FBI Atlanta Warns Public to Increase Hiring Scrutiny
FBI Atlanta is warning the public about the threat of hiring Remote IT workers who use false identifications to conceal their true North Korean identities.
Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Koreans, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal from two companies virtual currency, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants concealed their North Korean identities from their employers by providing the employers with false identification documents that contained stolen and fake identity information.
In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.
After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.
To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds, using the virtual currency mixer Tornado Cash, and then transferred the funds to virtual currency exchange accounts controlled by Kang Tae Bok and Chang Nam Il but held in the names of aliases. These accounts were opened using fraudulent Malaysian identification documents.
According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents, along with other individuals, and worked together as a co-located team.
Neither of the victim companies in this investigation would have hired the individuals had they known they were North Korean citizens. FBI Atlanta is warning the public about the threat of North Korean citizens who often apply for Remote IT roles as blockchain developers. These individuals often use multiple fake names, identity cards, and social media accounts to gain employment at numerous companies. Companies looking to hire Remote IT workers, especially for blockchain development, are encouraged to apply additional layers of scrutiny to their interview and hiring processes.
Recommendations for Strengthening Remote-Hiring Processes
Implement identity-verification processes during interviewing, onboarding, and throughout the employment of any remote worker. Cross-check HR systems for other applicants with the same resume content and/or contact information. The FBI has observed in other instances that North Korean IT workers use artificial intelligence and face-swapping technology during video job interviews to obfuscate their true identities.
Educate HR staff, hiring managers, and development teams regarding the North Korean IT worker threat, specifically focusing on changes in address or payment platforms during the onboarding process.
Review each applicant’s communication accounts as North Korean IT workers have reused phone numbers (particularly voice-over-IP numbers) and email addresses on multiple resumes purportedly belonging to different applicants.
Verify third-party staffing firms conduct robust hiring practices and routinely audit those practices.
Use “soft” interview questions to ask applicants for specific details about their location or educational background. North Korean IT workers often claim to have attended non-US educational institutions.
Check applicant resumes for typos and unusual terminology.
Complete as much of the hiring and onboarding process as possible in person.
Reporting: If you suspect you have been approached or victimized by a North Korean IT worker, the FBI recommends taking the following actions:
Report the suspicious activity to the FBI’s Internet Crime Complaint Center (IC3) at www.IC3.gov as quickly as possible.
Evaluate network activity from the suspected employee and their assigned device(s), and use internal intrusion-detection software to capture activity on the suspected device(s).
Reference
In 2022 and 2023, the United States, along with foreign partners, issued public advisories regarding how North Korean IT workers operate and provided red-flag indicators and due diligence measures for businesses to avoid hiring North Korean freelance developers. In May 2024, the FBI provided further guidance regarding North Korean IT workers and their use of witting and unwitting US-based individuals.
Source: State University of Management – Official website of the State –
On July 1, 2025, a joint meeting of the commissions of the State Council of the Russian Federation in the areas of “Personnel”, “Youth and Children”, “Family” was held at the site of the State University of Management to consider the draft Strategy for the Development of Education in the Russian Federation until 2036.
The moderator of the meeting, Russian journalist and TV presenter Ernest Matskyavichyus, introduced the main participants in the discussion and reported that more than 1,000 experts worked on the text of the Education Development Strategy, many of whom are present at the meeting.
The Chairman of the Commission of the State Council of the Russian Federation on “Personnel”, Governor of the Kaluga Region, and graduate of the State University of Management Vladislav Shapsha noted in his welcoming speech that the education system should be flexible and adaptive, integrated into the real sector of the economy and continuous.
“Today, a situation has arisen where one specialty is no longer enough for an educated person; at least two are needed to always be prepared for the changing situation on the labor market. Qualified specialists of a new type must think innovatively and be able to solve problems in the context of rapid digital transformation and global competition. The key tasks now are: synchronizing education with the labor market, overcoming imbalances in personnel training and forming a system of advanced training, since in the future the situation will change even faster, and artificial intelligence can sharply reduce employment in many areas of labor activity,” warned Vladislav Shapsha.
The Chairman of the State Council of Russia Commission on “Youth and Children”, Governor of the Yamalo-Nenets Autonomous Okrug Dmitry Artyukhov expressed pleasure at the representative meeting on such a comprehensive topic.
“Education is a vital area that concerns absolutely everyone: teachers, parents, and millions of children and young people across the country. We have done serious work on the Education Development Strategy on the instructions of the President. Now it is time to move on to action – to focus on implementing our plans. Together, we are laying the foundation for the future of Russian education. This is a vital state task, because it is education that solves key problems for the country: it provides knowledge and skills, trains personnel for the economy, and most importantly, brings up a new generation of Russians,” said Dmitry Artyukhov.
The Chairman of the State Council of Russia’s Commission on the “Family” Direction, Head of the Republic of Mordovia Artem Zdunov drew the attention of those gathered to the fact that the document under discussion will determine the development vectors not only of education itself, but also through it of the entire country as a whole.
“I will note two key priorities of the Strategy. The first is the further implementation of high-quality education regardless of the place of residence and social status of the family. Much has already been done for this: new schools and kindergartens have been built, major repairs have been carried out, and institutions have been equipped with modern equipment. The second priority is that the education system should be built on the basis of traditional Russian values, including a strong family. Efforts in this direction should be systemic and continuous, starting from kindergarten to university. The cult of large families should be spread everywhere, similar to how this year we widely celebrate the 80th anniversary of Victory in the Great Patriotic War – information should be broadcast from TV screens, from the Internet, from billboards on city streets and in educational institutions,” said Artem Zdunov.
Deputy Minister of Education of the Russian Federation Irina Shvartsman said that a public opinion poll was conducted to prepare the draft Strategy for the Development of Education, which affected 338 thousand people. The structure of the Strategy was developed by 15 working groups, including representatives of all departments, the Presidential Administration, the Russian Academy of Education and other experts.
“The strategy does not hide the problems, it is designed to identify and eliminate them. These are the problems of a shortage of personnel and wages, dilapidated buildings, bureaucratic burden on teachers, and the ideological gap between teachers and students. One of the main values in the education system should be a person. The rights of children and teachers should be equally protected. And to achieve humanitarian and scientific-technical leadership of Russia in the world, it is necessary not only to train qualified specialists, but also to work systematically in the direction of patriotic education,” said Irina Shvartsman.
Deputy Minister of Science and Higher Education of the Russian Federation Dmitry Afanasyev noted that for the first time in Russia a single document on issues of education development is appearing.
“In response to current challenges, the Ministry of Education and Science proposes to create a new list of specialties that meet the country’s strategic objectives, reboot and update state programs such as “Priority 2030” and “Advanced Engineering Schools”, and continue to build new university campuses. In addition, it is necessary to strengthen the influence of domestic education abroad, develop online forms of education, and promote the Russian language as the language of international communication. In this area, the Strategy still requires revision,” Dmitry Afanasyev said.
Rector of the State University of Management Vladimir Stroyev noted the significant number of GUU graduates at a meeting of the State Council commissions and spoke about the work of the university.
“The need to change the education system is obvious, but its conservatism can also have its advantages. Until the 1990s, GUU was not a management university, but an engineering and economics university. And we managed to preserve elements of the previous system. Starting in 2022, we are actively reviving the system of training industry managers who understand and know the production base well. For this purpose, GUU is implementing a system of seamless project-based learning. The structure of the university includes the Pre-University – a budget school where, in addition to studying general subjects, students begin to get used to practice-oriented learning. GUU is probably the only university in the country where project-based learning is practiced in 100% of areas of education, starting from the 1st year, which by the end of the study leads to a high level of graduate employment. In addition, we do not forget about the meanings – we are a leading university in the field of educational work, we support student families, and we encourage employees to have children. Our task is not only to raise a competent manager, but also to educate him as a responsible citizen who works for the benefit of the state and society,” said Vladimir Stroyev.
In addition, the rector of the State University of Management introduced the meeting participants to the scientific and technical achievements of the university, in particular, to the system of work of the inter-university design bureau, and invited those interested to take a tour of the university.
The meeting was also attended by: Deputy Head of the Secretariat of the Deputy Prime Minister of the Russian Government Antony Shvindt, Director of the Department of Personnel Policy of the Ministry of Education and Science of the Russian Federation Alexey Svistunov, Deputy Governor of the Kaluga Region Tatyana Leonova, Deputy Head of the Federal Service for Supervision in Education and Science Evgeny Semchenko and many other experts.
Summing up the panel discussion, the Chairman of the State Council of the Russian Federation Commission on Personnel Vladislav Shapsha particularly highlighted the topic raised by many speakers about the key role of education within the Education Development Strategy. “You can teach a lot, but if a person does not have a moral core, then his technical skills can be harmful. The Russian person has always been spiritual. You cannot understand Russia with your mind, you cannot measure it with a common yardstick…”, Vladislav Valerievich concluded the meeting of the State Council commissions with a quote from a poem by Fyodor Tyutchev.
After the end of the panel discussion, the participants of the meeting of the State Council commissions were given a tour of the State University of Management, as promised by the rector. In addition to the experts, the moderator of the discussion, Ernest Matskyavichyus, did not miss this opportunity.
The guests were shown the new workshop of the student design bureau “Innovative Solutions”, the Engineering Project Management Center and the Media Center of the State University of Management. Antoniy Shvindt paid special attention to the scientific and technical developments of the State University of Management. Aleksey Svistunov appreciated the comfort and equipment of the premises. Ernest Matskyavichyus, naturally, was most interested in the studios, and Tatyana Leonova even proposed a project for a series of short educational videos on the topic of management science.
Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.
Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that it believes it has regained compliance with the minimum shareholders’ equity requirement under Nasdaq Listing Rule 5550(b)(1) due to strong financial performance and closing of a financing round, as well as the requirement to hold an annual meeting of shareholders under Nasdaq Listing Rule 5620(a).
Shareholders’ Equity Compliance
As of the date of this report, the Company believes its shareholders’ equity is above the Nasdaq $2.5 million requirement. This increase is partially attributable to the closing of a private investment in public equity (“PIPE”) offering for total gross proceeds of $2,000,001.00. The objective of this fund raise is to accelerate product development and to increase market share, especially in the Australia and New Zealand (ANZ) markets. In addition, the Company expects to continue strengthening its financial position for the full year, supported by robust operating performance for the first half of 2025. Based on these trends and internal forecasts, the Company projects that it will continue to meet and exceed shareholders’ equity requirement by year-end.
Annual General Meeting Compliance
Separately, the Company confirms that it has successfully concluded its Annual General Meeting of Shareholders (“AGM”), which was held at 9:00am Eastern Time, on June 30, 2025. The convening of this AGM satisfies the requirement under Nasdaq Listing Rule 5620(a) to hold an annual meeting of shareholders within the required timeframe. It is, however, also noted that the Company has announced earlier this year that it will rely on Cayman Islands home country exemption with regards to AGM requirements in the future.
The Company will continue to monitor its ongoing compliance with all applicable Nasdaq listing standards and will provide further updates as appropriate.
About SIMPPLE LTD.
Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices.
This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.
Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.
Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.
North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.
Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.
Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.
Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.
This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.
From North Korea to the world: The remote IT workforce
Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.
North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.
North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.
Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.
North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.
Tactics and techniques
The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.
They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.
Figure 1. The North Korean IT worker ecosystem
Crafting fake personas and profiles
The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.
Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.
Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.
The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.
After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:
Figure 3. Example profile used by a North Korean IT worker that has since been taken down.
Using AI to improve operations
Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:
Figure 4. Photos of potential North Korean IT workers
The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:
VPS and VPN accounts, along with specific VPS IP addresses
Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
Wallet information and suspected payments made to facilitators
LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
Tracking sheet of work performed, and payments received by the IT workers
Image creation
Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.
Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profilesFigure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.
Communications
Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.
Facilitators for initial access
North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:
Figure 7. Example of a job opportunity for a facilitator role
The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:
Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
Purchase mobile phone numbers or SIM cards
During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.
Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.
Defense evasion and persistence
To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.
Attribution
Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.
How Microsoft disrupts North Korean remote IT worker operations with machine learning
Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.
Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.
Defending against North Korean remote IT worker infiltration
Defending against the threats from North Korean remote IT workers involves a threefold strategy:
Ensuring a proper vetting approach is in place for freelance workers and vendors
Monitoring for anomalous user activity
Responding to suspected Jasper Sleet signals in close coordination with your insider risk team
Investigate
How can you identify a North Korean remote IT worker in the hiring process?
To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:
Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
Search whether a potential employee is employed at multiple companies using the same persona.
Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
Keep records, including recordings of video interviews, of all interactions with potential employees.
Require notarized proof of identity.
Monitor
How can your organization prevent falling victim to the North Korean remote IT worker technique?
To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.
Monitor for identifiable characteristics of North Korean remote workers
Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.
The employee lists a Chinese phone number on social media accounts that is used by other accounts.
The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.
Monitor for activity associated with Jasper Sleet access
If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
Monitor for consistent user activity outside of typical working hours.
Remediate
What are the next steps if you positively identify a North Korean remote IT worker employed at your company?
Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:
Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
Rapidly evaluate the subject’s proximity to critical assets, such as:
Leadership or sensitive teams
Direct reports or vendor staff the subject has influence over
Suppliers or vendors
People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
Conduct preliminary link analysis to:
Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
Identify shared indicators (for example, shared IP addresses, behavioral overlap)
Avoid premature action that might alert other Jasper Sleet operators
Conduct a risk-based prioritization of efforts, informed by:
Placement and access to critical assets (not necessarily where you identified them)
Stakeholder insight from potentially impacted business units
Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
Conduct open-source intelligence (OSINT) collection and analysis to:
Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include:
Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning.
Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
Exaggerated facial expressions.
Duplicative or improperly placed appendages.
Pixelation or tearing at edges of face, eyes, ears, and glasses.
Engage counterintelligence or insider risk/threat teams to:
Understand tradecraft and likely next steps
Gain national-level threat context, if applicable
Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
Preserve evidence and document findings.
Share lessons learned and increase awareness.
Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.
After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.
For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).
Microsoft Defender XDR detections
Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.
Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.
Microsoft Defender XDR
Alerts with the following titles in the security center can indicate threat activity on your network:
Sign-in activity by a suspected North Korean entity
Microsoft Defender for Endpoint
Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.
Suspicious usage of remote management software
Suspicious connection to remote access software
Microsoft Defender for Identity
Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.
Atypical travel
Suspicious behavior: Impossible travel activity
Microsoft EntraID Protection
Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.
Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)
Microsoft Defender for Cloud Apps
Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.
Impossible travel activity
Microsoft Security Copilot
Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:
Incident investigation
Microsoft User analysis
Threat actor profile
Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.
Hunting queries
Microsoft Defender XDR
Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.
If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal.
Microsoft Sentinel
The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:
User principal name
Label name
Activity
City
State
Country/Region
Time generated
The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.
References
Acknowledgments
For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.
Learn more
Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.
For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog.
To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky.
To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast.
ATLANTA – Pradip Parikh, 67, of Valley Stream, New York, and Alpesh Patel, 40, of Louisa, Virginia, have been convicted for their roles in a scam that defrauded unsuspecting Americans out of millions of dollars after a five-day jury trial.
“This case involved a scheme to defraud multiple victims – many of whom were elderly – and to callously rob them of their hard-earned savings,” said U.S. Attorney Theodore S. Hertzberg. “The defendants and their conspirators within and outside the United States enriched themselves through government-imposter scams designed to exploit the public’s inherent trust in federal institutions. The jury has spoken, and Parikh and Patel will now be held accountable for their crimes.”
“These defendants deliberately preyed on some of our most vulnerable citizens—particularly the elderly—by impersonating Social Security officials and exploiting their trust,” said Michelle L. Anderson, Assistant Inspector General for Audit performing the duties of the Social Security Administration (SSA), Inspector General. “This telephone imposter scheme defrauded millions of Americans and caused real harm to individuals who believed they were protecting their benefits. Today’s convictions send a clear message: we will relentlessly pursue those who weaponize fear and deceit to commit fraud, and we thank our law enforcement partners for helping bring these perpetrators to justice.”
“These defendants targeted mostly older adults to cheat them out of their savings,” said FBI Atlanta Special Agent in Charge Paul Brown. “This sentencing should make it known to individuals that protecting our most vulnerable community members is critically important, and we will hold accountable those who engage in these sorts of egregious fraud schemes.”
According to U.S. Attorney Hertzberg, the charges, and other information presented in court: In 2022, Pradip Parikh, Alpesh Patel, and eight others were indicted for running, promoting, and profiting from an India-based call center scam targeting Americans. The fraudsters typically identified themselves as Social Security Administration employees, telling the victims that their Social Security Numbers had been compromised in connection with criminal activity and promising to help “protect” their assets. Upon luring the victims to agree to this offer, the fraudsters directed the victims to send money to bank accounts controlled by Parikh, Patel, and other conspirators.
During the defendants’ trial, a 70-year-old victim from New Jersey testified that one of the conspirators told her that she would be arrested and lose all her assets if she did not transfer funds to accounts that the caller designated. In response, the victim transferred more than $600,000 of her lifesavings to multiple banks accounts, including $150,000 to an account called “JDM Management” that Parikh controlled.
A recently widowed mother of eight testified that she transferred over $300,000 to JDM Management’s account as part of the scheme. Parikh then laundered the funds, retaining thousands for himself and transferring the balance to a conspirator.
Other victims testified that they wired money to an account called “Seven Points Agency” that Patel controlled. Evidence admitted during trial revealed that the Seven Points Agency account was opened just before scam victims began wiring money into it. More than $100,000 was deposited into the account in the span of two days, and Patel immediately diverted those funds to a conspirator after keeping approximately $10,000 for himself.
Pradip Parikh and Alpesh Patel were charged with conspiracy to commit wire fraud, conspiracy to commit money laundering, and two substantive counts of money laundering. The jury convicted Patel of all the counts. Parikh was convicted of conspiracy to commit money laundering and two substantive counts of money laundering.
The conspiracy to commit wire fraud count carries a maximum penalty of 20 years of imprisonment, and the money laundering counts each carry a maximum penalty of ten years of incarceration. In determining the actual sentence, the court will consider the United States Sentencing Guidelines, which are not binding but provide appropriate sentencing ranges for most offenders.
Sentencing hearings for the defendants will be scheduled at a future date before United States District Judge William M. Ray II.
This case is being investigated by the Social Security Administration – Office of the Inspector General and the Federal Bureau of Investigation.
Assistant United States Attorney Angela Adams and Special Assistant United States Attorney Diane C. Schulman are prosecuting the case.
The U.S. Attorney’s Office for the Northern District of Georgia is part of the Department of Justice Transnational Elder Fraud Strike Force. The Strike Force focuses on investigating and prosecuting defendants associated with foreign-based fraud schemes that disproportionately affect American seniors. These include romance scams, phone scams, mass-mailing fraud schemes, and tech-support fraud schemes. For further information on these scams, see https://www.justice.gov/elderjustice/senior-scam-alert.
For further information please contact the U.S. Attorney’s Public Affairs Office at USAGAN.PressEmails@usdoj.gov or (404) 581-6185. The Internet address for the U.S. Attorney’s Office for the Northern District of Georgia is http://www.justice.gov/usao-ndga.
ATLANTA – Pradip Parikh, 67, of Valley Stream, New York, and Alpesh Patel, 40, of Louisa, Virginia, have been convicted for their roles in a scam that defrauded unsuspecting Americans out of millions of dollars after a five-day jury trial.
“This case involved a scheme to defraud multiple victims – many of whom were elderly – and to callously rob them of their hard-earned savings,” said U.S. Attorney Theodore S. Hertzberg. “The defendants and their conspirators within and outside the United States enriched themselves through government-imposter scams designed to exploit the public’s inherent trust in federal institutions. The jury has spoken, and Parikh and Patel will now be held accountable for their crimes.”
“These defendants deliberately preyed on some of our most vulnerable citizens—particularly the elderly—by impersonating Social Security officials and exploiting their trust,” said Michelle L. Anderson, Assistant Inspector General for Audit performing the duties of the Social Security Administration (SSA), Inspector General. “This telephone imposter scheme defrauded millions of Americans and caused real harm to individuals who believed they were protecting their benefits. Today’s convictions send a clear message: we will relentlessly pursue those who weaponize fear and deceit to commit fraud, and we thank our law enforcement partners for helping bring these perpetrators to justice.”
“These defendants targeted mostly older adults to cheat them out of their savings,” said FBI Atlanta Special Agent in Charge Paul Brown. “This sentencing should make it known to individuals that protecting our most vulnerable community members is critically important, and we will hold accountable those who engage in these sorts of egregious fraud schemes.”
According to U.S. Attorney Hertzberg, the charges, and other information presented in court: In 2022, Pradip Parikh, Alpesh Patel, and eight others were indicted for running, promoting, and profiting from an India-based call center scam targeting Americans. The fraudsters typically identified themselves as Social Security Administration employees, telling the victims that their Social Security Numbers had been compromised in connection with criminal activity and promising to help “protect” their assets. Upon luring the victims to agree to this offer, the fraudsters directed the victims to send money to bank accounts controlled by Parikh, Patel, and other conspirators.
During the defendants’ trial, a 70-year-old victim from New Jersey testified that one of the conspirators told her that she would be arrested and lose all her assets if she did not transfer funds to accounts that the caller designated. In response, the victim transferred more than $600,000 of her lifesavings to multiple banks accounts, including $150,000 to an account called “JDM Management” that Parikh controlled.
A recently widowed mother of eight testified that she transferred over $300,000 to JDM Management’s account as part of the scheme. Parikh then laundered the funds, retaining thousands for himself and transferring the balance to a conspirator.
Other victims testified that they wired money to an account called “Seven Points Agency” that Patel controlled. Evidence admitted during trial revealed that the Seven Points Agency account was opened just before scam victims began wiring money into it. More than $100,000 was deposited into the account in the span of two days, and Patel immediately diverted those funds to a conspirator after keeping approximately $10,000 for himself.
Pradip Parikh and Alpesh Patel were charged with conspiracy to commit wire fraud, conspiracy to commit money laundering, and two substantive counts of money laundering. The jury convicted Patel of all the counts. Parikh was convicted of conspiracy to commit money laundering and two substantive counts of money laundering.
The conspiracy to commit wire fraud count carries a maximum penalty of 20 years of imprisonment, and the money laundering counts each carry a maximum penalty of ten years of incarceration. In determining the actual sentence, the court will consider the United States Sentencing Guidelines, which are not binding but provide appropriate sentencing ranges for most offenders.
Sentencing hearings for the defendants will be scheduled at a future date before United States District Judge William M. Ray II.
This case is being investigated by the Social Security Administration – Office of the Inspector General and the Federal Bureau of Investigation.
Assistant United States Attorney Angela Adams and Special Assistant United States Attorney Diane C. Schulman are prosecuting the case.
The U.S. Attorney’s Office for the Northern District of Georgia is part of the Department of Justice Transnational Elder Fraud Strike Force. The Strike Force focuses on investigating and prosecuting defendants associated with foreign-based fraud schemes that disproportionately affect American seniors. These include romance scams, phone scams, mass-mailing fraud schemes, and tech-support fraud schemes. For further information on these scams, see https://www.justice.gov/elderjustice/senior-scam-alert.
For further information please contact the U.S. Attorney’s Public Affairs Office at USAGAN.PressEmails@usdoj.gov or (404) 581-6185. The Internet address for the U.S. Attorney’s Office for the Northern District of Georgia is http://www.justice.gov/usao-ndga.
overnor Kathy Hochul today announced that Phase I of Perry Homes in Buffalo’s First Ward has welcomed its first residents. When complete, Phase I will consist of 405 affordable apartments in 27 newly constructed buildings, replacing the dilapidated Commodore Perry Homes public housing development and transforming it into quality, modern, all-electric affordable homes for families. In the past five years, New York State Homes and Community Renewal has created or preserved more than 12,000 affordable homes in Erie County. Perry Homes continues this effort and is part of Governor Hochul’s five-year, $25 billion Housing Plan, which is on track to create or preserve 100,000 affordable homes statewide.
“It is an honor to welcome the first residents of the new Perry Homes to a place where they can live comfortably and affordably with access to all of the things that make Buffalo and this First Ward neighborhood so special,” Governor Hochul said. “This is a huge milestone as this development begins to take shape and open its doors. This long-anticipated development that replaces an unfortunate symbol of decline is now a symbol of pride and will not only increase the supply of quality housing in Buffalo, but provide countless opportunities for families, businesses, and the entire city to grow and thrive.”
Perry Homes I is the first phase of a multi-phase transformation plan and involves the redevelopment of an 18-acre portion of the existing public housing development site. Once complete, the new Perry Homes will include 405 high-quality apartments, all of which will be affordable to households with incomes at or below 60 percent of the Area Median Income. Of the total units, 284 will be covered under a Section 8 Project-Based Housing Assistance Payment contract administered by the U.S. Department of Housing and Urban Development Office of Multifamily Housing.
The redevelopment will also feature comprehensive on-site amenities, including a centrally-located property management office, maintenance suite, mail and package rooms, two community rooms with a kitchenette, three fitness centers, shared laundry on each floor, and bicycle storage.
Residents will be provided free broadband Internet service and Wi-Fi, and they will also enjoy access to green space and outdoor amenities, such as four playgrounds, each designed to maximize play for children ages 2-12; multiple tree groves; rain gardens to support stormwater management practices; and two outdoor plazas with picnic tables, card tables, benches, and room for gathering and programming.
On-site surface parking, including 30 electric vehicle charging stations, will be accessible across the site for residential tenant use, commercial visitors, and management staff.
Perry Homes I is designed to be a highly efficient, all-electric project meeting Enterprise Green Communities 2020 Plus certification requirements and the U.S. Department of Energy Zero Energy Ready Home Version 1 program. As part of New York State’s Homes and Community Renewal Clean Energy Initiative, the new buildings will have high performance windows, enhanced insulation, a combination of high efficiency building mounted LED lighting to promote safety, and solar panels on each of the three mid-rise buildings. Every apartment will be equipped with inverter-driven air source heat pumps for air conditioning and heating and electric hot water heaters, ENERGY STAR certified dishwashers, refrigerators, washers and dryers, and low-flow plumbing fixtures.
Residents will have easy access to the New York Thruway via I-190 at Louisiana Street and Perry Street. Bus access, which is available along South Park Avenue and Perry Street, provides quick access to downtown and places of employment. There are numerous shopping destinations and healthcare facilities nearby, as well as adult and childcare, a public library, and a community center.
The development team is Pennrose and Bridges Development, Inc., a not-for-profit corporation affiliate of the Buffalo Municipal Housing Authority. The Perry Homes redevelopment will use the Federal Housing and Urban Development RAD program to convert the vacant public housing units to Project-Based Rental Assistance.
Financing for the $254 million development includes $21.9 million in tax-exempt bonds, $115.7 million in State and Federal Low Income Tax Credits, and $81 million in subsidy from New York State Homes and Community Renewal (HCR). Empire State Development provided $5 million in Restore New York funding. Additional funds include: $6 million in BMHA Capital Fund Program; $1.1 million in Buffalo Community Development Block Grants; $5 million in RAD Rehab Assistance Payments; and $1.6 million in Federal 45L tax credits. The all-electric development received $1.4 million through HCR’s Clean Energy Initiative program, created in partnership with NYSERDA.
Governor Hochul’s Housing Agenda
Governor Hochul is dedicated to addressing New York’s housing crisis and making the State more affordable and more livable for all New Yorkers. As part of the FY25 Enacted Budget, the Governor secured a landmark agreement to increase New York’s housing supply through new tax incentives, capital funding, and new protections for renters and homeowners. Building on this commitment, the FY26 Enacted Budget includes more than $1.5 billion in new State funding for housing, a Housing Access Voucher pilot program, and new policies to improve affordability for tenants and homebuyers. These measures complement the Governor’s five-year, $25 billion Housing Plan, included in the FY23 Enacted Budget, to create or preserve 100,000 affordable homes statewide, including 10,000 with support services for vulnerable populations, plus the electrification of an additional 50,000 homes. More than 60,000 homes have been created or preserved to date.
The FY25 and FY26 Enacted Budgets also strengthened the Governor’s Pro-Housing Community Program — which allows certified localities exclusive access to up to $750 million in discretionary State funding. Currently, more than 300 communities have received Pro Housing certification, including the city of Buffalo.
EL PASO, Texas – An Anthony man who had previously been convicted for aggravated sexual assault of a prepubescent child was sentenced in a federal court in El Paso today to life in prison plus 10 years for producing, possessing and exchanging child sexual abuse material (CSAM), violating the Sex Offender Registration and Notification Act (SORNA), and committing a sex offense as a registered sex offender.
According to court documents, Mark Martinez, 57, was found to be distributing CSAM within a group on the social messaging application Kik. Martinez was previously convicted in 1991 for the sexual assault of a child around the age of eight years old and, as of 2022, was residing at an address unknown to his registration officer.
FBI agents executed a search warrant in August 2022, seizing several electronic devices containing CSAM images and videos. One of those devices contained multiple photos taken at his residence in July, depicting a female approximately five to six years old. The device also contained a folder of videos of another minor female downloaded from WhatsApp. A separate device revealed chats on the messaging app Telegram, in which Martinez admitted to sexually molesting a minor. Agents discovered approximately 2,391 CSAM images and 138 CSAM videos on one device, several of which involved prepubescent minors. Martinez’s cellphone contained approximately 50 more CSAM images.
A criminal complaint and arrest warrant were issued for Martinez in October 2022. Martinez had already fled to Mexico without reporting to his registration officer and was arrested at the Columbus Port of Entry in New Mexico when he returned March 3, 2023. A federal grand jury indicted Martinez March 22, 2023. He pleaded guilty to all five counts on Aug. 21, 2024.
“Placing this child predator behind bars for the rest of his life makes certain this predator will never again harm another child,” said U.S. Attorney Justin R. Simmons for the Western District of Texas. “The facts of this case are incredibly disturbing, and I thank all of our law enforcement partners for their work investigating this case, which led to this repeat offender’s ultimate conviction, and life imprisonment.”
“Martinez is a dangerous sexual predator who preyed on our community’s most vulnerable victims- our children. This case highlights the disturbing reality of sexual exploitation, and the sentence ensures this predator will remain behind bars and unable to continue such atrocities physically and on the web,” said FBI El Paso Special Agent in Charge John Morales. “The FBI and our law enforcement partners remain steadfast in our commitment to work together to ensure no child is victimized in this way.”
The FBI, El Paso County Sheriff’s Office and the Winnebago County Sherriff’s Office investigated the case.
Assistant U.S. Attorneys Sarah Valenzuela and Lori Hughes prosecuted the case.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.
Prime Minister Narendra Modi’s two-day visit to Ghana from July 2, marks a landmark moment in India–Ghana relations. This will be the first visit by an Indian Prime Minister to Ghana in more than three decades and PM Modi’s first bilateral engagement with the West African nation. The visit is expected to deepen cooperation in trade, development partnership, capacity building and cultural exchange, strengthening a warm relationship that has endured since Ghana’s independence.
Historical Context
India and Ghana share historical ties rooted in anti-colonial solidarity and a shared vision for the Global South. India established its representative office in Accra in 1953, four years before Ghana gained independence in 1957. Diplomatic relations were formally established the same year, laying the foundation for a close and friendly partnership.
Political Engagement and High-Level Visits
High-level exchanges have played a crucial role in nurturing this bond. From the Ghanaian side, President Nana Addo Dankwa Akufo-Addo visited India in March 2018 for the International Solar Alliance Founding Conference and later addressed the Voice of Global South Summit hosted by Prime Minister Modi in January 2023. Before him, President John Dramani Mahama travelled to India in October 2015 to attend the third India-Africa Forum Summit. Other notable visits include President Kufuor’s trips in 2002 and 2008, President Rawlings’ visit in 1993, President Limann’s in 1981 and President Kwame Nkrumah’s historic visit in 1961.
From the Indian side, President Pranab Mukherjee visited Ghana in June 2016. Before that, Prime Minister P.V. Narasimha Rao’s visit in November 1995 was the last by an Indian Prime Minister, making PM Modi’s upcoming trip especially significant. Recent engagements have kept the momentum alive, with External Affairs Minister Dr. S. Jaishankar meeting President Akufo-Addo in September 2022 and Minister of State V. Muraleedharan attending the Ghanaian Presidential inauguration in January 2021.
Institutional Mechanisms
India and Ghana have built robust institutional mechanisms to sustain regular dialogue. The Joint Commission was established in 1995 and reinforced in 2016, while a protocol for Foreign Office Consultations was signed in 2002. Three rounds of consultations have been held since then, with the latest in New Delhi in 2022. The Joint Trade Committee, operational since 1981, held its fourth meeting in Accra in May 2024. Ghana’s Parliamentary Friendship Association also contributes to exchanges at the legislative level.
Commercial Partnership
India is among Ghana’s top trading partners and the largest destination for Ghanaian exports. Bilateral trade crossed two billion US dollars in 2022–23, with Ghana enjoying a positive trade balance due to substantial gold exports. Indian investments in Ghana are valued at over 1.2 billion dollars, spanning sectors such as pharmaceuticals, agro-processing, construction, manufacturing and ICT. Platforms like the CII-Exim Bank Conclave on India–Africa Project Partnership continue to play an important role in strengthening commercial ties. Ghana has been an active participant, with the 19th edition of the conclave in August 2024 witnessing the participation of four Ghanaian ministers and senior regulatory officials.
Development Partnership
India has been a committed development partner for Ghana, extending around 450 million US dollars in concessional credit and grants for infrastructure and capacity-building projects. Landmark initiatives include the India-Ghana Kofi Annan ICT Centre of Excellence established in 2003, the Rural Electrification Project, the Jubilee House Presidential Complex which was rehabilitated in 2017, and industrial ventures like the Komenda Sugar Plant and Elmina Fish Processing Plant inaugurated in 2016. Under Buyer’s Credit, India supported the construction of the Tema-Mpakadan Standard Gauge Railway Line, which was inaugurated in November 2024 and is expected to boost regional connectivity by linking Ghana’s main port city to its hinterland and neighbouring Burkina Faso. Other key projects include the Tamale-Walewale Road and an assembly plant for agricultural machinery.
Capacity Building & Human Resource Development
Ghana is also one of the largest beneficiaries of India’s flagship capacity-building programmes. Over 1,600 scholarships have been offered under the e-Vidya Bharati and e-Arogya Bharati digital network project. Hundreds of Ghanaians have benefited from ITEC and ICCR scholarships. In 2024 alone, 128 civilians and 109 defence personnel from Ghana trained in India under ITEC, while 35 ICCR scholarships and three AYUSH scholarships were awarded. Education fairs held in Kumasi and Accra in 2024 and 2025 have strengthened linkages between Indian institutions and Ghanaian students.
Sectoral Cooperation
Sectoral cooperation has grown steadily over the years. Agreements have been signed to promote cooperation in areas like LPG distribution, peaceful uses of nuclear energy and standardisation through collaborations between India’s Bureau of Indian Standards and Ghana Standards Authority. Air connectivity is facilitated through the Air Services Agreement signed in 1978 and updated through subsequent MoUs. Cultural exchange remains a vibrant aspect of the partnership, anchored by a Cultural Agreement signed in 1981 and periodic Cultural Exchange Programmes. India also extended humanitarian support to Ghana during the COVID-19 pandemic, providing 50,000 vaccine doses as a grant and over 1.6 million doses through the COVAX facility.
Prime Minister Modi’s visit is expected to inject fresh momentum into the bilateral partnership by expanding trade, boosting investments in energy and digital infrastructure, advancing cooperation in defence and capacity building, and deepening collaboration in health, education and climate action.
Khartoum (Agenzia Fides) – Most areas of Khartoum are without electricity and water, exacerbating the country’s already precarious security situation and the lack of other services such as internet and telecommunications.Recently, the humanitarian organization LIZENFO raised the alarm which reported that a large number of people in the Sudanese capital have been forced to return to displacement areas, with the exception of areas of Omdurman. According to the director of the organization, several civilians from Khartoum have returned to the United States after facing great difficulties during the conflict in the capital.Against a backdrop of general insecurity, the Sudanese Teachers’ Committee has voiced its disagreement with a decision by the Khartoum state government’s decision to reopen schools, saying that the move ignores the deteriorating security, health, and economic reality, and post a direct threat to the lives of education workers and their families. Furthermore, telecommunications networks are fluctuating, and the internet is not available most of the time. The teachers pointed out that they are forced to charge their phones, at great expense, at shops that rely on solar energy, and warned of a terrible deterioration in the humanitarian situation, and the high cost of food.Furthermore, civilians in the south and west of Khartoum are being detained and taken to unknown locations without giving reasons. Most neighborhood markets remain closed, and the public are forced to go to the central market, in addition to traveling long distances to get drinking water. (AP) (Agenzia Fides, 1/7/2025)
Share:
Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that the proposed resolutions submitted for shareholder approval have been duly adopted at its Annual General Meeting of Shareholders (“AGM”) held on June 30, 2025, at 9:00am Eastern Time.
Results of the Annual General Meeting
Shareholders of SIMPPLE approved all proposals submitted by the Board of Directors, including the following:
The confirmation of Financial Statements of the Company for the year ended December 31, 2024;
The appointment of Audit Alliance LLP as the independent auditor of the Company until the next AGM and the fixing of their remuneration to be delegated to the Board of Directors of the Company;
All nominated Board of Directors, including Mr. Lee Soon Sze Kelvin as Chairman, were re-elected for a one-year term ending at the conclusion of the 2026 AGM.
About SIMPPLE LTD.
Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices.
This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.
Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.
Source: The Conversation – USA – By Kassem Fawaz, Associate Professor of Electrical and Computer Engineering, University of Wisconsin-Madison
Many apps and social media platforms collect detailed information about you as you use them, and sometimes even when you’re not using them.Malte Mueller/fStop via Getty images
You wake up in the morning and, first thing, you open your weather app. You close that pesky ad that opens first and check the forecast. You like your weather app, which shows hourly weather forecasts for your location. And the app is free!
But do you know why it’s free? Look at the app’s privacy settings. You help keep it free by allowing it to collect your information, including:
What devices you use and their IP and Media Access Control addresses.
Information you provide when signing up, such as your name, email address and home address.
App settings, such as whether you choose Celsius or Fahrenheit.
Your interactions with the app, including what content you view and what ads you click.
Inferences based on your interactions with the app.
Your location at a given time, including, depending on your settings, continuous tracking.
What websites or apps that you interact with after you use the weather app.
Information you give to ad vendors.
Information gleaned by analytics vendors that analyze and optimize the app.
This type of data collection is standard fare. The app company can use this to customize ads and content. The more customized and personalized an ad is, the more money it generates for the app owner. The owner might also sell your data to other companies.
Many apps, including the weather channel app, send you targeted advertising and sell your personal data by default. Jack West, CC BY-ND
You might also check a social media account like Instagram. The subtle price that you pay is, again, your data. Many “free” mobile apps gather information about you as you interact with them.
As an associate professor of electrical and computer engineering and a doctoral student in computer science, we follow the ways software collects information about people. Your data allows companies to learn about your habits and exploit them.
It’s no secret that social media and mobile applications collect information about you. Meta’s business model depends on it. The company, which operates Facebook, Instagram and WhatsApp, is worth US$1.48 trillion. Just under 98% of its profits come from advertising, which leverages user data from more than 7 billion monthly users.
Before mobile phones gained apps and social media became ubiquitous, companies conducted large-scale demographic surveys to assess how well a product performed and to get information about the best places to sell it. They used the information to create coarsely targeted ads that they placed on billboards, print ads and TV spots.
Mobile apps and social media platforms now let companies gather much more fine-grained information about people at a lower cost. Through apps and social media, people willingly trade personal information for convenience. In 2007 – a year after the introduction of targeted ads – Facebook made over $153 million, triple the previous year’s revenue. In the past 17 years, that number has increased by more than 1,000 times.
Five ways to leave your data
App and social media companies collect your data in many ways. Meta is a representative case. The company’s privacy policy highlights five ways it gathers your data:
First, it collects the profile information you fill in. Second, it collects the actions you take on its social media platforms. Third, it collects the people you follow and friend. Fourth, it keeps track of each phone, tablet and computer you use to access its platforms. And fifth, it collects information about how you interact with apps that corporate partners connect to its platforms. Many apps and social media platforms follow similar privacy practices.
Your data and activity
When you create an account on an app or social media platform, you provide the company that owns it with information like your age, birth date, identified sex, location and workplace. In the early years of Facebook, selling profile information to advertisers was that company’s main source of revenue. This information is valuable because it allows advertisers to target specific demographics like age, identified gender and location.
And once you start using an app or social media platform, the company behind it can collect data about how you use the app or social media. Social media keeps you engaged as you interact with other people’s posts by liking, commenting or sharing them. Meanwhile, the social media company gains information about what content you view and how you communicate with other people.
Advertisers can find out how much time you spent reading a Facebook post or that you spent a few more seconds on a particular TikTok video. This activity information tells advertisers about your interests. Modern algorithms can quickly pick up subtleties and automatically change the content to engage you in a sponsored post, a targeted advertisement or general content.
Your devices and applications
Companies can also note what devices, including mobile phones, tablets and computers, you use to access their apps and social media platforms. This shows advertisers your brand loyalty, how old your devices are and how much they’re worth.
Because mobile devices travel with you, they have access to information about where you’re going, what you’re doing and who you’re near. In a lawsuit against Kochava Inc., the Federal Trade Commission called out the company for selling customer geolocation data in August 2022, shortly after Roe v Wade was overruled. The company’s customers, including people who had abortions after the ruling was overturned, often didn’t know that data tracking their movements was being collected, according to the commission. The FTC alleged that the data could be used to identify households.
Information that apps can gain from your mobile devices includes anything you have given an app permission to have, such as your location, who you have in your contact list or photos in your gallery.
If you give an app permission to see where you are while the app is running, for instance, the platform can access your location anytime the app is running. Providing access to contacts may provide an app with the phone numbers, names and emails of all the people that you know.
Cross-application data collection
Companies can also gain information about what you do across different apps by acquiring information collected by other apps and platforms.
The settings on an Android phone show that Meta uses information it collects about you to target ads it shows you in its apps – and also in other apps and on other platforms – by default. Jack West, CC BY-ND
This is common with social media companies. This allows companies to, for example, show you ads based on what you like or recently looked at on other apps. If you’ve searched for something on Amazon and then noticed an ad for it on Instagram, it’s probably because Amazon shared that information with Instagram.
Companies, including Google, Meta, X, TikTok and Snapchat, can build detailed user profiles based on collected information from all the apps and social media platforms you use. They use the profiles to show you ads and posts that match your interests to keep you engaged. They also sell the profile information to advertisers.
Meanwhile, researchers have found that Meta and Yandex, a Russian search engine, have overcome controls in mobile operating system software that ordinarily keep people’s web-browsing data anonymous. Each company puts code on its webpages that used local IPs to pass a person’s browsing history, which is supposed to remain private, to mobile apps installed on that person’s phone, de-anonymizing the data. Yandex has been conducting this tracking since 2017, while Meta began in September 2024, according to the researchers.
What you can do about it
If you use apps that collect your data in some way, including those that give you directions, track your workouts or help you contact someone, or if you use social media platforms, your privacy is at risk.
Aside from entirely abandoning modern technology, there are several steps you can take to limit access – at least in part – to your private information.
Read the privacy policy of each app or social media platform you use. Although privacy policy documents can be long, tedious and sometimes hard to read, they explain how social media platforms collect, process, store and share your data.
Check a policy by making sure it can answer three questions: what data does the app collect, how does it collect the data, and what is the data used for. If you can’t answer all three questions by reading the policy, or if any of the answers don’t sit well with you, consider skipping the app until there’s a change in its data practices.
Remove unnecessary permissions from mobile apps to limit the amount of information that applications can gather from you.
Be aware of the privacy settings that might be offered by the apps or social media platforms you use, including any setting that allows your personal data to affect your experience or shares information about you with other users or applications.
These privacy settings can give you some control. We recommend that you disable “off-app activity” and “personalization” settings. “Off-app activity” allows an app to record which other apps are installed on your phone and what you do on them. Personalization settings allow an app to use your data to tailor what it shows you, including advertisements.
Review and update these settings regularly because permissions sometimes change when apps or your phone update. App updates may also add new features that can collect your data. Phone updates may also give apps new ways to collect your data or add new ways to preserve your privacy.
Use private browser windows or reputable virtual private networks software, commonly referred to as VPNs, when using apps that connect to the internet and social media platforms. Private browsers don’t store any account information, which limits the information that can be collected. VPNs change the IP address of your machine so that apps and platforms can’t discover your location.
Finally, ask yourself whether you really need every app that’s on your phone. And when using social media, consider how much information you want to reveal about yourself in liking and commenting on posts, sharing updates about your life, revealing locations you visited and following celebrities you like.
This article is part of a series on data privacy that explores who collects your data, what and how they collect, who sells and buys your data, what they all do with it, and what you can do about it.
Kassem Fawaz receives funding from the National Science Foundation. In the past, his research group has received unrestricted gifts from Meta and Google.
Jack West does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
NEW YORK, July 01, 2025 (GLOBE NEWSWIRE) — SLR Investment Corp. (the “Company”) (NASDAQ: SLRC) today announced that it will release its financial results for the quarter ended June 30, 2025 on Tuesday, August 5, 2025 after the close of the financial markets.
The Company will host an earnings conference call and audio webcast at 10:00 a.m. (Eastern Time) on Wednesday, August 6, 2025.
All interested parties may participate in the conference call by dialing (800) 245-3047 approximately 5-10 minutes prior to the call, international callers should dial (203) 518-9765. Participants should reference SLR Investment Corp. and Conference ID: SLRC2Q25. A telephone replay will be available until August 20, 2025 and can be accessed by dialing (800) 839-8389. International callers should dial (402) 271-9156.
This conference call will also be broadcast live over the Internet and can be accessed by all interested parties from the Event Calendar within the “Investors” tab of SLR Investment Corp.’s website, https://slrinvestmentcorp.com/Investors/Event-Calendar. Please register online prior to the start of the call. For those who are not able to listen to the broadcast live, a replay of the webcast will be available soon after the call.
ABOUT SLR INVESTMENT CORP.
SLR Investment Corp. is a closed-end investment company that has elected to be treated as a business development company under the Investment Company Act of 1940. A specialty finance company with expertise in several niche markets, the Company primarily invests directly and indirectly in leveraged, U. S. middle market companies in the form of cash flow senior secured loans including first lien and second lien debt instruments and asset-based loans including senior secured loans collateralized on a first lien basis primarily by current assets.
Contact:
SLR Investment Corp. Richard Pivirotto 646-308-8770
The Council has delivered a balanced budget for 2024/25 and investing more than £125m in the city’s future, despite the significant national pressures affecting local authorities across the country.
The Council’s final outturn position represents a remarkable turnaround from the predicted £7 million overspend projected at Quarter 3, demonstrating strong financial management and disciplined budget control throughout the challenging financial year.
The Council successfully delivered a substantial £128.8 million capital investment programme during 2024/25, with an impressive 65% funded through external grants – demonstrating the authority’s success in securing funding that reduces the burden on local taxpayers.
Key investments included:
£22 million in transport and highways infrastructure, including completion of the 220-meter Coventry Very Light Rail test track
£18.3 million across the city’s school estate, focusing on additional secondary school capacity
£16.5 million in climate change initiatives covering green homes and decarbonisation projects
£6.6 million supporting registered housing providers to tackle housing issues
Councillor Richard Brown, Cabinet Member for Strategic Finance and Resources, said:
“This strong financial performance demonstrates our commitment to sound fiscal management while continuing to invest in Coventry’s future.
“Despite the challenging environment facing all local authorities and through the efforts of finance colleagues, we have ended the year with a balanced budget.”
The Council’s commercial investments delivered exceptional returns, with the Asset Management Revenue Account generating a surplus exceeding £10 million.
Strong dividend performance from Birmingham Airport and Coventry & Solihull Waste Disposal Company contributed to this success.
Total commercial income of £27.7 million helps support the delivery of essential services for Coventry residents, representing approximately 10% of the Council’s net service expenditure.
Like councils across the country, Coventry faced significant pressures in children’s and adult social care services due to increased demand, case complexity, and market challenges.
The Council successfully managed these pressures through careful financial planning and the use of one-off income sources.
The authority’s strong balance sheet position enabled it to manage budget variations while maintaining its ambitious capital programme, positioning the Council well to continue improving services for residents and investing in the city.
The capital programme demonstrates the Council’s commitment to Coventry’s long-term prosperity:
Infrastructure preparation for the West Midlands Investment Zone focusing on advanced manufacturing
Continued progress on major regeneration projects including City Centre South
Sustainable transport improvements including cycling infrastructure that has enabled the city to avoid a city centre congestion charge
Digital and ICT improvements to enhance service delivery
Cllr Brown added:
“The authority’s success in attracting external funding and maintaining strong commercial returns demonstrates effective financial stewardship that benefits all Coventry residents.”
Laptop recycling at Sellafield helps to bridge the digital divide
A collaborative laptop recycling scheme, is helping to bridge the digital divide across our local communities.
Cockermouth School, West Cumbria, a revisited recipient of IT equipment
Passing on a previously used laptop might seem like a simple act of generosity—but at Sellafield, when it comes to boosting educational attainment, our laptop recycling scheme is helping bridge the digital divide across our local communities.
The initiative, in partnership with our IT supplier Atos and Information Services Organisation (ISO), is now in its fourth year of repurposing decommissioned laptops—which are no longer suitable for Sellafield’s secure network—into vital educational tools for schools, charities, and community groups.
Over the past 18 months, our social impact team has revisited recipients to understand the real-world impact of these donations. The results speak volumes.
Thanks to partnerships with Western Excellence in Leadership and Learning (WELL) Programme and Laptops for Kids in Warrington, schools have introduced new courses in graphic design, film, photography, and engineering. These opportunities are helping disadvantaged students build confidence, develop digital skills, and thrive in a technology-driven world.
Teachers, too, are seeing the benefits. With access to reliable, modern devices, they can focus more on teaching and less on troubleshooting outdated equipment—saving time and reducing frustration.
The scheme’s reach extends beyond the classroom. Local charities have used donated laptops to support young people researching opportunities like the Duke of Edinburgh’s Award, while others have transitioned from bulky desktop setups to lightweight laptops.
This shift has enabled them to repurpose space for adult learning and job-seeking support, amplifying the scheme’s community impact.
Our commitment to social value continues to drive innovation in how surplus assets can be used for public good proving that sustainability and community development can go hand in hand.
Pam Collis and Emma Graham, from the ISO team within Sellafield Ltd, who introduced this process within ISO, explain the importance:
We all recognise the vital role modern Information and Communication Technology (ICT) plays in the workplace, and the same holds true for school classrooms.
The future workforce needs access to the right tools, software, and equipment to develop their skills and progress. Without this access, they risk being left behind.
This potential for a digital divide is something we were determined to address through our social impact commitments.
By sharing ICT equipment that no longer meets our needs, we realised we could tackle digital poverty and boost digital literacy.
While we donate the devices, our supply chain partner Atos cleans, repairs, and prepares them for reuse, ensuring our data is securely removed. It’s truly a collaborative effort.
Our social impact team collaborates with projects and groups to make sure these devices reach those who need them most. And it’s not just schools, local charities and community groups can benefit as well.
Source: The Conversation – UK – By Andrew Forde, Assistant Professor – European Human Rights Law, Dublin City University
A special tribunal has been established by the international human rights organisation the Council of Europe (CoE) and the Ukrainian government to try crimes of aggression against Ukraine which could be used to hold Vladimir Putin and others to account for the February 2022 invasion and war crimes committed since.
The Ukrainian president, Volodymyr Zelensky, signed an agreement with CoE secretary general, Alain Berset, on June 25, setting up the special tribunal. Subject to it securing the necessary political backing and budget the tribunal will be established within the framework of the CoE (which is not part of the European Union.
Work on the first phase of the court could progress in 2026. In his speech to the Council of Europe parliamentary assembly in Strasbourg, Zelensky was cautious in his optimism but stressed that the agreement was “just the beginning”.
“It will take strong political and legal cooperation to make sure every Russian war criminal faces justice – including Putin,” he said. He knows, through years of hard experience as he travelled the world seeking help from Ukraine’s allies, that political support can be fleeting.
A new Nuremberg?
Inspired by ad hoc courts established after major conflicts such as the Nuremberg tribunal after the second world war or, more recently the International Criminal Tribunal for the former Yugoslavia (ICTY) in the 1990s, the Ukraine has been established with the aim of holding to account the perpetrators of the first full-scale armed conflict in Europe in the 21st century.
The prohibition against the crime of aggression is a basic principle of international law, and a key part of the UN charter.
In principle, the crime of aggression should be prosecuted by the International Criminal Court (ICC). But as Russia is not a party to the Rome Statute which underpins the court, that option was ruled out. Similarly, Russia’s veto on the UN security council meant that it would be impossible in practice to practically set up a court under the mandate of the UN – as the ICTY was in 1993.
The Ukraine special tribunal, which was developed by a Core Group, made up of states plus the EU and the Council of Europe, seeks to fill an obvious accountability gap. If the illegal invasion is left unpunished, it would set a dangerous precedent.
Such impunity would embolden Russia and inspire others with revanchist ambitions, undermining an already shaky international order. The US, which was instrumental in setting up the Core Group under the presidency of Joe Biden, withdrew in March 2025 when Donald Trump took office.
The statute of the special tribunal sets out that the court will be based on Ukrainian law and will have a strong link to the country’s legal system. Ukraine’s prosecutor-general will play a key role in the proceedings, referring evidence for further investigation by the tribunal. But it will be internationally funded with international judges and prosecutors, and strong cooperation with the International Criminal Court. It is likely to be based in the Hague – although this has yet to be confirmed.
The need for accountability for the illegal invasion of Ukraine was stressed in a resolution of the UN general assembly in February 2023 as the war headed into its second year. The resolution, which calls for “appropriate, fair and independent investigations and prosecutions at the national or international level” to “ensure justice for all victims and the prevention of future crimes” was approved by an overwhelming majority of 141 states. Any country in the world can join this core group to support its establishment.
Holding leaders accountable
Unlike previous international courts, the caseload is likely to be extremely narrow. There are likely to be dozens of charges rather than hundreds or thousands, which is perhaps reassuring in terms of managing costs.
The tribunal will focus on those “most responsible” including the so-called “troika”: the president Vladimir Putin, prime minister Mikhail Mishustin and the minister for foreign affairs Sergey Lavrov. Charges may also be levelled against the leadership of Belarus and North Korea for their role in aiding, abetting and actively participating in the war of aggression. But don’t expect Kim Jong-un or Alexander Lukashenko in the dock anytime soon.
The Court has opted for a novel approach to a longstanding customary rule by noting that heads of state are not functionally immune from prosecution. But it adds that indictments won’t be confirmed until such time as the suspect is no longer in office.
Trials can take place in absentia if the accused fails to attend and all reasonable steps taken to apprehend them have failed. But, like the ICC, the court will still rely on states to apprehend and physically transfer indicted individuals in due course. This will inevitably limit the chances of seeing any of the key individuals actually in a court, something that has also dogged the ICC.
The fact that a tribunal has now been set up is a major development in international criminal justice. But it is now in a sort of purgatory, existing and not existing at the same time. To become operational, another treaty known as an enlarged partial agreement must be signed by interested states. This will have to be ratified by many national parliaments, depending on their constitutions. This process could take years.
But simply by creating the framework for the tribunal, the Council of Europe has demonstrated its commitment to ensuring accountability. In a further development, the European Court of Human Rights delivers its long-awaited judgment in the case of Ukraine and the Netherlands v Russia on July 9.
This concerns “complaints about the conflict in eastern Ukraine involving pro-Russian separatists which began in 2014, including the downing of Malaysia Airlines flight MH17, and the Russian military operations in Ukraine since 2022”. The judgement will add further momentum to these accountability efforts.
Symbolic as it may seem, this week’s agreement creates a real opportunity for the international community to send a message that impunity for international aggression is intolerable – not just for the victims, but for all who believe in the rule of law.
Andrew Forde is affiliated with Dublin City University (Assistant Professor, European Human Rights Law). He is also, separately, affiliated with the Irish Human Rights and Equality Commission (Commissioner).
NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, INTO OR IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA OR JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW. THIS ANNOUNCEMENT DOES NOT CONSTITUTE OR FORM AN OFFER FOR SALE OF, OR THE SOLICITATION OF AN OFFER TO BUY, THE SECURITIES REFERRED TO HEREIN IN ANY JURISDICTION, INCLUDING THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW.
PLEASE SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
01 July 2025
AI Prime & Cy S.C.A. announces pricing of an accelerated placing of shares of InPost S.A.
AI Prime & Cy S.C.A. (“AI Prime”), an Advent International company has priced an accelerated placing (the “Placing”) to institutional investors of 17.5 million ordinary shares in InPost S.A. (the “Company”), constituting c.3.5% of the Company’s existing share capital, at a price of EUR 13.25 per ordinary share.
Upon settlement of the Placing, the aggregate total ownership interest of Advent International in the Company’s issued ordinary share capital will be c.6.5%. Settlement is expected to occur on 3 July 2025.
As part of the transaction, remaining shares in the Company held by AI Prime will be subject to a 60 day lock-up period from the settlement date, subject to customary exemptions.
Barclays Bank PLC acted as Sole Global Co-ordinator and Bookrunner on the Placing.
The Company will not receive any proceeds from the Placing.
IMPORTANT NOTICE
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS FOR INFORMATION PURPOSES ONLY AND DOES NOT CONSTITUTE AN OFFER TO SELL OR THE SOLICITATION OF AN OFFER TO BUY ANY OF THESE SECURITIES IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH SUCH OFFER, SOLICITATION OR SALE WOULD BE UNLAWFUL PRIOR TO REGISTRATION OR QUALIFICATION UNDER THE SECURITIES LAWS OF ANY SUCH JURISDICTION. THE SECURITIES MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES ABSENT REGISTRATION OR AN APPLICABLE EXEMPTION FROM UNITED STATES REGISTRATION REQUIREMENTS. NO PUBLIC OFFER OF SECURITIES IS TO BE MADE IN THE UNITED STATES AND NEITHER THIS ANNOUNCEMENT NOR ANY COPY OF IT MAY BE TAKEN, TRANSMITTED OR DISTRIBUTED, DIRECTLY OR INDIRECTLY, IN OR INTO OR FROM THE UNITED STATES (INCLUDING ITS TERRITORIES AND POSSESSIONS, ANY STATE OF THE UNITED STATES AND THE DISTRICT OF COLUMBIA), CANADA, SOUTH AFRICA OR JAPAN. ANY FAILURE TO COMPLY WITH THIS RESTRICTION MAY CONSTITUTE A VIOLATION OF UNITED STATES, CANADIAN, SOUTH AFRICAN OR JAPANESE SECURITIES LAWS.
THIS ANNOUNCEMENT AND ANY OFFER OF SHARES PURSUANT TO THE PLACING (“PLACING SHARES“) IF MADE SUBSEQUENTLY ARE ONLY ADDRESSED TO AND DIRECTED AT PERSONS (1) IN THE EEA WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF REGULATION (EU) 2017/1129 (THE “PROSPECTUS REGULATION“) AND (2) IN THE UNITED KINGDOM, WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF THE PROSPECTUS REGULATION AS IT FORMS PART OF DOMESTIC LAW BY VIRTUE OF THE EUROPEAN UNION (WITHDRAWAL) ACT 2018 AND WHO HAVE PROFESSIONAL EXPERIENCE IN MATTERS RELATING TO INVESTMENTS WHO FALL WITHIN ARTICLE 19(5) OF THE FINANCIAL SERVICES AND MARKETS ACT 2000 (FINANCIAL PROMOTION) ORDER 2005 (AS AMENDED, THE “ORDER“) OR ARE HIGH NET WORTH ENTITIES FALLING WITHIN ARTICLE 49(2)(A) TO (D) OF THE ORDER OR ARE PERSONS TO WHOM AN OFFER OF THE PLACING SHARES MAY OTHERWISE BE LAWFULLY COMMUNICATED (ALL SUCH PERSONS BEING REFERRED TO AS “RELEVANT PERSONS“). PERSONS WHO ARE NOT RELEVANT PERSONS SHOULD NOT TAKE ANY ACTION ON THE BASIS OF THIS ANNOUNCEMENT AND SHOULD NOT ACT OR RELY ON IT.
THE SECURITIES REFERRED TO HEREIN WILL BE OFFERED (I) WITHIN THE UNITED STATES ONLY TO A LIMITED NUMBER OF QUALIFIED INSTITUTIONAL BUYERS AS DEFINED IN RULE 144A UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT“) PURSUANT TO AN EXEMPTION FROM, OR IN TRANSACTIONS NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT, AND (II) OUTSIDE THE UNITED STATES IN RELIANCE ON REGULATION S UNDER THE SECURITIES ACT, IN EACH CASE SUBJECT TO PREVAILING MARKET AND OTHER CONDITIONS. THERE IS NO ASSURANCE THAT THE PLACING WILL BE COMPLETED, OR IF COMPLETED, AS TO THE TERMS ON WHICH IT IS COMPLETED. THE SECURITIES REFERRED TO HEREIN HAVE NOT BEEN AND WILL NOT BE REGISTERED UNDER THE SECURITIES ACT AND MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES WITHOUT REGISTRATION THEREUNDER OR UNLESS PURSUANT TO AN AVAILABLE EXEMPTION THEREFROM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN CONSTITUTES OR FORMS PART OF AN OFFER TO SELL, OR THE SOLICITATION OF AN OFFER TO BUY, SECURITIES IN THE UNITED STATES. THERE WILL BE NO PUBLIC OFFER OF ANY SECURITIES IN THE UNITED STATES OR ANY OTHER JURISDICTION.
THIS ANNOUNCEMENT DOES NOT, AND SHALL NOT, IN ANY CIRCUMSTANCES CONSTITUTE A PUBLIC OFFERING, NOR AN OFFER TO SELL OR TO SUBSCRIBE, NOR A SOLICITATION TO OFFER TO PURCHASE OR TO SUBSCRIBE SECURITIES IN ANY JURISDICTION. THE DISTRIBUTION OF THIS ANNOUNCEMENT AND THE OFFERING OR SALE OF THE SECURITIES IN CERTAIN JURISDICTIONS MAY BE RESTRICTED BY LAW. NO ACTION HAS BEEN TAKEN BY AI PRIME, BARCLAYS BANK PLC (THE “GLOBAL CO-ORDINATOR“) OR ANY OF THEIR RESPECTIVE AFFILIATES THAT WOULD, OR WHICH IS INTENDED TO, PERMIT A PUBLIC OFFER OF THE SECURITIES IN ANY JURISDICTION OR POSSESSION OR DISTRIBUTION OF THIS ANNOUNCEMENT OR ANY OTHER OFFERING OR PUBLICITY MATERIAL RELATING TO THE SECURITIES IN ANY JURISDICTION WHERE ACTION FOR THAT PURPOSE IS REQUIRED. PERSONS INTO WHOSE POSSESSION THIS ANNOUNCEMENT COMES ARE REQUIRED BY AI PRIME AND THE GLOBAL CO-ORDINATOR TO INFORM THEMSELVES ABOUT AND TO OBSERVE ANY APPLICABLE RESTRICTIONS.
NO PROSPECTUS OR OFFERING DOCUMENT HAS BEEN OR WILL BE PREPARED IN CONNECTION WITH THE PLACING. ANY INVESTMENT DECISION IN CONNECTION WITH THE PLACING MUST BE MADE SOLELY ON THE BASIS OF PUBLICLY AVAILABLE INFORMATION RELATING TO THE COMPANY AND ITS SHARES. SUCH INFORMATION HAS NOT BEEN INDEPENDENTLY VERIFIED AND AI PRIME AND THE GLOBAL CO-ORDINATOR ARE NOT RESPONSIBLE, AND EXPRESSLY DISCLAIM ANY LIABILITY, FOR SUCH INFORMATION. THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT IS FOR BACKGROUND PURPOSES ONLY AND DOES NOT PURPORT TO BE FULL OR COMPLETE. NO RELIANCE MAY BE PLACED FOR ANY PURPOSE ON THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT OR ON ITS ACCURACY OR COMPLETENESS.
IN CONNECTION WITH THE PLACING, THE GLOBAL CO-ORDINATOR OR ANY OF ITS AFFILIATES MAY TAKE UP A PORTION OF THE PLACING SHARES AS A PRINCIPAL POSITION AND IN THAT CAPACITY MAY RETAIN, PURCHASE, SELL OR OFFER TO SELL FOR ITS OWN ACCOUNT SUCH PLACING SHARES AND OTHER SECURITIES OF THE COMPANY OR RELATED INVESTMENTS IN CONNECTION WITH THE PLACING OR OTHERWISE. ACCORDINGLY, REFERENCES TO THE PLACING SHARES BEING OFFERED, ACQUIRED, PLACED OR OTHERWISE DEALT IN SHOULD BE READ AS INCLUDING ANY OFFER TO, OR ACQUISITION, PLACING OR DEALING BY THE GLOBAL CO-ORDINATOR AND ANY OF ITS AFFILIATES ACTING AS INVESTORS FOR THEIR OWN ACCOUNTS. THE GLOBAL CO-ORDINATOR DOES NOT INTEND TO DISCLOSE THE EXTENT OF ANY SUCH INVESTMENT OR TRANSACTIONS OTHERWISE THAN IN ACCORDANCE WITH ANY LEGAL OR REGULATORY OBLIGATIONS TO DO SO.
THIS ANNOUNCEMENT DOES NOT PURPORT TO IDENTIFY OR SUGGEST THE RISKS (DIRECT OR INDIRECT) WHICH MAY BE ASSOCIATED WITH AN INVESTMENT IN THE COMPANY OR ITS SHARES.
THIS ANNOUNCEMENT DOES NOT CONSTITUTE A RECOMMENDATION CONCERNING THE PLACING. THE PRICE AND VALUE OF SECURITIES AND ANY INCOME FROM THEM CAN GO DOWN AS WELL AS UP. PAST PERFORMANCE IS NOT A GUIDE TO FUTURE PERFORMANCE. ACQUIRING PLACING SHARES TO WHICH THIS ANNOUNCEMENT RELATES MAY EXPOSE AN INVESTOR TO A SIGNIFICANT RISK OF LOSING ALL OF THE AMOUNT INVESTED. POTENTIAL INVESTORS SHOULD CONSULT A PROFESSIONAL ADVISOR AS TO THE SUITABILITY OF THE PLACING FOR THE ENTITY OR PERSON CONCERNED. THIS ANNOUNCEMENT DOES NOT REPRESENT THE ANNOUNCEMENT OF A DEFINITIVE AGREEMENT TO PROCEED WITH THE PLACING AND, ACCORDINGLY, THERE CAN BE NO CERTAINTY THAT THE PLACING WILL PROCEED. AI PRIME RESERVES THE RIGHT NOT TO PROCEED WITH THE PLACING OR TO VARY THE TERMS OF THE PLACING IN ANY WAY.
BARCLAYS BANK PLC IS AUTHORISED IN THE UNITED KINGDOM BY THE PRUDENTIAL REGULATION AUTHORITY AND REGULATED BY THE FINANCIAL CONDUCT AUTHORITY AND THE PRUDENTIAL REGULATION AUTHORITY. THE GLOBAL CO-ORDINATOR IS ACTING FOR AI PRIME AND NO-ONE ELSE IN CONNECTION WITH THE PLACING. NEITHER THE GLOBAL CO-ORDINATOR NOR ANY OF ITS AFFILIATES, NOR THEIR RESPECTIVE PARTNERS, DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS WILL REGARD ANY OTHER PERSON AS A CLIENT IN CONNECTION WITH THE PLACING AND THEY WILL NOT BE RESPONSIBLE TO ANYONE OTHER THAN AI PRIME FOR PROVIDING THE PROTECTIONS AFFORDED TO THEIR RESPECTIVE CLIENTS OR FOR PROVIDING ADVICE IN CONNECTION WITH THE PLACING DESCRIBED IN THIS ANNOUNCEMENT OR FOR ANY OTHER MATTERS REFERRED TO HEREIN.
CERTAIN FIGURES CONTAINED IN THIS ANNOUNCEMENT HAVE BEEN SUBJECT TO ROUNDING ADJUSTMENTS. ACCORDINGLY, IN CERTAIN INSTANCES, THE SUM OR PERCENTAGE CHANGE OF THE NUMBERS CONTAINED IN THIS ANNOUNCEMENT MAY NOT CONFORM EXACTLY WITH THE TOTAL FIGURE GIVEN.
THIS ANNOUNCEMENT INCLUDES STATEMENTS THAT ARE, OR MAY BE DEEMED TO BE, FORWARD-LOOKING STATEMENTS. THESE FORWARD-LOOKING STATEMENTS MAY BE IDENTIFIED BY THE USE OF FORWARD-LOOKING TERMINOLOGY, INCLUDING THE TERMS “INTENDS”, “EXPECTS”, “WILL”, OR “MAY”, OR, IN EACH CASE, THEIR NEGATIVE OR OTHER VARIATIONS OR COMPARABLE TERMINOLOGY, OR BY DISCUSSIONS OF STRATEGY, PLANS, OBJECTIVES, GOALS, FUTURE EVENTS OR INTENTIONS. THESE FORWARD-LOOKING STATEMENTS INCLUDE ALL MATTERS THAT ARE NOT HISTORICAL FACTS AND INCLUDE STATEMENTS REGARDING INTENTIONS, BELIEFS OR CURRENT EXPECTATIONS. NO ASSURANCES CAN BE GIVEN THAT THE FORWARD-LOOKING STATEMENTS IN THIS ANNOUNCEMENT WILL BE REALISED. AS A RESULT, NO UNDUE RELIANCE SHOULD BE PLACED ON THESE FORWARD-LOOKING STATEMENTS AS A PREDICTION OF ACTUAL EVENTS OR OTHERWISE.
This information is provided by RNS, the news service of the London Stock Exchange. RNS is approved by the Financial Conduct Authority to act as a Primary Information Provider in the United Kingdom. Terms and conditions relating to the use and distribution of this information may apply. For further information, please contact rns@lseg.com or visit www.rns.com.
NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, INTO OR IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA OR JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW. THIS ANNOUNCEMENT DOES NOT CONSTITUTE OR FORM AN OFFER FOR SALE OF, OR THE SOLICITATION OF AN OFFER TO BUY, THE SECURITIES REFERRED TO HEREIN IN ANY JURISDICTION, INCLUDING THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW.
PLEASE SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
01 July 2025
AI Prime & Cy S.C.A. announces pricing of an accelerated placing of shares of InPost S.A.
AI Prime & Cy S.C.A. (“AI Prime”), an Advent International company has priced an accelerated placing (the “Placing”) to institutional investors of 17.5 million ordinary shares in InPost S.A. (the “Company”), constituting c.3.5% of the Company’s existing share capital, at a price of EUR 13.25 per ordinary share.
Upon settlement of the Placing, the aggregate total ownership interest of Advent International in the Company’s issued ordinary share capital will be c.6.5%. Settlement is expected to occur on 3 July 2025.
As part of the transaction, remaining shares in the Company held by AI Prime will be subject to a 60 day lock-up period from the settlement date, subject to customary exemptions.
Barclays Bank PLC acted as Sole Global Co-ordinator and Bookrunner on the Placing.
The Company will not receive any proceeds from the Placing.
IMPORTANT NOTICE
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS FOR INFORMATION PURPOSES ONLY AND DOES NOT CONSTITUTE AN OFFER TO SELL OR THE SOLICITATION OF AN OFFER TO BUY ANY OF THESE SECURITIES IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH SUCH OFFER, SOLICITATION OR SALE WOULD BE UNLAWFUL PRIOR TO REGISTRATION OR QUALIFICATION UNDER THE SECURITIES LAWS OF ANY SUCH JURISDICTION. THE SECURITIES MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES ABSENT REGISTRATION OR AN APPLICABLE EXEMPTION FROM UNITED STATES REGISTRATION REQUIREMENTS. NO PUBLIC OFFER OF SECURITIES IS TO BE MADE IN THE UNITED STATES AND NEITHER THIS ANNOUNCEMENT NOR ANY COPY OF IT MAY BE TAKEN, TRANSMITTED OR DISTRIBUTED, DIRECTLY OR INDIRECTLY, IN OR INTO OR FROM THE UNITED STATES (INCLUDING ITS TERRITORIES AND POSSESSIONS, ANY STATE OF THE UNITED STATES AND THE DISTRICT OF COLUMBIA), CANADA, SOUTH AFRICA OR JAPAN. ANY FAILURE TO COMPLY WITH THIS RESTRICTION MAY CONSTITUTE A VIOLATION OF UNITED STATES, CANADIAN, SOUTH AFRICAN OR JAPANESE SECURITIES LAWS.
THIS ANNOUNCEMENT AND ANY OFFER OF SHARES PURSUANT TO THE PLACING (“PLACING SHARES“) IF MADE SUBSEQUENTLY ARE ONLY ADDRESSED TO AND DIRECTED AT PERSONS (1) IN THE EEA WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF REGULATION (EU) 2017/1129 (THE “PROSPECTUS REGULATION“) AND (2) IN THE UNITED KINGDOM, WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF THE PROSPECTUS REGULATION AS IT FORMS PART OF DOMESTIC LAW BY VIRTUE OF THE EUROPEAN UNION (WITHDRAWAL) ACT 2018 AND WHO HAVE PROFESSIONAL EXPERIENCE IN MATTERS RELATING TO INVESTMENTS WHO FALL WITHIN ARTICLE 19(5) OF THE FINANCIAL SERVICES AND MARKETS ACT 2000 (FINANCIAL PROMOTION) ORDER 2005 (AS AMENDED, THE “ORDER“) OR ARE HIGH NET WORTH ENTITIES FALLING WITHIN ARTICLE 49(2)(A) TO (D) OF THE ORDER OR ARE PERSONS TO WHOM AN OFFER OF THE PLACING SHARES MAY OTHERWISE BE LAWFULLY COMMUNICATED (ALL SUCH PERSONS BEING REFERRED TO AS “RELEVANT PERSONS“). PERSONS WHO ARE NOT RELEVANT PERSONS SHOULD NOT TAKE ANY ACTION ON THE BASIS OF THIS ANNOUNCEMENT AND SHOULD NOT ACT OR RELY ON IT.
THE SECURITIES REFERRED TO HEREIN WILL BE OFFERED (I) WITHIN THE UNITED STATES ONLY TO A LIMITED NUMBER OF QUALIFIED INSTITUTIONAL BUYERS AS DEFINED IN RULE 144A UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT“) PURSUANT TO AN EXEMPTION FROM, OR IN TRANSACTIONS NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT, AND (II) OUTSIDE THE UNITED STATES IN RELIANCE ON REGULATION S UNDER THE SECURITIES ACT, IN EACH CASE SUBJECT TO PREVAILING MARKET AND OTHER CONDITIONS. THERE IS NO ASSURANCE THAT THE PLACING WILL BE COMPLETED, OR IF COMPLETED, AS TO THE TERMS ON WHICH IT IS COMPLETED. THE SECURITIES REFERRED TO HEREIN HAVE NOT BEEN AND WILL NOT BE REGISTERED UNDER THE SECURITIES ACT AND MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES WITHOUT REGISTRATION THEREUNDER OR UNLESS PURSUANT TO AN AVAILABLE EXEMPTION THEREFROM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN CONSTITUTES OR FORMS PART OF AN OFFER TO SELL, OR THE SOLICITATION OF AN OFFER TO BUY, SECURITIES IN THE UNITED STATES. THERE WILL BE NO PUBLIC OFFER OF ANY SECURITIES IN THE UNITED STATES OR ANY OTHER JURISDICTION.
THIS ANNOUNCEMENT DOES NOT, AND SHALL NOT, IN ANY CIRCUMSTANCES CONSTITUTE A PUBLIC OFFERING, NOR AN OFFER TO SELL OR TO SUBSCRIBE, NOR A SOLICITATION TO OFFER TO PURCHASE OR TO SUBSCRIBE SECURITIES IN ANY JURISDICTION. THE DISTRIBUTION OF THIS ANNOUNCEMENT AND THE OFFERING OR SALE OF THE SECURITIES IN CERTAIN JURISDICTIONS MAY BE RESTRICTED BY LAW. NO ACTION HAS BEEN TAKEN BY AI PRIME, BARCLAYS BANK PLC (THE “GLOBAL CO-ORDINATOR“) OR ANY OF THEIR RESPECTIVE AFFILIATES THAT WOULD, OR WHICH IS INTENDED TO, PERMIT A PUBLIC OFFER OF THE SECURITIES IN ANY JURISDICTION OR POSSESSION OR DISTRIBUTION OF THIS ANNOUNCEMENT OR ANY OTHER OFFERING OR PUBLICITY MATERIAL RELATING TO THE SECURITIES IN ANY JURISDICTION WHERE ACTION FOR THAT PURPOSE IS REQUIRED. PERSONS INTO WHOSE POSSESSION THIS ANNOUNCEMENT COMES ARE REQUIRED BY AI PRIME AND THE GLOBAL CO-ORDINATOR TO INFORM THEMSELVES ABOUT AND TO OBSERVE ANY APPLICABLE RESTRICTIONS.
NO PROSPECTUS OR OFFERING DOCUMENT HAS BEEN OR WILL BE PREPARED IN CONNECTION WITH THE PLACING. ANY INVESTMENT DECISION IN CONNECTION WITH THE PLACING MUST BE MADE SOLELY ON THE BASIS OF PUBLICLY AVAILABLE INFORMATION RELATING TO THE COMPANY AND ITS SHARES. SUCH INFORMATION HAS NOT BEEN INDEPENDENTLY VERIFIED AND AI PRIME AND THE GLOBAL CO-ORDINATOR ARE NOT RESPONSIBLE, AND EXPRESSLY DISCLAIM ANY LIABILITY, FOR SUCH INFORMATION. THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT IS FOR BACKGROUND PURPOSES ONLY AND DOES NOT PURPORT TO BE FULL OR COMPLETE. NO RELIANCE MAY BE PLACED FOR ANY PURPOSE ON THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT OR ON ITS ACCURACY OR COMPLETENESS.
IN CONNECTION WITH THE PLACING, THE GLOBAL CO-ORDINATOR OR ANY OF ITS AFFILIATES MAY TAKE UP A PORTION OF THE PLACING SHARES AS A PRINCIPAL POSITION AND IN THAT CAPACITY MAY RETAIN, PURCHASE, SELL OR OFFER TO SELL FOR ITS OWN ACCOUNT SUCH PLACING SHARES AND OTHER SECURITIES OF THE COMPANY OR RELATED INVESTMENTS IN CONNECTION WITH THE PLACING OR OTHERWISE. ACCORDINGLY, REFERENCES TO THE PLACING SHARES BEING OFFERED, ACQUIRED, PLACED OR OTHERWISE DEALT IN SHOULD BE READ AS INCLUDING ANY OFFER TO, OR ACQUISITION, PLACING OR DEALING BY THE GLOBAL CO-ORDINATOR AND ANY OF ITS AFFILIATES ACTING AS INVESTORS FOR THEIR OWN ACCOUNTS. THE GLOBAL CO-ORDINATOR DOES NOT INTEND TO DISCLOSE THE EXTENT OF ANY SUCH INVESTMENT OR TRANSACTIONS OTHERWISE THAN IN ACCORDANCE WITH ANY LEGAL OR REGULATORY OBLIGATIONS TO DO SO.
THIS ANNOUNCEMENT DOES NOT PURPORT TO IDENTIFY OR SUGGEST THE RISKS (DIRECT OR INDIRECT) WHICH MAY BE ASSOCIATED WITH AN INVESTMENT IN THE COMPANY OR ITS SHARES.
THIS ANNOUNCEMENT DOES NOT CONSTITUTE A RECOMMENDATION CONCERNING THE PLACING. THE PRICE AND VALUE OF SECURITIES AND ANY INCOME FROM THEM CAN GO DOWN AS WELL AS UP. PAST PERFORMANCE IS NOT A GUIDE TO FUTURE PERFORMANCE. ACQUIRING PLACING SHARES TO WHICH THIS ANNOUNCEMENT RELATES MAY EXPOSE AN INVESTOR TO A SIGNIFICANT RISK OF LOSING ALL OF THE AMOUNT INVESTED. POTENTIAL INVESTORS SHOULD CONSULT A PROFESSIONAL ADVISOR AS TO THE SUITABILITY OF THE PLACING FOR THE ENTITY OR PERSON CONCERNED. THIS ANNOUNCEMENT DOES NOT REPRESENT THE ANNOUNCEMENT OF A DEFINITIVE AGREEMENT TO PROCEED WITH THE PLACING AND, ACCORDINGLY, THERE CAN BE NO CERTAINTY THAT THE PLACING WILL PROCEED. AI PRIME RESERVES THE RIGHT NOT TO PROCEED WITH THE PLACING OR TO VARY THE TERMS OF THE PLACING IN ANY WAY.
BARCLAYS BANK PLC IS AUTHORISED IN THE UNITED KINGDOM BY THE PRUDENTIAL REGULATION AUTHORITY AND REGULATED BY THE FINANCIAL CONDUCT AUTHORITY AND THE PRUDENTIAL REGULATION AUTHORITY. THE GLOBAL CO-ORDINATOR IS ACTING FOR AI PRIME AND NO-ONE ELSE IN CONNECTION WITH THE PLACING. NEITHER THE GLOBAL CO-ORDINATOR NOR ANY OF ITS AFFILIATES, NOR THEIR RESPECTIVE PARTNERS, DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS WILL REGARD ANY OTHER PERSON AS A CLIENT IN CONNECTION WITH THE PLACING AND THEY WILL NOT BE RESPONSIBLE TO ANYONE OTHER THAN AI PRIME FOR PROVIDING THE PROTECTIONS AFFORDED TO THEIR RESPECTIVE CLIENTS OR FOR PROVIDING ADVICE IN CONNECTION WITH THE PLACING DESCRIBED IN THIS ANNOUNCEMENT OR FOR ANY OTHER MATTERS REFERRED TO HEREIN.
CERTAIN FIGURES CONTAINED IN THIS ANNOUNCEMENT HAVE BEEN SUBJECT TO ROUNDING ADJUSTMENTS. ACCORDINGLY, IN CERTAIN INSTANCES, THE SUM OR PERCENTAGE CHANGE OF THE NUMBERS CONTAINED IN THIS ANNOUNCEMENT MAY NOT CONFORM EXACTLY WITH THE TOTAL FIGURE GIVEN.
THIS ANNOUNCEMENT INCLUDES STATEMENTS THAT ARE, OR MAY BE DEEMED TO BE, FORWARD-LOOKING STATEMENTS. THESE FORWARD-LOOKING STATEMENTS MAY BE IDENTIFIED BY THE USE OF FORWARD-LOOKING TERMINOLOGY, INCLUDING THE TERMS “INTENDS”, “EXPECTS”, “WILL”, OR “MAY”, OR, IN EACH CASE, THEIR NEGATIVE OR OTHER VARIATIONS OR COMPARABLE TERMINOLOGY, OR BY DISCUSSIONS OF STRATEGY, PLANS, OBJECTIVES, GOALS, FUTURE EVENTS OR INTENTIONS. THESE FORWARD-LOOKING STATEMENTS INCLUDE ALL MATTERS THAT ARE NOT HISTORICAL FACTS AND INCLUDE STATEMENTS REGARDING INTENTIONS, BELIEFS OR CURRENT EXPECTATIONS. NO ASSURANCES CAN BE GIVEN THAT THE FORWARD-LOOKING STATEMENTS IN THIS ANNOUNCEMENT WILL BE REALISED. AS A RESULT, NO UNDUE RELIANCE SHOULD BE PLACED ON THESE FORWARD-LOOKING STATEMENTS AS A PREDICTION OF ACTUAL EVENTS OR OTHERWISE.
This information is provided by RNS, the news service of the London Stock Exchange. RNS is approved by the Financial Conduct Authority to act as a Primary Information Provider in the United Kingdom. Terms and conditions relating to the use and distribution of this information may apply. For further information, please contact rns@lseg.com or visit www.rns.com.
Leading European digital signage provider ZetaDisplay has announced an exciting new partnership with ENRA Technologies, a rapidly growing South African IT and AV solutions company, to accelerate the adoption of digital signage across South Africa and the wider African and Middle Eastern markets.
This strategic collaboration will leverage ZetaDisplay’s proprietary Engage Suite, an advanced digital signage software platform, to offer a full-service digital signage solution to businesses in retail, manufacturing, finance, and insurance. Together, ENRA and ZetaDisplay will combine their expertise to create innovative, data-driven digital experiences that enhance customer engagement and operational efficiency.
Raees Mukuddem, CEO and Founder of ENRA Technologies says:
“The digital signage market in South Africa is still in its infancy, but we’ve recognised its immense potential. By partnering with ZetaDisplay, an internationally recognised leader in this space, we are bringing best-in-class full-service solutions to the market. We believe in success through collaboration—what we call ‘evoking Ubuntu’—and we’re excited to work alongside ZetaDisplay to transform the industry.”
ENRA Technologies, founded in 2008, has grown from humble beginnings into a powerhouse delivering IT-managed services, integrated AV, security, and electronics across Africa and the Middle East. With a commitment to service excellence, the company has built strong, long-term relationships with major clients such as Woolworths, University of the Western Cape, Western Cape Government as well as other Public and Private sector Enterprises.
A Level One Black Economic Empowerment (BEE) company, ENRA is deeply committed to driving economic transformation in South Africa and has been recognised as a three-time Impumelelo Award winner for business excellence.
Ola Sæverås, Chief Business Officer at ZetaDisplay comments:
“ENRA is the perfect partner for expanding into the South African market. They are incredibly well-established, working with leading brands and enterprise clients across the region. Their deep local expertise, combined with our innovative Engage Suite CMS platform, will allow us to create powerful digital signage solutions tailored to regional business needs.”
The partnership is already making waves, with ENRA actively pursuing major digital signage rollouts with a leading South African retail chain with over 750 stores and one of the country’s top universities.
At the heart of this collaboration is ZetaDisplay’s Engage Suite, a next-generation CMS designed for omnichannel content management, real-time data analytics and programmatic advertising integration. The platform will empower South African businesses to create seamless, automated and highly targeted digital signage campaigns.
This partnership signals a new era for digital signage in South Africa, bringing together European innovation and African expertise to create engaging, effective, and future-proof digital solutions.
For further information please contact:
Ola Sæverås Chief Business Officer – ZetaDisplay Group Phone: +47 41 678 234 Email: ola@zetadisplay.com
Raees Mukuddem CEO / Founder – ENRA technologies South Africa Tel: +27 72 786 1856 Email: raees@enra.co.za
ABOUTENRA Technologies
Founded in 2008 ENRA Technologies CC (“ENRA”) is a B-BBEE Level 1, South African ICT organisation headquartered in Cape Town with a satellite office in Johannesburg servicing clients throughout the country and the wider African continent. ENRA’s core business is turnkey solutions design, implementation and maintenance of IT, Audio Visual and Security systems for government and private sector entities. ENRA is deeply committed to driving economic transformation in South Africa and has been recognised as a three-time Impumelelo Award winner for business excellence. More information at: www.enra.co.za/
ABOUT ZETADISPLAY
ZetaDisplay was founded 2003 in Sweden as one of the early pioneers of digital signage software and solutions. Today ZetaDisplay is of the leading European corporations in the digital signage market and a leading force in the European and global digital signage industry.
Our proprietary software platform, digital business development and consulting services, innovative digital signage solutions, and creative concepts regularly inspire- influence and guide millions of people every day in retail environments, in restaurants, on advertising screens, in factories, on trains, on cruise ships, in stadiums, in workplaces and in all types of public spaces indoor and outdoor. ZetaDisplay is one of the largest leading European digital signage companies with direct operations in eight European countries and the US with +125,000 active installations in over 50 countries, across all major continents where we are the business partner of choice for many of the worlds most respected blue-chip brands and companies.
ZetaDisplay is based in Malmö-Sweden, has a turnover of SEK +600 million and employs approx. 250 co-workers. ZetaDisplay is owned by the investment company Hanover Investors.
Over the past 15 years there’s been an increasing demand from within and outside the higher education sector for African countries to produce more PhD graduates. For this to happen, it’s important to know what’s holding people back from pursuing or completing their doctoral degrees. The authors of a new review article did just that, with a focus on South Africa, Kenya, Ethiopia, Uganda and Nigeria. Five themes emerged from their work: PhD candidates’ sociodemographic profiles, access to funding, the availability of resources and training, experiences with PhD supervisors, and personal coping mechanisms.
The Conversation Africa spoke with the paper’s authors, Oluwatomilayo Omoya, Udeme Samuel Jacob, Olumide A. Odeyemi and Omowale A. Odeyemi, to learn more about their findings.
Why is it important for African countries to produce PhD graduates?
PhD programmes have been shown to play a crucial role in advancing research, innovation, and economic and scientific progress.
That’s because the more research capacity a country has, the more likely it will be able to address gaps in healthcare, economic barriers and food insecurity. This point has been emphasised by, among others, the World Health Organization (WHO) and the African Union.
Doctoral education builds academic expertise. This drives growth across multiple sectors, such as health, education and technology. It also fosters an environment where creative and practical solutions to local challenges can thrive.
What are some of the main obstacles PhD students faced in the countries you studied?
Our study was a scoping review. This research method allowed us to broadly survey existing studies and identify key concepts, evidence types and knowledge gaps. The review included articles from different African countries, among them South Africa, Kenya, Ethiopia, Uganda and Nigeria.
One of the biggest hurdles we identified for PhD students is a lack of resources. Many of the continent’s universities are underfunded. They struggle to offer their staff and students adequate research facilities, libraries and even internet access.
Another major challenge is the shortage of quality doctoral supervision. In many African universities, the number of qualified supervisors is far lower than the number of doctoral candidates. This imbalance means that some students receive little attention. Their progress may suffer as a result.
A PhD is, by nature, a solitary pursuit. But without the proper support, students can feel disconnected from the academic community. This sense of isolation can increase dropout rates and hinder the completion of research projects.
Supervisors are frequently overwhelmed with other responsibilities – their own research, administrative duties, or teaching large undergraduate classes. This leaves them with limited time to mentor PhD students. The students they’re tasked with supervising can end up feeling isolated.
Personal funding is also hard to come by. Scholarships are rare and, when they are available, they don’t always cover all the student’s expenses over the course of their research. Many students must work full-time jobs to support themselves while pursuing their doctorate. This can severely affect their ability to dedicate time to their studies.
Even in cases where funding is available, it’s often linked to short-term projects or grants that don’t allow students to finish their research without interruption. This leads to long delays in graduation rates, which creates a bottleneck effect: students remain stuck in the system for years, clogging the flow of new researchers entering academia.
Another challenge is that African doctoral students who do succeed may leave their home countries for better opportunities abroad. The so-called “brain drain” phenomenon has a profound effect on Africa’s ability to build a strong academic community. While many African PhD students go on to do groundbreaking research in Europe, North America or Asia, their departure means their home institutions – and countries – lose valuable knowledge and experience.
Brain drain is not just about better salaries or living conditions; it’s also about the availability of cutting-edge research opportunities. Once abroad, many students are able to access better resources and then choose to stay in environments that allow them to thrive professionally.
What role does gender play in the likelihood of completing a PhD?
Women pursuing PhDs face additional challenges that their male peers do not. We found that women PhD students frequently face gender biases, both socially and professionally, that make it harder to fulfil their academic goals.
Over the past decade, the number of women enrolling in PhD training in some countries, such as Ethiopia and South Africa, has increased.
However, women are less likely than men to complete their doctoral studies, partly because of the cultural expectations and responsibilities they bear. Female students who are married or have children must often balance managing their households and care-giving responsibilities with pursuing their studies.
In regions where family is traditionally prioritised over career aspirations, women may feel an added layer of guilt or societal pressure, which can lessen the time they have to focus on research.
Moreover, in areas where colonial or apartheid legacies still influence societal structures, Black women in particular report additional barriers. They say they feel overlooked or underestimated in academic spaces.
There has been some progress. Organisations like the Consortium for Advanced Research Training in Africa (Carta) offer programmes that support women throughout their academic journeys. However, a greater, gender-responsive approach is needed to ensure that women have access to resources, mentorship and flexible support systems that address these unique challenges.
Increasing support for women in PhD programmes isn’t just about numbers. It means institutions and the wider society must address the structural and cultural barriers that hold women back.
Are there solutions to the issues you’ve identified?
The challenges facing doctoral students in Africa are complex, but not impossible to overcome.
With the right investments and a commitment to reform, universities on the continent can grow into global centres of excellence in research and development. It’s vital for societies not to lose sight of the importance of higher education. As we’ve said, and as a large body of evidence shows, strong doctoral training programmes and investing in research and innovation to address the challenges faced by the African continent are key to ensuring that the next generation of researchers and innovators can lead the way in solving some of the world’s most pressing problems.
Governments, universities and funding organisations can collaborate by providing scholarships and research grants, creating gender equality policies, and introducing mentorship programmes or improving those that already exist.
Udeme Samuel Jacob is affiliated with The South African Research Chair: Education and Care in Childhood, Faculty of Education, University of Johannesburg, Johannesburg, South Africa.
Olumide A Odeyemi, Oluwatomilayo Omoya, and Omowale A Odeyemi do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.
Over the past 15 years there’s been an increasing demand from within and outside the higher education sector for African countries to produce more PhD graduates. For this to happen, it’s important to know what’s holding people back from pursuing or completing their doctoral degrees. The authors of a new review article did just that, with a focus on South Africa, Kenya, Ethiopia, Uganda and Nigeria. Five themes emerged from their work: PhD candidates’ sociodemographic profiles, access to funding, the availability of resources and training, experiences with PhD supervisors, and personal coping mechanisms.
The Conversation Africa spoke with the paper’s authors, Oluwatomilayo Omoya, Udeme Samuel Jacob, Olumide A. Odeyemi and Omowale A. Odeyemi, to learn more about their findings.
Why is it important for African countries to produce PhD graduates?
PhD programmes have been shown to play a crucial role in advancing research, innovation, and economic and scientific progress.
That’s because the more research capacity a country has, the more likely it will be able to address gaps in healthcare, economic barriers and food insecurity. This point has been emphasised by, among others, the World Health Organization (WHO) and the African Union.
Doctoral education builds academic expertise. This drives growth across multiple sectors, such as health, education and technology. It also fosters an environment where creative and practical solutions to local challenges can thrive.
What are some of the main obstacles PhD students faced in the countries you studied?
Our study was a scoping review. This research method allowed us to broadly survey existing studies and identify key concepts, evidence types and knowledge gaps. The review included articles from different African countries, among them South Africa, Kenya, Ethiopia, Uganda and Nigeria.
One of the biggest hurdles we identified for PhD students is a lack of resources. Many of the continent’s universities are underfunded. They struggle to offer their staff and students adequate research facilities, libraries and even internet access.
Another major challenge is the shortage of quality doctoral supervision. In many African universities, the number of qualified supervisors is far lower than the number of doctoral candidates. This imbalance means that some students receive little attention. Their progress may suffer as a result.
A PhD is, by nature, a solitary pursuit. But without the proper support, students can feel disconnected from the academic community. This sense of isolation can increase dropout rates and hinder the completion of research projects.
Supervisors are frequently overwhelmed with other responsibilities – their own research, administrative duties, or teaching large undergraduate classes. This leaves them with limited time to mentor PhD students. The students they’re tasked with supervising can end up feeling isolated.
Personal funding is also hard to come by. Scholarships are rare and, when they are available, they don’t always cover all the student’s expenses over the course of their research. Many students must work full-time jobs to support themselves while pursuing their doctorate. This can severely affect their ability to dedicate time to their studies.
Even in cases where funding is available, it’s often linked to short-term projects or grants that don’t allow students to finish their research without interruption. This leads to long delays in graduation rates, which creates a bottleneck effect: students remain stuck in the system for years, clogging the flow of new researchers entering academia.
Another challenge is that African doctoral students who do succeed may leave their home countries for better opportunities abroad. The so-called “brain drain” phenomenon has a profound effect on Africa’s ability to build a strong academic community. While many African PhD students go on to do groundbreaking research in Europe, North America or Asia, their departure means their home institutions – and countries – lose valuable knowledge and experience.
Brain drain is not just about better salaries or living conditions; it’s also about the availability of cutting-edge research opportunities. Once abroad, many students are able to access better resources and then choose to stay in environments that allow them to thrive professionally.
What role does gender play in the likelihood of completing a PhD?
Women pursuing PhDs face additional challenges that their male peers do not. We found that women PhD students frequently face gender biases, both socially and professionally, that make it harder to fulfil their academic goals.
Over the past decade, the number of women enrolling in PhD training in some countries, such as Ethiopia and South Africa, has increased.
However, women are less likely than men to complete their doctoral studies, partly because of the cultural expectations and responsibilities they bear. Female students who are married or have children must often balance managing their households and care-giving responsibilities with pursuing their studies.
In regions where family is traditionally prioritised over career aspirations, women may feel an added layer of guilt or societal pressure, which can lessen the time they have to focus on research.
Moreover, in areas where colonial or apartheid legacies still influence societal structures, Black women in particular report additional barriers. They say they feel overlooked or underestimated in academic spaces.
There has been some progress. Organisations like the Consortium for Advanced Research Training in Africa (Carta) offer programmes that support women throughout their academic journeys. However, a greater, gender-responsive approach is needed to ensure that women have access to resources, mentorship and flexible support systems that address these unique challenges.
Increasing support for women in PhD programmes isn’t just about numbers. It means institutions and the wider society must address the structural and cultural barriers that hold women back.
Are there solutions to the issues you’ve identified?
The challenges facing doctoral students in Africa are complex, but not impossible to overcome.
With the right investments and a commitment to reform, universities on the continent can grow into global centres of excellence in research and development. It’s vital for societies not to lose sight of the importance of higher education. As we’ve said, and as a large body of evidence shows, strong doctoral training programmes and investing in research and innovation to address the challenges faced by the African continent are key to ensuring that the next generation of researchers and innovators can lead the way in solving some of the world’s most pressing problems.
Governments, universities and funding organisations can collaborate by providing scholarships and research grants, creating gender equality policies, and introducing mentorship programmes or improving those that already exist.
Udeme Samuel Jacob is affiliated with The South African Research Chair: Education and Care in Childhood, Faculty of Education, University of Johannesburg, Johannesburg, South Africa.
Olumide A Odeyemi, Oluwatomilayo Omoya, and Omowale A Odeyemi do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.
Source: The Conversation – UK – By Andrew Forde, Assistant Professor – European Human Rights Law, Dublin City University
A special tribunal has been established by the international human rights organisation the Council of Europe (CoE) and the Ukrainian government to try crimes of aggression against Ukraine which could be used to hold Vladimir Putin and others to account for the February 2022 invasion and war crimes committed since.
The Ukrainian president, Volodymyr Zelensky, signed an agreement with CoE secretary general, Alain Berset, on June 25, setting up the special tribunal. Subject to it securing the necessary political backing and budget the tribunal will be established within the framework of the CoE (which is not part of the European Union.
Work on the first phase of the court could progress in 2026. In his speech to the Council of Europe parliamentary assembly in Strasbourg, Zelensky was cautious in his optimism but stressed that the agreement was “just the beginning”.
“It will take strong political and legal cooperation to make sure every Russian war criminal faces justice – including Putin,” he said. He knows, through years of hard experience as he travelled the world seeking help from Ukraine’s allies, that political support can be fleeting.
A new Nuremberg?
Inspired by ad hoc courts established after major conflicts such as the Nuremberg tribunal after the second world war or, more recently the International Criminal Tribunal for the former Yugoslavia (ICTY) in the 1990s, the Ukraine has been established with the aim of holding to account the perpetrators of the first full-scale armed conflict in Europe in the 21st century.
The prohibition against the crime of aggression is a basic principle of international law, and a key part of the UN charter.
In principle, the crime of aggression should be prosecuted by the International Criminal Court (ICC). But as Russia is not a party to the Rome Statute which underpins the court, that option was ruled out. Similarly, Russia’s veto on the UN security council meant that it would be impossible in practice to practically set up a court under the mandate of the UN – as the ICTY was in 1993.
The Ukraine special tribunal, which was developed by a Core Group, made up of states plus the EU and the Council of Europe, seeks to fill an obvious accountability gap. If the illegal invasion is left unpunished, it would set a dangerous precedent.
Such impunity would embolden Russia and inspire others with revanchist ambitions, undermining an already shaky international order. The US, which was instrumental in setting up the Core Group under the presidency of Joe Biden, withdrew in March 2025 when Donald Trump took office.
The statute of the special tribunal sets out that the court will be based on Ukrainian law and will have a strong link to the country’s legal system. Ukraine’s prosecutor-general will play a key role in the proceedings, referring evidence for further investigation by the tribunal. But it will be internationally funded with international judges and prosecutors, and strong cooperation with the International Criminal Court. It is likely to be based in the Hague – although this has yet to be confirmed.
The need for accountability for the illegal invasion of Ukraine was stressed in a resolution of the UN general assembly in February 2023 as the war headed into its second year. The resolution, which calls for “appropriate, fair and independent investigations and prosecutions at the national or international level” to “ensure justice for all victims and the prevention of future crimes” was approved by an overwhelming majority of 141 states. Any country in the world can join this core group to support its establishment.
Holding leaders accountable
Unlike previous international courts, the caseload is likely to be extremely narrow. There are likely to be dozens of charges rather than hundreds or thousands, which is perhaps reassuring in terms of managing costs.
The tribunal will focus on those “most responsible” including the so-called “troika”: the president Vladimir Putin, prime minister Mikhail Mishustin and the minister for foreign affairs Sergey Lavrov. Charges may also be levelled against the leadership of Belarus and North Korea for their role in aiding, abetting and actively participating in the war of aggression. But don’t expect Kim Jong-un or Alexander Lukashenko in the dock anytime soon.
The Court has opted for a novel approach to a longstanding customary rule by noting that heads of state are not functionally immune from prosecution. But it adds that indictments won’t be confirmed until such time as the suspect is no longer in office.
Trials can take place in absentia if the accused fails to attend and all reasonable steps taken to apprehend them have failed. But, like the ICC, the court will still rely on states to apprehend and physically transfer indicted individuals in due course. This will inevitably limit the chances of seeing any of the key individuals actually in a court, something that has also dogged the ICC.
The fact that a tribunal has now been set up is a major development in international criminal justice. But it is now in a sort of purgatory, existing and not existing at the same time. To become operational, another treaty known as an enlarged partial agreement must be signed by interested states. This will have to be ratified by many national parliaments, depending on their constitutions. This process could take years.
But simply by creating the framework for the tribunal, the Council of Europe has demonstrated its commitment to ensuring accountability. In a further development, the European Court of Human Rights delivers its long-awaited judgment in the case of Ukraine and the Netherlands v Russia on July 9.
This concerns “complaints about the conflict in eastern Ukraine involving pro-Russian separatists which began in 2014, including the downing of Malaysia Airlines flight MH17, and the Russian military operations in Ukraine since 2022”. The judgement will add further momentum to these accountability efforts.
Symbolic as it may seem, this week’s agreement creates a real opportunity for the international community to send a message that impunity for international aggression is intolerable – not just for the victims, but for all who believe in the rule of law.
Andrew Forde is affiliated with Dublin City University (Assistant Professor, European Human Rights Law). He is also, separately, affiliated with the Irish Human Rights and Equality Commission (Commissioner).
Artificial intelligence (AI) is increasing productivity and pushing the boundaries of what’s possible. It powers self-driving cars, social media feeds, fraud detection and medical diagnoses. Touted as a game changer, it is projected to add nearly US$15.7 trillion to the global economy by the end of the decade.
Africa is positioned to use this technology in several sectors. In Ghana, Kenya and South Africa, AI-led digital tools in use include drones for farm management, X-ray screening for tuberculosis diagnosis, and real-time tracking systems for packages and shipments. All these are helping to fill gaps in accessibility, efficiency and decision-making.
However, it also introduces risks. These include biased algorithms, resource and labour exploitation, and e-waste disposal. The lack of a robust regulatory framework in many parts of the continent increases these challenges, leaving vulnerable populations exposed to exploitation. Limited public awareness and infrastructure further complicate the continent’s ability to harness AI responsibly.
What are African countries doing about it?
To answer this, my research mapped out what Ghana and Rwanda had in place as AI policies and investigated how these policies were developed. I looked for shared principles and differences in approach to governance and implementation.
The research shows that AI policy development is not a neutral or technical process but a profoundly political one. Power dynamics, institutional interests and competing visions of technological futures shape AI regulation.
I conclude from my findings that AI’s potential to bring great change in Africa is undeniable. But its benefits are not automatic. Rwanda and Ghana show that effective policy-making requires balancing innovation with equity, global standards with local needs, and state oversight with public trust.
The question is not whether Africa can harness AI, but how and on whose terms.
How they did it
Rwanda’s National AI Policy emerged from consultations with local and global actors. These included the Ministry of ICT and Innovation, the Rwandan Space Agency, and NGOs like the Future Society, and the GIZ FAIR Forward. The resulting policy framework is in line with Rwanda’s goals for digital transformation, economic diversification and social development. It includes international best practices such as ethical AI, data protection, and inclusive AI adoption.
Ghana’s Ministry of Communication, Digital Technology and Innovations conducted multi-stakeholder workshops to develop a national strategy for digital transformation and innovation. Start-ups, academics, telecom companies and public-sector institutions came together and the result is Ghana’s National Artificial Intelligence Strategy 2023–2033.
Both countries have set up or plan to set up Responsible AI offices. This aligns with global best practices for ethical AI. Rwanda focuses on local capacity building and data sovereignty. This reflects the country’s post-genocide emphasis on national control and social cohesion. Similarly, Ghana’s proposed office focuses on accountability, though its structure is still under legislative review.
Ghana and Rwanda have adopted globally recognised ethical principles like privacy protection, bias mitigation and human rights safeguards. Rwanda’s policy reflects Unesco’s AI ethics recommendations and Ghana emphasises “trustworthy AI”.
Both policies frame AI as a way to reach the UN’s Sustainable Development Goals. Rwanda’s policy targets applications in healthcare, agriculture, poverty reduction and rural service delivery. Similarly, Ghana’s strategy highlights the potential to advance economic growth, environmental sustainability and inclusive digital transformation.
Key policy differences
Rwanda’s policy ties data control to national security. This is rooted in its traumatic history of identity-based violence. Ghana, by contrast, frames AI as a tool for attracting foreign investment rather than a safeguard against state fragility.
The policies also differ in how they manage foreign influence. Rwanda has a “defensive” stance towards global tech powers; Ghana’s is “accommodative”. Rwanda works with partners that allow it to follow its own policy. Ghana, on the other hand, embraces partnerships, viewing them as the start of innovation.
While Rwanda’s approach is targeted and problem-solving, Ghana’s strategy is expansive, aiming for large-scale modernisation and private-sector growth. Through state-led efforts, Rwanda focuses on using AI to solve immediate challenges such as rural healthcare access and food security. In contrast, Ghana looks at using AI more widely – in finance, transport, education and governance – to become a regional tech hub.
Constraints and solutions
The effectiveness of these AI policies is held back by broader systemic challenges. The US and China dominate in setting global standards, so local priorities get sidelined. For example, while Rwanda and Ghana advocate for ethical AI, it’s hard for them to hold multinational corporations accountable for breaches.
Energy shortages further complicate large-scale AI adoption. Training models require reliable electricity – a scarce resource in many parts of the continent.
To address these gaps, I propose the following:
Investments in digital infrastructure, education and local start-ups to reduce dependency on foreign tech giants.
African countries must shape international AI governance forums. They must ensure policies reflect continental realities, not just western or Chinese ones. This will include using collective bargaining power through the African Union to bring Africa’s development needs to the fore. It could also help with digital sovereignty issues and equitable access to AI technologies.
Finally, AI policies must embed African ethical principles. These should include communal rights and post-colonial sensitivities.
Thompson Gyedu Kwarkye does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
BIRMINGHAM, Ala., June 30, 2025 (GLOBE NEWSWIRE) — ServisFirst Bancshares, Inc. (NYSE: SFBS) is scheduled to announce earnings and operating results for the quarter ended June 30, 2025 on July 21, 2025 at 4 p.m. ET. The news release will be available at www.servisfirstbancshares.com.
ServisFirst Bancshares, Inc. will host a live audio webcast to discuss earnings and results on Monday, July 21, 2025 beginning at 5:15 p.m. ET. The audio webcast can be accessed at www.servisfirstbancshares.com. A replay of the call will be available until July 31, 2025.
AboutServisFirstBancshares,Inc.
ServisFirst Bancshares, Inc. is a bank holding company based in Birmingham, Alabama. Through its subsidiary ServisFirst Bank, ServisFirst Bancshares, Inc. provides business and personal financial services from locations in Alabama, Florida, Georgia, North and South Carolina, Tennessee, and Virginia. Through the bank, we originate commercial, consumer and other loans and accept deposits, provide electronic banking services, such as online and mobile banking, including remote deposit capture, deliver treasury and cash management services and provide correspondent banking services to other financial institutions.
ServisFirst Bancshares, Inc. files periodic reports with the U.S. Securities and Exchange Commission (SEC). Copies of its filings may be obtained through the SEC’s website at www.sec.gov or at www.servisfirstbancshares.com.
More information about ServisFirst Bancshares, Inc. may be obtained over the Internet at www.servisfirstbancshares.com or by calling (205) 949-0302.
BIRMINGHAM, Ala., June 30, 2025 (GLOBE NEWSWIRE) — ServisFirst Bancshares, Inc. (NYSE: SFBS) is scheduled to announce earnings and operating results for the quarter ended June 30, 2025 on July 21, 2025 at 4 p.m. ET. The news release will be available at www.servisfirstbancshares.com.
ServisFirst Bancshares, Inc. will host a live audio webcast to discuss earnings and results on Monday, July 21, 2025 beginning at 5:15 p.m. ET. The audio webcast can be accessed at www.servisfirstbancshares.com. A replay of the call will be available until July 31, 2025.
AboutServisFirstBancshares,Inc.
ServisFirst Bancshares, Inc. is a bank holding company based in Birmingham, Alabama. Through its subsidiary ServisFirst Bank, ServisFirst Bancshares, Inc. provides business and personal financial services from locations in Alabama, Florida, Georgia, North and South Carolina, Tennessee, and Virginia. Through the bank, we originate commercial, consumer and other loans and accept deposits, provide electronic banking services, such as online and mobile banking, including remote deposit capture, deliver treasury and cash management services and provide correspondent banking services to other financial institutions.
ServisFirst Bancshares, Inc. files periodic reports with the U.S. Securities and Exchange Commission (SEC). Copies of its filings may be obtained through the SEC’s website at www.sec.gov or at www.servisfirstbancshares.com.
More information about ServisFirst Bancshares, Inc. may be obtained over the Internet at www.servisfirstbancshares.com or by calling (205) 949-0302.
NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, INTO OR IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA OR JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW. THIS ANNOUNCEMENT DOES NOT CONSTITUTE OR FORM AN OFFER FOR SALE OF, OR THE SOLICITATION OF AN OFFER TO BUY, THE SECURITIES REFERRED TO HEREIN IN ANY JURISDICTION, INCLUDING THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW.
PLEASE SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
30 June 2025
AI Prime & Cy S.C.A. announces the launch of an accelerated placing of shares in InPost S.A.
AI Prime & Cy S.C.A. (“AI Prime”), an Advent International company, has launched an accelerated placing (the “Placing”) of c. 17.5 million ordinary shares of InPost S.A. (the “Company”) representing c. 3.5% of the Company’s existing share capital.
The Placing is addressed to certain eligible institutional investors only, with final terms to be determined through an accelerated bookbuilding process.
The books for the Placing will open with immediate effect. Pricing and allocations are expected to be announced as soon as practicable following the closing of the books.
As part of the transaction, remaining shares in the Company held by AI Prime will be subject to a 60 day lock up period from the Placing settlement date, subject to customary exemptions.
Barclays Bank PLC is acting as Sole Global Co-ordinator and Bookrunner on the Placing.
The Company will not receive any proceeds from the Placing.
IMPORTANT NOTICE
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS FOR INFORMATION PURPOSES ONLY AND DOES NOT CONSTITUTE AN OFFER TO SELL OR THE SOLICITATION OF AN OFFER TO BUY ANY OF THESE SECURITIES IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH SUCH OFFER, SOLICITATION OR SALE WOULD BE UNLAWFUL PRIOR TO REGISTRATION OR QUALIFICATION UNDER THE SECURITIES LAWS OF ANY SUCH JURISDICTION. THE SECURITIES MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES ABSENT REGISTRATION OR AN APPLICABLE EXEMPTION FROM UNITED STATES REGISTRATION REQUIREMENTS. NO PUBLIC OFFER OF SECURITIES IS TO BE MADE IN THE UNITED STATES AND NEITHER THIS ANNOUNCEMENT NOR ANY COPY OF IT MAY BE TAKEN, TRANSMITTED OR DISTRIBUTED, DIRECTLY OR INDIRECTLY, IN OR INTO OR FROM THE UNITED STATES (INCLUDING ITS TERRITORIES AND POSSESSIONS, ANY STATE OF THE UNITED STATES AND THE DISTRICT OF COLUMBIA), CANADA, SOUTH AFRICA OR JAPAN. ANY FAILURE TO COMPLY WITH THIS RESTRICTION MAY CONSTITUTE A VIOLATION OF UNITED STATES, CANADIAN, SOUTH AFRICAN OR JAPANESE SECURITIES LAWS.
THIS ANNOUNCEMENT AND ANY OFFER OF SHARES PURSUANT TO THE PLACING (“PLACING SHARES“) IF MADE SUBSEQUENTLY ARE ONLY ADDRESSED TO AND DIRECTED AT PERSONS (1) IN THE EEA WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF REGULATION (EU) 2017/1129 (THE “PROSPECTUS REGULATION“) AND (2) IN THE UNITED KINGDOM, WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF THE PROSPECTUS REGULATION AS IT FORMS PART OF DOMESTIC LAW BY VIRTUE OF THE EUROPEAN UNION (WITHDRAWAL) ACT 2018 AND WHO HAVE PROFESSIONAL EXPERIENCE IN MATTERS RELATING TO INVESTMENTS WHO FALL WITHIN ARTICLE 19(5) OF THE FINANCIAL SERVICES AND MARKETS ACT 2000 (FINANCIAL PROMOTION) ORDER 2005 (AS AMENDED, THE “ORDER“) OR ARE HIGH NET WORTH ENTITIES FALLING WITHIN ARTICLE 49(2)(A) TO (D) OF THE ORDER OR ARE PERSONS TO WHOM AN OFFER OF THE PLACING SHARES MAY OTHERWISE BE LAWFULLY COMMUNICATED (ALL SUCH PERSONS BEING REFERRED TO AS “RELEVANT PERSONS“). PERSONS WHO ARE NOT RELEVANT PERSONS SHOULD NOT TAKE ANY ACTION ON THE BASIS OF THIS ANNOUNCEMENT AND SHOULD NOT ACT OR RELY ON IT.
THE SECURITIES REFERRED TO HEREIN WILL BE OFFERED (I) WITHIN THE UNITED STATES ONLY TO A LIMITED NUMBER OF QUALIFIED INSTITUTIONAL BUYERS AS DEFINED IN RULE 144A UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT“) PURSUANT TO AN EXEMPTION FROM, OR IN TRANSACTIONS NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT, AND (II) OUTSIDE THE UNITED STATES IN RELIANCE ON REGULATION S UNDER THE SECURITIES ACT, IN EACH CASE SUBJECT TO PREVAILING MARKET AND OTHER CONDITIONS. THERE IS NO ASSURANCE THAT THE PLACING WILL BE COMPLETED, OR IF COMPLETED, AS TO THE TERMS ON WHICH IT IS COMPLETED. THE SECURITIES REFERRED TO HEREIN HAVE NOT BEEN AND WILL NOT BE REGISTERED UNDER THE SECURITIES ACT AND MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES WITHOUT REGISTRATION THEREUNDER OR UNLESS PURSUANT TO AN AVAILABLE EXEMPTION THEREFROM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN CONSTITUTES OR FORMS PART OF AN OFFER TO SELL, OR THE SOLICITATION OF AN OFFER TO BUY, SECURITIES IN THE UNITED STATES. THERE WILL BE NO PUBLIC OFFER OF ANY SECURITIES IN THE UNITED STATES OR ANY OTHER JURISDICTION.
THIS ANNOUNCEMENT DOES NOT, AND SHALL NOT, IN ANY CIRCUMSTANCES CONSTITUTE A PUBLIC OFFERING, NOR AN OFFER TO SELL OR TO SUBSCRIBE, NOR A SOLICITATION TO OFFER TO PURCHASE OR TO SUBSCRIBE SECURITIES IN ANY JURISDICTION. THE DISTRIBUTION OF THIS ANNOUNCEMENT AND THE OFFERING OR SALE OF THE SECURITIES IN CERTAIN JURISDICTIONS MAY BE RESTRICTED BY LAW. NO ACTION HAS BEEN TAKEN BY AI PRIME, BARCLAYS BANK PLC (THE “GLOBAL CO-ORDINATOR“) OR ANY OF THEIR RESPECTIVE AFFILIATES THAT WOULD, OR WHICH IS INTENDED TO, PERMIT A PUBLIC OFFER OF THE SECURITIES IN ANY JURISDICTION OR POSSESSION OR DISTRIBUTION OF THIS ANNOUNCEMENT OR ANY OTHER OFFERING OR PUBLICITY MATERIAL RELATING TO THE SECURITIES IN ANY JURISDICTION WHERE ACTION FOR THAT PURPOSE IS REQUIRED. PERSONS INTO WHOSE POSSESSION THIS ANNOUNCEMENT COMES ARE REQUIRED BY AI PRIME AND THE GLOBAL CO-ORDINATOR TO INFORM THEMSELVES ABOUT AND TO OBSERVE ANY APPLICABLE RESTRICTIONS.
NO PROSPECTUS OR OFFERING DOCUMENT HAS BEEN OR WILL BE PREPARED IN CONNECTION WITH THE PLACING. ANY INVESTMENT DECISION IN CONNECTION WITH THE PLACING MUST BE MADE SOLELY ON THE BASIS OF PUBLICLY AVAILABLE INFORMATION RELATING TO THE COMPANY AND ITS SHARES. SUCH INFORMATION HAS NOT BEEN INDEPENDENTLY VERIFIED AND AI PRIME AND THE GLOBAL CO-ORDINATOR ARE NOT RESPONSIBLE, AND EXPRESSLY DISCLAIM ANY LIABILITY, FOR SUCH INFORMATION. THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT IS FOR BACKGROUND PURPOSES ONLY AND DOES NOT PURPORT TO BE FULL OR COMPLETE. NO RELIANCE MAY BE PLACED FOR ANY PURPOSE ON THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT OR ON ITS ACCURACY OR COMPLETENESS.
IN CONNECTION WITH THE PLACING, THE GLOBAL CO-ORDINATOR OR ANY OF ITS AFFILIATES MAY TAKE UP A PORTION OF THE PLACING SHARES AS A PRINCIPAL POSITION AND IN THAT CAPACITY MAY RETAIN, PURCHASE, SELL OR OFFER TO SELL FOR ITS OWN ACCOUNT SUCH PLACING SHARES AND OTHER SECURITIES OF THE COMPANY OR RELATED INVESTMENTS IN CONNECTION WITH THE PLACING OR OTHERWISE. ACCORDINGLY, REFERENCES TO THE PLACING SHARES BEING OFFERED, ACQUIRED, PLACED OR OTHERWISE DEALT IN SHOULD BE READ AS INCLUDING ANY OFFER TO, OR ACQUISITION, PLACING OR DEALING BY THE GLOBAL CO-ORDINATOR AND ANY OF ITS AFFILIATES ACTING AS INVESTORS FOR THEIR OWN ACCOUNTS. THE GLOBAL CO-ORDINATOR DOES NOT INTEND TO DISCLOSE THE EXTENT OF ANY SUCH INVESTMENT OR TRANSACTIONS OTHERWISE THAN IN ACCORDANCE WITH ANY LEGAL OR REGULATORY OBLIGATIONS TO DO SO.
THIS ANNOUNCEMENT DOES NOT PURPORT TO IDENTIFY OR SUGGEST THE RISKS (DIRECT OR INDIRECT) WHICH MAY BE ASSOCIATED WITH AN INVESTMENT IN THE COMPANY OR ITS SHARES.
THIS ANNOUNCEMENT DOES NOT CONSTITUTE A RECOMMENDATION CONCERNING THE PLACING. THE PRICE AND VALUE OF SECURITIES AND ANY INCOME FROM THEM CAN GO DOWN AS WELL AS UP. PAST PERFORMANCE IS NOT A GUIDE TO FUTURE PERFORMANCE. ACQUIRING PLACING SHARES TO WHICH THIS ANNOUNCEMENT RELATES MAY EXPOSE AN INVESTOR TO A SIGNIFICANT RISK OF LOSING ALL OF THE AMOUNT INVESTED. POTENTIAL INVESTORS SHOULD CONSULT A PROFESSIONAL ADVISOR AS TO THE SUITABILITY OF THE PLACING FOR THE ENTITY OR PERSON CONCERNED. THIS ANNOUNCEMENT DOES NOT REPRESENT THE ANNOUNCEMENT OF A DEFINITIVE AGREEMENT TO PROCEED WITH THE PLACING AND, ACCORDINGLY, THERE CAN BE NO CERTAINTY THAT THE PLACING WILL PROCEED. AI PRIME RESERVES THE RIGHT NOT TO PROCEED WITH THE PLACING OR TO VARY THE TERMS OF THE PLACING IN ANY WAY.
BARCLAYS BANK PLC IS AUTHORISED IN THE UNITED KINGDOM BY THE PRUDENTIAL REGULATION AUTHORITY AND REGULATED BY THE FINANCIAL CONDUCT AUTHORITY AND THE PRUDENTIAL REGULATION AUTHORITY. THE GLOBAL CO-ORDINATOR IS ACTING FOR AI PRIME AND NO-ONE ELSE IN CONNECTION WITH THE PLACING. NEITHER THE GLOBAL CO-ORDINATOR NOR ANY OF ITS AFFILIATES, NOR THEIR RESPECTIVE PARTNERS, DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS WILL REGARD ANY OTHER PERSON AS A CLIENT IN CONNECTION WITH THE PLACING AND THEY WILL NOT BE RESPONSIBLE TO ANYONE OTHER THAN AI PRIME FOR PROVIDING THE PROTECTIONS AFFORDED TO THEIR RESPECTIVE CLIENTS OR FOR PROVIDING ADVICE IN CONNECTION WITH THE PLACING DESCRIBED IN THIS ANNOUNCEMENT OR FOR ANY OTHER MATTERS REFERRED TO HEREIN.
CERTAIN FIGURES CONTAINED IN THIS ANNOUNCEMENT HAVE BEEN SUBJECT TO ROUNDING ADJUSTMENTS. ACCORDINGLY, IN CERTAIN INSTANCES, THE SUM OR PERCENTAGE CHANGE OF THE NUMBERS CONTAINED IN THIS ANNOUNCEMENT MAY NOT CONFORM EXACTLY WITH THE TOTAL FIGURE GIVEN.
THIS ANNOUNCEMENT INCLUDES STATEMENTS THAT ARE, OR MAY BE DEEMED TO BE, FORWARD-LOOKING STATEMENTS. THESE FORWARD-LOOKING STATEMENTS MAY BE IDENTIFIED BY THE USE OF FORWARD-LOOKING TERMINOLOGY, INCLUDING THE TERMS “INTENDS”, “EXPECTS”, “WILL”, OR “MAY”, OR, IN EACH CASE, THEIR NEGATIVE OR OTHER VARIATIONS OR COMPARABLE TERMINOLOGY, OR BY DISCUSSIONS OF STRATEGY, PLANS, OBJECTIVES, GOALS, FUTURE EVENTS OR INTENTIONS. THESE FORWARD-LOOKING STATEMENTS INCLUDE ALL MATTERS THAT ARE NOT HISTORICAL FACTS AND INCLUDE STATEMENTS REGARDING INTENTIONS, BELIEFS OR CURRENT EXPECTATIONS. NO ASSURANCES CAN BE GIVEN THAT THE FORWARD-LOOKING STATEMENTS IN THIS ANNOUNCEMENT WILL BE REALISED. AS A RESULT, NO UNDUE RELIANCE SHOULD BE PLACED ON THESE FORWARD-LOOKING STATEMENTS AS A PREDICTION OF ACTUAL EVENTS OR OTHERWISE.
This information is provided by RNS, the news service of the London Stock Exchange. RNS is approved by the Financial Conduct Authority to act as a Primary Information Provider in the United Kingdom. Terms and conditions relating to the use and distribution of this information may apply. For further information, please contact rns@lseg.com or visit www.rns.com.
NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, INTO OR IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA OR JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW. THIS ANNOUNCEMENT DOES NOT CONSTITUTE OR FORM AN OFFER FOR SALE OF, OR THE SOLICITATION OF AN OFFER TO BUY, THE SECURITIES REFERRED TO HEREIN IN ANY JURISDICTION, INCLUDING THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH OFFERS OR SALES WOULD BE PROHIBITED BY APPLICABLE LAW.
PLEASE SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
30 June 2025
AI Prime & Cy S.C.A. announces the launch of an accelerated placing of shares in InPost S.A.
AI Prime & Cy S.C.A. (“AI Prime”), an Advent International company, has launched an accelerated placing (the “Placing”) of c. 17.5 million ordinary shares of InPost S.A. (the “Company”) representing c. 3.5% of the Company’s existing share capital.
The Placing is addressed to certain eligible institutional investors only, with final terms to be determined through an accelerated bookbuilding process.
The books for the Placing will open with immediate effect. Pricing and allocations are expected to be announced as soon as practicable following the closing of the books.
As part of the transaction, remaining shares in the Company held by AI Prime will be subject to a 60 day lock up period from the Placing settlement date, subject to customary exemptions.
Barclays Bank PLC is acting as Sole Global Co-ordinator and Bookrunner on the Placing.
The Company will not receive any proceeds from the Placing.
IMPORTANT NOTICE
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS FOR INFORMATION PURPOSES ONLY AND DOES NOT CONSTITUTE AN OFFER TO SELL OR THE SOLICITATION OF AN OFFER TO BUY ANY OF THESE SECURITIES IN THE UNITED STATES, CANADA, AUSTRALIA, SOUTH AFRICA, JAPAN OR ANY OTHER JURISDICTION IN WHICH SUCH OFFER, SOLICITATION OR SALE WOULD BE UNLAWFUL PRIOR TO REGISTRATION OR QUALIFICATION UNDER THE SECURITIES LAWS OF ANY SUCH JURISDICTION. THE SECURITIES MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES ABSENT REGISTRATION OR AN APPLICABLE EXEMPTION FROM UNITED STATES REGISTRATION REQUIREMENTS. NO PUBLIC OFFER OF SECURITIES IS TO BE MADE IN THE UNITED STATES AND NEITHER THIS ANNOUNCEMENT NOR ANY COPY OF IT MAY BE TAKEN, TRANSMITTED OR DISTRIBUTED, DIRECTLY OR INDIRECTLY, IN OR INTO OR FROM THE UNITED STATES (INCLUDING ITS TERRITORIES AND POSSESSIONS, ANY STATE OF THE UNITED STATES AND THE DISTRICT OF COLUMBIA), CANADA, SOUTH AFRICA OR JAPAN. ANY FAILURE TO COMPLY WITH THIS RESTRICTION MAY CONSTITUTE A VIOLATION OF UNITED STATES, CANADIAN, SOUTH AFRICAN OR JAPANESE SECURITIES LAWS.
THIS ANNOUNCEMENT AND ANY OFFER OF SHARES PURSUANT TO THE PLACING (“PLACING SHARES“) IF MADE SUBSEQUENTLY ARE ONLY ADDRESSED TO AND DIRECTED AT PERSONS (1) IN THE EEA WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF REGULATION (EU) 2017/1129 (THE “PROSPECTUS REGULATION“) AND (2) IN THE UNITED KINGDOM, WHO ARE QUALIFIED INVESTORS WITHIN THE MEANING OF THE PROSPECTUS REGULATION AS IT FORMS PART OF DOMESTIC LAW BY VIRTUE OF THE EUROPEAN UNION (WITHDRAWAL) ACT 2018 AND WHO HAVE PROFESSIONAL EXPERIENCE IN MATTERS RELATING TO INVESTMENTS WHO FALL WITHIN ARTICLE 19(5) OF THE FINANCIAL SERVICES AND MARKETS ACT 2000 (FINANCIAL PROMOTION) ORDER 2005 (AS AMENDED, THE “ORDER“) OR ARE HIGH NET WORTH ENTITIES FALLING WITHIN ARTICLE 49(2)(A) TO (D) OF THE ORDER OR ARE PERSONS TO WHOM AN OFFER OF THE PLACING SHARES MAY OTHERWISE BE LAWFULLY COMMUNICATED (ALL SUCH PERSONS BEING REFERRED TO AS “RELEVANT PERSONS“). PERSONS WHO ARE NOT RELEVANT PERSONS SHOULD NOT TAKE ANY ACTION ON THE BASIS OF THIS ANNOUNCEMENT AND SHOULD NOT ACT OR RELY ON IT.
THE SECURITIES REFERRED TO HEREIN WILL BE OFFERED (I) WITHIN THE UNITED STATES ONLY TO A LIMITED NUMBER OF QUALIFIED INSTITUTIONAL BUYERS AS DEFINED IN RULE 144A UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT“) PURSUANT TO AN EXEMPTION FROM, OR IN TRANSACTIONS NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT, AND (II) OUTSIDE THE UNITED STATES IN RELIANCE ON REGULATION S UNDER THE SECURITIES ACT, IN EACH CASE SUBJECT TO PREVAILING MARKET AND OTHER CONDITIONS. THERE IS NO ASSURANCE THAT THE PLACING WILL BE COMPLETED, OR IF COMPLETED, AS TO THE TERMS ON WHICH IT IS COMPLETED. THE SECURITIES REFERRED TO HEREIN HAVE NOT BEEN AND WILL NOT BE REGISTERED UNDER THE SECURITIES ACT AND MAY NOT BE OFFERED OR SOLD IN THE UNITED STATES WITHOUT REGISTRATION THEREUNDER OR UNLESS PURSUANT TO AN AVAILABLE EXEMPTION THEREFROM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN CONSTITUTES OR FORMS PART OF AN OFFER TO SELL, OR THE SOLICITATION OF AN OFFER TO BUY, SECURITIES IN THE UNITED STATES. THERE WILL BE NO PUBLIC OFFER OF ANY SECURITIES IN THE UNITED STATES OR ANY OTHER JURISDICTION.
THIS ANNOUNCEMENT DOES NOT, AND SHALL NOT, IN ANY CIRCUMSTANCES CONSTITUTE A PUBLIC OFFERING, NOR AN OFFER TO SELL OR TO SUBSCRIBE, NOR A SOLICITATION TO OFFER TO PURCHASE OR TO SUBSCRIBE SECURITIES IN ANY JURISDICTION. THE DISTRIBUTION OF THIS ANNOUNCEMENT AND THE OFFERING OR SALE OF THE SECURITIES IN CERTAIN JURISDICTIONS MAY BE RESTRICTED BY LAW. NO ACTION HAS BEEN TAKEN BY AI PRIME, BARCLAYS BANK PLC (THE “GLOBAL CO-ORDINATOR“) OR ANY OF THEIR RESPECTIVE AFFILIATES THAT WOULD, OR WHICH IS INTENDED TO, PERMIT A PUBLIC OFFER OF THE SECURITIES IN ANY JURISDICTION OR POSSESSION OR DISTRIBUTION OF THIS ANNOUNCEMENT OR ANY OTHER OFFERING OR PUBLICITY MATERIAL RELATING TO THE SECURITIES IN ANY JURISDICTION WHERE ACTION FOR THAT PURPOSE IS REQUIRED. PERSONS INTO WHOSE POSSESSION THIS ANNOUNCEMENT COMES ARE REQUIRED BY AI PRIME AND THE GLOBAL CO-ORDINATOR TO INFORM THEMSELVES ABOUT AND TO OBSERVE ANY APPLICABLE RESTRICTIONS.
NO PROSPECTUS OR OFFERING DOCUMENT HAS BEEN OR WILL BE PREPARED IN CONNECTION WITH THE PLACING. ANY INVESTMENT DECISION IN CONNECTION WITH THE PLACING MUST BE MADE SOLELY ON THE BASIS OF PUBLICLY AVAILABLE INFORMATION RELATING TO THE COMPANY AND ITS SHARES. SUCH INFORMATION HAS NOT BEEN INDEPENDENTLY VERIFIED AND AI PRIME AND THE GLOBAL CO-ORDINATOR ARE NOT RESPONSIBLE, AND EXPRESSLY DISCLAIM ANY LIABILITY, FOR SUCH INFORMATION. THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT IS FOR BACKGROUND PURPOSES ONLY AND DOES NOT PURPORT TO BE FULL OR COMPLETE. NO RELIANCE MAY BE PLACED FOR ANY PURPOSE ON THE INFORMATION CONTAINED IN THIS ANNOUNCEMENT OR ON ITS ACCURACY OR COMPLETENESS.
IN CONNECTION WITH THE PLACING, THE GLOBAL CO-ORDINATOR OR ANY OF ITS AFFILIATES MAY TAKE UP A PORTION OF THE PLACING SHARES AS A PRINCIPAL POSITION AND IN THAT CAPACITY MAY RETAIN, PURCHASE, SELL OR OFFER TO SELL FOR ITS OWN ACCOUNT SUCH PLACING SHARES AND OTHER SECURITIES OF THE COMPANY OR RELATED INVESTMENTS IN CONNECTION WITH THE PLACING OR OTHERWISE. ACCORDINGLY, REFERENCES TO THE PLACING SHARES BEING OFFERED, ACQUIRED, PLACED OR OTHERWISE DEALT IN SHOULD BE READ AS INCLUDING ANY OFFER TO, OR ACQUISITION, PLACING OR DEALING BY THE GLOBAL CO-ORDINATOR AND ANY OF ITS AFFILIATES ACTING AS INVESTORS FOR THEIR OWN ACCOUNTS. THE GLOBAL CO-ORDINATOR DOES NOT INTEND TO DISCLOSE THE EXTENT OF ANY SUCH INVESTMENT OR TRANSACTIONS OTHERWISE THAN IN ACCORDANCE WITH ANY LEGAL OR REGULATORY OBLIGATIONS TO DO SO.
THIS ANNOUNCEMENT DOES NOT PURPORT TO IDENTIFY OR SUGGEST THE RISKS (DIRECT OR INDIRECT) WHICH MAY BE ASSOCIATED WITH AN INVESTMENT IN THE COMPANY OR ITS SHARES.
THIS ANNOUNCEMENT DOES NOT CONSTITUTE A RECOMMENDATION CONCERNING THE PLACING. THE PRICE AND VALUE OF SECURITIES AND ANY INCOME FROM THEM CAN GO DOWN AS WELL AS UP. PAST PERFORMANCE IS NOT A GUIDE TO FUTURE PERFORMANCE. ACQUIRING PLACING SHARES TO WHICH THIS ANNOUNCEMENT RELATES MAY EXPOSE AN INVESTOR TO A SIGNIFICANT RISK OF LOSING ALL OF THE AMOUNT INVESTED. POTENTIAL INVESTORS SHOULD CONSULT A PROFESSIONAL ADVISOR AS TO THE SUITABILITY OF THE PLACING FOR THE ENTITY OR PERSON CONCERNED. THIS ANNOUNCEMENT DOES NOT REPRESENT THE ANNOUNCEMENT OF A DEFINITIVE AGREEMENT TO PROCEED WITH THE PLACING AND, ACCORDINGLY, THERE CAN BE NO CERTAINTY THAT THE PLACING WILL PROCEED. AI PRIME RESERVES THE RIGHT NOT TO PROCEED WITH THE PLACING OR TO VARY THE TERMS OF THE PLACING IN ANY WAY.
BARCLAYS BANK PLC IS AUTHORISED IN THE UNITED KINGDOM BY THE PRUDENTIAL REGULATION AUTHORITY AND REGULATED BY THE FINANCIAL CONDUCT AUTHORITY AND THE PRUDENTIAL REGULATION AUTHORITY. THE GLOBAL CO-ORDINATOR IS ACTING FOR AI PRIME AND NO-ONE ELSE IN CONNECTION WITH THE PLACING. NEITHER THE GLOBAL CO-ORDINATOR NOR ANY OF ITS AFFILIATES, NOR THEIR RESPECTIVE PARTNERS, DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS WILL REGARD ANY OTHER PERSON AS A CLIENT IN CONNECTION WITH THE PLACING AND THEY WILL NOT BE RESPONSIBLE TO ANYONE OTHER THAN AI PRIME FOR PROVIDING THE PROTECTIONS AFFORDED TO THEIR RESPECTIVE CLIENTS OR FOR PROVIDING ADVICE IN CONNECTION WITH THE PLACING DESCRIBED IN THIS ANNOUNCEMENT OR FOR ANY OTHER MATTERS REFERRED TO HEREIN.
CERTAIN FIGURES CONTAINED IN THIS ANNOUNCEMENT HAVE BEEN SUBJECT TO ROUNDING ADJUSTMENTS. ACCORDINGLY, IN CERTAIN INSTANCES, THE SUM OR PERCENTAGE CHANGE OF THE NUMBERS CONTAINED IN THIS ANNOUNCEMENT MAY NOT CONFORM EXACTLY WITH THE TOTAL FIGURE GIVEN.
THIS ANNOUNCEMENT INCLUDES STATEMENTS THAT ARE, OR MAY BE DEEMED TO BE, FORWARD-LOOKING STATEMENTS. THESE FORWARD-LOOKING STATEMENTS MAY BE IDENTIFIED BY THE USE OF FORWARD-LOOKING TERMINOLOGY, INCLUDING THE TERMS “INTENDS”, “EXPECTS”, “WILL”, OR “MAY”, OR, IN EACH CASE, THEIR NEGATIVE OR OTHER VARIATIONS OR COMPARABLE TERMINOLOGY, OR BY DISCUSSIONS OF STRATEGY, PLANS, OBJECTIVES, GOALS, FUTURE EVENTS OR INTENTIONS. THESE FORWARD-LOOKING STATEMENTS INCLUDE ALL MATTERS THAT ARE NOT HISTORICAL FACTS AND INCLUDE STATEMENTS REGARDING INTENTIONS, BELIEFS OR CURRENT EXPECTATIONS. NO ASSURANCES CAN BE GIVEN THAT THE FORWARD-LOOKING STATEMENTS IN THIS ANNOUNCEMENT WILL BE REALISED. AS A RESULT, NO UNDUE RELIANCE SHOULD BE PLACED ON THESE FORWARD-LOOKING STATEMENTS AS A PREDICTION OF ACTUAL EVENTS OR OTHERWISE.
This information is provided by RNS, the news service of the London Stock Exchange. RNS is approved by the Financial Conduct Authority to act as a Primary Information Provider in the United Kingdom. Terms and conditions relating to the use and distribution of this information may apply. For further information, please contact rns@lseg.com or visit www.rns.com.
Querido Pedro Sánchez, Presidente del Gobierno de España quiero agradecerte y agradecer al Gobierno y al pueblo de España por la magnífica organización de esta Conferencia y por la extraordinaria hospitalidad que estamos recibiendo.
España esun pilar del multilateralismo, un socio firme de las Naciones Unidas y un defensor del desarrollo – como demuestra, una vez más, al acoger esta importante conferencia. España es también una voz líder mundial por la paz – y comprende los profundos vínculos entre el desarrollo y la paz.
At a time of profound global turmoil, we must keep working for peace, for peace in the Middle East.
For an immediate ceasefire in Gaza, the immediate release of all hostages, and unimpeded humanitarian access as a first step to achieve the two-State solution.
For the ceasefire between Iran and Israel to hold.
For a just and lasting peace in Ukraine based on the UN Charter, international law and UN resolutions.
For an end to the horror and bloodshed in Sudan.
We know that sustainable peace requires sustainable development.
Ladies and gentlemen of the media.
As I said in opening the Conference this morning, development is not just about numbers on a page.
It’s about food, health care and education.
It’s about jobs and social protection.
It’s about infrastructure like water systems, internet access and climate-resilient buildings.
It’s about providing equal opportunity for girls and women which moves all societies ahead.
It’s about easing human suffering, and driving progress across every community, large and small.
Development is about people.
And we have collectively made great strides in development in recent decades.
But progress doesn’t happen on its own.
It takes support and investment.
As we meet, the world is falling behind in its commitments to advance the Sustainable Development Goals.
Achieving them will take an investment of more than $4 trillion a year.
And meanwhile, global growth is slowing, trade barriers are rising, and aid budgets are falling.
Developing countries are drowning in debt service payments, which have skyrocketed to $1.4 trillion every year.
And the great enabler of development — international cooperation — is being chipped away by geopolitical mistrust and division.
Now, this Conference is about rebuilding that trust with concrete commitments.
With the adoption of the Sevilla Commitment document, countries are proving their dedication to getting the engine of development revving again:
Through new domestic and global commitments that can channel public and private finance to the areas of greatest need…
By overhauling the world’s approach to debt to make borrowing work in service of sustainable development…
And by reforming the global financial architecture to reflect today’s realities and the urgent needs of developing countries, that must have a much stronger voice and participation in the institutions of this financial architecture.
The Sevilla Platform of Action being launched later today will help us move from words to action.
It contains dozens of new practical initiatives to accelerate funding for development around the world.
This includes the commitment to establish a borrowers forum for countries to learn from one another and coordinate their approaches in debt management and restructuring.
This is one of 11 immediately actionable proposals to help resolve the debt crisis, backed by my group of experts on debt that will be publishing their report.
I look forward to working closely with Member States — including the G20 — to bring this forum to life. Por encima de todo, Sevilla va de soluciones. Y de encontrar esas soluciones en un momento de dificultades y división para la familia humana. Espero que nuestros esfuerzos colectivos aquí en Sevilla puedan inspirar y motivar a los países del mundo a trabajar unidos para resolver otros desafíos globales.
Y una vez más, quiero agradecer al Presidente del Gobierno y al pueblo español por dar la bienvenida al mundo aquí enSevilla. Muchas gracias.
**** [all-English]
Prime Minister Sánchez, my thanks to you and the government and people of Spain for your tremendous hospitality.
Dear Pedro Sánchez, President of the Government of Spain, I would like to thank you and the Government and people of Spain for the magnificent organization of this Conference and for the extraordinary hospitality we are receiving.
Spain is a pillar of multilateralism, a steadfast partner of the United Nations, and a champion of development as we see once again in your hosting of this major conference.
Spain is also a leading global voice for peace — and understands the deep linkages between development and peace.
At a time of profound global turmoil, we must keep working for peace, for peace in the Middle East.
For an immediate ceasefire in Gaza, the immediate release of all hostages, and unimpeded humanitarian access as a first step to achieve the two-State solution.
For the ceasefire between Iran and Israel to hold.
For a just and lasting peace in Ukraine based on the UN Charter, international law and UN resolutions.
For an end to the horror and bloodshed in Sudan.
We know that sustainable peace requires sustainable development.
Ladies and gentlemen of the media.
As I said in opening the Conference this morning, development is not just about numbers on a page.
It’s about food, health care and education.
It’s about jobs and social protection.
It’s about infrastructure like water systems, internet access and climate-resilient buildings.
It’s about providing equal opportunity for girls and women which moves all societies ahead.
It’s about easing human suffering, and driving progress across every community, large and small.
Development is about people.
And we have collectively made great strides in development in recent decades.
But progress doesn’t happen on its own.
It takes support and investment.
As we meet, the world is falling behind in its commitments to advance the Sustainable Development Goals.
Achieving them will take an investment of more than $4 trillion a year.
Meanwhile, global growth is slowing, trade barriers are rising, and aid budgets are falling.
Developing countries are drowning in debt service payments, which have skyrocketed to $1.4 trillion every year.
And the great enabler of development — international cooperation — is being chipped away by geopolitical mistrust and division.
This Conference is about rebuilding that trust with concrete commitments.
With the adoption of the Sevilla Commitment document, countries are proving their dedication to getting the engine of development revving again:
Through new domestic and global commitments that can channel public and private finance to the areas of greatest need…
By overhauling the world’s approach to debt to make borrowing work in service of sustainable development…
And by reforming the global financial architecture to reflect today’s realities and the urgent needs of developing countries, that must have a much stronger voice and participation in the institutions of this financial architecture.
The Sevilla Platform of Action being launched later today will help us move from words to action.
It contains dozens of new practical initiatives to accelerate funding for development around the world.
This includes the commitment to establish a borrowers forum for countries to learn from one another and coordinate their approaches in debt management and restructuring.
This is one of 11 immediately actionable proposals to help resolve the debt crisis, backed by my group of experts on debt that will be publishing their report.
I look forward to working closely with Member States — including the G20 — to bring this forum to life.
Above all, Sevilla is about solutions.
And finding these solutions at a divided and difficult moment for the human family.
It is my hope that our collective efforts here in Sevilla can inspire and motivate the countries of the world to work as one to solve other global challenges.
Once again, I’d like to thank Prime Minister Sánchez and the people of Spain for welcoming the world to Sevilla.
Thank you.
***** [all-Spanish]
Querido Pedro Sánchez, Presidente del Gobierno de España quiero agradecerte y agradecer al Gobierno y al pueblo de España por la magnífica organización de esta Conferencia y por la extraordinaria hospitalidad que estamos recibiendo.
España es un pilar del multilateralismo, un socio firme de las Naciones Unidas y un defensor del desarrollo – como lo demuestra, una vez más, al acoger esta importante conferencia.
España es también una voz líder mundial por la paz – y comprende los profundos vínculos entre el desarrollo y la paz.
En estos momentos de profunda agitación mundial, debemos seguir trabajando por la paz, por la paz en Oriente Medio.
Por un alto el fuego inmediato en Gaza, la liberación inmediata de todos los rehenes y un acceso humanitario sin trabas – como primer paso para lograr la solución de dos Estados.
Por el mantenimiento del alto el fuego entre Irán e Israel.
Por una paz justa y duradera en Ucrania, basada en la Carta de las Naciones Unidas, el derecho internacional y las resoluciones de la ONU.
Por el fin del horror y el derramamiento de sangre en Sudán.
Sabemos que una paz sostenible requiere un desarrollo sostenible.
Señoras y señores de los medios,
Como he dicho esta mañana al inaugurar la Conferencia, el desarrollo no es solo números en un papel.
El desarrollo tiene que ver con la alimentación, la atención sanitaria y la educación.
Con los empleos y la protección social.
Con las infraestructuras, como los sistemas de abastecimiento de agua, el acceso a Internet y los edificios resistentes al clima.
Se trata de ofrecer igualdad de oportunidades a las niñas y las mujeres, que tan a menudo son las primeras a quienes se deja atrás.
Se trata de aliviar el sufrimiento humano e impulsar el progreso en todas las comunidades, tanto grandes como pequeñas.
El desarrollo se trata de las personas.
Y colectivamente hemos hecho grandes progresos en materia de desarrollo en las últimas décadas.
Pero los progresos no se producen por sí solos.
Se necesita apoyo e inversión.
Mientras nos reunimos, el mundo se está quedando a la zaga en sus compromisos de impulsar los Objetivos de Desarrollo Sostenible.
Para alcanzarlos, hará falta una inversión de más de 4 billones de dólares al año.
Y mientras tanto, el crecimiento mundial se ralentiza, las barreras comerciales aumentan, y disminuyen los presupuestos para ayuda.
Los países en desarrollo están ahogados por los pagos de servicio de la deuda, que se han disparado hasta los 1,4 billones de dólares anuales.
Y la desconfianza y la división geopolíticas están minando el gran motor del desarrollo, que es la cooperación internacional.
Esta Conferencia trata de reconstruir esa confianza con compromisos concretos.
Con la adopción del documento del Compromiso de Sevilla, los países están demostrando que quieren volver a acelerar el motor del desarrollo:
Con nuevos compromisos nacionales y globales que dirijan la financiación pública y privada a las esferas donde es más necesaria…
Revisando el enfoque global de la deuda para hacer que el endeudamiento esté al servicio del desarrollo sostenible…
Y reformando la arquitectura financiera mundial para que refleje las realidades actuales y las necesidades urgentes de los países en desarrollo que deben tener una voz y una participación mucho más fuertes en las instituciones de esta arquitectura financiera.
La Plataforma de Acción de Sevilla, que se pondrá en marcha hoy, nos ayudará a pasar de las palabras a los hechos.
Contiene docenas de nuevas iniciativas prácticas para acelerar la financiación del desarrollo en todo el mundo.
Este incluye el compromiso de establecer un foro de prestatarios para que los países aprendan unos de otros y coordinen sus planteamientos en la gestión de la deuda y la reestructuración.
Esta es una de las 11 propuestas de acción inmediata para ayudar a resolver la crisis de la deuda, respaldadas por mi grupo de expertos en deuda que publicará su informe.
Espero trabajar en estrecha colaboración con los Estados miembros -incluido el G20 – para dar vida a este foro.
Por encima de todo, Sevilla va de soluciones.
Y de encontrar esas soluciones en un momento de dificultades y división para la familia humana.
Espero que nuestros esfuerzos colectivos aquí en Sevilla puedan inspirar y motivar a los países del mundo a trabajar unidos para resolver otros desafíos globales.
Y una vez más, quiero agradecer al Presidente del Gobierno y al pueblo español por dar la bienvenida al mundo aquí en Sevilla.
BOSTON, June 30, 2025 (GLOBE NEWSWIRE) — IP Fabric, the Automated Infrastructure Assurance Platform, today announced new resources to operationalize compliance with leading security frameworks, including NIST and ISO 27001, and regulatory standards, including PCI-DSS, HIPAA, DORA and NIS2. These complement IP Fabric’s core automated assurance capabilities, which provide continuous validation of business intent so that organizations can implement automation, AIOps and other strategic projects with confidence.
With ransomware attacks surging 84% over the past year, and global regulatory frameworks growing more complex by the day, today’s enterprises face a stark reality: stay continuously compliant or risk operational disruption, multi-million-dollar fines and the loss of board and stakeholder trust.
With today’s patchwork of infrastructure tools, up to 20% of the infrastructure is left unmonitored and unmanaged at any given time — resulting in gaps in security, outages and incomplete evidence of compliance. IP Fabric helps enterprises avoid these risks by expanding visibility to all infrastructure devices, connections and configurations, and embedding continuous validation into strategic initiatives like infrastructure automation and AIOps. Teams can also automatically generate end-to-end snapshots as on-demand evidence to prove that all security and compliance policies are aligned with business intent, especially as organizations scale.
“Regular network security audits are essential in dynamic, hybrid environments, but nearly half of organizations fail to complete them,” said Pavel Bykov, co-founder and CEO of IP Fabric. “Security and regulatory compliance requires continuous governance from day one. IP Fabric helps teams meet compliance requirements while keeping infrastructure resilient, available and secure as they innovate.”
Key Features of IP Fabric Security & Regulatory Controls:
NIST 2.0: IP Fabric automatically detects drift in firewall, segmentation and other security policies before submitting ITSM ticketing, and generates timestamped compliance reports in a clean, user-friendly interface.
ISO 27001: IP Fabric builds a full inventory of devices, connections and configurations across environments, flags outdated hardware and simulates end-to-end pathways to ensure that Zero Trust security controls are behaving as intended.
HIPAA: IP Fabric surfaces all infrastructure devices and runs end-to-end snapshots to analyze ePHI in transmission and prove that encrypted paths (e.g. IPSec tunnels) are protected.
PCI-DSS: IP Fabric inventories all Cardholder Data Environment (CDE) system components, surfaces misconfigurations and firewall gaps and automates infrastructure snapshots to track and prove compliance.
DORA: IP Fabric maps Information and Communication Technology (ICT) assets and dependencies, flags outdated tech, cross-references CVEs and creates timestamped snapshots to support audit and recovery efforts.
NIS 2: IP Fabric discovers all devices and configurations across hybrid environments, identifies End-of-Life (EoL) devices and runs custom and built-in intent checks to ensure aherence with Zero Trust architecture.
To learn how IP Fabric helps organizations meet specific security frameworks and regulatory standards, visit the interactive microsite and download the e-Book.
About IP Fabric IP Fabric is the industry’s leading automated infrastructure assurance platform, offering a continuously validated view of cloud, network and security infrastructure to improve stability, security and spend. Within minutes, the platform creates a unified view of devices, state, configurations and interdependencies, normalizing multi-vendor data and revealing operational truth through automated intent checks. By uncovering risks and providing actionable insights, IP Fabric empowers enterprises to accelerate IT and business transformation while reducing costs. Trusted by industry leaders like Red Hat, Major League Baseball and Air France, IP Fabric delivers the foundation for a secure and modern infrastructure.
BOSTON, June 30, 2025 (GLOBE NEWSWIRE) — IP Fabric, the Automated Infrastructure Assurance Platform, today announced new resources to operationalize compliance with leading security frameworks, including NIST and ISO 27001, and regulatory standards, including PCI-DSS, HIPAA, DORA and NIS2. These complement IP Fabric’s core automated assurance capabilities, which provide continuous validation of business intent so that organizations can implement automation, AIOps and other strategic projects with confidence.
With ransomware attacks surging 84% over the past year, and global regulatory frameworks growing more complex by the day, today’s enterprises face a stark reality: stay continuously compliant or risk operational disruption, multi-million-dollar fines and the loss of board and stakeholder trust.
With today’s patchwork of infrastructure tools, up to 20% of the infrastructure is left unmonitored and unmanaged at any given time — resulting in gaps in security, outages and incomplete evidence of compliance. IP Fabric helps enterprises avoid these risks by expanding visibility to all infrastructure devices, connections and configurations, and embedding continuous validation into strategic initiatives like infrastructure automation and AIOps. Teams can also automatically generate end-to-end snapshots as on-demand evidence to prove that all security and compliance policies are aligned with business intent, especially as organizations scale.
“Regular network security audits are essential in dynamic, hybrid environments, but nearly half of organizations fail to complete them,” said Pavel Bykov, co-founder and CEO of IP Fabric. “Security and regulatory compliance requires continuous governance from day one. IP Fabric helps teams meet compliance requirements while keeping infrastructure resilient, available and secure as they innovate.”
Key Features of IP Fabric Security & Regulatory Controls:
NIST 2.0: IP Fabric automatically detects drift in firewall, segmentation and other security policies before submitting ITSM ticketing, and generates timestamped compliance reports in a clean, user-friendly interface.
ISO 27001: IP Fabric builds a full inventory of devices, connections and configurations across environments, flags outdated hardware and simulates end-to-end pathways to ensure that Zero Trust security controls are behaving as intended.
HIPAA: IP Fabric surfaces all infrastructure devices and runs end-to-end snapshots to analyze ePHI in transmission and prove that encrypted paths (e.g. IPSec tunnels) are protected.
PCI-DSS: IP Fabric inventories all Cardholder Data Environment (CDE) system components, surfaces misconfigurations and firewall gaps and automates infrastructure snapshots to track and prove compliance.
DORA: IP Fabric maps Information and Communication Technology (ICT) assets and dependencies, flags outdated tech, cross-references CVEs and creates timestamped snapshots to support audit and recovery efforts.
NIS 2: IP Fabric discovers all devices and configurations across hybrid environments, identifies End-of-Life (EoL) devices and runs custom and built-in intent checks to ensure aherence with Zero Trust architecture.
To learn how IP Fabric helps organizations meet specific security frameworks and regulatory standards, visit the interactive microsite and download the e-Book.
About IP Fabric IP Fabric is the industry’s leading automated infrastructure assurance platform, offering a continuously validated view of cloud, network and security infrastructure to improve stability, security and spend. Within minutes, the platform creates a unified view of devices, state, configurations and interdependencies, normalizing multi-vendor data and revealing operational truth through automated intent checks. By uncovering risks and providing actionable insights, IP Fabric empowers enterprises to accelerate IT and business transformation while reducing costs. Trusted by industry leaders like Red Hat, Major League Baseball and Air France, IP Fabric delivers the foundation for a secure and modern infrastructure.