Category: Middle East

  • MIL-OSI United Kingdom: British High Commissioner to Trinidad and Tobago: Jon Dean

    Source: United Kingdom – Government Statements

    Jon Dean has been appointed British High Commissioner to the Republic of Trinidad and Tobago, in succession to Harriet Cross.

    Mr Jon Dean

    Mr Jon Dean has been appointed British High Commissioner to the Republic of Trinidad and Tobago, in succession to Ms Harriet Cross, who will be transferring to another Diplomatic Service appointment.

    Mr Dean will take up his appointment during December 2024.

    Curriculum vitae

    Full name: Jon Mark Dean

    2022 to 2024 N’Djamena, His Majesty’s Ambassador
    2020 to 2022 New York, Counsellor Internal
    2018 to 2020 United Nations Office of Counter-Terrorism, Secondment, New York
    2015 to 2018 FCO, Head of Iraq Team, Middle East and North Africa Directorate
    2013 to 2015  Juba, Deputy Head of Mission and Consul
    2013 Yaoundé, Deputy High Commissioner and Consul (3 months)
    2012 New York, UK Permanent Mission to the United Nations, Second Secretary Political (3 months)
    2009 to 2012 Brasília, Second Secretary Political
    2007 to 2008 FCO, Desk Officer, Kosovo
    2005 to 2007 FCO, Desk Officer, EU Environment Policy
    2005 Joined FCO

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom

  • MIL-OSI Video: UAE: The Next Decade

    Source: World Economic Forum (video statements)

    Rapid technological advancements are driving disruption in everything from employment, skills and education to international trade and industry. Meanwhile a fragmented geopolitical and geo-economic landscape has sidelined traditional models of international cooperation.

    Amid these powerful forces, how is the United Arab Emirates navigating these headwinds to define the next decade?

    https://www.youtube.com/watch?v=QM5d7Z0xja8

    MIL OSI Video

  • MIL-OSI Security: The Challenge Behind the Coin: HM2 Huitt’s journey through service

    Source: United States Navy (Medical)

    Hospital Corpsman 2nd Class Brylea Huitt, a proud native of Dallas, Texas, has carved out a distinguished path in the Navy, blending her passion for healthcare with service to her country.

    Starting as a nurse’s assistant at the young age of just 16, Huitt’s calling to serve others naturally led her to the Navy, where she took on the role of a Corpsman.

    “Joining the Navy was a clear choice for me — it allowed me to serve my country while pursuing my passion for helping others,” she said.

    Huitt arrived at Naval Medical Readiness and Training Command (NMRTC) Twentynine Palms in Dec. 2022 and plans to separate from the Navy in Jan. 2025.

    Throughout her career, challenge coins have become meaningful symbols of her most memorable experiences in the Navy, each representing a personal story.

    Challenge coins have a long-standing tradition in military history, believed to date back to World War I, when service members carried coins as symbols of camaraderie and loyalty. Over the years, these coins have evolved into personalized tokens that represent unit pride, special achievements, or moments of recognition. Often given by commanding officers or peers, challenge coins serve as a meaningful reminder of the bonds formed and the milestones reached throughout a service member’s career.

    Out of the many challenge coins Huitt has earned, three stand out as her favorites.

    The First Coin: Gifted from an Admiral

    Huitt’s most cherished challenge coin came as a surprise, as it was given to her by an Admiral.

    “My top favorite challenge coin is the first one I ever received, which was from Rear Admiral Timothy Weber,” Huitt recalled. “During my time as a Hospital Apprentice at the 13 Area Branch Clinic at Camp Pendleton, I had the honor of giving him a tour and discussing all the impactful work we were doing there. Although I was initially nervous, it turned into a moment of immense pride for me.”

    “Naval Medical Forces Pacific” is engraved on the coin. Naval Medical Forces Pacific is a key command within the U.S. Navy’s medical structure, overseeing Navy Medicine’s healthcare operations and support across the Pacific region. It provides medical expertise, readiness, and support to naval and joint forces, ensuring that service members are healthy, prepared, and able to perform their duties. It also plays a vital role in supporting humanitarian missions, disaster relief efforts, and maintaining force readiness in the Indo-Pacific area.

    The coin represents a significant moment of recognition in the early days of Huitt’s career.

    The Second Coin: A Scorpion from Bahrain

    Her second favorite coin, shaped like a scorpion, was earned during her deployment from NMRTC Twentynine Palms to Isa Air Base in Bahrain. Modeled after the local ‘death stalker’ scorpion, the coin features the U.S. and Bahraini flags.

    “I received this while serving at the Expeditionary Medical Clinic, where I cared for multiple deployed units and took on the roles of MEDEVAC (Medical Evacuation) coordinator and SAPR (Sexual Assault Prevention and Response) Victim’s Advocate,” Huitt explained.

    The coin serves as a reminder of her pivotal role in supporting both the medical and emotional needs of her fellow service members.

    The Third Coin: A Holographic Caduceus

    Huitt’s third favorite coin is a holographic caduceus that comes complete with a removable sword.

    “This thoughtful gift from the Physical Therapy department during deployment (to Bahrain) holds special significance to me, as it features the Hospital Corpsman Pledge on the back,” said Huitt.

    The Hospital Corpsman Pledge highlights the Corpsman’s dedication to providing compassionate and skilled medical care to all service members. It emphasizes loyalty to the Navy, maintaining the highest standards of performance, and upholding the trust placed in them by both patients and the Navy. The pledge reflects a commitment to preserving life, relieving suffering, and upholding professional ethics in every aspect of their duty.

    Looking back on her years serving at NMRTC Twentynine Palms, Huitt’s deployment to Bahrain stands out as one of her most memorable experiences.

    “It provided me with invaluable opportunities to travel to three different countries, assist diverse groups of locals and service members, and immerse myself in cultures I might never have experienced otherwise,” she exclaimed.

    Huitt’s time as a Sailor in the Navy may be coming to a close, but her days of serving others in a healthcare setting are far from over.

    “After separation from the Navy, I plan to return to Texas and begin school to become a Radiology Technician,” Huitt shared.

    Huitt’s story helps exemplify the significance of challenge coins to service members — each one a tangible reminder of the dedication, service, and connections she has built throughout her career.

    MIL Security OSI

  • MIL-OSI Africa: GITEX DIGI_HEALTH 5.0 Dubai showcases the future of Artificial Intelligence (AI)-driven innovations

    Source: Africa Press Organisation – English (2) – Report:

    DUBAI, United Arab Emirates, October 16, 2024/APO Group/ —

    • Innovators and leaders from the most influential medical labs, hospitals, healthcare institutions, research centres and academia gathered in Dubai to discuss AI opportunities
    • Neurology and remote patient monitoring were among the key topics on the agenda for discussion
    • Tech enterprises and providers showcased the most impactful digital solutions to accelerate connectivity and drive transformation

    Transformative health tech solutions were at the heart of conversations at GITEX GLOBAL’s GITEX DIGI_HEALTH 5.0 Dubai (www.GITEX.com), where thousands of tech enthusiasts and healthcare pioneers converged at Dubai World Trade Centre (DWTC) for a day of future health discussions.

    The world’s largest tech event provided a platform to showcase the latest AI-driven digital health and health tech solutions, spotlighting innovations that are reshaping patient care on a global scale.

    The event aligns with the UAE government’s pioneering efforts to advance the digital health ecosystem, with the UAE’s digital health market projected to reach USD $487.30 million by the end of this year. The show also supports Dubai’s commitment to adopting digital practices that benefit medical professionals and patients alike.

    With AI-powered healthcare investments projected to make up 20% of global healthcare spending by year’s end, GITEX GLOBAL set the stage for industry leaders to explore how AI is revolutionising delivery and enhancing outcomes for millions of patients.

    GITEX DIGI_HEALTH 5.0 Dubai brought together global professionals and leaders to build on that figure and discuss the impact the innovative tool is having on the day-to-day operations while also providing an outlook of what the future would hold. It attracted some of the biggest names in the global landscape including labs such as Biogen, Roche and Sanofi as well as tech giants Microsoft, M42, Lenovo. Also present were established medical institutions including Samsung Medical Centre, Harvard Medical School, Roche and many more.

    Pioneering Robotic and AI in Digital Health

    The evolving role of robotics in health tech was a major focus of the showcase and conference programme. Denis Ledenkof, Founder of Robosculptor, showcased how AI-powered robotics is transforming patient care via an autonomous platform for body treatments developed by health industry experts, emphasising robotic technology is providing plenty of benefits.

    He said: “AI is a powerful tool and is leading to better patient preferences. When it comes to robotic treatments, they help improve the experience of patients by just giving them access to a wider range of therapies as well as enhancing accessibility.

    One example that we’re using is an application that functions similarly to a taxi or delivery app where people can scan for treatments and displays the information that users would be looking for.”

    Alex Aliper, Co-Founder and President of Insilico Medicine, a Hong Kong digital health unicorn – was part of another panel that delved into genomics. He discussed how precision medicine, powered by AI, is revolutionising genetic profiles – an approach set to transform treatments for diseases previously deemed incurable.

    The future of AI in neurology

    Meanwhile, following a study which showed that AI can reduce the risk of new vascular events by 25.6% in stroke patients, Aneesh Singhal, M.D, Director, Comprehensive Stroke Center & Vice-Chair of Neurology at Massachusetts General Hospital, gave an overview of what to expect in the field of neurology.

    In his presentation, he discussed the Golden Bridge II trial, which showed that the use of an AI-based clinical decision support system had a significantly greater impact on the number of vascular events and stroke care quality than standard care in patients with acute ischemic stroke (AIS).

    Elsewhere, Jong-Soo Choi, Chief Technology Officer at Samsung Medical Centre, one of Korea’s most renowned hospitals, shared insights into cutting-edge technologies such as Remote Patient Monitoring (RPM) and gene therapy and how they are setting the stage for the next wave of change.

    Smart lens among innovations unveiled

    Dubai’s own deep tech company Xpanceo made waves with the unveiling of smart contact lens for 3D imaging, and another for data reading, demonstrating wireless data transmission capabilities integrated directly into the lens. These innovations are set to redefine the boundaries of how data in real time is perceived, pushing the digital health landscape into a new era of smart diagnostics.

    Oracle Health also displayed its innovative Clinical Digital Assistant. Leveraging AI-powered driven voice recognition, the assistant autonomously documents physician-patient encounters, interprets the information, and accurately inputs a draft note into the Oracle Health EHR, allowing the physician to quickly review and approve the clinical documentation.

    GITEX GLOBAL is seamlessly connecting the world’s largest network of tech events with GITEX EUROPE Berlin, GITEX ASIA Singapore, GITEX AFRICA Morocco, and GITEX NIGERIA all part of its portfolio. These events are fostering collaboration and driving innovation to shape the tech landscape of tomorrow.

    GITEX GLOBAL this year announced the launch of GITEX DIGI_HEALTH 5.0 Expo-Summit in Thailand, from 10-12 September 2025, in a destination touted with one of the highest potentials to leapfrog the digital health industry, putting the spotlight on digital solutions to address the rising demands across Asia.

    More information on GITEX GLOBAL and to purchase passes, please visit http://www.GITEX.com

    MIL OSI Africa

  • MIL-OSI Europe: AFRICA/EGYPT – A missionary from Cairo: “The days in the mission pass quickly”

    Source: Agenzia Fides – MIL OSI

    Wednesday, 16 October 2024

    AF

    Cairo (Agenzia Fides) – “I have started learning Arabic and two days a week, early in the morning, we go from our neighborhood to the Comboni school with Patrick and Florindo,” says Anselmo Fabiano, an Italian missionary from Cairo. “I must say that it is quite an adventure.”The young missionary from the Society of African Missions describes the emotions and feelings that accompany daily life. “Just being able to shop at the market, chat with the children or share with the small Christian community that comes to mass is already a great success,” he says. “On the days when I don’t go to school, learning Arabic takes up a lot of my free time, which is actually always very limited. But I do it with pleasure and passion because I know how important it is to be able to communicate, to listen and to understand in order to build relationships with the people I meet.” “Nevertheless, I am always fascinated by the power of a smile, an attentive look, these simple gestures of kindness that go beyond words,” says Father Anselmo. “Like on Wednesdays, when I spend the morning with the disabled children in our school. No big words are needed, just a simple presence, a look and a few signs, and an incredible harmony is established. Or when I offer my service to the poor in the community of the Sisters of Mother Teresa, it is wonderful how we are welcomed, with a smile, a hug and a handshake that overcomes all language barriers and makes us feel part of their lives!” “The first days of school were precious opportunities to make new acquaintances and, thanks to the organized excursions, we also had the pleasure of delving into the discovery of the roots of the Christian faith in Egypt,” the missionary continues. “We went into the desert to learn about the life of the monks, men of prayer, work and fraternal community. Even the desert is now fertile ground where, thanks to the patient care of the monks, trees of all kinds flourish, along with the fruits of the seeds of the Word of God that have sprouted in people’s lives,” he reports. “We also had the opportunity to enter one of the most fundamental places for Islam, the Al-Azhar Mosque: one of the oldest universities in the world and the most prestigious seat of Sunni Islam. Entering this place of worship and walking barefoot on the white floor, I enjoyed a moment of silence surrounded by hundreds of people praying: a small foretaste of fraternity,” concluded Father Anselmo. (AP) (Agenzia Fides, 16/10/2024)
    AF

    AF

    Share:

    MIL OSI Europe News

  • MIL-OSI Global: Bouncing between war-torn countries: Displacement in Lebanon and Syria highlights cyclical nature of cross-border refuge

    Source: The Conversation – USA – By Jasmin Lilian Diab, Assistant Professor of Migration Studies; Director of the Institute for Migration Studies, Lebanese American University

    Displaced people crossing a hole on the road caused by an Israeli airstrike near the Masnaa crossing. Bilal Jawich/Xinhua via Getty Images

    The escalation of hostilities between Israel and Hezbollah since September 2024, and Israel’s bombing of civilian areas across Lebanon, have unleashed a profound humanitarian disaster.

    The mass displacement of over 1 million people, including Lebanese citizens, migrant workers and Syrian and Palestinian refugees, has created a crisis within Lebanon. Yet an equally significant phenomenon is occurring away from Lebanon’s southern border with Israel: the movement of people who have been displaced within Lebanon into Syria.

    An estimated 400,000 Lebanese and Syrians have reportedly fled into Syria through overcrowded border crossings.

    Not to be confused with return, this movement represents a reversal of the refugee flow that followed the descent of Syria into civil war in 2011. It is also emblematic of a broader pattern of cyclical displacement crises in the region.

    The complex and intertwined histories of Lebanon and Syria – where each has at various points been a refuge for citizens of the other – challenge the simple binaries often associated with the refugee experience.

    The exchange of roles between Lebanon and Syria highlights not only the fragility of regional stability but the fluidity of displacement – and the deeper implications that cross-border movement has on the sociopolitical dynamics of both countries.

    A history of reciprocal refuge

    The relationship between Lebanon and Syria has long been complex, oscillating between cooperation and tension. Despite Syria’s official withdrawal from Lebanon in 2005 after decades as an occupying force, the two countries remain connected due to shared borders, economic ties and security concerns. Cooperation exists in areas such as trade, but there is significant tension, especially over the presence of over 1 million Syrian refugees in Lebanon.

    Yet, throughout their modern histories, one of the most enduring bonds has been the shared experiences of displacement and refuge, dating back to Lebanon’s civil war. From 1975 to 1990, thousands of Lebanese fled to Syria to escape the sectarian-driven conflict that engulfed their homeland.

    The post-war period, however, was marked by a shift in the dynamics between the two countries. The 2005 withdrawal of Syrian troops from Lebanon marked a new chapter in their relations.

    Tensions rose as Lebanon sought to rebuild and assert its sovereignty after nearly 30 years of Syrian occupation. Yet, the region’s tendency for upheaval soon saw the roles reversed again decades later, when an estimated 180,000 Lebanese took refuge in Syria during the 2006 July war.

    With the onset of the Syrian civil war in 2011, it was Lebanon’s turn to serve as a refuge. By 2015, 1 million Syrians fleeing violence made the journey into Lebanon.

    Despite being one of the 44 countries never to have signed the 1951 Refugee Convention, Lebanon is the country hosting the largest number of refugees per capita globally.

    Because Lebanon didn’t sign the convention, it doesn’t formally recognize refugee status, which gives the country what it views as more control over its refugee policies. While Lebanon receives humanitarian support from the United Nations’ refugee agency, refugees remain in a precarious legal status, with limited rights.

    For many Lebanese, this most recent influx of fleeing Syrian refugees has rekindled memories of their own displacement, while for others, it has fueled anti-refugee sentiments.

    Bouncing between 2 war-torn countries

    With the latest escalation of the Israel-Hezbollah conflict, history is again repeating itself. Lebanese citizens, primarily from Hezbollah strongholds in South Lebanon and the Beqaa Valley, are seeking refuge in Syria, a country still grappling with its own economic collapse, violence and internal strife.

    While the conflict on Lebanese territory has gone on for more than a year, movements into Syria only picked up in late September 2024 as people have become more desperate to flee.

    As one displaced person forced to flee from Beirut explained to me: “Syria was certainly not a ‘better’ option than Lebanon six months ago, but in the last week, since the attacks on Beirut and political assassinations, Syria is safer – despite everything it is going through. That’s how unsafe we feel in Beirut – we are bouncing between one war-torn country and another.”

    Implications for refugee-host dynamics

    The cyclical nature of displacement between Lebanon and Syria overturns the prevailing political narrative of host-refugee dynamics being fixed and unidirectional.

    Syrian displacement to Lebanon has been portrayed by some Lebanese politicians as one-directional. This appears to be in order to frame Syrian refugees as the sole recipients of aid – as opposed to Lebanese citizens – as well as burdens on Lebanon.

    When displacement occurs in both directions, however, this narrative begins to break down.

    Syrian refugees who once sought safety in Lebanon now see their home country as a safer haven – albeit a fragile and temporary one. Meanwhile, Lebanese citizens face the same kinds of vulnerability and desperation that their Syrian counterparts experienced over the past decade.

    Importantly, testimonies from those who are making the trip from their ‘temporary’ home in Lebanon back to Syria highlight that these movements should not be mistaken for return. Rather, they are in themselves a temporary solution.

    As one Syrian who had fled his Lebanese home explained to me: “No, I am not returning. I am rather leaving one foot in Lebanon and one in Syria. Syria is in no way a safe place. As men, we are at risk of arrest and forced conscription. However, Lebanon is momentarily, at this point in history, much less safe. We do this assessment week by week. I sent my wife and my children first. I will follow.”

    For their part, internally displaced Lebanese entering into Syria insist that these movements are “absolutely temporary.” One told me: “Syria is not foreign to us. It feels close and familiar. But most importantly, it feels temporary and is the right proximity to Lebanon. As soon as things calm down we will come back to our homes. Many of us have nothing to go back to, but even in this case, we will not remain in Syria.”

    The strain of displacement

    Both Lebanon and Syria are, in many ways, ill-equipped to handle the new wave of displacement.

    Syrian children at a refugee camp in Lebanon’s frontier town of Arsal on Feb. 18, 2014.
    Ratib Al Safadi/Anadolu Agency via Getty Images

    By 2023, Lebanon’s economic collapse had driven 80% of its population into poverty, making it nearly impossible to absorb the additional strain of mass internal displacement.

    Government paralysis, compounded by political deadlock, leaves internally displaced people with little to no state support, mostly relying on aid and community networks to survive.

    Syria, though in the position of “host” in this current migratory flow, is similarly constrained. The country’s infrastructure remains devastated from more than a decade of civil war. Basic services are stretched thin, and the economy has not recovered. Humanitarian organizations coordinating the response are working amid overextended resources and dwindling support.

    A region in perpetual chaos

    As the armed conflict between Israel and Hezbollah escalates, the displacement crisis in Lebanon and Syria will, I fear, likely worsen.

    The recent wave of Syrian refugees and Lebanese into Syria reveals the cyclical nature of refuge in the region. Ultimately, the ongoing displacement crisis in Lebanon and Syria serves as a reminder that refuge is often temporary, contingent on the shifting geopolitics of the region.

    The histories of these two countries, where both have served as havens for the other’s displaced populations, underscore the complexity of displacement in the Middle East.

    The fact that Lebanese citizens are now seeking shelter in Syria, a country from which over 1 million refugees fled just over a decade ago, underscores the volatility of regional displacement patterns. It also raises critical questions about the sustainability of international refugee systems that too often rely on static, one-directional models of migration and don’t account for the fluid and often reversible nature of displacement.

    Jasmin Lilian Diab does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Bouncing between war-torn countries: Displacement in Lebanon and Syria highlights cyclical nature of cross-border refuge – https://theconversation.com/bouncing-between-war-torn-countries-displacement-in-lebanon-and-syria-highlights-cyclical-nature-of-cross-border-refuge-241168

    MIL OSI – Global Reports

  • MIL-OSI Global: Overseas US voters get ignored by political campaigns − but could be crucial supporters

    Source: The Conversation – USA – By Amanda Klekowski von Koppenfels, Honorary Reader in MIgration and Politics, University of Kent

    Election workers prepare to mail absentee ballots to Americans, including those living overseas. Allison Joyce/Getty Images

    One group of American voters is being largely ignored in the closely watched polling leading up to the Nov. 5 elections: U.S. citizens living abroad, whether as civilians or as members of the military. We know from governmental data that the number of ballots cast by overseas Americans has been greater than the margin of victory in races in the past – and may be again in 2024.

    But that one potentially crucial group of American voters – U.S. citizens living abroad – does not get much attention, from pollsters or campaigns.

    We are scholars of political science whose research shows that overseas voters can make a difference in elections – and that there is potential for campaigns to mobilize these voters, despite a more complex process of voting than for domestic voters.

    Who are overseas Americans?

    Though there is not an exact count of American citizens living abroad, we do know they number in the millions. Estimates from the Federal Voter Assistance Program and the Association of Americans Resident Overseas placed this number between 4.4 million and 5.3 million in 2023.

    But those are likely undercounts. It’s almost impossible to account fully for dual citizens, naturalized U.S. citizens who have returned to the country of their birth or people who split their time between the U.S. and other countries.

    Research that we and others have conducted indicates that Mexico and Canada are home to the largest numbers of Americans outside the U.S., followed by the U.K., France, Israel and Germany. The three most common reasons Americans move abroad are family connections, employment and quality of life, although there are others.

    Overseas Americans tend to be highly educated: More than three-quarters have a college degree, double the percentage within the U.S. Most overseas Americans do not move from country to country but rather stay in one country, often for a decade or more. But our surveys have found they remain interested in U.S. politics – not least because they pay U.S. income taxes, whether they work for a U.S. or foreign employer. IRS data shows that the vast majority are not ultra-wealthy.

    Voting from abroad

    Military members and U.S. citizens living abroad have had the right to vote in federal elections since 1976. This right was further consolidated in the 1986 Uniformed and Overseas Citizens Absentee Voting Act, while the right for Americans living abroad to vote in local and state elections depends on state law.

    Some people have recently expressed concern that overseas voting could be used to cast fraudulent ballots, but there is no evidence of illegal voting by noncitizens abroad.

    Overseas voters’ absentee ballot requests and their returned ballots are carefully scrutinized by local officials in the state where they last lived in the U.S., making abuse very unlikely. But it is complex for overseas voters to vote: The paperwork is complicated, and there is comparatively little outreach from political parties and candidates.

    Barriers to voting from overseas

    In 2020, the Federal Voting Assistance Program, which is supposed to help overseas voters exercise their voting rights, estimated that just shy of 8% of eligible American voters overseas cast ballots in that year’s presidential election. Using program numbers to calculate a percentage another way finds that no more than 20% of overseas Americans cast ballots in the 2020 election.

    That’s far lower than the 67% national turnout rate that year.

    Federal law requires local election officials in the U.S. to mail absentee ballots 45 days before an election to overseas Americans who request them. Poor mail service in the U.S. and elsewhere can mean that voters don’t always get the ballots in time, and the ballots mailed back to election officials face similar delays.

    Some states allow voters to receive or return their ballots electronically, which is faster; an overseas voter casting a ballot in Massachusetts can request a ballot, receive a blank ballot and return it all by email, while an overseas voter from Pennsylvania must return it by mail or courier, following exact procedures for enclosing their ballot in multiple envelopes.

    In 2023, the Federal Voting Assistance Program estimated that as many as 150,000 U.S. citizens overseas did not cast ballots in the 2022 elections because of administrative hurdles, such as slow or irregular mail service and difficulties in communicating procedural changes to prospective voters abroad.

    Interest in US politics

    Another possible reason Americans abroad don’t vote is that they have lost interest in U.S. politics. But our own research, and the work of others, finds that not to be true.

    Even given the logistical challenges, U.S. citizens living in Canada, as one example, have very similar levels of interest in American politics compared with citizens back home.

    During the 2020 and 2022 campaign seasons, two of us surveyed American citizens who had moved north of the border. In 2020, 55% indicated they were very interested in American politics, as did 44% in the midterm year of 2022. This is comparable with levels of attention to politics within the U.S. during those campaigns, as gauged by the Cooperative Election Study.

    So although Americans in Canada indicated interest levels as high as those in the U.S. during the past two national election cycles, the vast majority of them did not cast a vote. Administrative barriers play a role, but they’re not enough to explain such low turnout among citizens overseas.

    Ignored by campaigns

    Another key factor driving low turnout from abroad is a lack of communication from campaigns and parties. Research demonstrates that contacts by campaigns and parties significantly increase a person’s likelihood of voting.

    In the U.S., parties and campaign organizations can help streamline the voter registration process, reinforce the stakes of an election and bolster a sense of camaraderie among citizens.

    U.S. citizens living abroad are unlikely to hear from campaigns, even in nearby Canada. When asked in 2020 or 2022 whether they had been contacted by American political campaigns, most potential voters in the U.S. had. But our surveys of Americans living in Canada show less than one-third reported contact from parties or candidates.

    Because overseas citizens vote in their last state of residence in the U.S. but are not physically resident there, campaigns find it harder to identify them as swing-state residents or members of favorable demographic groups.

    Overall, Americans living overseas are as eligible to vote as citizens in the U.S. They are as attentive to politics as Americans living in the U.S. On the other hand, they face major administrative hurdles and are generally not contacted by American parties or campaigns.

    James A. McCann has received support for his research on migration from Purdue University, the US Fulbright Program, the Russell Sage Foundation, and the Carnegie Corporation of New York.

    Amanda Klekowski von Koppenfels and Ronald Rapoport do not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Overseas US voters get ignored by political campaigns − but could be crucial supporters – https://theconversation.com/overseas-us-voters-get-ignored-by-political-campaigns-but-could-be-crucial-supporters-240184

    MIL OSI – Global Reports

  • MIL-OSI Global: What is Chabad-Lubavitch? A Jewish studies scholar explains

    Source: The Conversation – USA – By Schneur Zalman Newfield, Associate Professor of Sociology and Jewish Studies, Hunter College

    Lubavitchers have put up leaflets, posters and even murals of Rabbi Menachem Mendel Schneerson around the world, with many proclaiming him the messiah. Nizzan Cohen via Wikimedia Commons, CC BY-SA

    If you live anywhere near New York – or anywhere in the world, really – you may have seen a picture of Rabbi Menachem Mendel Schneerson. Yellow posters of the rabbi’s face are stuck to lampposts or streetlights: an elderly man with a long white beard and black hat.

    For tens of thousands of ultra-Orthodox Jews, Schneerson is simply “the rebbe”: the leader of the Chabad-Lubavitch movement, even though he died in 1994. The name “Chabad” is familiar to many Americans, but the actual beliefs of this Hasidic group rarely are.

    As someone who was raised in a Lubavitch community and became a scholar of sociology and Jewish studies, I am often asked what sets it apart from other Orthodox streams of Judaism.

    Mystic teachings, joyful prayer

    Hasidism began under the leadership of the 18th-century mystic and healer Israel ben Eliezer, known as the Baal Shem Tov. Instead of focusing on the Bible and Jewish law, the movement prioritized attaching oneself to God through joyful prayer and passionate devotion.

    The Lubavitch sect of Hasidism was founded in the late 1700s by Rabbi Schneur Zalman of Liadi, the author of the Tanya – a theological text and self-improvement manual still studied daily by Lubavitchers. For over a hundred years, the movement was based in the rural town of Lyubavichi, Russia, from which it derives its name.

    Lubavitch headquarters in Brooklyn, which many followers call ‘770.’
    Sagtkd/Wikimedia Commons

    Since 1940, however, Lubavitch has been based in Crown Heights, Brooklyn. The headquarters there at 770 Eastern Parkway are simply referred to as “770” by Lubavitchers the world over, who imbue the red brick building with mystical symbolism.

    Lubavitch, also known by the name “Chabad,” is one of the largest Hasidic groups today, with an estimated 90,000 members.

    Lubavitch shares many things in common with all streams of Orthodox Judaism, including a commitment to strictly abiding by “halacha” – Jewish law and customs. The group also shares a great deal with other ultra-Orthodox communities, such as opposition to providing their children with secular education.

    Yet there are key features of Lubavitch that distinguish it – particularly how much it engages with non-Orthodox Jews.

    The rebbe

    All Hasidic sects have a leader, a “rebbe,” who is believed to possess unique spiritual gifts and connect his followers to the divine. Still, Lubavitch is distinct in terms of the extent to which the rebbe is central to the lives of every single member of the community.

    In 1951, Schneerson accepted leadership of the Lubavitchers after the passing of his father-in-law and grew the movement exponentially until his passing in 1994. Rather than naming a successor, however, Lubavitchers have continued to regard Schneerson as “the rebbe.”

    With his piercing blue eyes, full white beard, black fedora and silk coat, images of Schneerson are ubiquitous among Lubavitchers. Photos and paintings of him adorn walls, key chains, clocks and charity boxes wherever they live.

    A baby clutches a photo of Rabbi Menachem Mendel Schneerson during a holiday celebration in front of the Chabad Lubavitch headquarters in Brooklyn.
    AP Photo/Mark Lennihan

    While the rebbe was alive, his followers would ask him for advice and blessings regarding all spiritual matters, as well as questions about health, business and marriage. Since his passing, followers continue to seek his blessings by placing notes at his gravesite and searching his printed works for guidance.

    Even among Lubavitchers who have left the fold, many still feel attached to its leader.

    Jewish outreach

    One expression of Lubavitchers’ devotion is their commitment to creating Jewish outreach centers all over the world.

    The ethos of sharing Hasidic thought was present from the founding of the Lubavitch movement. This drive became much more developed, however, during and after the Holocaust and continued under Schneerson’s leadership.

    Today, Lubavitch has established Jewish outposts, called “Chabad Houses,” from Melbourne to Hong Kong and Buenos Aires to Cape Town. These emissaries endeavor to reach out to secular Jews and inspire them to become more religiously observant.

    Members of Chabad participate in a Fourth of July parade in Santa Monica, Calif.
    AP Photo/Richard Vogel

    The language surrounding Lubavitch outreach often has a militaristic flavor – for example, its youth movement is named the “Army of God”: Tzivos Ha-Shem, in Hebrew. However, outreach is rooted in the commandment to love one’s fellow Jew and a desire to help them enjoy the Jewish tradition. It is also motivated by a belief that these efforts will help fulfill the biblical prophecy of a Jewish messiah, who will usher in a time of global peace.

    These two motivations fortify the nearly 5,000 emissaries sent to far-flung communities around the world, notwithstanding profound obstacles. These include being separated from their families, who tend to live in established Hasidic communities, and being vulnerable to antisemitic attacks.

    Messianism

    The most distinct aspect of contemporary Lubavitch is its enthusiasm for the coming of the messiah and its assertion that Schneerson is that long-awaited messiah, despite his death.

    Messianic hopes and people claiming to be the messiah have appeared at various points throughout Jewish history, often during periods of crisis. In the wake of the devastation of the Holocaust, however, Schneerson made the idea of the messiah’s coming integral to every aspect of Jewish life.

    Eventually, most followers came to believe that Schneerson was the righteous redeemer sent by God to usher in the messianic age. While Schneerson did not embrace these proclamations, he insisted that through additional acts of goodness and kindness it was possible to bring about the messianic redemption.

    While some outsiders criticized this emphasis, especially claims about the rebbe, the situation became much more fraught after he passed away in 1994. In response to this trauma, a split developed in Lubavitch.

    Praying men leave notes seeking guidance and blessings at the grave site of Menachem Mendel Schneerson.
    Bentzi Sasson via Wikimedia Commons, CC BY-SA

    One camp, composed largely of those involved in outreach work and members of long-standing Lubavitch families, argued Lubavitch should stop publicly talking about Schneerson being the messiah since it scared away outsiders. The other camp, largely composed of those who joined the community as adults, claimed that he was still the messiah and was about to return, and that it was vital to tell the world.

    To some other Jews, this belief seemed suspiciously close to Christian faith in the second coming of Jesus. Still, many Lubavitchers persist in their messianic beliefs.

    The future

    This issue still divides some Lubavitchers. Nonetheless, since Schneerson’s passing three decades ago, the movement has increased in size and strength.

    The group’s cohesiveness has been aided by creative uses of technology to foster a sense of the rebbe’s continued presence in their lives. For example, the Jewish Educational Media organization regularly produces videos that splice footage of his talks with current visuals to make him feel present in the moment. Lubavitchers have reinterpreted Hasidic texts to fit their current predicament, helping them feel grounded despite his physical absence.

    While the precise future of Lubavitch is unknown, the fact that it has managed to weather the storm of the rebbe’s passing and emerged stronger gives his followers hope for the future.

    Schneur Zalman Newfield does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. What is Chabad-Lubavitch? A Jewish studies scholar explains – https://theconversation.com/what-is-chabad-lubavitch-a-jewish-studies-scholar-explains-222218

    MIL OSI – Global Reports

  • MIL-OSI Global: What is Temporary Protected Status? A global migration expert why the US offers some foreign nationals temporary protection

    Source: The Conversation – USA – By Karen Jacobsen, Henry J. Leir Chair in Global Migration, Fletcher School of Law & Diplomacy, Tufts University

    Haitian students use mobile phones to record an exercise during an English class in Springfield, Ohio, on Sept. 13, 2024. Roberto Schmidt/AFP via Getty Images

    Former President Donald Trump and his running mate, U.S. Sen. JD Vance, have criticized the Biden administration’s decision to allow Haitian nationals who are in the U.S. to apply for permission to stay under a legal classification called Temporary Protected Status. Here is what this designation means and how it’s made:

    TPS permits foreign nationals who are already in the United States – even if they did not enter the country through an official or legal means – to remain for six, 12 or 18 months at a time if the situation in their home country is deemed too dangerous for them to return. Threats that prompt TPS designations include ongoing armed conflict, natural disasters, epidemics and other extraordinary and temporary conditions.

    The Secretary of the U.S. Department of Homeland Security designates a foreign country for TPS when conditions there meet requirements spelled out in federal law. Once the secretary determines that the foreign country is safe for its nationals to return, their protected status expires and people who have been granted it are expected to return to their home country.

    Congress created TPS as part of the Immigration Act of 1990. Since then, administrations have used it to protect thousands of people from dozens of countries. The first nations to be designated, in March 1991, were Kuwait, Lebanon and Liberia.

    As of March 2024, there were 863,880 people from 16 countries under Temporary Protected Status in the U.S. Another 486,418 people had initial or renewal applications pending. An estimated 316,000 people may also be eligible under two new extensions since that date.

    TPS beneficiaries may not be detained by federal officials over their immigration status or deported from the United States. They can obtain work permits and apply for authorization to travel outside the U.S. and return to it.

    People who receive TPS don’t automatically become legal permanent residents. But they can petition for an adjustment of their immigration status, such as applying for permanent residency, a student visa or asylum. Applying for a change of immigration status does not necessarily mean their application will be approved.

    Humanitarian measures

    TPS is not the only tool administrations can use to protect people from countries facing disaster or conflict.

    For example, a Haitian person currently living in the U.S. is eligible for TPS under a designation that lasts through Feb. 3, 2026. In contrast, a Haitian who travels through Mexico and applies for entry to the U.S. at the border is not likely to be admitted.

    However, there is a third possibility for Haitians, known as parole. The federal government can give certain groups permission to enter or remain in the U.S. if it finds “urgent humanitarian or significant public benefit reasons” for doing so.

    People who enter through parole programs must have an approved financial supporter in the U.S., undergo a robust security vetting and meet other eligibility criteria. They typically can stay for one to two years, and may apply for authorization to work.

    One current parole program is for people from Latin American countries that are TPS designates. The U.S. government can grant advance permission to enter the U.S. to up to 30,000 Cubans, Haitians, Nicaraguans and Venezuelans each month. People fleeing these countries – all of which have been designated for Temporary Protected Status – can seek authorization to travel from their homes to the U.S. for urgent humanitarian reasons, and then stay for a temporary period of parole for up to two years.

    Immigrant rights groups rally at the U.S. Capitol following a federal court ruling that threatened the legal standing of thousands with Temporary Protected Status, Sept. 15, 2020.
    Chip Somodevilla/Getty Images

    I’ve studied global migration and asylum policy for 25 years. I see both TPS and parole as legal and carefully considered ways to support people from countries experiencing wrenching conflict, disorder and disaster who are seeking safety in the U.S. Doing away with these programs, as Trump sought to do during his term in office, would make it extremely difficult for people in great danger to escape.

    Neither TPS nor parole programs are automatic roads to citizenship or permanent residence. They are ways to provide humanitarian assistance to people in appalling circumstances, such as rampant gang violence in Haiti and economic hardship and political repression in Venezuela and Nicaragua.

    Certainly, cities need more resources to support large numbers of immigrants. But offering temporary protection to people whose home countries are not safe places to live is a long-standing – and, in my view, crucial – element of U.S. immigration policy.

    Karen Jacobsen does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. What is Temporary Protected Status? A global migration expert why the US offers some foreign nationals temporary protection – https://theconversation.com/what-is-temporary-protected-status-a-global-migration-expert-why-the-us-offers-some-foreign-nationals-temporary-protection-240525

    MIL OSI – Global Reports

  • MIL-OSI: DigiAsia Corp. and Digit9 Announce Strategic Collaboration

    Source: GlobeNewswire (MIL-OSI)

    ~ Enhancing Cross Border Payments ~

    ABU DHABI, United Arab Emirates and NEW YORK, Oct. 16, 2024 (GLOBE NEWSWIRE) — DigiAsia Corp. (NASDAQ: FAAS) (“DigiAsia” or the “Company”), a leading Fintech as a Service (FaaS) ecosystem provider, has announced a strategic collaboration with Digit9, the cross-border payments orchestration platform developed by LuLu Money Singapore, a wholly owned subsidiary of Abu Dhabi-based LuLu Financial Holdings.

    The partnership with Digit9 will enhance DigiAsia’s offering and competitiveness in servicing the cross-border payments needs for Indonesian consumers and SMEs in Indonesia and the GCC.

    Further, DigiAsia will be able to leverage Digit9’s wide network of partners and the ability to facilitate cross-border payments in more than 150 markets globally, to create efficient and cost-effective cross-border payment rails to further support Indonesian consumers and SMEs.

    DigiAsia estimates that the partnership with Digit9 will generate an estimated US$250mn volume annually in cross-border payments.

    DigiAsia and Digit9 will continue strategic partnership discussions and look to launch innovative products and services in the cross-border payments space in the near future.

    About DigiAsia

    DigiAsia is a leading Fintech as a Service (FaaS) provider operating a B2B2X model offering its complete Fintech solution in emerging markets. DigiAsia’s fintech architecture offers small and medium business enterprises (SMEs) comprehensive embedded finance APIs to streamline processes across the commerce value chain of distributors and customers. DigiAsia’s embedded fintech solutions equally address democratizing digital finance access that supports financial inclusion of underbanked merchants and consumers in emerging markets resulting in growth for enterprise business. The suite of B2B2X solutions provided by DigiAsia include, but are not limited to, cashless payments, digital wallets, digital banking, remittances and banking licenses. DigiAsia has recently established a strategic initiative to develop its embedded FaaS enterprise solution with AI capabilities in Southeast Asia, India, and the Middle East, with plans for global expansion. For more information, please visit DigiAsia’s Corporate website here or Investor Relations website here.

    About Digit9

    Digit9 is a payments orchestration platform tailored to meet the diverse needs of financial institutions. It seamlessly integrates an array of payment methods, banks, and service providers, simplifying the complexities of cross-border payments. Digit9 has been developed by LuLu Money Singapore, a wholly owned subsidiary of LuLu Financial Holdings.

    About LuLu Financial Holdings

    LuLu Financial Holdings is a leading global financial services provider, offering a wide range of services including cross-border payments, currency exchange, and financial technology solutions. With over 350 customer engagement centers in over 10 countries and a commitment to innovation and customer satisfaction, LuLu Financial Holdings continues to set benchmarks in the financial services industry.

    Forward-Looking Statements:

    This press release may contain forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. The words “believe”, “expect”, “anticipate”, “project”, “targets”, “optimistic”, “confident that”, “continue to”, “predict”, “intend”, “aim”, “will” or similar expressions are intended to identify forward-looking statements. All statements other than statements of historical fact are statements that may be deemed forward-looking statements. These forward-looking statements including, but not limited to, statements concerning DigiAsia and the Company’s operations, financial performance and condition are based on current expectations, beliefs and assumptions which are subject to change at any time. DigiAsia cautions that these statements by their nature involve risks and uncertainties, and actual results may differ materially depending on a variety of important factors such as government and stock exchange regulations, competition, political, economic and social conditions around the world including those discussed in DigiAsia’s Form 20-F under the headings “Risk Factors”, “Management’s Discussion and Analysis of Financial Condition and Results of Operations” and “Business Overview” and other reports filed with the Securities and Exchange Commission from time to time. All forward-looking statements are applicable only as of the date it is made and DigiAsia specifically disclaims any obligation to maintain or update the forward-looking information, whether of the nature contained in this release or otherwise, in the future.

    DigiAsia Company Contact:
    Subir Lohani
    Chief Financial Officer and Chief Strategy Officer
    646-480-0142

    Lulu Financial Holdings Company Contact:
    Ajit Johnson
    Head of Strategic Business Relations
    ajit.johnson@lulufin.com

    Investor Contact:
    MZ North America
    Email: FAAS@mzgroup.us

    The MIL Network

  • MIL-OSI NGOs: Netherlands: Mass police surveillance of protests part of ‘growing control culture’ – new report

    Source: Amnesty International –

    “All facial recognition technology for identification purposes should be banned and clear rules for police surveillance at protests must be established.”  Dagmar Oudshoorn

    Fear amongst protestors that camera surveillance may lead to negative repercussions

    Transparency needed from Dutch police about use of materials gathered at protests

    A new report from Amnesty International has found that widespread use of digital surveillance technology by police combined with a lack of transparency about its deployment and how materials gathered are analysed, stored and used is having a discriminatory and chilling effect on protest in the Netherlands.

    Recording dissent: Camera surveillance at peaceful protests in the Netherlands, finds that Dutch police are using an array of digital means to monitor peaceful protesters, from drones to video cars and bodycams to conduct mass surveillance of protesters which is detrimentally impacting the right to protest.  

    The report collates the experiences of protesters from a wide range of movements, including climate protests, pro-Palestine protests and protests relating to COVID. The research involved observation of 24 protests between 2022 and 2024, several interviews with protesters and police as well as an analysis of protest rules and practice. Across the range of demonstrations, protesters expressed fears that their identities could be logged in police databases and that this could have negative repercussions for them. 

    One organiser of COVID protests told Amnesty: “I would like to work at a ministry one day. If I have a mark against my name somewhere, I might never get in, so I want to avoid that. Those fears are really deep with everyone in our group.”  

    Dagmar Oudshoorn, Director of Amnesty International Netherlands, said:

    Peaceful protest is a right, not a privilege but in the Netherlands an increasing risk-based approach to protest by authorities and a growing control culture is putting this right a risk.

    “Dutch laws and policies are not formulated with sufficient precision with regard to what police may or may not do when surveilling protests. This creates a risk of arbitrariness or abuse and is having a discriminatory and chilling effect.

    “It is unacceptable that images are stored in police data banks without any clarity as to what is done with them. This can lead to abuse – or fear of abuse – which can really have far-reaching consequences for people’s personal lives.

    “Camera surveillance is being deployed because protests are being perceived as a security risk rather than a fundamental right and a vital part of a healthy society. All facial recognition technology for identification purposes should be banned and clear rules for police surveillance at protests must be established.”  

    The new research shows that police routinely fail to explain to organisers, protesters and the public why camera surveillance is in place.Opaque practices make it unclear what resources are being deployed and what images of protesters are being used for. Without adequate safeguards in place, surveillance practices are open to widespread abuse.  Police are able to use facial recognition technology to identify people. This risk is especially serious for migrants, who could be included in a facial recognition database when they apply for a residence permit.

    One climate activist told Amnesty: “It’s unpredictable. I’ve seen camera surveillance in all forms…Police in uniform photographing, and camera cars with a telescopic camera on the roof…Not once have the police informed us about the surveillance.” 

    Protest rights under threat across continent.

    This report is part of Amnesty ‘s global “Protect the Protest” campaign which challenges attacks on peaceful protest, works in solidarity with those targeted and supports the causes of social movements pushing for human rights change.  

    A report published in July 2024 looking at the state of protest across Europe found that the right to protest is being systematically undermined across Europe. See https://www.amnesty.org/en/latest/news/2024/07/europe-sweeping-pattern-of-systematic-attacks-and-restrictions-undermine-peaceful-protest/ 

    MIL OSI NGO

  • MIL-OSI: Gilat Satellite Networks to Present at the 17th Annual LD Micro Invitational Conference

    Source: GlobeNewswire (MIL-OSI)

    PETAH TIKVA, Israel, Oct. 16, 2024 (GLOBE NEWSWIRE) — Gilat Satellite Networks Ltd. (NASDAQ, TASE: GILT), a worldwide leader in satellite networking technology, solutions, and services, announced today that it will be presenting at the 17th annual LD Micro Invitational on Wednesday, October 30, at 8 am PT at the Luxe Sunset Boulevard Hotel in Los Angeles. Gil Benyamini, Chief Financial Officer, will be giving the Gilat presentation.

    In addition, Mr. Benyamini, Gilat’s CFO and Ms. Mayrav Sher (Head of Finance & IR) will be available for one-on-one meetings with investors throughout the conference days. To schedule a meeting please contact an LD Micro representative or email a request to the Gilat investor relations team at Mayravs@gilat.com.

    We invite interested parties to register to watch the presentation remotely at Here.

    About LD Micro
    LD Micro, a wholly owned subsidiary of Freedom US Markets, was founded in 2006 with the sole purpose of being an independent resource in the micro-cap space. Whether it is the Index, comprehensive data, or hosting the most significant events annually, LD’s sole mission is to serve as an invaluable asset for all those interested in finding the next generation of great companies. For more information on LD Micro, visit http://www.ldmicro.com.

    Please reach out to the company representative below or Dean Summers (dean@ldmicro.com) to register for the event and schedule a meeting with the company.

    To learn more about Freedom US Markets, visit http://www.freedomusmkts.com.

    About Gilat 
    Gilat Satellite Networks Ltd. (NASDAQ: GILT, TASE: GILT) is a leading global provider of satellite-based broadband communications. With over 35 years of experience, we create and deliver deep technology solutions for satellite, ground, and new space connectivity and provide comprehensive, secure end-to-end solutions and services for mission-critical operations, powered by our innovative technology. We believe in the right of all people to be connected and are united in our resolution to provide communication solutions to all reaches of the world.

    Our portfolio includes a diverse offering to deliver high-value solutions for multiple orbit constellations with very high throughput satellites (VHTS) and software-defined satellites (SDS). Our offering is comprised of a cloud-based platform and high-performance satellite terminals; high-performance Satellite On-the-Move (SOTM) antennas; highly efficient, high-power Solid State Power Amplifiers (SSPA) and Block Upconverters (BUC) and includes integrated ground systems for commercial and defense, field services, network management software, and cybersecurity services.

    Gilat’s comprehensive offering supports multiple applications with a full portfolio of products and tailored solutions to address key applications including broadband access, mobility, cellular backhaul, enterprise, defense, aerospace, broadcast, government, and critical infrastructure clients all while meeting the most stringent service level requirements. For more information, please visit: http://www.gilat.com 

    Certain statements made herein that are not historical are forward-looking within the meaning of the Private Securities Litigation Reform Act of 1995. The words “estimate”, “project”, “intend”, “expect”, “believe” and similar expressions are intended to identify forward-looking statements. These forward-looking statements involve known and unknown risks and uncertainties. Many factors could cause the actual results, performance or achievements of Gilat to be materially different from any future results, performance or achievements that may be expressed or implied by such forward-looking statements, including, among others, changes in general economic and business conditions, inability to maintain market acceptance to Gilat’s products, inability to timely develop and introduce new technologies, products and applications, rapid changes in the market for Gilat’s products, loss of market share and pressure on prices resulting from competition, introduction of competing products by other companies, inability to manage growth and expansion, loss of key OEM partners, inability to attract and retain qualified personnel, inability to protect the Company’s proprietary technology and risks associated with Gilat’s international operations and its location in Israel, including those related to the current terrorist attacks by Hamas, and the war and hostilities between Israel and Hamas and Israel and Hezbollah. For additional information regarding these and other risks and uncertainties associated with Gilat’s business, reference is made to Gilat’s reports filed from time to time with the Securities and Exchange Commission. We undertake no obligation to update or revise any forward-looking statements for any reason.

    Contact: 
    Gilat Satellite Networks
    Hagay Katz, Chief Products and Marketing Officer 
    hagayk@gilat.com

    Gilat Satellite Networks
    Mayrav Sher, Head of Finance and Investor Relations 
    mayravs@gilat.com

    The MIL Network

  • MIL-OSI United Kingdom: Change of His Majesty’s High Commissioner to Trinidad and Tobago

    Source: United Kingdom – Executive Government & Departments 3

    Mr Jon Dean has been appointed British High Commissioner to the Republic of Trinidad and Tobago in succession to Ms Harriet Cross who will be transferring to another Diplomatic Service appointment. Mr Dean will take up his appointment during December 2024.

    Mr Jon Dean

    Curriculum vitae

    Full name: Jon Mark Dean

    2022 to 2024 N’Djamena, His Majesty’s Ambassador
    2020 to 2022 New York, Counsellor Internal
    2018 to 2020 United Nations Office of Counter-Terrorism, Secondment, New York
    2015 to 2018 FCO, Head of Iraq Team, Middle East and North Africa Directorate
    2013 to 2015  Juba, Deputy Head of Mission and Consul
    2013 Yaoundé, Deputy High Commissioner and Consul (3 months)
    2012 New York, UK Permanent Mission to the United Nations, Second Secretary Political (3 months)
    2009 to 2012 Brasília, Second Secretary Political
    2007 to 2008 FCO, Desk Officer, Kosovo
    2005 to 2007 FCO, Desk Officer, EU Environment Policy
    2005 Joined FCO

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom

  • MIL-OSI Economics: Huawei Globally Unveils Intelligent Campus 2030 White Paper Oct 16, 2024

    Source: Huawei

    Headline: Huawei Globally Unveils Intelligent Campus 2030 White Paper
    Oct 16, 2024

    [Dubai, UAE, October 16, 2024] During GITEX Global 2024, Huawei released the Intelligent Campus 2030 white paper for markets outside China at the forum Redefining Intelligent Campus with ICTs, Maximizing Enterprises’ Intelligent Productivity with Xinghe Intelligent Campus. This white paper envisions the future of the intelligent campus.
    David Shi, Vice President of Huawei’s ICT Marketing & Solution Sales Dept, delivered an opening speech at the forum. He highlighted that as digital technology advances, the intelligent connectivity of everything will become a reality, which will allow campuses to be fully digital and intelligent. He added that future campuses will become fully perceptible, collaborative, and constantly online smart buildings that are capable of self-learning, self-troubleshooting, and making decisions and executing them independently. “Huawei is committed to bringing digital to every campus for pervasive intelligence and has been deeply involved with intelligent campuses for many years. We have proposed to redefine campuses with ICTs and have leveraged the advantages of our product portfolios to reshape campus connectivity, platform, and business. Up to now, we have helped over 1000 customers worldwide build secure, green, digital, and intelligent campuses,” said David Shi.
    David Shi, Vice President of ICT Marketing & Solution Sales Dept, Huawei

    Eric He, CEO of Huawei Campus Team, said in his speech that revolutions in energy and information take us closer to the intelligent world, where campuses will play a crucial role. As Eric He explains, we have entered the stage of intelligent campus 2.0, which is 10 Gbps, digital, intelligent, and green. During this stage, campus networks will evolve from simply transmitting data to providing quality connections, campus platforms will move beyond integrating IoT to providing data intelligence, and extensive business management will be upgraded to low-carbon operations. “Relying on ICTs to redefine campuses, Huawei looks forward to working with customers and industry peers to innovate as well as envision and build intelligent campus 2030,” he said.
    Eric He, CEO of Huawei Campus Team

    Hawn Zhao, President of the Campus Network Domain, Data Communication Product Line, Huawei, introduced Huawei’s Xinghe Intelligent Campus Solution at the forum. As enterprises are witnessing a surge in the number of devices and video conferences, their digital and intelligent office requires improved network performance, security, experiences, and O&M. Huawei’s all-scenario Wi-Fi 7 products can strengthen signals by 100% and improve concurrency by 50%. In addition, Huawei’s application experience assurance solution ensures smooth video conferences and protects VIP services from being compromised, while the Wi-Fi Shield prevents data eavesdropping to ensure 100% network security.
    Helping Customers Advance Digital and Intelligent Transformation
    Ibrahim Al Kindi, IT Director of the Arab Authority for Agricultural Investment and Development (AAAID), shared AAAID’s experience in intelligent campus construction. AAAID and Huawei have collaborated to enhance its office experiences in five areas: seamless access, intelligent office conferences, full wireless network coverage, AI-based building control, and centralized IoT device access. Ibrahim Al Kindi stated that this is just the beginning of a new era of intelligent office, and AAAID will continue to explore the digital and intelligent transformation of the office field.
    Fahad Daghriri, Chief Information Officer of Technical and Vocational Training Corporation (TVTC) in Saudi Arabia, shared how TVTC built an intelligent campus network with the help of Huawei. This network allows for wide coverage, high performance, and efficient O&M, improving mobile office for teachers and studying for students. “Our collaboration aims to achieve a win-win situation, promote digital transformation, build a one-stop campus network, create a smart education platform, and lay a solid foundation for long-term development,” said Fahad Daghriri.
    Releasing the Intelligent Campus 2030 White Paper
    Huawei globally unveils the Intelligent Campus 2030 white paper

    The campus is a basic unit in the making of a city. It is the main place where people live and work. It acts as an important carrier to boost the digital economy, and a key point to realize green and low-carbon transformation. In recent years, the industry has conducted in-depth exploration and cultivated practices surrounding the intelligent campus. Huawei, along with industry experts and scholars, provides insights into its future in the Intelligent Campus 2030 white paper.
    Based on the insights into and practices of global intelligent campuses, this white paper proposes a far-sighted definition of future intelligent campus along with visions for its advancement. It outlines five trends that affect intelligent campus development, systematically depicts 10 typical future scenarios, and defines six key technical features of future intelligent campuses for the first time. Innovatively, the white paper proposes a unique reference architecture for the intelligent campus and 22 quantitative indicators to predict the prospects of intelligent campuses, guiding their implementation and construction.
    Click the link to read more about the white paper: https://www.huawei.com/en/giv/intelligent-campus-2030

    MIL OSI Economics

  • MIL-OSI Economics: Training course on market access for governments acceding to WTO concludes in Geneva

    Source: WTO

    Headline: Training course on market access for governments acceding to WTO concludes in Geneva

    The governments represented were Azerbaijan, Bahamas, Belarus, Bhutan, Iraq, Libya, Somalia, Turkmenistan and Uzbekistan. Participants were given guidance on how to prepare initial goods offers, consolidate bilateral market access agreements and verify schedules of concessions and commitments on goods.
    Speaking at the opening session, the Director of the WTO Accessions Division Maika Oshikawa emphasised the importance of the training programme in strengthening acceding governments’ negotiation capacities. “Managing market access negotiations on goods alone can be a challenging task, even for the biggest economies with capacities,” she told participants. “This training is designed not only to equip you to start negotiations but, more importantly, to successfully conclude them.”
    The curriculum included lectures and interactive exercises organized by WTO experts. A roundtable took place with representatives of selected WTO members active in accessions and another with negotiators from recently acceded governments. The objective was to gain insights on market access negotiations with specific WTO members, known as “bilateral negotiations”. Participants also simulated the negotiation of bilateral market access agreements on goods.
    Participating in the course was Bokhodirjon Bobokulov, Chief Inspector at Uzbekistan’s State Customs Committee, who said: “I gained practical knowledge on negotiating market access, analysing non-tariff barriers and aligning trade policies with WTO principles. This training has equipped me with essential tools to engage more effectively in international trade discussions.”
    Another course participant, Sharmarke Abdi Jama, Senior Trade Advisor in the Office of the President of Somalia, underlined the importance of preparation and strategy in market access negotiations: “The course significantly enhanced my understanding of tariff schedules and taught me how to find a balance when it comes to stakeholders’ interests in the negotiations, while also aligning with global trade rules. The combination of theoretical insights and practical exercises will be particularly beneficial to my work.”
    Also taking part in the course was Diveen Abduraheem, Head of the Trade in Goods Division at Iraq’s Ministry of Trade. Underscoring the comprehensive nature of the training programme, she stressed: “Through this course, I improved my understanding of WTO rules and trade agreements. It enhanced my negotiation skills and taught me how to analyse trade data effectively. Overall, the course has prepared me for real-world trade negotiations.”
    A training course on navigating WTO rules in accession negotiations took place in December 2023.

    Share

    MIL OSI Economics

  • MIL-OSI United Kingdom: Government funding secured to bring forward disused site for new homes 16 October 2024 Isle of Wight Council secures government funding to bring forward disused site for housing

    Source: Aisle of Wight

    The Isle of Wight Council has been awarded £150,000 to help bring forward a prime brownfield site for development.

    The windfall will be used to demolish the former police station in Fairlee Road, Newport, and prepare the council-owned site so that it is ready for the building of up to ten new homes.

    The funding comes from the government’s Brownfield Land Release Fund which supports councils in unlocking small and medium sites that have been previously developed and where viability issues due to abnormal costs, such as site levelling, demolition, and groundworks, are likely to prevent their future development.

    Councillor Ian Stephens, deputy leader and Cabinet member for housing and finance, said: “We are delighted to have secured funding from the Brownfield Land Release Fund.

    “This will enable us to demolish a disused building, in a prime location close to the town centre. The cleared site will speed up the delivery time for much needed new homes.”

    Council leader, Councillor Phil Jordan, added: “This scheme, using government funding, is part of a wider council project to deliver homes for residents of the Isle of Wight.

    “In clearing this site in preparation for housing, we are enabling another development to be built on and provide the homes we desperately need.

    “This is the third site we have obtained government funding for and along with other sites we are bringing forward for provision, are positively adding to the housing availability numbers on this Island at a time when demand is outstripping supply.”

    MIL OSI United Kingdom

  • MIL-OSI Asia-Pac: Minister of State for Communications inaugurates the International Conference of Telecom Regulators, being organized by TRAI

    Source: Government of India (2)

    Posted On: 16 OCT 2024 12:18PM by PIB Delhi

    Minister for State for Communication (MoSC) Dr. Chandra Sekhar Pemmasani inaugurated a one day International Conference of Telecom Regulators today in the presence of, Ms. Doreen Bogdan-Martin, Secretary General of International Telecommunication Union (ITU), Mr. Mats Granryd, Director General, GSMA, Shri Anil Kumar Lahoti Chairman TRAI.  While inaugurating the conference, Hon’ble Minister of State for Communications Dr. Pemmasani highlighted the spectacular growth of ICT sector in the country, particularly the fastest deployment of 5G services and quick adoption of digital technologies in the country. He also shared about the growth of digital economy and conducive regulatory environment and related factors that contribute to such growth. 

    During the inaugural session, message of Minister of Communication, Shri Jyotiraditya Scindia was read out by Shri Atul K. Chaudhary, Secretary, TRAI. In his message MoC  stressed that regulators hold a sacred responsibility to safeguard the interests of consumers, alongside their myriad duties. He further stated that Evolution of NTNs will unlock new vistas, expanding the horizons of communication technologies and fostering innovative use cases and applications across diverse sectors, ultimately serving the greater good of society and advancing our collective journey toward the United Nations Sustainable Development Goals (UN SDGs). He called upon regulators to deliberate issues related to craft frameworks for OTT communication.

    The speakers at the inaugural session included Ms. Doreen Bogdan Martin, Secretary General, ITU, Mr. Mats Granryd, DG, GSMA, Mr. Anil Kumar Lahoti, Chairman, TRAI.  Earlier Mr. Atul Kumar Chaudhary, Secretary, TRAI welcomed all the delegates to the conference.   Mr. Anil Kumar Lahoti, Chairman, TRAI mentioned in his address that TRAI has been proactively engaging in many international multilateral activities pertaining to ITU at global level and also at regional level through platforms like APT/SATRC, ASEAN etc. TRAI has hosted many conferences in collaboration with ITU, APT and with other international regulators both in India and abroad.

    This conference is being conducted in concurrence with ITU World Telecom Standardization Assembly (WTSA-24) and India Mobile Congress (IMC-24) being organized in New Delhi. Delegates representing ITU member states, policy makers, regulators, and technology partners across the world besides other stakeholders have converged in New Delhi for attending these prestigious events.  Making best use of this opportunity, TRAI is hosting this one-day international conference. The theme of this conference is ‘Emerging Trends in Regulation’ and it is proposed to cover important topics such as Regulatory Perspective in Standardization, Regulatory Aspects of Satellite Communication, including other Non-Terrestrial Networks and Regulatory Outlook for OTT Communication Services. 

    During the inaugural session, a Memorandum of Understanding (MoU) was signed between TRAI and the Communications, space and technology commission (CST), the regulator of Saudi Arabia.  Through signing of this bilateral agreement, both sides have formalized their long standing bi-lateral relations and shall initiate many collaborative activities in the days to come.  TRAI has more than 20 such bi-lateral agreements with international regulators/organizations which give opportunities for mutual consultations and collaborations on many regulatory issues. The inaugural session ended with a vote of thanks by Ms. Vandana Sethi, Advisor (Admn/IR), TRAI. 

    For any clarification/ information, Ms. Vandana Sethi, Advisor (Admn/IR) may be contacted on advadmn@trai.gov.in.

    ******

    SB/DP/ARJ

    (Release ID: 2065240) Visitor Counter : 29

    MIL OSI Asia Pacific News

  • MIL-OSI United Kingdom: Foreign Secretary statement on aid to Gaza

    Source: United Kingdom – Executive Government & Departments

    The Foreign Secretary has issued statement on the US letter relating to humanitarian aid entering into Gaza.

    Foreign Secretary David Lammy said:

    The humanitarian situation in Northern Gaza is dire, with access to basic services worsening and the UN reporting that barely any food has entered in the last two weeks.

    Israel must ensure civilians are protected and ensure routes are open to allow life-saving aid through. Along with our French and Algerian counterparts, we have called an urgent meeting of the UN Security Council today to address this.

    While the conflict continues, all parties are bound by international humanitarian law. Reflecting our concerns – the UK made the difficult decision last month to suspend export licences to Israel that could be used in military operations in Gaza. This does not change our steadfast support for Israel’s security.

    Along with our international partners, we continue to call for an immediate ceasefire, to allow more humanitarian aid to get in and get the remaining hostages out.

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Change of His Majesty’s High Commissioner to Trinidad and Tobago: Jon Dean

    Source: United Kingdom – Executive Government & Departments

    Jon Dean has been appointed British High Commissioner to the Republic of Trinidad and Tobago, in succession to Harriet Cross.

    Mr Jon Dean

    Mr Jon Dean has been appointed British High Commissioner to the Republic of Trinidad and Tobago, in succession to Ms Harriet Cross, who will be transferring to another Diplomatic Service appointment.

    Mr Dean will take up his appointment during December 2024.

    Curriculum vitae

    Full name: Jon Mark Dean

    2022 to 2024 N’Djamena, His Majesty’s Ambassador
    2020 to 2022 New York, Counsellor Internal
    2018 to 2020 United Nations Office of Counter-Terrorism, Secondment, New York
    2015 to 2018 FCO, Head of Iraq Team, Middle East and North Africa Directorate
    2013 to 2015  Juba, Deputy Head of Mission and Consul
    2013 Yaoundé, Deputy High Commissioner and Consul (3 months)
    2012 New York, UK Permanent Mission to the United Nations, Second Secretary Political (3 months)
    2009 to 2012 Brasília, Second Secretary Political
    2007 to 2008 FCO, Desk Officer, Kosovo
    2005 to 2007 FCO, Desk Officer, EU Environment Policy
    2005 Joined FCO

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom

  • MIL-OSI Security: Man charged with carrying knives

    Source: United Kingdom London Metropolitan Police

    A man will appear in court charged with possession of offensive weapons and class A and B drugs.

    Jordan Watson Best, 23, (22.02.2001) of Princes Avenue, Tolworth was charged on Tuesday, 15 October with:

    • Possessing an offensive weapon in a public place.
    • Possessing a sharply pointed article in a public place.
    • Possessing class A and class B drugs with intent to supply.

    Best was remanded to appear at Highbury Corner Magistrates’ Court on Wednesday, 16 October.

    MIL Security OSI

  • MIL-OSI Africa: GITEX GLOBAL 2024: Artificial Intelligence (AI) revolution unveiled to the world on “AI Super Tuesday”

    Source: Africa Press Organisation – English (2) – Report:

    DUBAI, United Arab Emirates, October 16, 2024/APO Group/ —

    • International exhibitors presented the most groundbreaking innovations helping shape the future of society and industry
    • “Cybersecurity Day” next up as world’s largest and best-rated tech event reaches halfway stage on Wednesday

    Hot on the heels of a memorable first day where GITEX GLOBAL 2024 (http://apo-opa.co/4hlR7gj) opened the doors for its biggest-ever international edition, the entire global tech ecosystem experienced another action-packed agenda on Tuesday at Dubai World Trade Centre (DWTC).

    Taking place from 14-18 October, GITEX GLOBAL presents a record-breaking edition in its 44th year – welcoming over 6,500 exhibitors, 1,800 startups, 1,200 investors alongside governments from more than 180 countries.

    With five themed days locked in across the 2024 event programme, a technology taking the world by storm was the focal point as “AI Super Tuesday” presented the most groundbreaking innovations helping shape the future of society and industry.

    A technology with vast transformative potential

    As AI takes centre stage in drug discovery, the world could soon witness the most significant shift in medicine since the advent of modern pharmaceuticals. But with such rapid advancements, a mesmerising Tuesday session – ‘The Next Leap in Medicine: Are we on the Edge of a Breakthrough?’ – saw experts discuss whether AI transformation is fast approaching or further away than some anticipate.

    Dr. Shameer Khader, Global Head and Executive Director – Computational Biology Cluster, Precision Medicine and Computational Biology at global pharmaceutical company Sanofi, gave AI an emphatic endorsement. He said: “Drug discovery on average takes 10-15 years and one project around $1.5-2 billion in cost. Is that something sustainable? The model must change, and we should harness AI capabilities and value across the ecosystem. We should optimise every single process to reduce development costs, streamline the drug discovery lifestyle, and build data disease models and infrastructure.”

    In a special case study, audiences became acquainted with ‘BabyX’ – an interactive simulation of a lifelike infant through AI. This virtual animated baby learns and reacts like a human infant with a built-in virtual brain with detailed likeness to that of a human. Functioning through biological AI and an operating system called Brain Language, stimulated neurochemical reactions help BabyX decide how she will react – something that could prove revolutionary in the future AI economy.

    Elaborating on the significance of BabyX, Dr. Mark Sagar, its creator who co-founded New Zealand-based Soul Machines, pointed out the defining difference between human and AI intelligence, adding: “As humans, we learn from a young age though exploring the world and experimenting. Play is such a key part of making intelligence open-ended and inventive, but it’s one thing what’s missing from current AI. If we’re ever going to regulate general AI intelligence, we need to build cognitive architecture that yields intelligent behaviour through a comprehensive approach.”

    A catalyst for forward-facing collaboration

    Alongside the profound transformative potential of AI, GITEX GLOBAL’s status as a catalyst for collaboration and forward-facing projects was on full display. A number of exciting high-profile partnerships were officially unveiled at the world’s largest and best-rated tech event, with one involved KAOUN – the world-leading organiser of business events and trade fairs, leading all GITEX events outside the UAE.

    Tuesday saw KAOUN sign a Memorandum of Understanding with the Digital Dubai Authority to grow the GITEX ecosystem, support Dubai’s internationalisation strategy, and explore new partnership opportunities. Additionally, AWS and e& entered into a $1 billion-plus agreement as part of new strategic alliance to deliver cloud solutions and supporting AI deployment and digital transformation across the region. 

    Tuesday casts spotlight on AI’s cross-sector impact and demands

    Elsewhere on the Super AI Tuesday agenda, another applauded show illustrated how high-performance computing is steering humanity’s quest for the next generation of aircraft. During ‘Quantum Maturation: Introducing The “Quantum Mobility Quest”’, companies were urged to move beyond the physical limits of present-day computing today and scale up future-focused solutions to unlock aviation’s vast potential.

    Isabell Gradert, Vice President of Central Research & Technology, Airbus, Germany, said: “Aviation is embedded in the tapestry of our global-leading industries and is one with the highest computation needs. Quantum computing is seen as the next big gamechanger in the aviation industry and has the potential to solve the most complex aerospace challenges and create a paradigm shift in the way aircrafts are built and flown. This is a very exciting time.”

    Additionally, audiences familiarised themselves with a wide of services and solutions being showcased by GITEX GLOBAL exhibitors. UAE-based Presight, the region’s leading big data analytics company powered by generative artificial intelligence (AI), unveiled its Intelli Platform, an AI-powered management and operations platform that lets cities, transport, energy, and infrastructure organisations immediately use Generative AI.

    AWS also cast a spotlight on AWS Bedrock, a fully managed service that enables enterprises to easily build, customise, and deploy generative AI applications using foundation models from top AI providers, all through the AWS platform.

    GITEX GLOBAL 2024 continues Wednesday as “Cybersecurity Day” welcomes an ensemble cast of thought leaders and experts to explore the emerging threats landscape, counter-infringement strategies, and tools organisations require in an increasingly digital world.

    GITEX Editions (https://apo-opa.co/4h8xBn9) also presents Intelligent Connectivity (https://apo-opa.co/4hayjAy) with visitors set to explore how industry leaders can bridge digital divides and harness emerging technology to drive innovation and economic growth. The World Future Economy Digital Leaders Summit (https://apo-opa.co/4hlR8kn) also continues with another star-studded cast of world-renowned experts and innovative minds.  

    GITEX GLOBAL is seamlessly connecting with the world’s largest network of tech events, including GITEX EUROPE Berlin, GITEX ASIA Singapore, GITEX AFRICA Morocco, and GITEX NIGERIA. These events are fostering collaboration and driving innovation to shape the tech landscape of tomorrow.

    More information on GITEX GLOBAL, please visit http://www.GITEX.com

    MIL OSI Africa

  • MIL-OSI Africa: Applied Artificial intelligence (AI) and Deep Tech Innovations Take Centre Stage on Day Three of Expand North Star 2024

    Source: Africa Press Organisation – English (2) – Report:

    DUBAI, United Arab Emirates, October 16, 2024/APO Group/ –With global participation continuing to flourish, the spotlight also turned towards Africa, where burgeoning tech ecosystems are paving the way for a new wave of entrepreneurs and innovators. H.E. Savannah Maziya, Minister, Ministry of Information, Communications & Technology, Eswatini, alongside other thought leaders, emphasised the importance of structured development to tackle unique market challenges and unlock Africa’s economic potential.   

    Celina Lee, CEO & Co-Founder, Zindi, South Africa, highlighted the trend of talent returning to Africa to start companies and create ecosystems that foster innovation and attract global corporations like Microsoft to set up labs in Ghana and Nairobi.   

    Speaking on the challenges facing Africa, Olatunbosun Alake, Honorable Commissioner, Ministry of Innovation, Science and Technology, Lagos State Government, Nigeria, said, “The greatest challenge in Africa is education. In Nigeria, if you look at the most educated parts, they show economic value, whereas in the north, where education levels are not as high, economic productivity is lower. There needs to be an African Renaissance of education funding across the board because if you drive education, educate, and enlighten people, people will change the environment.” 

    Across its four-day span, Expand North Star continues to shed light on the future of industries through defining events such as GITEX Impact, Fintech Surge, Future Blockchain Summit, and Marketing Mania. These events underscore how emerging technologies are transforming the way we live and are also playing a pivotal role in reshaping the future.  

    MIL OSI Africa

  • MIL-OSI Global: Autocratic nations are reaching across borders to silence critics – and so far nothing seems to stop them

    Source: The Conversation – UK – By Francesca Lessa, Associate Professor in International Relations of the Americas, UCL

    Iranian journalist Pouria Zeraati survived an assassination attempt outside his home in Wimbledon, south London, in late March 2024. Eighteen months earlier, the London-based independent television channel Iran International, for which Zeraati worked, had temporarily relocated to Washington DC over threats that they believe come from the Islamic Revolutionary Guards Corps.

    Both incidents are examples of how it seems that a government can target an individual or organisation based outside their borders, with terrifying results.

    According to the latest research from the V-Dem Institute at the University of Gothenberg, 71% of the world’s population lived in autocracies in 2023 – ten years ago it was 48%. But what’s also new is that autocracies – as well as some other nations – are increasingly reaching across their borders to target people living abroad, enforcing the idea that they can reach their critics wherever they live.

    This kind of state action, taken outside national borders, is known as transnational repression, and is becoming more widespread. The Chinese government is seen as the biggest perpetrator, sometimes using violence to close down criticism or protests against its regime, held in other countries.

    Countries reaching across borders

    More than 20% of the world’s governments are believed to have taken this kind of action outside their borders in the past ten years. These included assassinations, abductions, assaults, detentions and unlawful deportations, according to the NGO Freedom House. These are aimed at forcibly silencing exiled political activists, journalists, former regime insiders and members of ethnic or religious minorities.
    In 2023, 125 such incidents were committed by 25 countries.

    While the majority of countries committing such practices tend to be autocracies, a number of democracies have also taken action across borders, including Israel, Hungary, India and Turkey, according to the report. In 2023, six countries engaged in these practices for the first time, including the Democratic Republic of Congo, El Salvador and Yemen.




    Read more:
    Why the growing number of foreign agent laws around the world is bad for democracy


    Freedom House recorded 1,034 physical attacks between 2014 and 2023, committed by 44 governments in 100 target countries. China, Turkey, Tajikistan, Russia and Egypt are the most prolific perpetrators, with China accounting for a quarter of all incidents.

    This type of terror tactic can take many forms. Freedom House has noted that governments increasingly cooperated to help target exiled dissidents. In 74% of the incidents of transnational repression that took place in 2021, both the origin and the host countries were rated “not free” by Freedom House.

    Awareness of this type of cross-border action is growing. Both human rights groups and academics are now systematically tracking attacks. And several governments, including the US and Australia, have committed to taking action to combat these practices. A bill was introduced in the US Senate in 2023 to specifically tackle transnational repression by foreign governments in the US and abroad.

    I studied the increasing levels of cooperation in transnational repression by different nations in a recent article published in International Studies Quarterly. We look at why states, which are normally reluctant to collaborate, do so when it comes to silencing dissidents abroad.




    Read more:
    Continuing crackdown on churches and NGOs moves Nicaragua further from democracy to authoritarianism


    Historical lessons?

    There are historical parallels between what happened during Operation Condor in South America and what’s happening today. Operation Condor was a system that Argentina, Bolivia, Chile, Paraguay and Uruguay started using in late 1975 with the backing of the US. It was aimed at persecuting exiles. Operation Condor was the most sophisticated, institutionalised and coordinated scheme ever established to persecute citizens who had been forced to flee their homeland.

    Journalist Pouria Zeraati was attacked.

    Three factors were found to explain why this form of repression was able to be used at the time and why countries agreed to cooperate.

    First, politically active exiled dissidents constituted a threat to the reputation and survival of South America’s ruling juntas. They successfully named and shamed the region’s military regimes, discrediting their international public images given the human rights violations perpetrated and resulting in the US cutting funding to Uruguay in 1976 and Argentina in 1977.

    Second, these autocracies, which came to power between 1964 and 1976, drew inspiration from the US National Security Doctrine and the French School of Counterinsurgency. In both, security was considered more important than human rights.

    The history of Operation Condor.

    Finally, two countries catalysed efforts to cooperate in this kind of action. Chile pushed for the formal creation of Operation Condor in 1975. Argentina then expanded it to include Brazil, Peru and Ecuador between 1976 and 1978. This significantly widened Operation Condor’s scope for action to most of South America.

    Why Operation Condor is relevant?

    Operation Condor was the only regional organisation to be created to hunt down political opponents across borders. Lessons from this historical experience are relevant today.

    Cooperation in transnational repression in the last few years also occurs in regional clusters, as shown by research by academics and human rights groups. These groups of nations include, for instance, Belarus, Russia and Tajikistan, as well as Thailand, Cambodia, Laos and Vietnam.

    In recent years these south-east Asian countries have closely collaborated to persecute, arbitrarily arrest and forcibly repatriate exiled activists and refugees, according to the media, the UN and international human rights NGOs.

    Second, one or more countries, predominantly Russia and Turkey, have worked together on efforts to repress critics over a significant period.

    Third, some regional organisations, of authoritarian nature, often enable cooperation in transnational repression, or at least create unsafe environments for migrating dissidents.

    The Shanghai Cooperation Organisation (SCO) and the Gulf Cooperation Council are examples, since they “have expanded their collective efforts against exiles”, according to some sources. SCO member states, especially Russia, China and Uzbekistan, have repeatedly used the organisation to pursue political opponents abroad and persecute them as criminals. This shows the organisation’s role as a platform for the diffusion and consolidation of authoritarian principles.

    Countries engaging in this kind of political repression today often wish to silence dissent wherever it occurs.

    These countries are acting in complete disregard of established principles of international law and international relations, such as sovereignty and the protection of refugees, and seem to be expanding their operations. It remains to be seen if there’s anything that the rest of the international community can do to reverse this terrifying trend, but at least it has started trying.

    Francesca Lessa’s projects “Operation Condor” and “Plancondor.org” received funding from the University of Oxford John Fell Fund, The British Academy/Leverhulme Trust, the University of Oxford ESRC Impact Acceleration Account, the European Commission under Horizon 2020, the Open Society Foundations, and UCL Public Policy through Research England’s QR-PSF funding. Lessa is also the Honorary President of the Observatorio Luz Ibarburu, a network of human rights NGOs in Uruguay.

    ref. Autocratic nations are reaching across borders to silence critics – and so far nothing seems to stop them – https://theconversation.com/autocratic-nations-are-reaching-across-borders-to-silence-critics-and-so-far-nothing-seems-to-stop-them-233037

    MIL OSI – Global Reports

  • MIL-OSI Global: Threads: the harrowing 1984 BBC docudrama is back on our screens – scary but appropriate viewing for our uncertain times

    Source: The Conversation – UK – By Mark Lacy, Senior lecturer, Politics, Philosophy, and Religion, Lancaster University

    The BBC docudrama Threads shocked audiences in 1984. BBC

    Threads – the horrific film made by the BBC in 1984 depicting the impact of a nuclear war on a city in the north of England – was recently made available to stream. It’s a brutal and grim tour of the aftermath of nuclear war, which anyone who viewed it when originally aired may struggle to watch again. But, 40 years on, the film is probably regarded more as an unpleasant artefact from a more dangerous time.

    These days we consume many types of apocalyptic entertainment in film and video games, exploring all types of societal collapse: ecological disaster, manufactured pandemics, alien invasions, cyber-attacks and dangerous AI. But Threads is particularly chilling in its attempt to give a realistic account of what could happen if cold war tensions escalated. I remember watching it as a teenager in a lesson at school and once was enough for me.

    But in the winter of 2024, it is difficult to escape the regular warnings about the escalating tensions around the world. There are widespread fears that a catastrophic series of diplomatic breakdowns and strategic miscalculations could result in a 2024 version of the events depicted in the 1984 film.

    Since the end of the cold war, much of international conflict has played out below the threshold of open war, in the realms of cyberwarfare, espionage and subversion. Or in other attempts at economic and political tactics intended to influence and manipulate. But there is clearly something very alarming about the situation since the invasion of Ukraine and the escalation of events in the Middle East since October 7.

    What makes the current situation so alarming is the sense that “great powers” or states with nuclear weapons could be pulled into conflicts that might quickly escalate beyond any diplomatic or political control. It’s hoped that leaders on all sides are determined to deter or contain conflict. But wars are shaped by accidents, miscalculations and errors of strategic judgement.

    Would Vladimir Putin have sent his troops into Ukraine if he could see how the Ukrainians and the international community would react? Now he has turned to making regular threats about Russia’s nuclear arsenal.

    So, there is a sense of unease about the current possibility of events getting out of control – of events escalating from brutal and horrific local or regional conflicts into a full blown global conflict. To be sure, there will (hopefully) be a continual diplomatic effort focused in ensuring that events in Ukraine or the Middle East do not escalate to the point where there the world is drawn into a wider war involving weapons of mass destruction.

    Rational v irrational actors

    But one of the concerns is that the situation in the 2020s is markedly difficult to geopolitical tensions during the cold war. The influential “realists” of international relations – academics like John Mearsheimer and Stephen Walt – argued that one of the reasons that the US should not invade Iraq was that Saddam Hussein was a “rational actor” whose behaviour could be contained and controlled. Iraq could be controlled through what they saw as “vigilant surveillance” and containment.

    But the fear in 2024 is that the world isn’t populated by rational actors as it was during the cold war, with its doctrine of mutually assured destruction.

    Putin is viewed as a leader increasingly detached from reality – surrounded by advisers too afraid to give him advice that he might not want to hear. In strategic terms, the fear he is that he might escalate to de-escalate. He might attempt a nuclear strike to deter events escalating further – an horrific warning signal that will end any attempts to challenge him.

    Some would question whether Iran may be led by men who are also detached from reality and might actually be looking for an apocalyptic showdown with Israel and the west. This depiction of irrational leaders might be more a reflection of our panic and paranoia than a credible assessment of leadership in these states. And of course, some would argue that the liberal world has its fair share of irrational actors.

    An interconnected world

    So, are we in a time or dangerous irrational actors where deterrence will not prevent a potentially apocalyptic escalation in global events? Security analysts and policymakers often refer to what is known as “deterrence by entanglement”. There are various types of deterrence but one of the geopolitical differences between now and the cold war is the level of interconnection between states that might have diplomatic, economic and political tensions.

    How many Chinese students study in UK universities? How much property in London is owned by Russian citizens? Societies are entangled to such a degree that a launching a nuclear strike on London would not only destroy investments, it might also kill your own citizens. Then there is the question of geographical location and nuclear strikes: would you risk the ecological blowback from nuclear strikes in a way that might endanger your territory, ecology and citizens – for generations?

    Leaders make mistakes and situations escalate in dangerous and unpredictable ways. But one of the lessons of international relations – going back to the works of Sun Tzu and Machiavelli – is that deception is a vital part of statecraft and warfare. And the “performance” of statecraft often requires cultivating an image of irrationality as a form of rational statecraft and deterrence. Some have argued that Donald Trump’s actions and pronouncements on international affairs produce a sense of uncertainty that works as a one-man strategy of deterrence.

    But as this performance plays out, it can be terrifying to watch and experience. Let’s not forget, the history of international relations is a history of tragic and mainly avoidable accidents.

    Mark Lacy does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Threads: the harrowing 1984 BBC docudrama is back on our screens – scary but appropriate viewing for our uncertain times – https://theconversation.com/threads-the-harrowing-1984-bbc-docudrama-is-back-on-our-screens-scary-but-appropriate-viewing-for-our-uncertain-times-241314

    MIL OSI – Global Reports

  • MIL-OSI United Kingdom: UK pushes for Middle East stability on ministerial visit to Egypt

    Source: United Kingdom – Executive Government & Departments

    Minister for the Middle East Hamish Falconer visits Egypt to push for regional stability.

    • The UK announces £1 million of assistance to Egyptian health authority to support medically evacuated Palestinians from Gaza.
    • New UK-Egypt Memorandum of Understanding on food security signed, signalling the UK’s support for Egypt’s leading role in food production in the region.
    • Minister calls for urgent de-escalation and a ceasefire in Gaza and Lebanon in his first visit to the Middle East, with visit to Al Arish border crossing.

    Providing humanitarian support for civilians affected by the current conflict was the focus of the Minister for the Middle East’s, Hamish Falconer, first official visit to the region this week.

    Announcing a new package of support to assist civilians medically evacuated from Gaza to Egypt, the Minister pledged £1 million of UK assistance to the Egyptian Ministry of Health that will support medically evacuated civilians from Gaza who are receiving care in Egypt.

    Delivered through the World Health Organisation (WHO) in Egypt, the funding will provide vital medical supplies and medications, including chemotherapy and rehabilitative equipment, to those in need. It will also strengthen capacity to care for patients from Gaza with chronic diseases.

    Minister for the Middle East Hamish Falconer said:

    “As a key regional partner, Egypt plays a central role alongside the UK in working for stability and security across the Middle East and driving forward de-escalation efforts in both Gaza and Lebanon.  

    “The worsening humanitarian situation in Gaza continues to bring devastation to many lives, with many requiring life-saving support over the border in Egypt. That’s why, alongside our Egyptian partners, we are funding life-saving treatments and support for medically evacuated civilians from Gaza. 

    “At Al Arish, I saw that many tonnes of lifesaving aid continue to be denied entry into Gaza by Israel. As winter approaches, Israel can and must do more to ensure aid flows freely into Gaza and to facilitate the UN and humanitarian agencies to carry out their work safely.

    “I signed a new UK-Egypt Memorandum of Understanding on sustainable food security, launching a new partnership between our two countries to tackle a critical global challenge.”

    The announcement came during the Minister’s visit to Al-Arish, where he met with the North Sinai Governor to discuss aid flows into Gaza. Here, the Minister visited the Egyptian Red Crescent’s warehouse and Al-Arish General Hospital to see how UK funding to WHO Egypt will be used.

    The Minister also met with Egypt’s Foreign Minister, Badr Abdelatty where he thanked Egypt for its ongoing role in getting aid into Gaza and agreed the need to continue working together for an immediate ceasefire in Gaza and Lebanon. Minister Falconer also raised the consular case of Alaa Abd El-Fattah and called for quick progress on his release.

    As Egypt is a regional leader in ensuring sustainable food security for the Middle East and Africa, the Minister also agreed a landmark UK-Egypt Memorandum of Understanding on Food Security with Rania Al Mashat, Minister of International Cooperation and Alaa Farouk, Minister of Agriculture. The agreement includes technical assistance to advance sustainable agribusiness practice and increase crop yield in Egypt.

    Speaking on today’s funding announcement, World Health Organisation Representative to Egypt Dr Nima Abid said:

    “WHO values its long-standing partnership with the British government, and we are deeply grateful for this generous contribution from the Foreign, Commonwealth and Development Office.

    “This support will enable WHO, in collaboration with the Ministry of Health and Population, to deliver critical supplies to Egyptian hospitals and equip healthcare workers to meet the urgent needs of medical evacuees from Gaza. I would also like to express my appreciation for the government of Egypt for its vital role in treating patients from Gaza and in facilitating their safe evacuation to other countries as well.”

    The UK continues to play a leading role in alleviating the suffering in Gaza and continues to provide significant funding to partners to support those most in need. The UK has already provided 78,000 shelter items, 76,000 wound care kits, and 1.3 million items of medicine.

    The UK trebled its aid commitment to the OPTs in the last financial year and this Government will maintain significant funding this financial year to support trusted aid
     agencies on the ground.

    The UK continues to call for an immediate ceasefire on all fronts and continues to push for urgent aid to enter Gaza and reach those most in need.

    Background

    • The FCDO currently advises against all but essential travel to the Egyptian desert west and south of the oases of Fayoum, Bahariya, Farafra, Dakhla and Kharga, except for:
    • The coastal areas between the Nile Delta and Marsa Matruh
    • The Marsa Matruh-Siwa road
    • The oasis town of Siwa
    • For further information on Egypt travel advice, visit https://www.gov.uk/foreign-travel-advice/egypt

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Flight PS752: International Coordination and Response Group memorial statement

    Source: United Kingdom – Executive Government & Departments

    The International Coordination and Response Group have filed a memorial with the International Court of Justice instituting the next phase in proceedings against Iran.

    Statement from the International Coordination and Response Group on filing memorial of Flight PS752:

    “Today the United Kingdom, Canada, Sweden and Ukraine have jointly filed a memorial with the International Court of Justice, instituting the next phase of proceedings against Iran in relation to its breaches of the 1971 Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation.

    “Iran has, among other violations, failed to take all practicable measures to prevent the destruction of Flight PS752 by members of its armed forces. Iran has equally failed to advance a full, transparent and impartial investigation and prosecution in accordance with international standards.

    “Today’s legal action underscores our commitment to achieving transparency, justice and accountability for the victims and their families.”

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Contact the FCDO Communication Team via email (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 16 October 2024

    MIL OSI United Kingdom

  • MIL-OSI Security: Defense News: Theodore Roosevelt Carrier Strike Group Returns to San Diego After 9-month Deployment

    Source: United States Navy

    TRCSG is a multiplatform team of ships, aircraft, and more than 6,000 Sailors, capable of carrying out a wide variety of missions around the globe. Deploying units of the strike group include Theodore Roosevelt, Destroyer Squadron (DESRON) 23, Carrier Air Wing (CVW) 11, and the Ticonderoga-class guided-missile cruiser USS Lake Erie (CG 70). While the Arleigh Burke-class guided-missile destroyers USS Russell (DDG 59), USS Halsey (DDG 97) and USS Daniel Inouye (DDG 118) also returned to their respective home ports, Lake Erie and Arleigh Burke-class guided-missile destroyer USS John S. McCain (DDG 56) remain deployed in the 7th Fleet area of operations supporting global maritime security operations.

    TRCSG deployed to the Indo-Pacific region to support regional security and stability, keep sea lanes open, and to reassure our allies and partners of the U.S. Navy’s unwavering commitment to the region. The strike group was later ordered to the U.S. Central Command area of responsibility to strengthen U.S. military force posture and capabilities throughout the Middle East in light of escalating regional tensions.

    “The strike group’s ability to quickly adjust from operations in 7th Fleet to 5th Fleet is a testament to both the flexibility of our naval forces as well as the strength and training of our Navy Sailors,” said Commander, Carrier Strike Group 9, Rear Adm. Christopher Alexander. “We had the distinct honor to strengthen our skills and relationships with 10 allied and partner nations, demonstrating our nation’s commitment to the freedom of navigation.”

    The TRCSG strengthened interoperability through dual carrier operations with the Carl Vinson Carrier Strike Group and Abraham Lincoln Carrier Strike Group, participation in exercise Valiant Shield 2024, and numerous bilateral and multilateral maritime exercises in the Philippine and South China seas as well as in the U.S. Central Command area of responsibility.

    Notable key leader engagements and visits aboard Theodore Roosevelt included the president of the Republic of Korea, chief of naval operations for the Republic of Korea Navy, lieutenant governor of Guam, U.S. Pacific Fleet commander, U.S. 7th Fleet commander, Republic of Singapore Navy fleet commander, U.S. ambassadors to the Republic of Korea, Singapore, Thailand and Qatar, and senior officers from the armed forces of the Japan Maritime Self-Defense Force, Republic of Korea and Royal Thai Navy, among others.

    The deployed Sailors from the TRCSG demonstrated their proficiency in enhanced maritime security operations through more than 9,000 sorties including 21,000 flight hours, 28 replenishments-at-sea, and more than 71,000 nautical miles traveled.

    Ships of the TRCSG conducted routine port visits to Bahrain, Diego Garcia, Guam, the Republic of Korea, Singapore and Thailand.

    “The crew worked incredibly hard and maintained mission focus this entire deployment,” said Capt. Brian Schrum, commanding officer, Theodore Roosevelt. “I am extremely proud of our Sailors and the work accomplished across the world’s oceans to keep our nation safe at home.”

    CVW 11 consisted of nine squadrons: the “Blue Blasters” of Strike Fighter Squadron (VFA) 34, the “Fist of the Fleet” of VFA-25, the “Flying Checkmates” of VFA-211, the “Black Knights” of VFA-154, the “Liberty Bells” of Airborne Command and Control Squadron (VAW) 115, the “Rooks” of Electronic Attack Squadron (VAQ) 137, the “Wolf Pack” of Helicopter Maritime Strike Squadron (HSM) 75, the “Eightballers” of Helicopter Sea Combat Squadron (HSC) 8 and the “Rawhides” of Fleet Logistics Support Squadron (VRC) 40.

    As an integral part of U.S. Pacific Fleet, Commander, U.S. 3rd Fleet operates naval forces in the Indo-Pacific and provides the realistic and relevant training necessary to execute the U.S. Navy’s timeless role across the full spectrum of military operations—from combat missions to humanitarian assistance and disaster relief. U.S. 3rd Fleet works in close coordination with other numbered fleets to provide commanders with capable, ready forces to deploy forward and win in day-to-day competition, in crisis, and in conflict.

    For more information about Carrier Strike Group 9 and USS Theodore Roosevelt visit https://www.surfpac.navy.mil/ccsg9/ and https://www.dvidshub.net/unit/COMCARSTRKGRU-9; Facebook: http://www.facebook.com/usstheodoreroosevelt

    MIL Security OSI

  • MIL-OSI China: 6 killed, 43 injured in Israeli airstrike on municipal building in S. Lebanon

    Source: China State Council Information Office

    Six people, including the mayor, were killed, and 43 others wounded on Wednesday in an Israeli airstrike targeting the buildings of the Nabatieh Municipality in southern Lebanon, according to Lebanese medical and military sources.

    The sources, speaking on condition of anonymity, told Xinhua that an Israeli warplane fired four air-to-ground missiles at the Nabatieh Municipality building and the building of the Union of Municipalities, killing the mayor, Ahmad Kahil, and a number of municipality members, injuring several others, and destroying the infrastructure.

    The Civil Defense teams, the Lebanese Red Cross, and the Islamic Health Authority are working to remove the rubble of the two buildings and search for missing persons, the sources said.

    Lebanese caretaker Prime Minister Najib Mikati condemned the attack, saying it deliberately targeted a meeting of the municipal council discussing the city’s service and relief situation.

    The new “aggression” conveys the message that “the international community should act immediately instead of remaining silent about Israeli crimes,” Mikati said.

    Meanwhile, Lebanese Ministry of Foreign Affairs and Emigrants announced on Wednesday that it had filed a new complaint with the UN Security Council regarding the Israeli attacks on Lebanon during the period Oct. 3-14.

    This is part of the periodic complaints submitted by the ministry through the Permanent Mission of Lebanon to the UN headquarters in New York to document the Israeli offensive and pressure the international community and the Security Council to act to stop it.

    Since Sept. 23, the Israeli army has been conducting intensive airstrikes on Lebanon in a sharp escalation with Hezbollah.

    The death toll from Israeli airstrikes on Lebanon since the beginning of the Hezbollah-Israeli conflict on Oct. 8, 2023 has reached 2,350, while injuries went up to 10,906, Health Ministry figures showed on Tuesday.

    MIL OSI China News

  • MIL-OSI USA: FACT SHEET: U.S. Achievements in the Global Fight Against  Corruption

    US Senate News:

    Source: The White House
    Corruption poses a grave and enduring threat to U.S. national interests and those of our partners. When officials abuse their entrusted power for personal or political gain, the interests of authoritarians and corrupt actors win – at the expense of citizens, honest businesses, and healthy societies. As the Biden-Harris Administration took office, this longstanding challenge had metastasized. In some countries, oligarchs were teaming up with foreign kleptocrats to warp policy and procurement decisions in exchange for kickbacks – with no accountability. Corrupt officials were laundering stolen assets through the U.S. and global financial systems, while local investigators were ill-equipped to follow the money. Reformers in countries saddled with corruption had scarce public resources to actually address development needs. The Biden-Harris Administration tacked these challenges starting Day One, to ensure democracy delivers and corrupt actors are held to account.
    The first National Security Study Memorandum of the Biden-Harris Administration established countering corruption as a “core U.S. national security interest,” leading to the issuance in December 2021 of the first United States Strategy on Countering Corruption. Since then, the United States has taken action at home and around the world to curb illicit finance, hold corrupt actors accountable, forge multilateral partnerships, and equip frontline leaders to take on transnational corruption. The result has been historic progress in protecting the U.S. financial system from money-laundering, including in the residential real estate sector, while enhancing corporate transparency. This Administration has mobilized record levels of foreign assistance dedicated to anti-corruption, including $339 million in Fiscal Year 2023 alone – almost double the yearly average during the previous four years. This new assistance has unlocked support for anti-corruption institutions, leveled the playing field for law-abiding businesses, enabled journalists to team up across borders, and more. Expanded law enforcement cooperation and capacity-building have generated convictions of corrupt actors as well as the seizure, forfeiture, and return of criminal proceeds, while new anti-corruption offices at the Department of State (State) and the U.S. Agency for International Development (USAID) energized diplomatic and stakeholder engagement. The United States imposed sanctions on more than 500 individuals and entities for corruption and related activities, and established – for the first time in any jurisdiction globally – a new visa restriction for those who enable corrupt activity.
    U.S. progress on anti-corruption has produced concrete benefits for the American people and stakeholders around the world – enhancing prosperity, economic security, safety, and democracy, as outlined below. To bolster and sustain this work, the U.S. government has also modernized its approach to addressing corruption as a cross-cutting priority. Today, Deputy National Security Advisor for International Economics Daleep Singh will highlight the benefits of this work to American businesses and workers at a White House anti-corruption roundtable with leaders from 15 major U.S. companies.
    Advancing economic opportunity abroad
    Improving the business enabling environment: U.S. assistance advanced governments’ capacity to prevent, detect, investigate, and prosecute corruption, while encouraging anti-bribery compliance. State expanded its Fiscal Transparency Innovation Fund – to help willing partners improve budget transparency – while holding countries to account for progress in its Fiscal Transparency Report. In the past two years alone, a newly expanded State-Federal Bureau of Investigations (FBI) program facilitated U.S. collaboration with foreign counterparts on more than 50 transnational corruption and money laundering cases with a U.S. nexus. In coordination with State, experienced legal advisors from the U.S. Department of Justice (DOJ) assisted foreign justice partners around the world in investigating and prosecuting corruption and money laundering cases, and recovering assets. And DOJ’s Kleptocracy Asset Recovery Initiative, in partnership with the FBI and the Department of Homeland Security, has recovered more than $1.7 billion and returned or assisted in returning more than $1.6 billion for the benefit of the people harmed by the corruption.
    Enforcing our bans on foreign bribery and money-laundering – and pressing other countries to do the same: To enable honest companies to compete overseas, the United States upheld its commitments under the OECD Anti-Bribery Convention by enforcing its foreign bribery and related laws and working with partners to monitor other countries’ progress in implementing the Convention, which celebrated its 25th anniversary in 2024. Since the start of the Administration, DOJ has imposed more than $3.5 billion in total monetary sanctions under the Foreign Corruption Practices Act (FCPA) in 16 corporate resolutions, and announced charges against more than 70 individuals. For instance, this April the former Comptroller General of Ecuador was convicted of money laundering relating to his receipt of over $10 million in bribes from, among others, the Brazil-based construction conglomerate Odebrecht S.A. The Securities and Exchange Commission continued civil enforcement of the FCPA, with approximately $1 billion in total monetary sanctions in 22 corporate resolutions, spanning conduct in 24 countries, since the start of the Administration. DOJ is also enforcing the recently enacted Foreign Extortion Prevention Act, which criminalizes demands for bribes by foreign officials from U.S. companies and others. In addition, this August DOJ announced a new Corporate Whistleblower Awards Pilot Program to uncover and prosecute corporate crime – with a particular focus on foreign and domestic corruption, as well as violations by financial institutions of their obligations to take steps to detect and deter money laundering.
    Seizing windows of opportunity: U.S. assistance has become more agile via the establishment of USAID’s Anti-Corruption Response Fund (providing flexible support to countries experiencing new opportunities or backsliding), the State-DOJ Global Anti-Corruption Rapid Response Fund (providing assistance and case mentoring to foreign partners on short notice), and USAID’s Democracy Delivers initiative (which has marshalled $500 million in funding from the United States and others to help reformers deliver, including on their anti-corruption commitments). These innovations, informed by USAID’s Dekleptification Guide, are enabling the U.S. government to more nimbly pivot toward environments where local momentum can be bolstered by outside assistance.
    Bolstering integrity in high-risk sectors: In April 2024, the United States and its partners launched the Blue Dot Network – a mechanism to certify infrastructure projects that have met global standards for quality and sustainability, including transparency in procurement and provisions to limit opportunities for corruption. The United States also supported the launch of PROTECT, a collective action project to address corruption risk in the supply chain for critical minerals.
    Strengthening corruption safeguards in the Indo-Pacific: In June, the United States and thirteen other partners held a signing ceremony, after concluding eight rounds of negotiations in record time, for the Indo-Pacific Economic Framework for Prosperity (IPEF) Fair Economy Agreement. The Agreement aims to create a more transparent, predictable trade and investment environment across IPEF partners’ markets, including through binding obligations to prevent and combat corruption. The Department of Commerce (Commerce) and State are accelerating implementation by offering new anti-corruption technical assistance to IPEF partners, including workshops on procurement corruption.
    Dialoguing with the private sector: In 2021, State launched the Galvanizing the Private Sector as Partners in Combatting Corruption initiative, which connects companies and governments to strengthen business integrity and encourage governance reform. Commerce’s International Trade Administration organized the 2024 forum of the Business Ethics for Asia-Pacific Economic Cooperation (APEC) Small and Medium Enterprises Initiative – the world’s largest public-private partnership on ethical business conduct – at which stakeholders formalized policy recommendations on business integrity in public procurement.
    Protecting the U.S. financial system from abuse
    Expanding corporate transparency: To deter kleptocrats and criminals from laundering money through anonymous shell companies, the Department of the Treasury (Treasury) operationalized a new filing system for certain companies operating in the United States to report their beneficial owners – the real people who own or control them – pursuant to the bipartisan Corporate Transparency Act. Treasury held hundreds of outreach events across all states and territories, reaching thousands of stakeholders, to enable companies to quickly and easily comply with this reporting requirement.
    Closing loopholes for money-laundering: Treasury finalized rules to close two major loopholes in the U.S. financial system: (1) to increase transparency in the U.S. residential real estate sector, to ensure that law-abiding homebuyers are not disadvantaged by individuals laundering their ill-gotten gains, and (2) to safeguard the investment adviser industry from illicit finance. Treasury also proposed a rule to modernize financial institutions’ anti-money-laundering/countering the financing of terrorism (AML/CFT) programs, to make them more effective and risk-based. Together, these rulemakings represent historic advances for the U.S. AML/CFT regime, in line with international standards, that will help the United States urge other countries to undertake similar reforms to curb illicit finance. The Biden-Harris Administration has also called on Congress to close even more loopholes that facilitate money-laundering by passing the ENABLERS Act.
    Blocking assets and denying entry to corrupt actors: Since the start of the Administration, Treasury has designated more than 500 individuals and entities for corruption and related activities, across six continents. That includes blocking the assets of 20 individuals and 48 companies in Fiscal Year 2024 for corruption in Afghanistan, Guatemala, Guyana, Paraguay, Western Balkans, and Zimbabwe. In tandem, State publicly issued corruption-related visa restrictions for 76 foreign officials and family members in Fiscal Year 2024, and 292 over the course of the Administration. These actions have protected the U.S. financial system from corrupt actors and promoted accountability in domestic jurisdictions. For example, just one week after the U.S. issuance of a public visa restriction on former Director of Bosnia-Herzegovina (BiH) Intelligence Services Osman Mehmedagic for significant corruption, he was arrested by BiH authorities for abuse of office.
    Taking aim at enablers of corruption: In December 2023, President Biden issued an historic Presidential Proclamation establishing a visa restriction for those who facilitate and enable significant corruption and their immediate family members. This new visa restriction complements existing commitments to use sanction and law enforcement capabilities to target private enablers of public corruption. Earlier this year, the FBI and DOJ secured a guilty plea and a criminal penalty of $661 million from Gunvor – one of the largest commodities trading firms in the world – for facilitating bribery of Ecuadorian officials and laundering those bribes through U.S. banks. In addition, USAID launched new activities to incentivize integrity within professions that serve as gatekeepers to the international financial system.
    Upholding international standards: The United States has helped lead efforts to expand anti-corruption work at the Financial Action Task Force (FATF), including improving assessment tools, mitigating risks associated with “golden passport” programs, and highlighting how non-financial sectors can be abused by corrupt actors.
    Keeping America and our partners safe
    Addressing corruption risk in the security sector: Security sector corruption can divert essential supplies, empower malign actors, threaten the safety of U.S. service members, and undermine U.S. military missions writ large. In the past year, the Department of Defense (DOD) incorporated corruption risk into its security cooperation planning – subjecting certain proposals to further scrutiny and identifying risk mitigation measures as needed. State also created new resources to weigh corruption risk as part of security sector assistance decision-making. In addition, State’s Global Defense Reform Program and DOD’s institutional capacity building programs advanced more transparent, accountable, and professional defense institutions. DOD continued running a training course on combatting corruption for partner military commanders and civilian leaders.
    Tackling organized crime and corruption: Transnational criminal organizations often rely on corruption to enable their criminal activities and evade accountability – which fuels narcotrafficking into the United States, human smuggling, cybercrimes, and more. The U.S. government is deploying anti-corruption tools to target criminal networks and their financial enablers, in line with the 2023 White House Strategy to Combat Transnational Organized Crime.
    Standing up to Russia’s aggression: The United States has adapted to address the wartime needs of Ukraine’s anti-corruption stakeholders, as they close off a key vector for Russian dominance and advance Ukraine’s democratic future. In 2023, Ukrainian anti-corruption investigators and prosecutors achieved an 80 percent increase in prosecutions and a 50 percent increase in convictions, plus opened cases against high-ranking officials including the former head of the Ukrainian Supreme Court.  With U.S. support, Ukraine has advanced significant reforms on asset disclosure, launched a whistleblower portal, strengthened the National Anti-Corruption Bureau, and enhanced transparency and integrity in reconstruction.
    Securing a greener future: The United States has integrated an anti-corruption lens across sectors, with particular emphasis on addressing corruption vulnerabilities that threaten a secure, just energy transition for all. This includes USAID support to the Extractive Industries Transparency Initiative (EITI), increased mining transparency in the Democratic Republic of Congo and Zambia, and innovations that address transnational corruption in green energy mineral supply chains across 15 countries.
    Protecting global health: Corruption curtails the ability of states to respond to pandemics and undercuts access to basic healthcare. USAID is tackling this challenge by releasing cutting-edge guidance on anti-corruption in the health sector and launching integrated programming. For example, in Liberia the United States is working with the government to curb theft of pharmaceuticals through civil society monitoring, law enforcement trainings, and public awareness campaigns.
    Addressing the root causes of migration: Combating corruption is a core component of improving conditions in El Salvador, Guatemala, and Honduras – so people do not feel compelled to leave their homes, in line with the U.S. Strategy for Addressing the Root Causes of Migration in Central America. Recent U.S. actions have included training up to 27,000 justice sector stakeholders in those countries to more effectively address corruption.
    Defending democracy by rooting out corruption
    Tackling electoral corruption: When candidates can be bankrolled by foreign adversaries and institutions captured by kleptocrats, citizens lose faith in their governments—or even in democracy itself. In response, USAID has launched new programs to bolster electoral integrity, strengthen independent media, and increase the transparency of political finance in high-risk locations.
    Lifting up civil society and independent media: The U.S. government has substantially expanded support to frontline activists and journalists, including through the Global Anti-Corruption Consortium. In addition, a new State Department initiative is training hundreds of journalists in transnational corruption investigations, while USAID’s new investigative journalist networks in Asia and Southern Africa are building capacity to track corruption across sectors and across borders. The Secretary of State established a new award for Anti-Corruption Champions, which has honored dozens of courageous civil society leaders and embattled reformers. In 2022, the United States also hosted the largest regular gathering of civil society activists fighting corruption – the International Anti-Corruption Conference – in Washington, DC, with keynote remarks from APNSA Jake Sullivan.
    Protecting sovereignty: Authoritarian actors like Russia and the PRC use bribery to interfere in the policy, procurement, debt, and electoral processes of other countries – undermining both sovereignty and democracy. The United States is standing up to this tactic by building the resilience of frontline actors to detect and deflect foreign-backed strategic corruption, educating partners about the kleptocrats’ playbook, harnessing sanction tools to deter threats, and increasing collaboration between practitioners working on anti-corruption and those addressing foreign malign influence – both within the USG and with likeminded partners. For example, in June the United States joined with Canada and the UK to expose Russia’s use of corruption and covert financing, among other tactics, to undermine democratic processes in Moldova.
    Restoring trust in American democracy: The Biden-Harris Administration has established the strongest ethics standards of any U.S. presidency. On his first day in office, the President signed an Executive Order requiring administration officials to take a stringent ethics pledge, which extends lobbying bans, limits shadow lobbying, and makes ethics waivers more transparent. The Administration also restored longstanding democratic norms by protecting DOJ cases from political interference, releasing the President’s and Vice-President’s taxes, and voluntarily disclosing White House visitor logs. And in the last year, the Office of Government Ethics finalized rules updating the standards for ethical conduct and legal expense funds for executive branch employees.
    Protecting American democracy from malign finance: Just as we defend democracy around the world, the U.S. government is working to keep American democracy safe from foreign adversaries. Actions to curb money laundering in the United States can help reduce the ability of foreign and domestic actors to make illegal campaign contributions and evade U.S. election laws. President Biden has called on Congress to go even further by passing the DISCLOSE Act, which would curb the ability of foreign entities and special interests to use dark money loopholes to influence our elections.
    Revitalizing participation in the Open Government Partnership (OGP): The United States rejoined the Steering Committee of OGP – a platform for civil society and governments to forge joint commitments and learn from each other– and provided assistance for OGP’s work on anti-corruption. Domestically, the United States has turbocharged OGP implementation by creating the U.S. Open Government Secretariat at the General Services Administration, an Open Government Federal Advisory Committee, an Interagency Community of Practice – spanning federal, state, local, tribal, and territorial governments, and engaged with hundreds of stakeholders to exchange lessons and expand transparency, accountability, and public participation. The United States also launched the first-ever Request for Information to feed into the 6th U.S. OGP National Action Plan and announced development of a toolkit to help federal agencies more meaningfully engage with the public.
    Modernizing and coordinating U.S. government efforts to fight corruption
    Institutionalizing anti-corruption as an enduring priority: Over the past four years, Departments and Agencies have made substantial organizational improvements to elevate corruption concerns. For example:
    The State Department’s new Office of the Coordinator on Global Anti-Corruption leads the integration of anti-corruption priorities into bilateral and other policy processes, conducts targeted diplomatic engagements, and drives strategic planning, including through the Department’s senior-level Anti-Corruption Policy Board. In the past year, the Office jumpstarted implementation of the Combating Global Corruption Act and completed an analysis of anti-corruption assistance to inform future State Department decision-making.
    USAID’s new Anti-Corruption Center, within the newly established Bureau for Democracy, Human Rights, and Governance, serves as a hub of technical expertise and thought leadership – driving the integration of corruption considerations across USAID’s portfolio, supporting USAID Missions in developing localized approaches, managing a suite of programming focused on transnational corruption, and using its convening power and policy insights to forge strategic partnerships. Since 2022, USAID has released its first-ever Anti-Corruption Policy, which outlines a cross-sectoral approach to constraining opportunities for corruption, raising the costs of corruption, and incentivizing integrity – plus a host of tools to drive uptake across USAID.
    FBI’s International Corruption Unit expanded an agreement with the State Department to deploy six regional anti-corruption advisors to strategic locations around the world, where they organize regional working groups with local law enforcement officials, provide case-base mentorship, and facilitate coordination with the International Anti-Corruption Coordination Centre.

    Expanded interagency capacity has been complemented by the National Security Council’s establishment of a dedicated Director for Anti-Corruption position, for the first time, to ensure whole-of-government coordination and advance anti-corruption within key policy processes.
    Leading in multilateral fora: The United States has regained its leadership role in the international bodies that shape anti-corruption norms globally and can sustain momentum across time. In particular, the United States stepped into the presidency of the UN Convention against Corruption Conference of States Parties (UNCAC COSP), proudly hosting in December 2023 thousands of stakeholders in Atlanta, Georgia, led by the U.S. Representative to the United Nations Linda Thomas-Greenfield. As part of its commitment to championing the role of non-governmental actors in the fight against corruption, the United States facilitated record civil society participation in UNCAC working group meetings, hosted the first UNCAC Private Sector Forum, and supported inclusive implementation of UNCAC commitments in Latin America, East Africa, and Southeast Asia. The United States also participated in several peer reviews of our own anti-corruption practices over the last three years, and proudly made these results public. Alongside these multilateral fora, we convened the Global Forum on Asset Recovery action series to accelerate practitioner cooperation across the United States, Algeria, Honduras, Iraq, Moldova, Nigeria, Seychelles, Ukraine, the United Kingdom, and Zambia.
    Understanding corruption dynamics: The Intelligence Community developed and disseminated new resources to bolster intelligence prioritization, collection and analysis on corrupt actors and their networks. USAID commissioned research on topics like countering corruption through social and behavioral change and State initiated an interagency anti-corruption learning agenda and a small grants program to support it.
    Deepening external partnerships: The United States convened a series of coordination meetings with other bilateral donors and philanthropies in order to harmonize our anti-corruption approaches and galvanized anti-corruption resources across the donor community through the Integrity for Development campaign. USAID’s Countering Transnational Corruption Grand Challenge for Development brought together technologists, businesses, activists, and others to collaboratively address concrete corruption challenges.

    MIL OSI USA News

  • MIL-OSI Security: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

    Source: US Department of Homeland Security

    Summary

    The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

    Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

    This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

    The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

    Download the PDF version of this report:

    For a downloadable list of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Overview of Activity

    The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

    Initial Access and Persistence

    The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

    Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

    • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
    • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

    The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

    Lateral Movement

    The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

    Credential Access

    The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

    Privilege Escalation

    In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

    Discovery

    The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

    • Nltest /dclist
    • Nltest /domain_trusts
    • Nltest /domain_trusts/all_trusts
    • Net group “Enterprise admins” /domain
    • Net group “Domain admins” /domain

    Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                               $i=0
                                               $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                               $L='LDAP://' . $D
                                               $D = [ADSI]$L
                                               $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                               $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                               $s = [adsisearcher]$str
                                               $s.searchRoot = $L.$D.distinguishedName
                                               $s.PropertiesToLoad.Add('cn') > $Null
                                               $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                               $s.PropertiesToLoad.Add('description') > $Null
                                               $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                               Foreach ($CA in $s.FindAll()) {
                                                             Write-Host $CA.Properties.Item('cn')
                                                             $CA.Properties.Item('operatingsystem')
                                                             $CA. Properties.Item('description')
                                                             $CA.Properties.Item('distinguishedName')
                                                             $i++
                                               }
                                               Write-host Total servers: $i

    Command and Control

    On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

    Exfiltration and Collection

    In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

    Detection

    To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

    To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

    • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
    • Look for one IP used for multiple accounts, excluding expected logins.
    • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
    • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
    • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
    • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
    • Look for unusual activity in typically dormant accounts.
    • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

    Mitigations

    The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

    • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
    • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
    • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
    • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
    • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
      • Detecting unsuccessful login attempts [CPG 2.G].
      • Having users deny MFA requests they have not generated.
      • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
    • Ensure password policies align with the latest NIST Digital Identity Guidelines.
      • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
    • Disable the use of RC4 for Kerberos authentication.

    These mitigations apply to critical infrastructure entities across sectors.

    The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

    Validate Security Controls

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

    Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

    Version History

    October 2, 2024: Initial version.

    Appendix A: MITRE ATT&CK Tactics and Techniques

    See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Reconnaissance
    Technique Title  ID Use
    Gather Victim Identity Information T1589 The actors likely gathered victim information.
    Table 2: Resource Development
    Technique Title  ID Use
    Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
    Table 3: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
    Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
    External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
    Table 4: Execution
    Technique Title  ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
    Table 5: Persistence
    Technique Title ID Use
    Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
    Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
    Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
    Table 6: Privilege Escalation
    Technique Title ID Use
    Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
    Table 7: Defense Evasion
    Technique Title ID Use
    Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Table 8: Credential Access
    Technique Title ID Use
    Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
    Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
    Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
    Table 9: Discovery
    Technique Title ID Use
    Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
    Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
    Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
    Table 10: Lateral Movement
    Technique Title  ID Use
    Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
    Table 11: Collection
    Technique Title ID Use
    Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
    Table 12: Command and Control
    Technique Title ID Use
    Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
    Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
    Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

    Appendix B: Indicators of Compromise

    See Tables 13 to 15 for IOCs obtained from FBI investigations.

    Table 13: Malicious Files Associated with Iranian Cyber Actors
    Hash Description
    1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
    3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

    Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

    Table 14: Network Indicators
    IP Address Date Range
    95.181.234.12 01/30/2024 to 02/07/2024
    95.181.234.25 01/30/2024 to 02/07/2024
    173.239.232.20 10/06/2023 to 12/19/2023
    172.98.71.191 10/15/2023 to 11/27/2023
    102.129.235.127 10/21/2023 to 10/22/2023
    188.126.94.60 10/22/2023 to 01/12/2024
    149.40.50.45 10/26/2023
    181.214.166.59 10/26/2023
    212.102.39.212 10/26/2023
    149.57.16.134 10/26/2023 to 10/27/2023
    149.57.16.137 10/26/2023 to 10/27/2023
    102.129.235.186 10/29/2023 to 11/08/2023
    46.246.8.138 10/31/2023 to 01/26/2024
    149.57.16.160 11/08/2023
    149.57.16.37 11/08/2023
    46.246.8.137 11/17/2023 to 01/25/2024
    212.102.57.29 11/19/2023 to 01/17/2024
    46.246.8.82 11/22/2023 to 01/28/2024
    95.181.234.15 11/26/2023 to 02/07/2024
    45.88.97.225 11/27/2023 to 02/11/2024
    84.239.45.17 12/04/2023 to 12/07/2023
    46.246.8.104 12/07/2023 to 02/07/2024
    37.46.113.206 12/07/2023
    46.246.3.186 12/07/2023 to 12/09/2023
    46.246.8.141 12/07/2023 to 02/10/2024
    46.246.8.17 12/09/2023 to 01/09/2024
    37.19.197.182 12/15/2023
    154.16.192.38 12/25/2023 to 01/24/2024
    102.165.16.127 12/27/2023 to 01/28/2024
    46.246.8.47 12/29/2023 to 01/29/2024
    46.246.3.225 12/30/2023 to 02/06/2024
    46.246.3.226 12/31/2023 to 02/03/2024
    46.246.3.240 12/31/2023 to 02/06/2024
    191.101.217.10 01/05/2024
    102.129.153.182 01/08/2024
    46.246.3.196 01/08/2024
    102.129.152.60 01/09/2024
    156.146.60.74 01/10/2024
    191.96.227.113 01/10/2024
    191.96.227.122 01/10/2024
    181.214.166.132 01/11/2024
    188.126.94.57 01/11/2024 to 01/13/2024
    154.6.13.144 01/13/2024 to 01/24/2024
    154.6.13.151 01/13/2024 to 01/28/2024
    188.126.94.166 01/15/2024
    89.149.38.204 01/18/2024
    46.246.8.67 01/20/2024
    46.246.8.53 01/22/2024
    154.16.192.37 01/24/2024
    191.96.150.14 01/24/2024
    191.96.150.96 01/24/2024
    46.246.8.10 01/24/2024
    84.239.25.13 01/24/2024
    154.6.13.139 01/26/2024
    191.96.106.33 01/26/2024
    191.96.227.159 01/26/2024
    149.57.16.150 01/27/2024
    191.96.150.21 01/27/2024
    46.246.8.84 01/27/2024
    95.181.235.8 01/27/2024
    191.96.227.102 01/27/2024 to 01/28/2024
    46.246.122.185 01/28/2024
    146.70.102.3 01/29/2024 to 01/30/2024
    46.246.3.233 01/30/2024 to 02/15/2024
    46.246.3.239 01/30/2024 to 02/15/2024
    188.126.89.35 02/03/2024
    46.246.3.223 02/03/2024
    46.246.3.245 02/05/2024 to 02/06/2024
    191.96.150.50 02/09/2024
    Table 15: Devices
    Device Type Description
    Samsung Galaxy A71 (SM-A715F) Registered with MFA
    Samsung SM-G998B Registered with MFA
    Samsung SM-M205F Registered with MFA

    MIL Security OSI