ransomware activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    • Maintain regular system backups that are known-good and stored offline or are segmented from source systems [CPG 2.R]. Ghost ransomware victims whose backups were unaffected by the ransomware attack were often able to restore operations without needing to contact Ghost actors or pay a ransom.
    • Patch known vulnerabilities by applying timely security updates to operating systems, software, and firmware within a risk-informed timeframe [CPG 1.E].
    • Segment networks to restrict lateral movement from initial infected devices and other devices in the same organization [CPG 2.F].
    • Require Phishing-Resistant MFA for access to all privileged accounts and email services accounts.
    • Train users to recognize phishing attempts.
    • Monitor for unauthorized use of PowerShell. Ghost actors leverage PowerShell for malicious purposes, although it is often a helpful tool that is used by administrators and defenders to manage system resources. For more information, visit NSA and CISA’s joint guidance on PowerShell best practices.
      • Implement the principle of least privilege when granting permissions so that employees who require access to PowerShell are aligned with organizational business requirements.
    • Implement allowlisting for applications, scripts, and network traffic to prevent unauthorized execution and access [CPG 3.A].
    • Identify, alert on, and investigate abnormal network activity. Ransomware activity generates unusual network traffic across all phases of the attack chain. This includes running scans to discover other network connected devices, running commands to list, add, or alter administrator accounts, using PowerShell to download and execute remote programs, and running scripts not usually seen on a network. Organizations that can successfully identify and investigate this activity are better able to interrupt malicious activity before ransomware is executed [CPG 3.A].
      • Ghost actors run a significant number of commands, scripts, and programs that IT administrators would have no legitimate reason for running. Victims who have identified and responded to this unusual behavior have successfully prevented Ghost ransomware attacks.
    • Limit exposure of services by disabling unused ports such as, RDP 3398, FTP 21, and SMB 445, and restricting access to essential services through securely configured VPNs or firewalls.
    • Enhance email security by implementing advanced filtering, blocking malicious attachments, and enabling DMARC, DKIM, and SPF to prevent spoofing [CPG 2.M].

    Validate Security Controls

    In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 3 to Table 13).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    Reporting

    Your organization has no obligation to respond or provide information back to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.

    The FBI is interested in any information that can be shared, to include logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, and/or decryptor files.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, date of infection, date detected, initial attack vector, and host and network-based indicators.

    The FBI, CISA, and MS-ISAC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and the MS-ISAC.

    Version History

    February 19, 2025: Initial version.

    MIL OSI USA News

  • MIL-OSI Europe: Answer to a written question – Reviewing the classification of IP addresses as personal data – E-002546/2024(ASW)

    Source: European Parliament

    The definition of personal data in Regulation (EU) 2016/679[1] (GDPR) is technologically neutral and broad to prevent creating a serious risk of circumvention of the protection of personal data[2]. Article 4(1) GDPR defines personal data as ‘any information relating to an identified or identifiable natural person’, including an online identifier that identifies the person directly or indirectly.

    Online identifiers, such as cookies and Internet Protocol (IP) addresses, combined with other information may be used to create online profiles of natural persons and identify them[3].

    Whether an IP address is personal data within the meaning of Article 4(1) GDPR depends on whether it can be linked to an identified or identifiable natural person.

    That is not necessarily always the case and depends on the specific circumstances of the case. In that respect, account must be taken of all the means reasonably likely to be used to identify the person, looking at all objective factors, such as the cost, the amount of time required for identification, taking into consideration available technology[4].

    The Court of Justice of the EU found on several occasions that IP addresses constituted personal data because the user of the IP address could be identified by the controller at issue[5].

    In the second report of the application of the GDPR[6], the Commission did not conclude that the definition of personal data should be amended.

    Regardless of their nature as personal data, where IP addresses are stored or accessed from the user’s terminal equipment, Article 5(3) of Directive 2002/58/EC[7] applies.

    That provision protects the confidentiality of users’ terminal equipment. It requires consent for the storage of or access to information (both personal and non-personal) stored in the terminal equipment, unless it is carried out for the sole purpose of carrying out the transmission of a communication or if it is strictly necessary for the provision of an information society service explicitly requested by the user[8].

    • [1] Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance), OJ L 119, 4.5.2016, p. 1-88.
    • [2] See for more Recital 15 GDPR.
    • [3] See for more Recital 30 GDPR.
    • [4] See for more Recital 26 GDPR.
    • [5] See for example C-470/21 and C-604/22.
    • [6] Communication from the Commission to the European Parliament and the Council Second Report on the application of the General Data Protection Regulation, COM/2024/357 final.
    • [7] Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), OJ L 201, 31.7.2002, p. 37-47, see in particular Recital 28.
    • [8] See also EDPB, Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive.

    MIL OSI Europe News

  • MIL-OSI Security: #StopRansomware: Ghost (Cring) Ransomware

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

    Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

    Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.

    Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.

    The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 16.1. See the MITRE ATT&CK Tactics and Techniques section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Initial Access

    The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [T1190]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), servers running Adobe ColdFusion (CVE-2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE-2021-34473CVE-2021-34523, and CVE-2021-31207— commonly referred to as the ProxyShell attack chain).

    Execution

    Ghost actors have been observed uploading a web shell [T1505.003] to a compromised server and leveraging Windows Command Prompt [T1059.003] and/or PowerShell [T1059.001] to download and execute Cobalt Strike Beacon malware [T1105] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.

    Persistence

    Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [T1136.001] and domain accounts [T1136.002] and change passwords for existing accounts [T1098]. In 2024, Ghost actors were observed deploying web shells [T1505.003] on victim web servers.

    Privilege Escalation

    Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [T1134.001].

    Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [T1068] such as “SharpZeroLogon,” “SharpGPPPass,” “BadPotato,” and “GodPotato.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials. 

    See Table 1 for a descriptive listing of tools.

    Credential Access

    Ghost actors use the built in Cobalt Strike function “hashdump” or Mimikatz [T1003] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.

    Defense Evasion

    Ghost actors used their access through Cobalt Strike to display a list of running processes [T1057] to determine which antivirus software [T1518.001] is running so that it can be disabled [T1562.001]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are: Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.

    Discovery

    Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [T1087.002], open-source tools such as “SharpShares” for network share discovery [T1135], and “Ladon 911” and “SharpNBTScan” for remote systems discovery [T1018]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.

    Lateral Movement

    Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [T1047] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with: powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA… [T1132.001][T1564.003].

    This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.

    In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.

    Exfiltration

    Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked. The FBI has observed limited downloading of data to Cobalt Strike Team Servers [T1041]. Victims and other trusted third parties have reported limited uses of Mega.nz [T1567.002] and installed web shells for similar limited data exfiltration. Note: The typical data exfiltration is less than hundreds of gigabytes of data.

    Command and Control

    Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [T1071.001]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example, http://xxx.xxx.xxx.xxx:80/Google.com where xxx.xxx.xxx.xxx represents the C2 server’s IP address.

    For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [T1573] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.

    Note: Table 2 contains a list of Ghost ransom email addresses.

    Impact and Encryption

    Ghost actors use Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [T1486]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.

    These ransomware payloads clear Windows Event Logs [T1070.001], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [T1490]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [T1486].

    The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.

    Indicators of Compromise (IOC)

    Table 1 lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.

    Note: Authors of these tools generally state that they should not be used in illegal activity.

    Table 1: Tools Leveraged by Ghost Actors
    Name Description Source
    Cobalt Strike Cobalt Strike is penetration testing software. Ghost actors  use an unauthorized version of Cobalt Strike. N/A
    IOX Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device. github[.]com/EddieIvan01/iox
    SharpShares.exe SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery. github[.]com/mitchmoser/SharpShares
    SharpZeroLogon.exe SharpZeroLogon.exe attempts to exploit CVE-2020-1472 and is run against a target Domain Controller. github[.]com/leitosama/SharpZeroLogon
    SharpGPPPass.exe SharpGPPPass.exe attempts to exploit CVE-2014-1812 and targets XML files created through Group Policy Preferences that may contain passwords. N/A
    SpnDump.exe SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration. N/A
    NBT.exe A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration. github[.]com/BronzeTicket/SharpNBTScan
    BadPotato.exe BadPotato.exe is an exploitation tool used for privilege escalation. github[.]com/BeichenDream/BadPotato
    God.exe God.exe is a compiled version of GodPotato and is used for privilege escalation. github[.]com/BeichenDream/GodPotato
    HFS (HTTP File Server) A portable web server program that Ghost actors use to host files for remote access and exfiltration. rejitto[.]com/hfs
    Ladon 911 A multifunctional scanning and exploitation tool, often used by Ghost actors with the MS17010 option to scan for SMB vulnerabilities associated with CVE-2017-0143 and CVE-2017-0144. github[.]com/k8gege/Ladon
    Web Shell A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access. Slight variation of github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx
    Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity
    File name MD5 File Hash
    Cring.exe c5d712f82d5d37bb284acd4468ab3533
    Ghost.exe

    34b3009590ec2d361f07cac320671410

    d9c019182d88290e5489cdf3b607f982

    ElysiumO.exe

    29e44e8994197bdb0c2be6fc5dfc15c2

    c9e35b5c1dc8856da25965b385a26ec4

    d1c5e7b8e937625891707f8b4b594314

    Locker.exe ef6a213f59f3fbee2894bd6734bbaed2
    iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3
    x86.log (IOX)

    c3b8f6d102393b4542e9f951c9435255

    0a5c4ad3ec240fbfd00bdc1d36bd54eb

    sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5
    main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9
    isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d
    sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090

    Ransom Email Addresses

    Table 3 is a subset of ransom email addresses that have been included in Ghost ransom notes.

    Table 3: Ransom Email Addresses
    Email Addresses
    asauribe@tutanota.com ghostbackup@skiff.com rainbowforever@tutanota.com
    cringghost@skiff.com ghosts1337@skiff.com retryit1998@mailfence.com
    crptbackup@skiff.com ghosts1337@tuta.io retryit1998@tutamail.com
    d3crypt@onionmail.org ghostsbackup@skiff.com rsacrpthelp@skiff.com
    d3svc@tuta.io hsharada@skiff.com rsahelp@protonmail.com
    eternalnightmare@tutanota.com just4money@tutanota.com sdghost@onionmail.org
    evilcorp@skiff.com kellyreiff@tutanota.com shadowghost@skiff.com
    fileunlock@onionmail.org kev1npt@tuta.io shadowghosts@tutanota.com
    fortihooks@protonmail.com lockhelp1998@skiff.com summerkiller@mailfence.com
    genesis1337@tutanota.com r.heisler@skiff.com summerkiller@tutanota.com
    ghost1998@tutamail.com rainbowforever@skiff.com webroothooks@tutanota.com

    Ransom Notes

    Starting approximately in August 2024, Ghost actors began using TOX IDs in ransom notes as an alternative method for communicating with victims. For example: EFE31926F41889DBF6588F27A2EC3A2D7DEF7D2E9E0A1DEFD39B976A49C11F0E19E03998DBDA and E83CD54EAAB0F31040D855E1ED993E2AC92652FF8E8742D3901580339D135C6EBCD71002885B.

    MITRE ATT&CK Tactics and Techniques

    See Table 4 to Table 13 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, version 16.1, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 4: Initial Access
    Technique Title  ID Use
    Exploit Public-Facing Application T1190 Ghost actors exploit multiple vulnerabilities in public-facing systems to gain initial access to servers.
    Table 5: Execution
    Technique Title  ID Use
    Windows Management Instrumentation T1047 Ghost actors abuse WMI to run PowerShell scripts on other devices, resulting in their infection with Cobalt Strike Beacon malware.
    PowerShell T1059.001 Ghost actors use PowerShell for various functions including to deploy Cobalt Strike.
    Windows Command Shell T1059.003 Ghost actors use the Windows Command Shell to download malicious content on to victim servers.
    Table 6: Persistence
    Technique Title  ID Use
    Account Manipulation T1098 Ghost actors change passwords for already established accounts.
    Local Account T1136.001 Ghost actors create new accounts or makes modifications to local accounts.
    Domain Account T1136.002 Ghost actors create new accounts or makes modifications to domain accounts.
    Web Shell T1505.003 Ghost actors upload web shells to victim servers to gain access and for persistence.
    Table 7: Privilege Escalation
    Technique Title  ID Use
    Exploitation for Privilege Escalation T1068 Ghost actors use a suite of open source tools in an attempt to gain elevated privileges through exploitation of vulnerabilities.
    Token Impersonation/Theft T1134.001 Ghost actors use Cobalt Strike to steal process tokens of processes running at a higher privilege.
    Table 8: Defense Evasion
    Technique Title  ID Use
    Application Layer Protocol: Web Protocols T1071.001 Ghost actors use HTTP and HTTPS protocols while conducting C2 operations. 
    Impair Defenses: Disable or Modify Tools T1562.001 Ghost actors disable antivirus products.
    Hidden Window T1564.003 Ghost actors use PowerShell to conceal malicious content within legitimate appearing command windows.
    Table 9: Credential Access
    Technique Title  ID Use
    OS Credential Dumping T1003 Ghost actors use Mimikatz and the Cobalt Strike “hashdump” command to collect passwords and password hashes.
    Table 10: Discovery
    Technique Title  ID Use
    Remote System Discovery T1018 Ghost actors use tools like Ladon 911 and ShapNBTScan for remote systems discovery.
    Process Discovery T1057 Ghost actors run a ps command to list running processes on an infected device.
    Domain Account Discovery T1087.002 Ghost actors run commands such as net group “Domain Admins” /domain to discover a list of domain administrator accounts.
    Network Share Discovery T1135 Ghost actors use various tools for network share discovery for the purpose of host enumeration.
    Software Discovery T1518 Ghost actors use their access to determine which antivirus software is running.
    Security Software Discovery T1518.001 Ghost actors run Cobalt Strike to enumerate running antivirus software.
    Table 11: Exfiltration
    Technique Title  ID Use
    Exfiltration Over C2 Channel T1041 Ghost actors use both web shells and Cobalt Strike to exfiltrate limited data.
    Exfiltration to Cloud Storage T1567.002 Ghost actors sometimes use legitimate cloud storage providers such as Mega.nz for malicious exfiltration operations.
    Table 12: Command and Control
    Technique Title  ID Use
    Web Protocols T1071.001 Ghost actors use Cobalt Strike Beacon malware and Cobalt Strike Team Servers which communicate over HTTP and HTTPS.
    Ingress Tool Transfer T1105 Ghost actors use Cobalt Strike Beacon malware to deliver ransomware payloads to victim servers.
    Standard Encoding T1132.001 Ghost actors use PowerShell commands to encode network traffic which reduces their likelihood of being detected during lateral movement.
    Encrypted Channel T1573 Ghost actors use encrypted email platforms to facilitate communications. 
    Table 13: Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486 Ghost actors use ransomware variants Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe to encrypt victim files for ransom.
    Inhibit System Recovery T1490 Ghost actors delete volume shadow copies.

    Mitigations

    The FBI, CISA, and MS-ISAC recommend organizations reference their #StopRansomware Guide and implement the mitigations below to improve cybersecurity posture on the basis of the Ghost ransomware activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    • Maintain regular system backups that are known-good and stored offline or are segmented from source systems [CPG 2.R]. Ghost ransomware victims whose backups were unaffected by the ransomware attack were often able to restore operations without needing to contact Ghost actors or pay a ransom.
    • Patch known vulnerabilities by applying timely security updates to operating systems, software, and firmware within a risk-informed timeframe [CPG 1.E].
    • Segment networks to restrict lateral movement from initial infected devices and other devices in the same organization [CPG 2.F].
    • Require Phishing-Resistant MFA for access to all privileged accounts and email services accounts.
    • Train users to recognize phishing attempts.
    • Monitor for unauthorized use of PowerShell. Ghost actors leverage PowerShell for malicious purposes, although it is often a helpful tool that is used by administrators and defenders to manage system resources. For more information, visit NSA and CISA’s joint guidance on PowerShell best practices.
      • Implement the principle of least privilege when granting permissions so that employees who require access to PowerShell are aligned with organizational business requirements.
    • Implement allowlisting for applications, scripts, and network traffic to prevent unauthorized execution and access [CPG 3.A].
    • Identify, alert on, and investigate abnormal network activity. Ransomware activity generates unusual network traffic across all phases of the attack chain. This includes running scans to discover other network connected devices, running commands to list, add, or alter administrator accounts, using PowerShell to download and execute remote programs, and running scripts not usually seen on a network. Organizations that can successfully identify and investigate this activity are better able to interrupt malicious activity before ransomware is executed [CPG 3.A].
      • Ghost actors run a significant number of commands, scripts, and programs that IT administrators would have no legitimate reason for running. Victims who have identified and responded to this unusual behavior have successfully prevented Ghost ransomware attacks.
    • Limit exposure of services by disabling unused ports such as, RDP 3398, FTP 21, and SMB 445, and restricting access to essential services through securely configured VPNs or firewalls.
    • Enhance email security by implementing advanced filtering, blocking malicious attachments, and enabling DMARC, DKIM, and SPF to prevent spoofing [CPG 2.M].

    Validate Security Controls

    In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 3 to Table 13).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    Reporting

    Your organization has no obligation to respond or provide information back to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.

    The FBI is interested in any information that can be shared, to include logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, and/or decryptor files.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, date of infection, date detected, initial attack vector, and host and network-based indicators.

    The FBI, CISA, and MS-ISAC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and the MS-ISAC.

    Version History

    February 19, 2025: Initial version.

    MIL Security OSI

  • MIL-OSI Security: Anchorage Man Sentenced to Over 11 Years for Attempting to Coerce a Minor

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    ANCHORAGE, Alaska – An Anchorage man was sentenced today to over 11 years in prison and will serve the rest of his life on supervised release for attempting to coerce and entice a minor in 2023.

    According to court documents, in early July 2023, Benjamin Roundy, aka “Aleks” or “Alekzander Marko,” 43, responded to a public group chat post on an internet-based app by an individual who identified herself as a 13-year-old living in Anchorage. The group chat post was actually made by an undercover agent.

    Court documents explain that Roundy communicated with the undercover agent for nearly a month, first on the app and then via text message, and he initiated sexual conversations. Roundy discussed sexual acts he wanted to perform on the individual, who be believed to be a child, and made repeated requests for explicit photos of her.

    On Aug. 4, 2023, Roundy asked the undercover agent to meet in person at the parking lot of a grocery store in Anchorage. The undercover agent told Roundy she was going to walk home from a friend’s house, and Roundy asked what street the friend lived on. Shortly after learning the fictional address of the friend, the defendant left his home to meet the undercover agent, who he thought was a minor.

    Court documents further explain that Roundy texted the undercover agent instructions on where to meet him. When he received no response to his instructions, Roundy drove to a parking lot where he could see the street of the fictitious friend. Law enforcement arrested Roundy in the parking lot shortly thereafter and discovered a new bottle of personal lubricant and condoms in his vehicle.

    The investigation revealed thousands of images and videos depicting child sexual abuse on Roundy’s electronic devices and data detailing his online presence, which included searches for child sexual abuse materials (CSAM) and related terms.

    On April 25, 2024, Roundy pleaded guilty to one count of attempted coercion and enticement of a minor.

    “Mr. Roundy’s conduct was heinous, as he tried to meet with who he believed was an underage girl in Anchorage to engage in sex, sought explicit images of the child, and obtained graphic images and videos depicting the sexual abuse of other minors for years,” said First Assistant U.S Attorney Kathryn R. Vogel for the District of Alaska. “Our office’s commitment to safeguarding Alaska’s children from those who seek to exploit their innocence is unwavering. We will relentlessly pursue justice by working with law enforcement to identify, investigate and hold accountable anyone who targets children.”

    “The defendant posed a significant threat to children in Alaska and abroad, as demonstrated by his disturbing pattern of conduct involving child exploitation,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “Even in the darkest corners of the Internet, the FBI’s Child Exploitation and Human Trafficking Task Force will find a way to seek justice for our most vulnerable.”

    The FBI and Anchorage Police Department investigated this case as part of the FBI’s Child Exploitation and Human Trafficking Task Force.

    Assistant U.S. Attorney Adam Alexander of the District of Alaska and Trial Attorney Rachel L. Rothberg of the Criminal Division’s Child Exploitation and Obscenity Section (CEOS) prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    ###

    MIL Security OSI

  • MIL-OSI Economics: Are value-added taxes a barrier to trade?

    Source: International Chamber of Commerce

    Headline: Are value-added taxes a barrier to trade?

    We use necessary cookies to make our site work. We’d also like to set optional cookies to optimize site functionality and to give you the most relevant experience. We won’t set optional cookies unless you enable them. Using this tool will set a cookie on your device to remember your preferences.

    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.

    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.

    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.

    MIL OSI Economics

  • MIL-OSI: Bitget Wallet Integrates Monad Testnet to Expand DeFi Capabilities

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Feb. 19, 2025 (GLOBE NEWSWIRE) — Bitget Wallet, a leading Web3 non-custodial wallet, has officially integrated support for Monad Testnet, a high-performance EVM-compatible Layer 1 blockchain. Users can now easily add the Monad Testnet through the wallet interface and interact with ecosystem projects listed on the dedicated Monad DApp section.

    Monad is a next-generation blockchain built to overcome performance and scalability limitations in decentralized networks. With high transaction throughput and low latency, it offers robust infrastructure for DeFi applications. Its compatibility with Ethereum ensures smooth transitions for developers and users without workflow adjustments. Monad also reduces transaction costs and delays, delivering a more efficient, cost-effective experience in decentralized exchanges, lending, and yield farming.

    Bitget Wallet’s integration of Monad supports its goal of expanding access to innovative DeFi applications. With Monad’s optimized performance, users of Bitget Wallet can experience faster transactions and reduced fees, making activities like token swaps and staking more efficient. This integration empowers users to take advantage of emerging DeFi opportunities while enjoying a seamless user experience.

    By integrating Monad, we’re reinforcing our mission to simplify access to Web3 innovation while lowering the barrier to blockchain adoption,” said Alvin Kan, COO of Bitget Wallet. “Our users will benefit from faster and more affordable transactions, and we’re excited to leverage this integration in upcoming interactive incentive campaigns to deliver even more value.”

    About Bitget Wallet
    Bitget Wallet is the home of Web3, uniting endless possibilities in one non-custodial wallet. With over 60 million users, it offers comprehensive onchain services, including asset management, instant swaps, rewards, staking, trading tools, live market data, a DApp browser, an NFT marketplace and crypto payment. Supporting over 100 blockchains, 20,000+ DApps, and 500,000+ tokens, Bitget Wallet enables seamless multi-chain trading across hundreds of DEXs and cross-chain bridges, along with a $300+ million protection fund to ensure safety of users’ assets. Experience Bitget Wallet Lite to start a Web3 journey.
    For more information, visit: XTelegramInstagramYouTubeLinkedInTikTokDiscordFacebook
    For media inquiries, please contact media.web3@bitget.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/e98f7bc4-08ab-4317-9997-94269e2756e7

    The MIL Network

  • MIL-OSI: Trawick International Launches Travel Insurance for Canadian Residents

    Source: GlobeNewswire (MIL-OSI)

    MIAMI and VICTORIA, British Columbia, Feb. 19, 2025 (GLOBE NEWSWIRE) — Trawick International, a leader in global insurance, today announced its expansion into Canada with the launch of three new travel insurance plans designed exclusively for Canadian residents.

    Known for its award-winning trip cancellation and travel medical plans, Trawick International brings its expertise to Canada with coverage tailored to the needs of Canadian travelers. The new TrueNorth portfolio includes three plans, offering options from full coverage to budget-friendly protection:

    • TrueNorth Trip Protection Plus – Comprehensive trip cancellation and emergency medical coverage for domestic or international travel. Includes trip interruption up to $25,000, trip delay, emergency medical, evacuation, baggage coverage, and more.
    • TrueNorth Travel Medical – Covers emergency medical expenses and repatriation, ensuring travelers can return to Canada for continued care if necessary. Available as a single-trip or annual plan covering multiple trips up to 15 or 30 days each.
    • TrueNorth Trip Protection Lite – A budget-friendly option covering trip cancellation, delay, interruption, and repatriation of remains.

    All plans include 24/7 non-insurance travel assistance services and have a 10-day free look period.

    Bailey Foster, Senior Vice President of Travel Insurance, Trawick International, commented, “Expanding into Canada is a natural next step for Trawick International, and we’re thrilled to offer plans that meet the unique needs of Canadian travelers. Whether they need full trip protection, emergency medical coverage, or a more budget-friendly option, our TrueNorth plans provide the flexibility and security travelers deserve.”

    Daryl Trawick, President and CEO, Trawick International, added, “Trawick International is committed to redefining travel insurance through innovation, reliability, and customer-focused solutions. Entering the Canadian market represents another significant milestone for us, and we are proud to introduce plans that provide Canadian travelers with the confidence they need to explore the world.”

    For full details on the TrueNorth travel insurance plans for Canadian residents, visit trawickinternational.ca.

    About Trawick International
    For over 25 years, Trawick International has been a leading provider of international insurance, administration, and assistance services. The company offers a full suite of innovative products and services designed to support today’s globally mobile population. For more, visit trawickinternational.com.

    Media Contact
    Melissa Nicholson
    Director, Corporate Communications
    Trawick International
    Melissa.Nicholson@trawickinternational.com

    The MIL Network

  • MIL-OSI Russia: “The rule of six handshakes is followed in social media”

    Translartion. Region: Russians Fedetion –

    Source: State University Higher School of Economics – State University Higher School of Economics –

    Ivan Samoylenko studies graph theory and in his third year he came up with an idea that formed the basis of a scientific article with a very high citation rate in the media. In an interview with the Young Scientists of the HSE project, he spoke about the Watts-Strogatz small world model, singing in the children’s choir of the Bolshoi Theater, and choosing between science and industry.

    How I got into science

    I am a graduate of the specialized mathematics school #57 in Moscow. I attended math clubs there since high school, and in the 9th grade I transferred to a specialized math class. I got acquainted with some mathematical disciplines at a fairly serious level there. At that time, my attention was drawn to graphs – perhaps because many life questions are clearly formulated in their language. After school, I entered the mathematics department of the Higher School of Economics and am currently mainly engaged in graph theory.

    At HSE, I work in two laboratories. In the International Laboratory of Game Theory and Decision Making at HSE in St. Petersburg, I study applications of graphs to game-theoretic problems. And at the Faculty of Mathematics, we created the Scientific and Educational Laboratory of Complex Networks, Hypergraphs, and Their Applications. There, as you can tell from the name of the laboratory, I study both graphs and their generalized version — hypergraphs. And not only from the point of view of theory, but also from the point of view of the possible application of these structures to solving problems from a wide variety of areas — biology, medicine, data analysis, etc.

    What is a graph

    For clarity, a graph can be represented as a set of points (vertices) connected by lines (edges). The main feature of graph theory is that almost any system can be represented as a set of objects and some interactions between them. For example, when a journalist interviews me, this is also a graph, and a directed one at that. But in this particular example, it is not very clear why the graph is needed – it does not provide any new information about what is happening. However, if many different journalists interview different scientists, with the help of graph theory, you can compare the structural characteristics of the vertices (people) and make unobvious (at first glance) general conclusions.

    About the history of graph theory

    The father of graph theory is considered to be the mathematician Leonard Euler, who published a solution to the problem of the Königsberg bridges in 1736. He proved that it is impossible to cross all seven Königsberg bridges without crossing any of them twice and return to the starting point. Later, with the development of technology and the emergence of large data sets, graph theory increasingly occupied the minds of mathematicians and was embodied in various fields of knowledge.

    Another famous graph problem is the four-color conjecture, the assertion that any map on a plane can be correctly colored in no more than four colors. Although the problem is formulated in a language understandable even to a schoolchild and is easily illustrated with understandable pictures, it took humanity more than 100 years to solve it. And when in 1976 a solution was found (by the way, not at all simple: one of the steps of this solution is to try out almost 2000 options), an important break in the history of all mathematics occurred: this was the first theorem completely proven with the help of a computer.

    In general, major breakthroughs and milestones in the history of graph theory are inextricably linked with the development of information technology. Thus, graph theory gained particular popularity with the emergence of a clear example of a very large irregular (which cannot be fully described by a small set of rules) graph — the Internet. In general, the emergence of the Internet led to the emergence of a major branch of graph theory — the theory of complex networks.

    The two major modern works in complex network theory are papers describing the mechanisms by which complex networks emerge in the real world: the Watts-Strogatz small-world model and the Barabasi-Albert preferential attachment model. These papers have a great many citations, which is rare in mathematics. The Watts-Strogatz model is even in the top 100 most cited scientific papers of all time.

    When large amounts of data appear, it is interesting to identify structural patterns. And now there is a lot of data, you can build informative graph systems in almost any area. For example, I saw a study on how the graph of interactions of British composers of the 20th century is structured. By calculating the characteristics of this graph, for example, some centralities, you can draw a conclusion about which specific composers were structurally important for the development of British music. And from different points of view: someone as an independent actor or founder of a school, and someone as a link, allowing more successful colleagues to interact with each other.

    In general, in the language of graph theory, one can formulate models – probabilistic, game-theoretic – and prove their properties with strict mathematical theorems. So this is both an applied and fundamental area of mathematics.

    What I am proud of

    I came up with a game-theoretic model that describes why the social networks we see in the real world follow the six-handshake rule. It has been described before why there should be relatively few handshakes, but I was able to show where the magic number 6 comes from. A paper about this, based on my bachelor’s thesis, was published in Physical Review X in 2023.

    In the language of graph theory, it is easy to formulate what a social network is. The vertices are people, and the relationships between them (for example, acquaintance or friendship) are edges. In this context, the six-handshake rule can be thought of as follows: if we take two random people registered in a social network, then with a probability close to one, the path from one to the other along the “friend” edges will be no longer than six steps.

    The Watts and Strogatz paper that I mentioned proposed a random graph model in which a similar phenomenon could be observed. And I came up with a model that, on the one hand, somehow justified why this model was reasonable, and on the other hand, theoretically proved that if it so happened that we had two people in the system who were more than six handshakes apart, then such a system would not be very stable under sufficiently weak constraints.

    It was fortunate that our article came out 25 years after Watts and Strogatz’s article. And Strogatz himself wrote about our article on his social networks. He is quite a media person, so such a mention greatly promoted our article; at some point, journalists from different countries even wrote to me to get comments. As a result, according to my calculations, according to the altmetrics indicator, which is responsible for mentions in the world media and social networks, among articles where the first author has affiliation with the HSE, mine is the most mentioned.

    How I Got Published in a Top-Rated Magazine

    Getting published in high-ranking journals is a separate art (or rather, a craft). Even if you are a young genius, but do not know how to write articles, present material in a format acceptable for your domain, then you most likely will not publish anything in serious journals.

    Our article, published in the journal, consists of two parts. This is the main, “selling” part, which should be read by a completely non-technical person, and the additional part, which provides technical details and detailed evidence. As the author of the concept and idea, I wrote almost all the additional material (with detailed evidence), while a team of several leading scientists worked on the first part. First of all, Stefano Bocaletti, who was introduced to me by my supervisor in the graduate school of MIPT, Andrei Mikhailovich Raigorodsky, made a significant contribution to the release of this publication.

    He was the first person who was able to read my drafts and believed in the concept I proposed (it should be noted that in 2021, when I started writing this work, there were no good LLM chats yet, and my English was so bad that even at local competitions of the Faculty of Mathematics my work did not take prizes; then I accidentally found out that one of the reasons was the inability to read it normally).

    Then Stefano, for some time, invited his friends, also very strong network scientists, to join our team so that they could help us illuminate and explore our problem: what experiments to conduct, where to place emphasis so that the work could be published in a major interdisciplinary journal. And everything worked out: our article has a fairly good citation rate both in the media and in other scientific publications. So it’s one thing to discover a phenomenon, and quite another to successfully convey your results to the scientific community. Moreover, the criteria for an interesting publication are different for different domains. For example, I know that my fellow economists from the Game Theory Laboratory did not really like the format of my work. I have yet to master writing good economic articles.

    On the lack of time, but not ideas

    I keep a document with tasks that can be done and where minimal progress has been made. There are more than 20 of them. There is no shortage of ideas, there is a shortage of time, and sometimes there is a shortage of workers.

    With semi-applied ideas, it is often unclear in advance whether they are good or not; this can only be determined by conducting an experiment. In theory, it sometimes happens that you come up with something — and it is immediately clear that it is a good idea. Even its refutation can be informative and interesting. In the context of applied methods, everything is different: if something does not work, it is no longer so interesting. But on the other hand, if you know the result in advance, then what kind of science is it? You research, and if something works out — that’s great.

    What I dream about

    I would like young Russian scientists to have an easier life. So that they could not only survive, doing exclusively or mainly science. The presence of specialized specialists who have the opportunity to fully devote their time to research is critically important from the point of view of the development of science and technology. To explain my understanding of the problem, I would like to give an example from game theory. There is such a concept as a “rational agent”. Let’s say a young man (or woman) as a rational agent chooses where to go to work. In theory, if in science, there will be less money, but the work will be more free. If in industry, vice versa. Such a trade-off with clear alternatives: for each person, you can figuratively imagine a payoff function depending on these two factors, and each chooses one of the two paths depending on which factor is more important for the person.

    However, this model is relevant only if the economic difference is not too big. In practice (this is not only our problem, but in Russia it is felt especially acutely) the gap is colossal. In some situations it is more reasonable and simpler to go to work in a corporation, and in your free time to get together with friends and discuss science, and some people do just that.

    Another important issue is time constraints. Many scientific projects/grants/programs are very heavy and unwieldy from a bureaucratic point of view. The project setup activities may begin when a student, say, has just entered a master’s program, and the launch — when he or she is already finishing the last pages of his or her diploma.

    In such conditions, a young scientist will have to look for part-time work/other jobs, be in a state of constant uncertainty, which leads to constant stress. So many, even among those who are really interested in a scientific career, cannot cope and simply leave science. If we attract young scientists and administrative personnel (in my understanding, a scientist should not be busy writing papers, he should be engaged in science, if he does not have additional paid administrative duties) on more market-based terms, it seems to me that much more interesting and breakthrough work could be done.

    If I hadn’t become a mathematician

    The simplest answer is that I would go into IT, because that’s how I make money. But, in principle, I could become anyone, mathematics is not about theorems, but rather about a way of thinking. I don’t know who I could become. I could even do music, I even sang in the children’s choir of the Bolshoi Theater. Many opera productions have parts where children sing, and opera houses have children’s choirs.

    So that there is no feeling that I am Luciano Pavarotti, I should clarify that it is easier for boys to get into the Bolshoi Choir. The Bolshoi Children’s Choir consisted (at least when I was there) mainly of girls, and any boy there is a great success; there are fewer of them in music in general, and in early adolescence many leave because of voice failure. We had a situation when three people stopped taking part in performances at once. Because when two boys almost six feet tall and a third, also quite a large fellow with the nickname Horse stand next to a soloist shorter than them by a head and a half and have to portray small children, a noticeable dissonance arises.

    What I was interested in at school

    I was interested in history. I was even closer to the final stage of the All-Russian in history than in mathematics. I also played a lot of “What? Where? When?” and continued to do so as a student, although a little less actively. Now, unfortunately, I have almost no time for this: I have to work in industry, do science, and I also have a social and organizational load in the laboratories where I work.

    Who would I like to meet?

    With John Conway. I have a close relationship with his attitude to mathematics: he saw it in various everyday things, and although he became famous mainly for the game “Life”, he was in fact an amazingly versatile scientist with a large number of important works in various areas of mathematics. I was very upset when I read the news of his death at the very beginning of the covid pandemic. It would also be interesting to talk to mathematicians from the golden age of the Faculty of Mechanics and Mathematics – for example, Andrey Kolmogorov, the author of the axiomatics of probability theory.

    What are my hobbies besides science?

    I am a curious person and try to get acquainted with different things, to find out what is happening in the world. Sometimes I watch history channels, sometimes I can watch something about football or a strange documentary. In general, almost any information is interesting to me. But all this is irregular. I work systematically, slept – good, did not sleep – well, what to do.

    Advice to young scientists

    Think carefully about choosing your future track. I can also wish you patience and strength, mental and physical – you will definitely need it.

    Favorite place in Moscow

    I really like Moscow as a whole. I’ve been to different cities and I can’t say that even one of them is close to Moscow in terms of comfort (I have a certain sense of being a Muscovite, of course). If I have to name a specific place, I can simply say that I love the Moscow metro – it’s very practical (and at the old stations, it’s also aesthetically pleasing).

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI: 360 Broadband Secures $52M Grant to Expand Internet Access in Fannin County, Texas

    Source: GlobeNewswire (MIL-OSI)

    LEONARD, Texas, Feb. 19, 2025 (GLOBE NEWSWIRE) — Internet service provider 360 Broadband will expand and upgrade internet access in Fannin County, Texas, with the help of a $52 million award from the Texas Broadband Development Office’s Bringing Online Opportunities to Texas (BOOT) II Program.

    The grant will fund part of a $65 million project to bring high-speed fiber internet service to the region, transforming connectivity for residents, businesses, and community institutions. In total, the buildout will improve internet speeds and reliability for 12,000 locations, with 4,355 funded by the grant and the remainder by 360 Broadband. The project is already underway and is expected to be completed by the end of 2026, creating good local jobs in the process.

    “This is a pivotal moment for Fannin County,” said Kris McElroy, CEO of 360 Broadband. “Reliable, high-speed internet isn’t just a convenience — it’s necessary for education, business, healthcare, and overall quality of life. We’re honored to lead this effort.”

    “Our mission has always been to connect under-served communities in our area, and this will allow us to take that commitment even further,” commented Drew Beverage, COO of 360 Broadband. “We’re not just laying fiber; we’re laying the foundation for long-term growth and quality of life in Fannin County.”

    The BOOT II Program, spearheaded by the Texas Comptroller’s office, aims to bridge the digital divide by funding projects that deliver reliable, high-speed broadband to underserved areas.

    About 360 Broadband: For more information about 360 Broadband and its services, visit 360broadband.com. The 360 Broadband Texas Office is located at 607 N US Highway 69, Leonard, TX 75452.

    MEDIA CONTACT: Benjamin Bennett, benjamin.bennett@360broadband.com, 855-328-5099

    The MIL Network

  • MIL-OSI Asia-Pac: LCQ17: Cracking down on online defamation and cyber-bullying

    Source: Hong Kong Government special administrative region

    LCQ17: Cracking down on online defamation and cyber-bullying
    LCQ17: Cracking down on online defamation and cyber-bullying
    ************************************************************

         Following is a question by Prof the Hon Chow Man-kong and a written reply by the Secretary for Security, Mr Tang Ping-keung, in the Legislative Council today (February 19): Question:      In September 2023, the Mainland issued the Guiding Opinions on Punishing Illegal and Criminal Acts of Cyberviolence in accordance with the Law (the Opinions), with a view to punishing illegal and criminal activities of cyberviolence in accordance with the law, effectively safeguarding citizens’ rights and interests, and maintaining order in the cyberspace. There are views that the Government should draw on the experience and improve the legislation concerned. In this connection, will the Government inform this Council: (1) of the respective numbers of persons who were prosecuted and convicted in each of the past three years for allegedly disseminating inappropriate information or making inappropriate speech on the Internet (including contravening data protection principles under the Personal Data (Privacy) Ordinance (Cap. 486), and committing offences such as criminal intimidation, blackmail or defamation, etc.), and set out the details of each case by the nature of crimes; (2) given that it has been reported that the Government has completed a consultancy study on addressing the issue of false information, whether the authorities have examined if the existing legislation is adequate in combating false information, defamation and bullying behaviour in the cyberspace; if they have, of the details; and (3) given that the Opinions stresses that “the focus must be on cracking down on malicious initiators, organizers, malicious promoters, and those who refuse to take corrective action after repeated education”, and crimes committed under specific circumstances (such as cyberviolence committed against a minor or disabled person, and cyberviolence committed by organizing an “Internet water army” and “thugs”) “carry a harsh penalty in accordance with the law”, whether the authorities will make reference to the aforesaid principles in reviewing and updating the existing legislation, particularly focusing on Internet users who publicly or privately make speech not based on facts and intend to launch malicious attacks, and add a provision to enable victims to recover losses through legal channels from users or service providers who publish defamatory statements, so as to combat defamation and bullying behaviour online in a more targeted manner; if so, of the details; if not, the reasons for that? Reply:President,         The Internet is not an unreal world that is beyond the law. As far as the existing legislation in Hong Kong is concerned, most of the laws enacted to prevent crimes in the real world are in principle applicable to the online world, including social media and mobile communication softwares. Any illegal acts involving criminal offences would be regulated by the relevant legislation, regardless of whether such acts occur online.         After consulting the Home and Youth Affairs Bureau (HYAB), the Constitutional and Mainland Affairs Bureau and the Department of Justice (DoJ), consolidated reply in response to the Member’s question is provided as follows: (1) Disseminating inappropriate information or making inappropriate remarks on the Internet may constitute an offence under section 64 of the Personal Data (Privacy) Ordinance (Cap. 486) (PDPO), which provides for disclosure of personal data without consent, commonly known as the “doxxing” offence. Since the offence came into effect in October 2021, as at December 31, 2024, the Office of the Privacy Commissioner for Personal Data arrested a total of 63 persons, with 32 of them being convicted. Meanwhile, the Hong Kong Police Force (HKPF) conducted investigations targeting the offence of doxxing causing specified harm to the data subject or any family member of the data subject under section 64(3C) of the PDPO. As at the third quarter of 2024, 34 persons were arrested, with 18 of them being convicted.      According to the records of the DoJ, no prosecution for “publishing libel known to be false” provided under section 5 of the Defamation Ordinance (Cap. 21) was initiated in the past three years. As of the third quarter of 2024, a total of 1 006 persons have been prosecuted for offences such as criminal intimidation under section 24 of the Crimes Ordinance (Cap. 200) or blackmail under section 23 of the Theft Ordinance (Cap. 210), of which 450 have been convicted.           The above figures include cases committed on the Internet. The Government does not maintain breakdown of online and offline figures. (2) HYAB has earlier hired consultant to study the experiences and measures of other countries and regions in dealing with false information. According to information provided by HYAB, the Government has completed a consultancy study on how to deal with false information, and will continue to closely monitor the issue of false information. Generally speaking, the dissemination of information by the media in Hong Kong has improved compared to the past, but this does not mean that we do not need to be wary of false information and other online defamation and bullying. (3) As mentioned in the first part of the reply, the existing laws in Hong Kong for preventing crimes are, in principle, applicable to the online world and the above-mentioned relevant offences are applicable to online conduct. Making inappropriate comments online may also constitute other offences, such as contravention of the data protection principles as set out in Schedule 1 of the PDPO.      As regards online remarks or information which are not based on facts, there are mechanisms under the existing legal framework demanding the removal of inappropriate messages to combat online defamation and cyber-bullying. For instance, under section 159AAL of the Crimes Ordinance, in cases where intimate images (including falsified ones that have been altered) are published without consent, the court, having regard to the circumstances, may order the defendant or any other persons to remove, delete or destroy the intimate images concerned. Section 66M of the PDPO also empowers the Privacy Commissioner for Personal Data to demand actions to cease disclosure of “doxxing” contents. Upon noticing the circulation of inappropriate messages on the Internet, the HKPF will actively investigate and take enforcement action in a timely manner. They will also require service providers to remove the messages as appropriate. The parties concerned may also apply to the High Court for an injunction as and where necessary.           The Government reinstates that members of the public have to act legally and responsibly when using the Internet, and should not commit any criminal offence. We will devote full efforts to crack down unlawful acts on the Internet, and take enforcement actions in accordance with the existing legislation, as well as to review the applicability and effectiveness of the laws from time to time.

     
    Ends/Wednesday, February 19, 2025Issued at HKT 12:30

    NNNN

    MIL OSI Asia Pacific News

  • MIL-OSI USA: 2025-28 O‘AHU GRAND JURY INDICTS FORMER NONPROFIT EXECUTIVE DIRECTOR FOR EMBEZZLING FUNDS

    Source: US State of Hawaii

    2025-28 O‘AHU GRAND JURY INDICTS FORMER NONPROFIT EXECUTIVE DIRECTOR FOR EMBEZZLING FUNDS

    Posted on Feb 18, 2025 in Latest Department News, Newsroom

    STATE OF HAWAIʻI

    KA MOKU ʻĀINA O HAWAIʻI

     

    DEPARTMENT OF THE ATTORNEY GENERAL

    KA ʻOIHANA O KA LOIO KUHINA

     

    JOSH GREEN, M.D.
    GOVERNOR

    KE KIAʻĀINA

     

    ANNE LOPEZ

    ATTORNEY GENERAL

    LOIO KUHINA

     

    O‘AHU GRAND JURY INDICTS FORMER NONPROFIT EXECUTIVE DIRECTOR FOR EMBEZZLING FUNDS

    News Release 2025-28

    FOR IMMEDIATE RELEASE                                                       

    February 17, 2025 

    HONOLULU – On February 14, 2025, Moanaoio Bjur, 49, was indicted by the O‘ahu Grand Jury and charged with Computer Fraud in the First Degree, Theft in the First Degree, Computer Fraud in the Second Degree, and Theft in the Second Degree. Bjur was arrested over the weekend and booked on the charges.  

    Bjur is the former executive director of the nonprofit Conservation Council for Hawai‘i. While employed with the Conservation Council for Hawai‘i, Bjur allegedly issued herself approximately 24 unauthorized payroll payments via QuickBooks and made three unauthorized withdrawals from a PayPal account totaling just over $81,000.

    Attorney General Anne Lopez stated, “Nonprofit organizations serve important charitable roles within Hawai‘i, and in exchange, they receive special tax exemptions. My department is dedicated to investigating and prosecuting those who exploit their positions within nonprofit organizations to steal funds intended for the public good within our communities.”

    Computer Fraud in the First Degree is a class A felony offense punishable by up to 20 years in prison and a $50,000 fine. Theft in the First Degree and Computer Fraud in the Second Degree are class B felony offenses punishable by up to 10 years in prison and a $20,000 fine. Theft in the Second Degree is a class C felony offense punishable by up to five years in prison and a $10,000 fine.

    The investigation was conducted by the Department of the Attorney General’s Special Investigation and Prosecution Division (SIPD).  SIPD is the state of Hawai‘i’s primary law enforcement unit responsible for investigating and prosecuting corruption, fraud, and economic crimes. 

    The case, State v. Moanaoio Bjur, 1CPC-25-0000178, is being prosecuted by SIPD Deputy Attorney General Thomas Michener. A copy of the indictment can be found here.

    Bjur is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

     

    # # #

    Media contacts:

    Dave Day

    Special Assistant to the Attorney General

    Office: 808-586-1284                                                  

    Email: [email protected]        

    Web: http://ag.hawaii.gov

    Toni Schwartz
    Public Information Officer
    Hawai‘i Department of the Attorney General
    Office:
    808-586-1252
    Cell: 808-379-9249
    Email:
    [email protected] 

    Web: http://ag.hawaii.gov

     

    MIL OSI USA News

  • MIL-OSI Asia-Pac: Innovate2Educate

    Source: Government of India

    Innovate2Educate

    Learning With Fun And Innovation

    Posted On: 19 FEB 2025 3:38PM by PIB Delhi

    Learning With Fun And Innovation

    Introduction

    The Innovate2Educate Handheld Device Design Challenge is an exciting competition aimed at transforming children’s learning experiences. It is part of the Create in India Challenge Season 1 and is celebrated under WAVES (World Audio Visual & Entertainment Summit), which will focus on four key pillars: Broadcasting & Infotainment, AVGC-XR, Digital Media & Innovation, and Films. Innovate2Educate aligns with Pillar 2 of WAVES dedicated to AVGC-XR (Animation, Visual Effects, Gaming, Comics, and cutting-edge technologies such as Augmented Reality, Virtual Reality, and the Metaverse).

    The event is being organized by the Ministry of Information and Broadcasting in partnership with The Indian Digital Gaming Society (IDGS) with Hack2Skill serving as the Innovation Partner and ICT Academy as the Skilling Partner. A total of 334 candidates have registered so far, including 3 international participants.

    Objective

    In this challenge academia, designers, engineers and innovators can participate to create a prototype of an educational handheld device that:

    1. Engages children in learning Mathematics
    2. Encourages problem-solving through puzzles
    3. Enhances cognitive skills with interactive content
    4. Is affordable and accessible for a broad audience

    Competition Guidelines

                                                               

    The competition guidelines emphasize designing an innovative handheld device that blends education with entertainment. Below are the key guidelines that participants should follow:

     

    Phases of the Competition

     

    The competition consists of three key phases each designed to guide participants from concept to final product. Below is an overview of the process from submitting initial ideas to presenting the finished prototypes.

    Registration Process

    Follow these steps to complete your registration:

    Step 1: Register Online

    Registration process will end on 23rd February, 2025 (11:59 PM IST)

    Step 2: Submit Your Concept

    Provide detailed sketches, descriptions and key features.

    Step 3: Develop and Submit Your Prototype

    Selected participants will be invited to create and submit a working prototype.

    Evaluation Criteria

    Participants submissions will be evaluated based on:

    1. Innovation: Originality and creativity in device design and content.
    2. Educational Value: Effectiveness in teaching math and enhancing cognitive skills.
    3. User Experience: How engaging and user-friendly the device is for children.
    4. Cost-effectiveness: Feasibility of producing the device at an affordable price.
    5. Durability and Design: Practicality and robustness of the design.

    Prizes

    The Innovate2Educate Challenge offers exciting prizes to reward creativity and innovation. Winners will receive cash prizes, support for prototype development and an opportunity to showcase their designs at prominent events.

    • Cash Prizes will be awarded to the top three designs.
    • Prototype Development Support: Assistance in refining and producing the winning prototype.
    • Showcase Opportunity: The winning design will be featured at key IDGS events and showcased to potential investors and manufacturers.

     

    References:

     

    Santosh Kumar/ Ritu Kataria/ Kamna Lakaria

    (Release ID: 2104683) Visitor Counter : 75

    MIL OSI Asia Pacific News