Category: Technology

  • MIL-OSI USA: NREL and Google Host Artificial Intelligence Hackathon To Tackle Data Center Energy Challenges

    Source: US National Renewable Energy Laboratory

    Experts Explore Potential of Google AI Tools To Mitigate Potential Energy Limits for Quick Growth of US Data Centers


    NREL and Google teamed up to host a hackathon, bringing together leading researchers from nine U.S. Department of Energy (DOE) national laboratories to explore and leverage Google’s generative artificial intelligence (AI) and large language model tools to address an array of critical challenges related to energy limitations for U.S. data centers.

    Overcoming these challenges is critical to enable scaling for future technologies while ensuring energy reliability and affordability.

    According to Google’s AI definition, fittingly, a hackathon is a collaborative event where people with diverse skills, often programmers and designers, come together to work intensively on a specific project, typically within a short time frame.

    The original idea for the hackathon emerged out of discussions with Google’s public sector team and NREL’s computational science team.

    “Both groups were interested in exposing scientists to some of the latest and greatest AI models to test out what they’re really capable of, but both groups also wanted a targeted application,” said Ray Grout, director of the computational science center at NREL. “Exploring data center energy challenges was a natural fit given the growing demand of energy for AI, and the interest in the topic for the labs and Google.”

    Roughly 50 top minds, including six NREL computational and data scientists, participated in the two-day event, which took place June 17–18 in Washington, D.C. Participants engaged in hands-on experimentation, applying cutting-edge AI capabilities to real-world problems in geospatial analytics, energy systems, data center optimization, and digital-twin development. The hackathon provided a unique platform for participants to directly engage with Google’s AI tools, particularly Gemini, and explore their applicability to a diverse range of scientific and engineering problems.

    The hackathon brought together leading researchers from across DOE’s national laboratories to explore and leverage Google’s generative AI tools. Photo from Beth Hartman, Google

    Google’s AI platform includes several tools that enable researchers to accelerate and expand their work overall. Among the tools are Agentspace and its included agents like Idea Generation and Deep Research. Idea Generation, an agent premade by Google, has the goal of helping with innovation and problem-solving for enterprise users by combining advanced AI with a unique tournament-style competition framework to generate and rank ideas. Deep Research enables researchers to gather, analyze, and understand internal and external information.

    Other tools help improve operational efficiency, allowing researchers to inform their work by more quickly finding resources across labs and agencies. Finally, many tools address specific use cases like geospatial reasoning, population dynamics, and weather forecasting. For example, one demonstration that the Google geospatial team showed at the hackathon used geospatial reasoning and weather forecasting for predicting grid outages. Google teams represented at the hackathon included Google Public Sector, DeepMind, Google Research, and Climate Ops.

    Google’s geospatial reasoning team developed a demo for the hackathon showing outage predictions based on weather forecasting models. Image from Beth Hartman, Google

    “Google was honored to partner with NREL and work with so many DOE labs at this collaborative event,” said Regiuel Days, account executive for federal science and research at Google. “These critical research institutions provide our country with essential insights into key issues such as grid resilience, energy security, and data center optimization. Combined with Google’s data and cutting-edge AI models, we can work together to more quickly find solutions to the big challenges we face.”

    Hackathon Experience and Outcomes

    The hackathon successfully demonstrated the potential of generative AI in accelerating research, automating complex tasks, and generating novel insights.

    During the two-day event, experts teamed up to collaborate and explore the various identified challenges. Some participants focused on geospatial analytics, leveraging Gemini to process and interpret spatial data. Other researchers utilized Gemini’s code-generation and debugging capabilities, while others found Gemini valuable for in-depth research and brainstorming.

    Hackathon participants engaged in collaborative, hands-on experimentation, applying cutting-edge AI capabilities to real-world problems. Photo from Beth Hartman, Google

    NREL’s Gabriel Steenberg was one of several researchers to explore specialized problems. Steenberg explored the Population Dynamics Foundation model to predict power grid behavior, feeding it county-level data to see if it could predict interconnections in other counties. Other laboratories with staff in person at the event included Argonne National Laboratory, Idaho National Laboratory, Jefferson Laboratory, Lawrence Berkeley National Laboratory, National Energy Technology Laboratory, Oakridge National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories.

    The labs explored solutions such as using Vertex AI and Google Earth Engine to better understand data-center load balancing, real-time water data, and cybersecurity. Through these topic explorations, Google gained insights into how national laboratories envision using their AI tools, especially concerning specialized applications like geospatial reasoning, digital twins, and autonomous engineering.

    The hackathon served as a valuable collaborative step, fostering innovation and providing crucial insights into the evolving landscape of generative AI for scientific research. The event generated robust discussion, shared learning, and discoveries and identified opportunities for future follow-on events.

    “We have so many experts across the national labs working on energy challenges, and Google has so many experts developing and deploying AI solutions. This was a great way to get everyone in the same room to figure out what we can do already and where there is more work to be done,” Grout said.

    “Throughout this interactive, guided exploration of Google’s AI models and tools, we learned a tremendous amount about what types of challenges the labs are focused on solving,” said Beth Hartman, Google’s industry executive for federal science and research. “This helps us to better understand how we can help more specifically. Going forward, we are focused on providing the labs with increased access to the models that best support their work. We are also planning to host more hackathons in partnership with the labs and will continue to invite all 17 DOE labs to participate. Stay tuned!”

    Learn more about NREL’s computational science and AI research.

    MIL OSI USA News

  • MIL-OSI: Taxback International rebrands as Fintua

    Source: GlobeNewswire (MIL-OSI)

    Kilkenny, Ireland , July 22, 2025 (GLOBE NEWSWIRE) — Taxback International, a global leader in VAT compliance and recovery, has officially rebranded as Fintua. This rebrand represents the fusion of decades of indirect tax expertise with next-generation SaaS technology, setting a new standard for digital solutions in the fintech space. With this rebrand, the company reinforces its commitment to delivering smarter, more scalable fintech solutions to accelerate positive digital change across the indirect tax landscape.

    Fintua are a global fintech leader, delivering specialist tax technology solutions for indirect tax recovery, compliance, eInvoicing and payments.

    Why the change?

    Fintua represents the evolution of our business from a specialist in VAT reclaim to a global technology expert in the wider fintech industry. As indirect tax grows more complex, businesses are seeking smarter, more agile solutions. Our rebrand signals a commitment to empowering global tax and finance professionals with innovative technology that simplifies complexity, reduces risk and transforms how tax is managed. 

    The name Fintua blends our financial technology focus with a strong connection to our Irish heritage. Fin reflects our fintech expertise, while Tua derived from the Irish word tuath (meaning people or community), highlights our collaborative and client-centric values.  

    A new chapter of innovation 

    Rebranding to Fintua represents more than a name change – it is a statement of intent. We remain the trusted partner our clients know, but with an even greater focus on developing intuitive, expert-built technology that meets both current and future tax challenges. 

    “As we embark on this exciting journey to become Fintua, I am thrilled to see our company evolve into a brand that truly reflects our innovative spirit and commitment to tax technology,” said Catherine Quirke, CEO of Fintua. “This rebranding marks a significant milestone in our growth, and identifies with our ability and commitment to deliver cutting-edge solutions that meet the evolving needs of our customers.” 

    Fintua’s vision is to be a leader in breakthrough technology, accelerating positive digital change throughout the indirect tax and wider fintech community. Our values; empowering, progressive, collaborative, and perceptive—will continue to guide every solution we deliver. 

    “The rebrand of Taxback International to Fintua is a proud moment for all of us at CluneTech. It’s a reflection of how far the business has come since its early days in Kilkenny – growing from a VAT reclaim specialist into a global technology leader in tax and fintech. For me, Fintua stands for innovation, ambition, and the power of a great team working together to solve complex challenges for businesses worldwide. I’m excited to see Fintua lead the way into this new era, continuing our tradition of empowering clients and driving positive change across the industry.” – Terry Clune, CEO and Founder of CluneTech. 

    About Fintua

    Fintua is a global fintech leader, delivering specialist tax technology solutions for indirect tax recovery, compliance, eInvoicing and payments. 

    Press inquiries

    Fintua
    https://fintua.com/
    Katie Fitzpatrick
    kfitzpatrick@fintua.com
    +353 87 020 3636
    IDA Business and Technology Park,
    Ring Road,
    Kilkenny,
    R95 ETN5

    The MIL Network

  • MIL-OSI: Layton Construction and TrueLook Partner to Deliver Complete Construction Site Visibility for Utah Mammoth’s New Practice Facility

    Source: GlobeNewswire (MIL-OSI)

    SALT LAKE CITY, July 22, 2025 (GLOBE NEWSWIRE) — Layton Construction, a leading national commercial contractor, is collaborating with TrueLook, an innovator in jobsite camera technology, to provide comprehensive visual oversight for the construction of the Utah Mammoth’s new practice and training facility at the Shops at South Town in Sandy.

    As the general contractor for this project, Layton Construction is leveraging TrueLook’s solutions, including a high-resolution 4K IR fixed camera and an intuitive platform. These technologies are providing Layton’s project managers with comprehensive, real-time visibility across the entire construction site.

    The integration of TrueLook’s cameras provides several key benefits, such as helping the project remain on schedule and keeping stakeholders consistently informed. The improved visibility allows Layton’s team to proactively monitor progress, identify potential challenges early, and make data-driven decisions to minimize delays. Furthermore, the visual access provided by the cameras keeps stakeholders directly connected to the project’s evolution, fostering clear communication and collaboration.

    “We rely on TrueLook Cameras to stay on top of what’s happening on our projects 24/7,” says Austin Lay, a Senior VDC Manager at Layton Construction. “With so much going on, it’s reassuring to have that second, third, or even fourth set of eyes helping us. TrueLook has proven to be a great partner, consistently delivering time and time again.”

    TrueLook’s technology offers significant advantages beyond standard monitoring. The 4K IR Fixed Camera captures exceptionally clear imagery, even in low-light or nighttime conditions, providing continuous visual insights into site activity around the clock. This ability to maintain comprehensive visibility, regardless of the time of day, empowers Layton to manage the complex construction process with greater precision.

    This partnership between Layton Construction and TrueLook underscores a commitment to innovation and efficiency in bringing this exciting project to life.

    About Layton Construction

    Layton Construction is a privately held national general contractor, delivering predictable outcomes in commercial construction since 1953. Headquartered in Salt Lake City, Utah, Layton operates from 16 strategic offices across the United States, employing more than 1,400 construction professionals who serve diverse markets including healthcare, education, commercial office, industrial, hospitality, and multi-unit residential. Founded on the core values of honesty, unity, safety, and quality, Layton has built a reputation for excellence in complex project delivery while maintaining strong partnerships with clients, architects, and trade partners nationwide.

    About TrueLook
    TrueLook provides construction teams with total jobsite visibility combining rugged, easy-to-deploy cameras with a powerful platform built for the realities of the field. From live streaming and cinematic time-lapses to AI-powered security, TrueLook helps builders document progress, protect assets, and keep stakeholders aligned. Thousands of projects across North America rely on TrueLook to stay informed and in control at every stage of the build.

    Media Contact
    Allison Shaub
    Chief Marketing Officer
    allison.shaub@truelook.com

    The MIL Network

  • MIL-OSI: Assembly Software Unveils NeosAI’s First-Year Milestones: From Groundbreaking Launch to Industry-Defining AI Platform

    Source: GlobeNewswire (MIL-OSI)

    CORAL GABLES, Fla., July 22, 2025 (GLOBE NEWSWIRE) — Assembly Software today celebrated a landmark year for NeosAI, showcasing the platform’s most transformative advancements since its June 2024 launch. The July 2025 release marks more than an upgrade; it’s a reimagining of what’s possible when artificial intelligence meets legal practice management.

    The Numbers Tell the Story: A Year of Unprecedented Growth

    • 20+ groundbreaking AI features delivered through continuous innovation cycles
    • Task execution has exploded by 10,000%, drastically increasing processing of legal documents and workflows
    • AI user adoption has skyrocketed 2,500%, with firms of all sizes embracing the platform
    • 75 hours (about 6 days) saved per week per firm – equivalent to hiring two additional full-time legal staff

    From Foundation to Future: The Evolution Timeline

    June 2024: NeosAI launched with a simple premise: eliminate repetitive legal work. Early adopters witnessed immediate impact through streamlined workflows and intelligent automation.

    December 2024: Based on intensive user feedback, Assembly delivered enhanced document processing capabilities and introduced the first generation of NeosAI Chat setting the stage for exponential growth.

    May 2025: Microsoft case study validates Assembly Software’s NeosAI, highlighting a 40% increase in case capacity and a 60% reduction in time-to-settlement, showcasing significant industry impact and third-party endorsement.

    July 2025: Today’s release represents the apex of legal AI evolution, introducing powerful new capabilities, including:

    • Large-Scale Document & Multi-Document Processing: Supporting documents up to approximately 4 million characters (1,500-2,000 pages), NeosAI now handles the most complex litigation files in single sessions – a 400% increase from launch capabilities.
    • Contextual Intelligence 2.0: Users can now leverage case data and multiple long-form documents as context for document generation, producing outputs with ease and accuracy
    • Adaptive Case Intelligence: The revolutionary Case Summary leverages data from user-selected information in Neos & Documents, producing a focused and relevant overview front and center of every case.
    • Hands Off Data Processing: Bulk medical record & invoice extraction capabilities have drastically reduced processing and data entry time.
    • Multi-Dimensional AI Chat: AI Chat’s ability to analyze multiple case documents and Neos data via smart conversation threads make it effortless to summarize, draft, and interrogate documents & case information.
    • Dynamic Form Evolution: Now available for all Neos users, NeosAI takes dynamic forms one step further with precise extraction capabilities.

    Client Success Stories: The Human Impact

    As Sheila Hiestand, McCoy & Hiestand puts it, NeosAI adoption is “about efficiencies. If you’re not evolving, you’re falling behind.”

    Nicole Zutz of Burnetti P.A. loves how NeosAI gives her “the ability to use AI to shorten the amount of time it takes to review a file and the ‘Analyze AI’ parts as well. It helps me with reviewing medical records.”

    Another happy NeosAI user is thrilled to share that “the AI-powered features have helped me manage documents and deadlines effortlessly, freeing up my time to focus on more critical legal research and case preparation.”

    These Neos customers are among the many who have harnessed the platform to significantly increase productivity while alleviating staff burnout. On average, firms save 25 hours per case through NeosAI’s advanced features, and with unlimited AI usage, they are only beginning to realize the full potential and value that AI brings to their operations.

    Looking Forward: The Next Chapter

    Assembly Software’s commitment to continuous innovation means NeosAI’s evolution is far from complete. The company has announced an aggressive roadmap for 2025-2026, including predictive case analytics, integration of advanced reasoning models and deployment of agentic AI for execution of complex tasks.

    About Assembly

    Assembly Software is a visionary technology company dedicated to revolutionizing the legal industry. It blends decades of history and industry experience with next-generation, customer-focused innovation, bringing together two of the legal profession’s pioneering case management brands, Needles and Trialworks, both of which have contributed to Neos, Assembly’s reimagined cloud-based solution. With its premier case management solution, Neos, and the game-changing NeosAI, Assembly Software empowers law firms to exceed expectations and maximize their potential through innovative software solutions.

    To learn more about NeosAI, visit:
    https://www.assemblysoftware.com/neos-ai

    Contacts

    Jessica Collier
    VP of Growth Marketing
    jessica@assemblysoftware.com
    305-357-6500

    The MIL Network

  • MIL-OSI: RWS and Copyleaks Join Forces to Deliver Built-in AI and Plagiarism Detection for Tridion Users

    Source: GlobeNewswire (MIL-OSI)

    MAIDENHEAD, United Kingdom and BERKSHIRE, United Kingdom, July 22, 2025 (GLOBE NEWSWIRE) — Copyleaks, the AI content analysis and governance platform trusted by enterprises, educators, and governments worldwide, today announced a strategic partnership with RWS, the global leader in language, content, and intellectual property services. Through a new native integration with Tridion Docs, the RWS intelligent content management solution, Copyleaks’ award-winning AI-generated text and plagiarism detection capabilities now operate seamlessly within RWS content workflows, empowering organizations to publish with confidence and integrity at scale.

    As generative AI transforms content creation, organizations face an unprecedented challenge: ensuring the authenticity and originality of the content they publish. From technical documentation and marketing copy to regulatory content and training materials, businesses need to verify not just what they publish, but how it was created and whether it’s safe to use.

    Copyleaks’ comprehensive content integrity platform combines advanced AI detection with plagiarism prevention in one powerful solution. The platform identifies AI-generated text from leading models, including ChatGPT, Gemini, DeepSeek, and Claude, with an accuracy rate of over 99% and support for more than 30 languages. Its sophisticated detection capabilities extend beyond surface-level scans to catch advanced evasion tactics, including character substitution, paraphrasing, and blended human-AI writing.

    At the heart of this detection power is AI Logic, Copyleaks’ latest innovation that reveals the ‘why’ behind AI detection. Unlike traditional black-box approaches, AI Logic provides transparent insights through AI Phrases, which highlight linguistic patterns commonly found in AI-generated content, and AI Source Match, which determines whether text matches AI-generated content that has already been published elsewhere. This level of transparency enables content teams to make informed decisions with clarity and confidence, rather than relying on guesswork.

    Seamless Integration, Powerful Results

    Tridion already helps organizations manage complex, multilingual content at scale. With Copyleaks’ integration, content teams gain automatic analysis capabilities that scan text, code, and paraphrased material before publication. This creates a robust workflow where content authored in Tridion Docs is automatically analyzed by Copyleaks, ensuring every document meets organizational standards for originality and authenticity without disrupting publication cycles.

    Key Integration Benefits

    Automated Content Analysis: Content drafted or uploaded in Tridion Docs undergoes real-time Copyleaks scanning, with issues surfacing instantly to keep projects on schedule while maintaining quality standards.

    AI Governance and Policy Enforcement: Administrators can establish acceptable AI usage policies and receive detailed explanations for any flagged content through AI Logic’s transparent analysis, enabling responsible AI adoption across teams.

    Comprehensive Content Coverage: The integration supports text, code snippets, and multiple file formats, detecting everything from exact copying to sophisticated paraphrasing across diverse content types.

    Enterprise-Scale API Integration: Organizations can extend Copyleaks analysis to any Tridion workflow or third-party system through streamlined API connectivity.

    “Our customers need speed, but never at the expense of integrity,” said Alon Yamin, CEO and co-founder of Copyleaks. “By embedding our detection capabilities directly into Tridion, writers and reviewers can identify AI usage, plagiarism, or licensing risks the moment they occur – no additional steps and no file uploads; just clean, verifiable content that organizations can trust.”

    The Copyleaks connector for Tridion Docs is available immediately to joint customers worldwide. Organizations interested in adding advanced content analysis to their Tridion environment can contact their RWS account representative or request a demonstration at Copyleaks.com.

    About Copyleaks

    Copyleaks is a leading AI text analysis platform empowering businesses and educational institutions to navigate the evolving landscape of generative AI with confidence. With an award-winning suite of AI-powered tools trusted by millions globally, Copyleaks ensures AI governance, enables responsible AI adoption, safeguards intellectual property, and maintains academic integrity through comprehensive AI and plagiarism detection capabilities.

    For additional information, visit Copyleaks.com or follow the company on LinkedIn.

    About RWS

    RWS is a global content solutions company powered by a combination of advanced technology and human expertise. The company enhances the value of ideas, data, and content by helping organizations be understood everywhere.

    With proprietary technology, more than 45 AI patents, and a global team of specialists, RWS enables organizations to bring ideas to market faster, build deeper cross-cultural relationships, and expand into new markets with confidence. Its solutions drive business growth and open up a world of opportunities.

    More than 80 of the world’s top 100 brands rely on RWS to fuel innovation, inform strategic decisions, and shape impactful brand experiences.

    Operating from over 60 global locations across five continents, RWS supports clients across nearly every industry. Headquartered in the UK, the company has been innovating since 1958 and is publicly listed on AIM, the London Stock Exchange’s regulated market (RWS.L).

    For further information, please visit: rws.com.

    The MIL Network

  • MIL-OSI: ASM reports second quarter 2025 results

    Source: GlobeNewswire (MIL-OSI)

    Almere, The Netherlands
    July 22, 2025, 6 p.m. CET
     
    Solid Q2 results against a backdrop of continued mixed market conditions

    ASM International N.V. (Euronext Amsterdam: ASM) today reports its Q2 2025 results (unaudited).

    Financial highlights

    € million Q2 2024 Q1 2025 Q2 2025
    New orders 755.4 834.2 702.5
    yoy change % at constant currencies 56% 14% (4%)
           
    Revenue 706.1 839.2 835.6
    yoy change % as reported 6% 31% 18%
    yoy change % at constant currencies 6% 26% 23%
           
    Gross profit 352.0 447.8 433.2
    Gross profit margin % 49.8  % 53.4  % 51.8  %
           
    Operating result 177.6 266.2 258.5
    Operating result margin % 25.1  % 31.7 % 30.9  %
           
    Adjusted operating result 1 182.3 271.0 263.2
    Adjusted operating result margin %1 25.8  % 32.3 % 31.5  %
           
    Net earnings (losses) 159.0 (28.9) 202.4
    Adjusted net earnings 1 164.7 191.9 173.0

    1 Adjusted figures are non-IFRS performance measures. Refer to Annex 3 for a reconciliation of non-IFRS performance measures.

    • New orders of €702 million in Q2 2025 decreased by 4% over the same period last year at constant currency (decreased by 7% as reported). Compared to Q1 2025, orders decreased by 10% at constant currency. This sequential decrease is explained by lower advanced logic/foundry orders due to timing of orders. The y-o-y decrease was mainly due to the lumpy nature of quarterly order intake and compared to a relatively high memory contribution in Q2 2024.
    • Revenue of €836 million increased by 23% at constant currencies (increased by 18% as reported) from Q2 last year. At constant currencies, revenue increased by 7% compared to Q1 2025, which was above our guidance range of +1% to +6% at constant currencies. Revenue in Q2 2025 was driven by foundry, followed by memory, and logic.
    • Gross profit margin of 51.8% in Q2 2025 improved compared to 49.8% in Q2 last year, while it decreased, as expected, compared to 53.4% in Q1 2025. Q2 2025 margin remained healthy thanks to mix, including continued strong sales to China.
    • Adjusted operating result margin of 31.5% increased by 5.7% points compared to the same period last year and slightly decreased by 0.8% points compared to previous quarter. The y-o-y improvement is mainly due to higher gross profit margin this quarter, and a one-off tax charge which resulted in a higher SG&A cost last year.
    • Reported net earnings included a reversal of impairment of €34 million from our stake in ASMPT (Q1 included a €215 million impairment), triggered by the increase in market valuation in the recent period. There is no cash impact. Following the impairment, and in line with our accounting policy, the changes in the market value of ASMPT will be included in our quarterly net results in case of further decline or until the impairment charge has been reversed.

    Comment

    “ASM continued to deliver solid quarterly results against a backdrop of mixed market conditions. Sales increased by 23% year-on-year at constant currencies to €836 million,” said Hichem M’Saad, CEO of ASM. “Compared to the first quarter of 2025 revenue increased by +7%, which was above the top end of our guidance. The y-o-y increase was led by the logic/foundry segment as well as continued momentum in our spares & services business.

    The market environment continued to show a mixed picture in the second quarter. Growth in AI is fueling ongoing capacity expansions in the leading-edge logic/foundry and HBM-related DRAM segments, while conditions in most of the other market segments are still slow.

    Bookings amounted to €702 million in Q2 2025, down 10% compared to Q1 at constant currencies, mainly due to lower advanced logic/foundry bookings. However, the underlying trend in this segment, particularly in gate-all-around (GAA), remains healthy and we expect related leading-edge logic/foundry bookings to pick up again in Q3.

    The gross margin, while down from a high level of 53.4%, remained strong at 51.8%, again driven by product and customer mix, improved operational efficiency and a better-than-expected contribution from China sales. For the full year 2025, we still expect the gross margin to be in the upper half of the target range of 46%-50%. This excludes any potential direct impact from tariffs, which at this point remains difficult to predict. We have various scenarios in place to mitigate potential financial impacts.

    Operating profit increased strongly in Q2, by approximately 40% adjusted for a one-off expense last year, on the back of increased sales, gross margin improvement and continued cost control, whilst continuing to invest in R&D.

    We are well positioned to at least maintain our ALD and epi market share from the first to the second GAA logic/foundry nodes and remain focused on further share gains in memory, as ALD and epi intensity grows in upcoming DRAM nodes.”

    Outlook

    We expect revenue in the second half of 2025 to be approximately similar to the level in the first half, at constant currencies. For Q3 2025, we expect total ASM revenue to be flat to slightly lower, in a range of 0% to -5% at constant currencies compared to Q2 2025. As a reminder, with the Q1 2025 results we changed our quarterly revenue guidance from absolute Euro amounts to growth rates at constant currencies, given the increased exchange rate volatility in the recent periods and ASM’s significant USD revenue exposure (>80% of sales).
    For Q3 2025, we expect advanced logic/foundry bookings to be higher than in Q2 2025 and China bookings to be lower, with the overall book-to-bill in Q3 projected to be below 1.

    Based on comparable sales in the second half versus the first half, we expect revenue growth at constant currencies in 2025 to be around the midpoint of the guidance range of +10% to +20%. We continue to expect to outperform the WFE market, which is forecasted to grow slightly this year. Uncertainties related to tariffs, geopolitical tensions and the overall economic outlook continue to be relatively high.
    The key growth driver for ASM this year is the high-volume manufacturing ramp of the 2nm GAA node. Despite some further shifts in capex forecasts among customers in this segment, our view for a strong increase in advanced logic/foundry sales in 2025 has not changed. Demand in advanced HBM-related DRAM applications remains solid, but conditions in the other parts of the memory market are sluggish. Against a very strong level last year, we still expect the memory contribution to drop this year (to less than 20% of equipment sales in 2025 versus 25% in 2024).

    In the power/analog/wafer segment equipment demand remains depressed with no meaningful sales recovery in the remainder of the year, despite some early signs of improvement in the related end markets.
    Demand in the Chinese market held up better than initially expected in the first half. We now expect China equipment sales in 2025 to be around the top end of the previously guided range of low to high 20s percentage of total ASM revenue. China sales and bookings in the second half are projected to be lower than in the first half.

    Share buyback program

    The €150 million share buyback program, announced in February 2025, started on April 30, 2025. On June 30, 2025, 40% of the program was completed at an average share price of €486.48 under ASM’s share buyback program (of which 28.6% has been delivered and settled in cash within the reporting period, and the remainder on July 1, 2025).

    Investor Day

    We will host our 2025 Investor Day on September 23. Speakers will include our CEO, CFO and other members of ASM’s senior management team. Further details will be announced later.

    Interim financial report

    ASM International N.V. (Euronext Amsterdam: ASM) today also publishes its Interim Financial Report for the six-month period ended June 30, 2025.

    This report includes an Interim Management Board Report, including ESG update, and condensed consolidated interim financial statements prepared in accordance with IAS 34 (Interim Financial Reporting). The Interim Financial Report comprises regulated information within the meaning of the Dutch Financial Markets Supervision Act (“Wet op het Financieel Toezicht”) and is available in full on our website www.asm.com.

    About ASM

    ASM International N.V., headquartered in Almere, the Netherlands, and its subsidiaries design and manufacture equipment and process solutions to produce semiconductor devices for wafer processing, and have facilities in the United States, Europe, and Asia. ASM International’s common stock trades on the Euronext Amsterdam Stock Exchange (symbol: ASM). For more information, visit ASM’s website at www.asm.com.

    Cautionary Note Regarding Forward-Looking Statements: All matters discussed in this press release, except for any historical data, are forward-looking statements. Forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from those in the forward-looking statements. These include, but are not limited to, economic conditions and trends in the semiconductor industry generally and the timing of the industry cycles specifically, currency fluctuations, corporate transactions, financing and liquidity matters, the success of restructurings, the timing of significant orders, market acceptance of new products, competitive factors, litigation involving intellectual property, shareholders or other issues, commercial and economic disruption due to natural disasters, terrorist activity, armed conflict or political instability, changes in import/export regulations, pandemics, epidemics and other risks indicated in the company’s reports and financial statements. The company assumes no obligation nor intends to update or revise any forward-looking statements to reflect future developments or circumstances.

    This press release contains inside information within the meaning of Article 7(1) of the EU Market Abuse Regulation.

    Quarterly earnings conference call details

    ASM will host the quarterly earnings conference call and webcast on Wednesday, July 23, 2025, at 3:00 p.m. CET.

    Conference-call participants should pre-register using this link to receive the dial-in numbers, passcode and a personal PIN, which are required to access the conference call.

    A simultaneous audio webcast and replay will be accessible at this link.

    Contacts  
    Investor and media relations Investor relations
    Victor Bareño Valentina Fantigrossi
    T: +31 88 100 8500 T: +31 88 100 8502
    E: investor.relations@asm.com E: investor.relations@asm.com

    The MIL Network

  • MIL-OSI: ASM reports second quarter 2025 results

    Source: GlobeNewswire (MIL-OSI)

    Almere, The Netherlands
    July 22, 2025, 6 p.m. CET
     
    Solid Q2 results against a backdrop of continued mixed market conditions

    ASM International N.V. (Euronext Amsterdam: ASM) today reports its Q2 2025 results (unaudited).

    Financial highlights

    € million Q2 2024 Q1 2025 Q2 2025
    New orders 755.4 834.2 702.5
    yoy change % at constant currencies 56% 14% (4%)
           
    Revenue 706.1 839.2 835.6
    yoy change % as reported 6% 31% 18%
    yoy change % at constant currencies 6% 26% 23%
           
    Gross profit 352.0 447.8 433.2
    Gross profit margin % 49.8  % 53.4  % 51.8  %
           
    Operating result 177.6 266.2 258.5
    Operating result margin % 25.1  % 31.7 % 30.9  %
           
    Adjusted operating result 1 182.3 271.0 263.2
    Adjusted operating result margin %1 25.8  % 32.3 % 31.5  %
           
    Net earnings (losses) 159.0 (28.9) 202.4
    Adjusted net earnings 1 164.7 191.9 173.0

    1 Adjusted figures are non-IFRS performance measures. Refer to Annex 3 for a reconciliation of non-IFRS performance measures.

    • New orders of €702 million in Q2 2025 decreased by 4% over the same period last year at constant currency (decreased by 7% as reported). Compared to Q1 2025, orders decreased by 10% at constant currency. This sequential decrease is explained by lower advanced logic/foundry orders due to timing of orders. The y-o-y decrease was mainly due to the lumpy nature of quarterly order intake and compared to a relatively high memory contribution in Q2 2024.
    • Revenue of €836 million increased by 23% at constant currencies (increased by 18% as reported) from Q2 last year. At constant currencies, revenue increased by 7% compared to Q1 2025, which was above our guidance range of +1% to +6% at constant currencies. Revenue in Q2 2025 was driven by foundry, followed by memory, and logic.
    • Gross profit margin of 51.8% in Q2 2025 improved compared to 49.8% in Q2 last year, while it decreased, as expected, compared to 53.4% in Q1 2025. Q2 2025 margin remained healthy thanks to mix, including continued strong sales to China.
    • Adjusted operating result margin of 31.5% increased by 5.7% points compared to the same period last year and slightly decreased by 0.8% points compared to previous quarter. The y-o-y improvement is mainly due to higher gross profit margin this quarter, and a one-off tax charge which resulted in a higher SG&A cost last year.
    • Reported net earnings included a reversal of impairment of €34 million from our stake in ASMPT (Q1 included a €215 million impairment), triggered by the increase in market valuation in the recent period. There is no cash impact. Following the impairment, and in line with our accounting policy, the changes in the market value of ASMPT will be included in our quarterly net results in case of further decline or until the impairment charge has been reversed.

    Comment

    “ASM continued to deliver solid quarterly results against a backdrop of mixed market conditions. Sales increased by 23% year-on-year at constant currencies to €836 million,” said Hichem M’Saad, CEO of ASM. “Compared to the first quarter of 2025 revenue increased by +7%, which was above the top end of our guidance. The y-o-y increase was led by the logic/foundry segment as well as continued momentum in our spares & services business.

    The market environment continued to show a mixed picture in the second quarter. Growth in AI is fueling ongoing capacity expansions in the leading-edge logic/foundry and HBM-related DRAM segments, while conditions in most of the other market segments are still slow.

    Bookings amounted to €702 million in Q2 2025, down 10% compared to Q1 at constant currencies, mainly due to lower advanced logic/foundry bookings. However, the underlying trend in this segment, particularly in gate-all-around (GAA), remains healthy and we expect related leading-edge logic/foundry bookings to pick up again in Q3.

    The gross margin, while down from a high level of 53.4%, remained strong at 51.8%, again driven by product and customer mix, improved operational efficiency and a better-than-expected contribution from China sales. For the full year 2025, we still expect the gross margin to be in the upper half of the target range of 46%-50%. This excludes any potential direct impact from tariffs, which at this point remains difficult to predict. We have various scenarios in place to mitigate potential financial impacts.

    Operating profit increased strongly in Q2, by approximately 40% adjusted for a one-off expense last year, on the back of increased sales, gross margin improvement and continued cost control, whilst continuing to invest in R&D.

    We are well positioned to at least maintain our ALD and epi market share from the first to the second GAA logic/foundry nodes and remain focused on further share gains in memory, as ALD and epi intensity grows in upcoming DRAM nodes.”

    Outlook

    We expect revenue in the second half of 2025 to be approximately similar to the level in the first half, at constant currencies. For Q3 2025, we expect total ASM revenue to be flat to slightly lower, in a range of 0% to -5% at constant currencies compared to Q2 2025. As a reminder, with the Q1 2025 results we changed our quarterly revenue guidance from absolute Euro amounts to growth rates at constant currencies, given the increased exchange rate volatility in the recent periods and ASM’s significant USD revenue exposure (>80% of sales).
    For Q3 2025, we expect advanced logic/foundry bookings to be higher than in Q2 2025 and China bookings to be lower, with the overall book-to-bill in Q3 projected to be below 1.

    Based on comparable sales in the second half versus the first half, we expect revenue growth at constant currencies in 2025 to be around the midpoint of the guidance range of +10% to +20%. We continue to expect to outperform the WFE market, which is forecasted to grow slightly this year. Uncertainties related to tariffs, geopolitical tensions and the overall economic outlook continue to be relatively high.
    The key growth driver for ASM this year is the high-volume manufacturing ramp of the 2nm GAA node. Despite some further shifts in capex forecasts among customers in this segment, our view for a strong increase in advanced logic/foundry sales in 2025 has not changed. Demand in advanced HBM-related DRAM applications remains solid, but conditions in the other parts of the memory market are sluggish. Against a very strong level last year, we still expect the memory contribution to drop this year (to less than 20% of equipment sales in 2025 versus 25% in 2024).

    In the power/analog/wafer segment equipment demand remains depressed with no meaningful sales recovery in the remainder of the year, despite some early signs of improvement in the related end markets.
    Demand in the Chinese market held up better than initially expected in the first half. We now expect China equipment sales in 2025 to be around the top end of the previously guided range of low to high 20s percentage of total ASM revenue. China sales and bookings in the second half are projected to be lower than in the first half.

    Share buyback program

    The €150 million share buyback program, announced in February 2025, started on April 30, 2025. On June 30, 2025, 40% of the program was completed at an average share price of €486.48 under ASM’s share buyback program (of which 28.6% has been delivered and settled in cash within the reporting period, and the remainder on July 1, 2025).

    Investor Day

    We will host our 2025 Investor Day on September 23. Speakers will include our CEO, CFO and other members of ASM’s senior management team. Further details will be announced later.

    Interim financial report

    ASM International N.V. (Euronext Amsterdam: ASM) today also publishes its Interim Financial Report for the six-month period ended June 30, 2025.

    This report includes an Interim Management Board Report, including ESG update, and condensed consolidated interim financial statements prepared in accordance with IAS 34 (Interim Financial Reporting). The Interim Financial Report comprises regulated information within the meaning of the Dutch Financial Markets Supervision Act (“Wet op het Financieel Toezicht”) and is available in full on our website www.asm.com.

    About ASM

    ASM International N.V., headquartered in Almere, the Netherlands, and its subsidiaries design and manufacture equipment and process solutions to produce semiconductor devices for wafer processing, and have facilities in the United States, Europe, and Asia. ASM International’s common stock trades on the Euronext Amsterdam Stock Exchange (symbol: ASM). For more information, visit ASM’s website at www.asm.com.

    Cautionary Note Regarding Forward-Looking Statements: All matters discussed in this press release, except for any historical data, are forward-looking statements. Forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from those in the forward-looking statements. These include, but are not limited to, economic conditions and trends in the semiconductor industry generally and the timing of the industry cycles specifically, currency fluctuations, corporate transactions, financing and liquidity matters, the success of restructurings, the timing of significant orders, market acceptance of new products, competitive factors, litigation involving intellectual property, shareholders or other issues, commercial and economic disruption due to natural disasters, terrorist activity, armed conflict or political instability, changes in import/export regulations, pandemics, epidemics and other risks indicated in the company’s reports and financial statements. The company assumes no obligation nor intends to update or revise any forward-looking statements to reflect future developments or circumstances.

    This press release contains inside information within the meaning of Article 7(1) of the EU Market Abuse Regulation.

    Quarterly earnings conference call details

    ASM will host the quarterly earnings conference call and webcast on Wednesday, July 23, 2025, at 3:00 p.m. CET.

    Conference-call participants should pre-register using this link to receive the dial-in numbers, passcode and a personal PIN, which are required to access the conference call.

    A simultaneous audio webcast and replay will be accessible at this link.

    Contacts  
    Investor and media relations Investor relations
    Victor Bareño Valentina Fantigrossi
    T: +31 88 100 8500 T: +31 88 100 8502
    E: investor.relations@asm.com E: investor.relations@asm.com

    The MIL Network

  • MIL-OSI: Titan.ium Platform Launches Cloud Native Number Portability Software to Help Telecoms Advance Operational Agility and Network Readiness

    Source: GlobeNewswire (MIL-OSI)

    LOWELL, Mass., July 22, 2025 (GLOBE NEWSWIRE) — Titan.ium Platform today announced its cloud native Number Portability (NP) product for telecom operators and system integrators that helps modernize existing infrastructure and aligns with next-generation technologies like 5G, edge computing, and artificial intelligence (AI).

    Built cloud native and not a repackaging of legacy code, NP is microservices-based and orchestrated with Kubernetes to provide rapid deployment, elastic scalability, and automation that supports multi-generation networks – from 2G to 5G, as well as fixed-line and IP-based services. The NP software serves as a central gateway providing portability data from a local data source or from an external data source. Access to the portability data is provided over multiple signaling protocols.

    According to the Deloitte 2025 Telecommunications Industry Outlook, telecom providers are working to update essential systems to better support customer needs and expand their digital capabilities.

    “Number Portability is not a new problem to solve and so, finding a solution must be part of greater vision,” said Mahesh Seshan, senior director of engineering, Titan.ium Platform. “This greater vision can be made possible with the Titan.ium cloud native NP product. It combines the power of a cloud native platform and a micro-services based application enabling a modern, multi-generational approach.”

    The new NP software supports Titan.ium’s broader efforts to streamline telecom infrastructure using flexible, software-based systems and provides a smooth evolution for the transition from virtualized to cloud native technologies. It serves as a modern alternative to traditional portability databases and routing systems.

    Key benefits include:

    • Faster time to market through integrated microservices and orchestration with Kubernetes;
    • High availability and real-time performance to handle rising porting volumes and signaling traffic demands;
    • Reduced operating expenses (OPEX) with lifecycle automation and simplified infrastructure;
    • ENUM interface and local data source integration for compatibility with evolving network functions;
    • Smooth migration path from existing Virtual Network Function (VNF)-based NP solutions.

    The cloud native NP software complements Titan.ium’s existing VNF-based NP solution and supports a wide range of deployment models to fit the modernization roadmaps of Tier 1 and Tier 2 operators.

    As operators continue to navigate the complexity of hybrid and next-generation networks, the ability to streamline porting operations without compromising service delivery is critical. Titan.ium’s cloud native NP platform is engineered to support this shift, offering a flexible, future-ready approach to one of telecom’s most essential functions.

    About Titan.ium Platform
    Titan.ium Platform is a leader in signaling, routing, subscriber data management, and security software and services. Our solutions, which are deployed in more than 80 countries by over 180 companies, including eight of the world’s top 10 communications service providers, and all of the top five, are a testament to our industry leadership. Titan.ium supports any network, domain, signaling protocol, and infrastructure with advanced routing capabilities and a unified end-user experience. For more information, please visit https://titaniumplatform.com.

    Media Contact
    Glenn Rossman
    glenn@eckertcomms.com
    914-623-8354

    The MIL Network

  • MIL-OSI: SOITEC REPORTS FIRST QUARTER REVENUE OF FISCAL YEAR 2026

    Source: GlobeNewswire (MIL-OSI)

    SOITEC REPORTS FIRST QUARTER REVENUE OF FISCAL YEAR 2026

    • Q1’26 revenue: €92m, down 16% year-on-year on an organic1basis, slightly better than the guidance
    • Q1’26 year-on-year revenue development reflects, as expected, ongoing RF-SOI inventory correction among customers, a weak automotive market, the anticipated phase-out of first-generation Imager-SOI, and the strong momentum in Photonics-SOI
    • Q2’26 revenue is expected to grow around 50% versus Q1’26, on an organic basis

    Bernin (Grenoble), France, July 22nd, 2025 – Soitec (Euronext Paris), a world leader in designing and manufacturing innovative semiconductor materials, today announced unaudited consolidated revenue of 92 million Euros for the first quarter of FY’26 (ended on June 29th, 2025), down 24% on a reported basis compared with 121 million Euros achieved in the first quarter of FY’25. This reflects a 16% decline on an organic basis, a negative currency impact of 5% and a negative scope effect2 of 3% related to the divestment of Dolphin Design’s businesses.

    Pierre Barnabé, Soitec’s CEO, commented: “Q1’26 revenue was slightly better than the guidance, down 16% year-on-year on an organic basis. This includes the phase-out of Imager-SOI. Artificial Intelligence continues to support strong growth in Edge & Cloud AI division, with traction both at the edge and in the cloud accelerating adoption of FD-SOI for Edge AI and Photonics-SOI for data centers. Conversely, the correction of RF-SOI inventories among our direct customers, and the ongoing weakness in the Automotive market continued to impact our revenue.

    Looking ahead, we expect Q2’26 revenue to grow around 50% versus Q1’26, on an organic basis. This reflects ongoing RF-SOI inventory correction in Mobile Communications, continued weakness in Automotive & Industrial, and strong growth in Edge & Cloud AI.

    In an uncertain and volatile environment, we remain focused on the factors within our control to prepare Soitec for the future. We are broadening our end-market exposure and customer base to diversify the company’s foundations. In parallel, we are accelerating the expansion of our product portfolio – across both SOI and compound semiconductors – to serve a wider range of applications. At the same time, we are building robust ecosystems that support the adoption of our products, with the ambition of establishing them as new industry standards.”

    First quarter FY’26 consolidated revenue

      Q1’26 Q1’25 Q1’26/Q1’25
             
             
    (Euros million)     change reported chg. at const. exch. rates & perimeter
             
    Mobile Communications 43 48 -12% -7%
    Automotive & Industrial 5 26 -82% -81%
    Edge & Cloud AI 44 46 -4% +13%
             
    Revenue 92 121 -24% -16%

    Mobile Communications

    Mobile Communications revenue reached 43 million Euros in Q1’26, down 7% year-on-year on an organic basis.

    After a strong seasonal tailwind in Q4’25, further correction was expected in RF-SOI customer inventories. As a result, sales of RF-SOI wafers decreased to a low level in Q1’26, below Q1’25. This mostly reflects a significant year-on-year decrease in 200-mm RF-SOI volumes sold. Sales of 300-mm RF-SOI wafers were higher than in Q1’25, driven by higher volumes, despite a slightly negative price / mix effect.

    Sales of POI (Piezoelectric-on-Insulator) wafers dedicated to RF filters were stable year-on-year, reflecting ongoing growth with key US customers and a temporary slowdown in Asia. POI is becoming the reference substrate for advanced Surface Acoustic Wave (SAW) filters, increasingly adopted by leading fabless globally.

    Sales of FD-SOI wafers, the only solution for fully integrated 5G mmWave system-on-chip, were significantly higher than in Q1’25. FD-SOI adoption is progressing with first design wins for Wi-Fi 7 SoCs, for premium Android smartphones.

    Automotive & Industrial

    In a persistently complicated automotive market, Automotive & Industrial revenue reached 5 million Euros in Q1’26, down 81% year-on-year on an organic basis.

    As expected, the Power-SOI inventory replenishment that took place at customer level in Q4’25, came at the expense of volumes in Q1’26, and will continue to impact Q2’26. Meanwhile, Soitec is accelerating the transition from 200-mm to 300-mm Power-SOI to address growing demand for Battery Management Systems.

    Automotive FD-SOI wafer sales were negligible in Q1’26, although the build-up of a solid ecosystem is supporting the strengthening of its adoption for analog/digital systems such as radars, microcontrollers and wireless connectivity.

    Regarding SmartSiCTM, the slower growth of the electric vehicle market combined with the longer qualification cycles confirms the delay in the production ramp-up, as already communicated.

    Edge & Cloud AI

    Edge & Cloud AI revenue reached 44 million Euros in Q1’26, up 13% on an organic basis compared to Q1’25 despite the discontinuation of the first generation of Imager-SOI wafers for 3D imaging applications, which recorded 25 million Dollars in revenue in Q1’25. On a reported basis, Edge & Cloud AI revenue went down 4% due to the scope effect of the divestment of Dolphin Design’s businesses combined with a negative currency impact.

    Soitec delivered another strong performance in Photonics-SOI in Q1’26, with sales significantly above Q1’25 levels. As AI computing power expands, driving demand for faster and more efficient data centers, Photonics-SOI stands out as the optimal solution for high-speed, high-bandwidth optical links, whether for pluggable transceivers or Co-Packaged Optics (CPOs). Soitec is capitalizing on strong Cloud infrastructure investments from Big Tech and AI players and is accelerating its Photonics-SOI roadmap with AI leaders.

    FD-SOI sales were also above Q1’25 levels. Thanks to its benefits in power efficiency, performance, thermal management, and reliability, FD-SOI is a key enabler of AI-driven IoT applications across consumer, healthcare, and industrial markets.

    Q2’26 outlook

    Q2’26 revenue is expected to grow around 50% versus Q1’26, on an organic basis. The impact from the phasing out of Imager-SOI will be less pronounced than in Q1’26, as Imager-SOI revenue amounted to approximately 7 million Dollars in Q2’25.

    Excluding Imager-SOI, Edge & Cloud AI is expected to maintain solid momentum and should be slightly up vs. Q1’26. Mobile Communications revenue will remain low, despite nearly doubling from Q1’26, as customers continue to work through excess RF-SOI inventory. As in Q1’26, Automotive & Industrial revenue in Q2’26 is expected to decline sharply versus Q2’25.

    Projected FY’26 Capex cash-out is confirmed around 150 million Euros, down from 230 million Euros in FY’25.

    Key events of Q1’26

    Soitec has successfully issued a new 200 million Euros Schuldschein loan

    This is a 200 million Euros Schuldschein loan offering a floating rate coupon with an average maturity of 4.1 years, which was subscribed by high quality European investors.
    The offering is structured in tranches of 3, 4, 5 & 7 years, with 72% of the transaction on the 4-year and 5-year tenors. The 100 million Euros initially planned were significantly oversubscribed, reflecting investor interest and confidence in Soitec’s financial profile and strategy, despite a volatile environment.
    The proceeds of the new Schuldschein loan will be used to partially refinance the 325 million Euros convertible bonds maturing in October 2025 and for general corporate purposes. Through this transaction, Soitec is actively managing its debt profile and extending its debt maturity.

    Soitec and PSMC collaborate on ultra-thin TLT technology for nm-scale 3D stacking

    On June 3rd, 2025, Soitec announced a strategic collaboration with Powerchip Semiconductor Manufacturing Corporation (PSMC). Under the collaboration, Soitec will supply PSMC 300mm substrates incorporating a release layer, Transistor Layer Transfer (TLT) ready, to support a new demonstration of advanced 3D chip stacking at the wafer level. This marks the first public announcement of Soitec’s TLT technology. The technology is an enabler for next-generation semiconductor designs that allow for more powerful, compact and energy-efficient chips – with potential applications ranging from smartphones, tablets and AI devices to autonomous driving systems.

    CEA-Leti and Soitec announce strategic partnership to leverage FD-SOI for enhanced security of integrated circuits

    On June 18th, 2025, CEA-Leti and Soitec announced a strategic partnership to enhance the cybersecurity of integrated circuits (ICs) through the innovative use of fully depleted silicon-on-insulator (FD-SOI) technologies. This collaboration aims to position FD-SOI as a foundational platform for secure electronics by leveraging and extending its inherent resistance to physical attacks. At the heart of the initiative is a joint effort to experimentally validate and augment the security benefits of FD-SOI—from the substrate level up to circuit design. The project aims to deliver concrete data, practical demonstrations, and roadmap guidance to meet the surging cybersecurity demands in critical markets such as automotive, industrial IoT, and secure infrastructure

    # # #

    Analysts conference call to be held in English on Wednesday 23rdJuly at 8:00 am CET.

    To listen to this conference call, the audiocast is available live and in replay at the following address: https://channel.royalcast.com/soitec/#!/soitec/20250723_1

    # # #

    Agenda

    Q2’26 revenue and H1’26 results are due to be published on November 19th, 2025, after market close.

    # # #

    Disclaimer

    This document is provided by Soitec (the “Company”) for information purposes only.

    The Company’s business operations and financial position are described in the Company’s Universal Registration Document (which notably includes the Annual Financial Report) which was filed on June 11th, 2025, with the French stock market authority (Autorité des Marchés Financiers, or AMF) under number D.25-0439. The French version of the 2024-2025 Universal Registration Document, together with English courtesy translation for information purposes of this document, are available for consultation on the Company’s website (www.soitec.com), in the section Company – Investors – Financial Reports.

    Your attention is drawn to the risk factors described in Chapter 2.1 (Risk factors and controls mechanism) of the Company’s Universal Registration Document.

    This document contains summary information and should be read in conjunction with the Universal Registration Document.

    This document contains certain forward-looking statements. These forward-looking statements relate to the Company’s future prospects, developments and strategy and are based on analyses of earnings forecasts and estimates of amounts not yet determinable. By their nature, forward-looking statements are subject to a variety of risks and uncertainties as they relate to future events and are dependent on circumstances that may or may not materialize in the future. Forward-looking statements are not a guarantee of the Company’s future performance. The occurrence of any of the risks described in Chapter 2.1 (Risk factors and controls mechanism) of the Universal Registration Document may have an impact on these forward-looking statements.

    The Company’s actual financial position, results and cash flows, as well as the trends in the sector in which the Company operates may differ materially from those contained in this document. Furthermore, even if the Company’s financial position, results, cash-flows and the developments in the sector in which the Company operates were to conform to the forward-looking statements contained in this document, such elements cannot be construed as a reliable indication of the Company’s future results or developments.

    The Company does not undertake any obligation to update or make any correction to any forward-looking statement in order to reflect an event or circumstance that may occur after the date of this document.

    This document does not constitute or form part of an offer or a solicitation to purchase, subscribe for, or sell the Company’s securities in any country whatsoever. This document, or any part thereof, shall not form the basis of, or be relied upon in connection with, any contract, commitment or investment decision.

    Notably, this document does not constitute an offer or solicitation to purchase, subscribe for or to sell securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from the registration under the U.S. Securities Act of 1933, as amended (the “Securities Act”). The Company’s shares have not been and will not be registered under the Securities Act. Neither the Company nor any other person intends to conduct a public offering of the Company’s securities in the United States.

    # # #

    About Soitec

    Soitec (Euronext – Tech Leaders), a world leader in innovative semiconductor materials, has been developing cutting-edge products delivering both technological performance and energy efficiency for over 30 years. From its global headquarters in France, Soitec is expanding internationally with its unique solutions, and generated sales of 0.9 billion Euros in fiscal year 2024-2025. Soitec occupies a key position in the semiconductor value chain, serving three main strategic markets: Mobile Communications, Automotive and Industrial, and Edge and Cloud AI. The company relies on the talent and diversity of more than 2,200 employees, representing 50 different nationalities, working at its sites in Europe, the United States and Asia. Nearly 4,300 patents have been registered by Soitec.

    Soitec, SmartSiC™ and Smart Cut™ are registered trademarks of Soitec.

    For more information: visit our website and follow us on LinkedIn and X

    # # #

    Media Relations: media@soitec.com

    Investor Relations: investors@soitec.com

    # # #

    Consolidated revenue per quarter

    Quarterly revenue Q1’25 Q2’25 Q3’25 Q4’25 Q1’26  
    (Euros millions)            
    Mobile Communications 48   124   154   220 43    
    Automotive & Industrial 26 33 25 45 5  
    Edge & Cloud AI 46 61 47 63 44  
                 
    Revenue 121   217   226   327 92    
    Change in quarterly revenue Q1’26/Q1’25
    (vs. previous year) Reported
    change
    Organic change1
         
    Mobile Communications -12% -7%
    Automotive & Industrial -82% -81%
    Edge & Cloud AI -4% +13%
         
    Revenue -24% -16%

    1         At constant exchange rates and comparable scope of consolidation:

    • in Q1’26 there is a negative scope effect related to the divestment of Dolphin Design’s mixed signal IP activities (completed on October 31st, 2024) and the divestment of Dolphin Design’s ASIC activities (completed on December 30th, 2024).

    1 At constant exchange rates and perimeter

    2 The scope effect is related to the divestment of Dolphin Design’s mixed-signal IP activities (completed on October 31st, 2024) and that of Dolphin Design’s ASIC activities (completed on December 30th, 2024)

    Attachment

    The MIL Network

  • MIL-OSI: Talkdesk introduces new multi-storefront capability for retailers

    Source: GlobeNewswire (MIL-OSI)

    PALO ALTO, Calif., July 22, 2025 (GLOBE NEWSWIRE) — Talkdesk®, Inc. today announced Talkdesk Multi-Store Commerce Integration, a new capability that enables multi-brand retailers to manage customer service across multiple Shopify and other commerce storefronts within a single Talkdesk account, streamlining operations and enhancing the customer experience (CX). The agnostic multi-shop connector integrates with any commerce engine, including BigCommerce, Salesforce Commerce Cloud, and Adobe Commerce Cloud.

    In today’s complex retail landscape, global brands often have different storefronts for each regional website, which can result in fragmented customer service. Talkdesk’s new multi-store integration addresses this by providing a unified platform for managing customer interactions across a brand or store portfolio.

    “Retailers need agile solutions that can keep pace with their growth and diverse brand strategies,” said Tiago Paiva, chief executive officer and founder of Talkdesk. “Our new multi-store integration empowers them to deliver consistent, efficient support across every customer touchpoint, regardless of which brand they’re engaging with. This not only improves customer satisfaction but also significantly reduces operational complexities for our retail partners.”

    Available as part of Talkdesk Retail Experience Cloud, the Multi-Store Commerce Integration offers several benefits for retailers:

    • Streamlined Agent Workflows: Agents can now efficiently support customers across multiple brands, all within a single Talkdesk interface. This eliminates the need for agents to switch between different systems, improving productivity and reducing resolution times.
    • Enhanced Customer Experience: By providing agents with a holistic view of customer interactions across brands, the integration ensures customers receive consistent and personalized support, even if they shop with multiple brands within a retailer’s portfolio. This removes friction and builds loyalty.
    • Accelerated Deployment and Scalability: The agnostic connector simplifies integration with all commerce engines, reducing deployment complexity and accelerating time-to-value. Retailers can “deploy once, deliver to many,” easily extending virtual agents, voice, chat, and SMS capabilities across numerous brand experiences. For example, a retailer can deploy a single artificial intelligence (AI) agent across the entire brand portfolio, rather than having to deploy multiple agents across several brands.
    • Improved Onboarding: The ability to identify and serve customers across brands with clarity and speed not only enhances customer service quality but also accelerates the onboarding process for new retail partners and brands.

    This new capability is a game-changer for retailers looking to optimize their customer service operations, scale efficiently, and deliver a superior customer experience across their entire brand ecosystem.

    About Talkdesk

    Talkdesk® is leading a new era in customer experience with Customer Experience Automation (CXA)—a new category and platform designed to automate the full complexity of modern customer journeys. CXA replaces fragmented, human-coordinated workflows with autonomous, multi-agent AI orchestration that delivers intelligent, scalable, and outcome-focused service across the entire CX lifecycle.

    At the core of CXA is the Talkdesk Data Cloud, which turns transcripts, call recordings, case notes, and customer records from across CRMs and systems of record into real-time, actionable knowledge. This enables AI agents to operate with full context, collaborating seamlessly to resolve complex customer problems with speed, precision, and adaptability.

    Talkdesk CXA supports both cross-industry workflows and industry-specialized use cases in sectors like retail, healthcare, financial services, utilities, travel, and government. With prebuilt AI agents, a virtuous automation cycle (Discover, Build, Orchestrate, Measure), and rapid time-to-value, Talkdesk helps enterprises modernize customer experience without the need for a full rip-and-replace.

    Trusted by global brands and recognized for continuous innovation, Talkdesk empowers organizations to grow revenue, reduce costs, and transform service delivery through coordinated, AI-driven automation. Companies that love their customers use Talkdesk.

    Talkdesk is a registered trademark of Talkdesk, Inc. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

    Media Contact:

    Talkdesk Public Relations

    pr@talkdesk.com

    The MIL Network

  • MIL-OSI: Guaranteed Approval Loans for Bad Credit with No Credit Check from 1F Cash Advance in 2025

    Source: GlobeNewswire (MIL-OSI)

    BOULDER, Colo., July 22, 2025 (GLOBE NEWSWIRE) — In a significant move to support borrowers with poor or no credit history, 1F Cash Advance has rolled out a new line of guaranteed approval payday loans for Americans facing financial hardships in 2025. With loan amounts ranging from $100 to $1,000, these flexible online loan solutions are designed to offer speed, security, and accessibility, even for people with poor credit or no credit score.

    A Fast, Flexible Lifeline for Bad Credit Borrowers

    Traditional lenders often reject applicants with low credit scores, but 1F Cash Advance offers an alternative by providing access to no credit check loans with guaranteed approval. Borrowers can apply online in minutes, receive an instant decision, and get funds deposited into their bank accounts as soon as the same day.

    “Millions of Americans are just one emergency away from a financial crisis. We built our platform to offer fast, stress-free access to cash, no matter your credit score,” said Adrienne Bailey, Public Relations Specialist for 1F Cash Advance.

    What’s a Payday Loan?

    Payday loans are a short-term way to get up to $1,000 in difficult financial circumstances quickly. Whether it’s an unexpected bill, a car repair, or another emergency expense, these loans are designed to help you cover urgent needs. They’re typically meant to be repaid in full, along with fees and interest, by your next payday, usually within 14 to 31 days.

    Payday loans are especially helpful for people who may not qualify for traditional bank loans due to factors such as a low credit score, inconsistent income, or unemployment. The application process is typically quick and easy, often requiring only proof of income, an active bank account, and a few other basic documents.

    APPLY FOR NO CREDIT CHECK PAYDAY LOANS

    How Do Payday Loans Work?

    Payday loans are straightforward to get. You fill out an application, and if you meet the requirements, the money is deposited directly into your bank account, often the same day.

    Unlike traditional loans, which often involve a mountain of paperwork and require waiting for days, payday loans are much more streamlined. The entire process is typically handled online, from application to approval and receiving the funds. Automated systems speed things up by checking your eligibility in real time, so you don’t have to wait in line or deal with unnecessary steps.

    Once you’re approved, you’ll receive the details of the loan agreement, including repayment terms and fees. You can review everything and decide whether to accept the offer—no pressure.

    Who Can Apply?

    Just like with any loan, there are a few basic requirements you’ll need to meet before you can get approved for a payday loan. Most people qualify without much difficulty. Here’s what lenders typically look for:

    • You need to be a U.S. citizen or permanent resident
    • You must be at least 18 years old
    • You should have a reliable source of income
    • A bank account to deposit the funds into
    • And a phone number or email so the lender can contact you

    Because these requirements are so straightforward, payday loans tend to have a high approval rate. Most people, even with bad credit, find that they meet all the criteria without needing to jump through hoops, making it a quick and accessible option when money is tight.

    Why Borrowers with Bad Credit Face Challenges While Getting Loans

    Borrowers with poor credit often encounter difficulties when seeking loans due to several important factors:

    Increased Lending Risk

    Credit scores serve as a tool for lenders to assess the likelihood that a borrower will repay a loan. A low credit score indicates past financial struggles, such as missed payments or high debt, making lenders hesitant to lend money.

    Costlier Loan Terms

    Because these borrowers are considered riskier, lenders typically offset this by charging higher interest rates and additional fees. This increases the overall cost of borrowing and can make loans less affordable.

    Fewer Lending Opportunities

    Traditional financial institutions usually set minimum credit standards. Borrowers with bad credit may find themselves rejected or limited to only a small selection of loan products.

    Tougher Conditions

    Loans approved for those with poor credit often come with stricter conditions, such as shorter repayment terms, higher fees, or the need for collateral, which can be difficult to provide.

    Discouragement and Hesitation

    Experiencing loan denials or steep borrowing conditions can reduce a borrower’s confidence, causing some to avoid applying for loans altogether.

    Risk of Predatory Lending

    In their search for financing, some borrowers with bad credit may turn to high-risk lenders offering loans with exorbitant interest rates and unfair terms, potentially trapping them in a cycle of debt.

    CHECK OUT NO CREDIT CHECK PAYDAY LOAN OPTIONS

    What Makes 1F Cash Advance Stand Out?

    In 2025, more people are looking for fast, no-hassle loan options, especially those who don’t qualify with traditional banks. That’s where 1F Cash Advance comes in. Here’s what sets it apart:

    • Guaranteed approval for most applicants, regardless of credit score
    • No hard credit checks during the application process
    • Loan amounts from $100 to $1,000
    • 1-hour payday loans available
    • Same-day or next-business-day funding
    • Simple and secure online form that takes 5 minutes to complete

    This service is ideal for anyone facing unexpected expenses, such as car repairs, medical bills, or rent, and doesn’t want to deal with paperwork, rejections, or long waits.

    Smarter Ways to Handle Financial Emergencies

    Here are some smarter, more manageable ways to handle those money problems:

    1. Figure Out What You’re Dealing With

    Before you jump into problem-solving mode, take a moment to consider details. Ask yourself:

    • How much money do I need?
    • Is this urgent, or do I have a little time?
    • Can I split this cost up or delay part of it?

    Getting clear on what’s going on can help you avoid rash decisions and unnecessary stress.

    2. Use Your Emergency Savings (If You’ve Got It)

    If you’ve managed to stash away even a little emergency fund, now’s the time to dip into it. That money is there for a reason, to help you stay out of deeper debt when life throws you a financial punch.

    3. Consider a Short-Term Loan from a Trusted Source

    If savings won’t cover it, borrowing might make sense, but not from just anywhere. That’s where 1F Cash Advance can help:

    • No credit check is required to explore available options.
    • Applications are reviewed quickly, often in minutes.
    • Funds can be available as soon as the same day or by the next business day.
    • Rates, terms, and fees are clearly presented upfront—no hidden surprises.


    4. Reach Out Before Things Spiral

    If the emergency involves rent, bills, or services, contact the relevant parties. Contact your landlord to see if you can split the rent. Ask your utility company about payment options. Check out local organizations that help with food, transportation, or temporary expenses. You might be surprised at how many options are available, especially if you ask early.

    5. Be Careful with Payday Loans

    The trick is knowing which ones are fair and which ones are traps. Avoid lenders who charge crazy interest rates or try to keep you stuck in a cycle of borrowing. Take time to read reviews and compare offers side by side — these extra steps can protect you from shady deals.

    6. Plan for Next Time

    Once the emergency is handled, take a moment to regroup. Setting aside $5 or $10 a week helps build a small buffer for the next unexpected expense. It doesn’t have to be big, just consistent.

    How Are Payday Loans Different from Traditional Loans?

    Payday loans and conventional (or traditional) loans both offer ways to borrow money, but they’re designed for very different situations and come with some key differences. Here’s how they stack up:

    1. Loan Amounts. Payday loans are meant for smaller, short-term needs, typically ranging from $100 to $1,000. Conventional loans can be significantly larger, sometimes reaching tens or even hundreds of thousands of dollars, depending on their intended use (such as buying a home or car).
    2. Repayment Terms. With a payday loan, you’re expected to repay the full amount, plus interest and fees, by your next paycheck—usually within a couple of weeks. Traditional loans give you much more time to repay. Payments are spread out over several months or even years, depending on the type of loan.
    3. Interest and Fees. Payday loans typically carry higher interest rates and fees. Since they’re short-term and don’t rely heavily on credit history, lenders take on more risk and charge accordingly. Conventional loans generally offer lower interest rates, especially if you have good credit.
    4. Credit Requirements. Most payday lenders either skip credit checks or perform a soft pull, meaning your credit score won’t be affected. Traditional lenders, like banks or credit unions, typically require a full credit check, and your approval depends heavily on your credit score, credit history, and sometimes even collateral.
    5. Approval Speed. Payday loans are focused on speed. Many are approved and funded within hours. Conventional loans often take several days or even weeks due to paperwork, underwriting, and approval processes.
    6. Eligibility Criteria. Payday loans are designed for people who may not have a perfect credit history or any credit history at all. They’re more accessible if you’re working with limited financial options. Traditional loans are more likely to be extended to borrowers with strong credit profiles, stable income, and a solid financial history.


    What They’re Used For

    People usually turn to payday loans when they need quick cash for:

    • Medical bills or prescription expenses
    • Emergency car or home repairs
    • Utility bills to avoid service shut-offs
    • Rent payments to avoid eviction
    • Unexpected travel expenses
    • Everyday necessities when short on funds
    • Covering gaps between paychecks

    Payday loans can be an option not only for those with jobs but also for students, retirees, single parents, or even unemployed individuals. The key requirement is having proof of a stable income source—this could be wages, benefits, pensions, or regular assistance payments.

    Conventional loans, on the other hand, are typically used for bigger financial needs, such as:

    • Buying a home
    • Financing a vehicle
    • Covering education expenses
    • Consolidating debts
    • Starting or expanding a business

    To wrap up, payday loans are fast, simple, and accessible, but they’re also more expensive. Conventional loans take longer to process and require stronger credit profiles, but usually come with better terms. The right choice depends on your FICO score, how urgently you need the money, and what you plan to use it for.

    The Pros and Cons of Payday Loans

    Payday loans can offer a quick financial fix when you’re in a pinch, but they also come with serious risks. Before applying, it’s essential to weigh both sides. Here’s a clear look at the upsides and downsides of payday loans:

    Upsides of Payday Loans

    1. Fast Access to Cash. One of the biggest perks of payday loans is speed. Many lenders offer same-day or next-day funding, which can be a lifesaver if you’re facing an urgent bill or emergency expense.
    2. No Credit Check Required. If your credit score isn’t great or you don’t have a credit history at all, payday lenders are often more forgiving. Most don’t require a hard credit check, which makes these loans accessible to a wider range of borrowers.
    3. Simple Qualifications. You don’t need perfect financials to qualify. Typically, the required documentation includes proof of income, a valid ID, a bank account, and a means of contact (such as a phone number or email address).
    4. Convenient Application Process. You can apply online or in person, and most applications take only a few minutes to complete. If you’d rather avoid the hassle of going to a bank, this is a flexible and convenient option.


    Downsides of Payday Loans

    1. The Debt Trap Risk. Because payday loans come with high fees and short repayment terms, many borrowers struggle to pay them back on time. This can lead to a dangerous cycle where you take out another loan just to cover the first, and the debt continues to grow.
    2. Extremely High Interest Rates. Payday loans are among the most expensive forms of borrowing, with APR rates typically ranging from 300% to 400%. Even a small loan can become very costly if you can’t repay it quickly.


    FAQs

    Can I Still Get a Payday Loan with Bad Credit?

    Yes, you can. Many payday lenders don’t even check your credit the traditional way. So, having bad credit or no credit at all usually won’t stop you from getting approved. Instead, they’ll look at your income and ability to repay the loan.

    What Happens If I Can’t Repay a Payday Loan?

    If you miss your repayment, things can get complicated. Lenders may charge late fees or other penalties, and in some cases, this could harm your credit score, especially if the loan is sent to collections. That can make it harder to borrow in the future. Some lenders may also attempt alternative methods to recover the money, such as multiple attempts to withdraw funds from your bank account. Contact your lender immediately if you anticipate difficulty repaying. They can offer options.

    Will Applying for a Payday Loan Hurt My Credit Score?

    Not when you apply through 1F Cash Advance. We only perform a soft credit check, which means it won’t show up on your credit report or affect your FICO score. Your credit score is only at risk if you default on the loan and it goes to collections.

    How Fast Can I Get a Payday Loan?

    Very fast! Most payday lenders aim to provide you with the money on the same day or by the next business day. You can often apply online in just a few minutes, and if approved, funds could be deposited into your bank account within hours.

    Media Contact Info

    Mailing Address

    1F Cash Advance, LLC

    1942 Broadway St., STE 314C Boulder, CO 80302

    Main Office Location

    2770 Canyon Blvd, Boulder, CO 80302

    Website: https://1firstcashadvance.org

    E-mail: info@1firstcashadvance.org

    Phone: (720) 428-2247

    Social Media:

    Disclaimer & Affiliate Disclosure

    This article is intended for informational and commercial purposes only. It’s not financial advice, legal guidance, or an official endorsement of any specific loan provider. While we strive to keep information accurate and up to date, we can’t guarantee its completeness or reliability. Please conduct your own research and, if necessary, consult with a licensed financial advisor or legal expert before making any financial decisions.

    The loan products mentioned here, including payday loans and other financial services, may not be suitable for everyone. Terms, rates, and eligibility vary by lender and location. Approval is never guaranteed, and every lender has its own criteria, including income verification, ID checks, and compliance with state or federal regulations.

    Some links in this content may be affiliate links. That means if you click and take action (such as applying for a loan), we may earn a small commission at no additional cost to you. These commissions help support our content, but they don’t affect our editorial integrity or influence what we write. We aim to provide honest, helpful, and unbiased information at all times.

    By reading or using this content, you agree that we, including the publisher, content creator, partners, and affiliates, aren’t liable for any losses, inaccuracies, or problems that may arise from the information provided here. This includes issues such as loan denials, outdated terms, or disputes with lenders.

    Mentions of companies like “1F Cash Advance” are for informational comparison only. We do not have a formal relationship or endorsement agreement with any specific company unless stated otherwise. For questions about a specific service or offer, please contact the company directly.

    All trademarks and company names belong to their respective owners.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/679bdf0b-cc82-4b57-80b4-72f1e4722a20

    https://www.globenewswire.com/NewsRoom/AttachmentNg/542fe772-e81a-47a9-85dd-48d5ee5e48f5

    The MIL Network

  • MIL-OSI Africa: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.


    Read more: West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.


    Read more: Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.


    Read more: West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.


    Read more: Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    – Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach
    – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Africa

  • MIL-OSI Banking: Samsung Launches Galaxy F36 5G with Premium Leather Finish, Segment-Leading Camera and AI Innovations in India

    Source: Samsung

     
    Samsung, India’s largest consumer electronics brand, today announced the launch of Galaxy F36 5G to deliver a superior smartphone experience to users. Galaxy F36 5G comes with several segment-leading features that sets it apart from its predecessors. Galaxy F36 5G stands out with a premium leather finish, 50MP OIS triple camera with Nightography, Corning® Gorilla® Glass Victus®+ protection and advanced AI innovations.
     
    “With Galaxy F36 5G, we are reiterating our commitment to empower our consumers’ lives with powerful, future-ready devices. Galaxy F36 5G further accelerates the democratization of mobile AI, bringing cutting-edge AI features and capabilities within everyone’s reach, enabling users to unlock their full potential,” said Akshay S Rao, Director, MX Business, Samsung India.
     
    AI Camera
    Galaxy F36 5G comes with an advanced 50MP OIS (Optical Image Stabilization) triple camera setup, enabling you to shoot high-resolution, shake free photos and blur free videos. Galaxy F36 5G features Auto Night Mode, taking the Nightography experience to a whole new level by allowing you to capture crystal-clear low-light shots and videos. You can capture sharper and clearer night portraits thanks to AI stereo depth map technology.
     
    Users can record 4K videos with both the front and rear cameras. Galaxy F36 5G comes with fantastic mobile AI features such as Object Eraser, which instantly removes unwanted objects or people from photos; Image Clipper, which helps users extract a subject from an image and separate it from the background; and Edit Suggestions, which provides AI-powered recommendations for photo and video editing, taking the user experience to a whole new level.
     
    AI-Led Convenience
    Furthering the democratization of mobile AI to even more devices in the Galaxy ecosystem, Galaxy F36 5G comes with Circle to Search with Google. Additionally, it introduces new AI experience with Gemini Live, bringing real-time visual conversations with AI to Galaxy users. It allows for natural, conversational interactions with the Gemini AI assistant through voice, camera, and screen sharing. You can talk to Gemini, ask it to brainstorm ideas, explore topics, or even practice for important moments.
     
    Design and Display
    Designed for young consumers and built to impress, Galaxy F36 5G features a premium leather finish which is crafted to perfection and will come in three refreshing colours – Luxe Violet, Coral Red and Onyx Black. Galaxy F36 5G is only 7.7mm slim and features segment-leading Corning® Gorilla® Glass Victus®+ protection – making it extremely tough as well as ergonomic.
     
    Galaxy F36 5G features a 6.7-inch Full HD+ Super AMOLED display with 120Hz refresh rate and Vision Booster technology making it the perfect device for an unparalleled viewing experience even in the harsh outdoor lighting conditions.
     
    Powerful Processor
    Galaxy F36 5G is powered by the fast and power-efficient Exynos 1380 processor. Along with the 5nm based processor, Galaxy F36 5G also comes with a large vapor cooling chamber, which ensures efficient heat dissipation, providing users with a lag-free gaming experience and super smooth processing. For long sessions of browsing, binge watching and gaming, Galaxy F36 5G packs in 5000mAh battery. The device supports 25W fast charging, giving more power in less time.
     
    Galaxy Experiences
    Galaxy F36 5G offers segment-best 6 generations of Android upgrades and 6 years of security updates, ensuring a future-ready experience. Galaxy F36 5G comes with One UI 7 out of the box, bringing simple, impactful and emotive design as well as streamlined and cohesive experience to Galaxy users.
     
    Galaxy F36 5G aims to revolutionize consumer experience with ‘made in India’ innovations such as Voice Focus that cuts the ambient noise for an amazing calling experience. Galaxy F36 5G also features Quick Share which enables users to instantly share files, photos and documents with other devices, even if they are faraway, including your laptop and tab, privately.
     
    Galaxy F36 5G also features one of Samsung’s most innovative security features: Samsung Knox Vault. The hardware-based security system offers comprehensive protection against both hardware and software attacks. It includes Samsung’s innovative Tap & Pay feature with Samsung Wallet allowing consumers to make secure payments effortlessly.
     

    Product
    Variant
    Introductory Price
    Offers

    Galaxy F36 5G
    6GB+128GB
    INR 16499
     
     
    Including INR 1000 Introductory Offer

    8GB+128GB
    INR 17999

    8GB+256GB
    INR 20999

     
     
     
     

    MIL OSI Global Banks

  • MIL-OSI USA: New IAM Union Merch Now Available on Updated IAM Online Store!

    Source: US GOIAM Union

    The IAM Union’s refreshed branding has been a hit with our membership and beyond!

    Now, we have a way for every IAM Union member and supporter to get our brand new merch shipped directly to them.

    Visit our revamped iamuniongear.org online store to order today!

    We have the following IAM Union swag ready for purchase, with more on the way:

    • T-Shirts
    • Polos
    • Hats
    • Magnets
    • Lapel pins
    • Pencils
    • Lanyards
    • Ties and pocket squares/scarves

    In addition, our heritage IAM gear is available at bargain prices, so visit iamuniongear.org today!

    As always, IAM Union merch also remains available for purchase at IAM Headquarters and the Winpisinger Center.

    The post New IAM Union Merch Now Available on Updated IAM Online Store! appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Analysis: How falling vaccination rates are fuelling the antibiotic resistance crisis

    Source: The Conversation – Canada – By Ruchika Gupta, Assistant Professor and Medical Microbiologist, Department of Pathobiology and Lab Medicine, London Health Sciences Centre and Schulich School of Medicine and Dentistry, Western University

    Antibiotic resistance is one of the biggest health threats we face today. It’s often blamed on the overuse of antibiotics, and for a good reason. But there’s another major factor quietly driving this crisis that doesn’t get as much attention: low vaccination rates.

    In early 2025, Ontario had a measles outbreak with 2,200 cases as of mid-July, mostly in people who hadn’t been fully vaccinated. An outbreak in Alberta that began in March has expanded to more than 1,300 cases as of mid-July.

    Measles had been eliminated in Canada since 1998, but it’s now reappearing, largely due to missed or delayed vaccinations. On the surface, these might seem like a limited viral outbreak. But the ripple effects go much further, causing more illness, more complications and, ultimately, more antibiotic use.

    Why measles can lead to antibiotic use

    Measles itself is a viral infection, so antibiotics don’t treat it directly. But the virus weakens the immune system, leaving people vulnerable to bacterial infections like pneumonia or ear infections, conditions that do require antibiotics.

    Unsurprisingly, this pattern isn’t new. A 2019 study published in Pediatrics showed that many children hospitalized with measles in the United States developed secondary infections that required antibiotic treatment, especially pneumonia and ear infections.

    While data from the Ontario outbreak is still being analyzed, experts expect a similar surge in antibiotic prescriptions to treat these preventable complications.

    The antibiotic resistance chain reaction

    Every time we use antibiotics, we give bacteria a chance to adapt.
    (NIAID), CC BY

    Here’s where it gets dangerous. Every time we use antibiotics, we give bacteria a chance to adapt. The most vulnerable bacteria die, but tougher ones survive and spread. This leads to antibiotic resistance where treatments that used to work no longer do.

    Even appropriate use of antibiotics, like treating a bacterial infection after measles, adds to the problem. And the more often we need to prescribe antibiotics, the faster this resistance builds.

    A 2022 global study published in The Lancet estimated that antimicrobial resistance directly caused 1.27 million deaths in 2019 and contributed to many millions more. As resistance spreads, doctors are forced to use more toxic, expensive or last-resort drugs, and sometimes, no effective treatment exists at all.

    Antibiotic resistance means that treatments that used to work no longer do.
    (NIAID), CC BY

    How vaccines help fight resistance

    Vaccines are one of the most powerful tools we have not just to prevent disease, but to reduce antibiotic use and slow resistance. By stopping infections before they happen, vaccines reduce the need for antibiotics in the first place.

    Some vaccines protect directly against bacteria. Pneumococcal vaccines (PCV13, PCV15, PCV20) guard against a major cause of pneumonia, brain infections and ear infections. Haemophilus influenzae type b (Hib) and diphtheria vaccines prevent other respiratory bacterial diseases.

    Other vaccines protect against viruses, which can weaken the body and open the door to bacterial infections called as secondary bacterial infections.

    The MMR (measles-mumps-rubella) vaccine not only prevents measles but also reduces the chance of bacterial pneumonias that often occur after measles due to immunosuppression.

    The seasonal flu and COVID-19 vaccines help prevent viral infections that can trigger secondary bacterial complications.

    The rotavirus vaccine that protects against diarrheal disease in children has also been shown to reduce antibiotic use by more than 20 per cent, according to a 2024 study in Vaccine.

    In fact, a 2020 study in Nature found that improving childhood vaccination coverage in low- and middle-income countries could reduce antibiotic-treated illnesses in kids under five by more than 20 per cent. That’s a massive step forward in the fight against antibiotic resistance.

    A wake-up call

    The measles outbreaks in Ontario and Alberta aren’t just local issues; they are a global warning. Each missed vaccine doesn’t just put one person at risk; it potentially means more infections, more complications and more antibiotics. That, in turn, means more antibiotic resistance for everyone.

    Vaccines are not just about individual protection. They are a public health strategy that keeps antibiotics effective for when we really need them, especially for vulnerable people like cancer patients, transplant recipients and the elderly, who rely on antibiotics to survive routine infections.

    Vaccines, in fact, do more than prevent disease. They protect our ability to treat infections by reducing the need for antibiotics and slowing the rise of resistant bacteria. With preventable diseases like measles making a comeback, now is the time to recognize the broader impact of vaccine hesitancy.

    Choosing to vaccinate is more than a personal decision. It’s a way to protect our communities and preserve the life-saving power of antibiotics for generations to come.

    Ruchika Gupta does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. How falling vaccination rates are fuelling the antibiotic resistance crisis – https://theconversation.com/how-falling-vaccination-rates-are-fuelling-the-antibiotic-resistance-crisis-259682

    MIL OSI Analysis

  • MIL-OSI Analysis: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa (2) – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.




    Read more:
    West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.




    Read more:
    Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.




    Read more:
    West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.




    Read more:
    Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Analysis

  • MIL-OSI United Kingdom: Government secures label-led measures to boost earnings for UK artists

    Source: United Kingdom – Executive Government & Departments

    Press release

    Government secures label-led measures to boost earnings for UK artists

    Major boost for UK music creators as government drives industry to produce new measures to support legacy artists, songwriters and session musicians

    *Changes estimated by labels to deliver tens of millions of pounds in new investment to support musicians by 2030, rewarding artists for their work and driving growth through Plan for Change *Agreement backed by UK arms of major labels Universal Music Group, Sony Music Entertainment and Warner Music Group

    UK music creators are set to benefit from a boost to their earnings thanks to the Government driving forward a new label-led agreement on streaming pay agreed today (Tuesday 22nd July).

    The Creator Remuneration Working Group (CRWG), chaired by Creative Industries Minister Sir Chris Bryant, has been meeting regularly since 2024 to explore industry-led action – driving growth in the creative industries as part of the Government’s Plan for Change.

    This process has delivered a set of measures designed to boost the earnings of legacy artists, songwriters and session musicians and marks a further step towards ensuring the music streaming market works for everyone, on top of existing industry programmes.

    The principles include a new framework for the renegotiation of contracts by artists who signed record deals before streaming became commonplace, in addition to support for the digitisation of their back catalogues so that it can be made available online. This aims to help legacy artists to increase their streaming earnings for their existing body of work. 

    Support for songwriters and composers includes a commitment to the payment of per diems and expenses for recording sessions, to ensure they are not left out of pocket.

    The British Phonographic Industry (BPI) and Musicians’ Union also agreed to an uplift in session musician fees of up to 40% for pop sessions and 15% for classical to ensure they are more fairly paid for their work. 

    The agreed principles have been adopted by the BPI and Association of Independent Music (AIM) and recommended to their UK members. The UK divisions of Universal Music Group, Sony Music Entertainment and Warner Music Group, the world’s three largest labels, have also committed to delivering them.

    Culture Secretary Lisa Nandy said:

    Streaming has totally revolutionised how audiences discover and enjoy music, and how artists connect with their fans across the globe.

    But we have heard loud and clear from creators that more needs to be done to ensure they are fairly compensated when their work is used on streaming platforms.

    That is why I am delighted that the industry has agreed these new measures, which will go a long way to making sure our talented artists and creators are properly rewarded for their hard work, while driving growth through our Plan for Change.

    Creative Industries Minister Sir Chris Bryant said:

    Everyone loves music and it’s about time we really valued the people who create it. Millions of us use music streaming platforms who provide a fantastic service to their customers, connecting users with a wealth of music from around the world. 

    But many musicians and songwriters are really struggling and artists simply don’t  think they receive their fair share of the profit generated by their work on these platforms. These new measures, which apply specifically in the UK, are an important step in ensuring creators are fairly paid for their work.

    I would like to thank the sector for coming together to drive this positive progress, which will benefit the music industry as a whole.

    Roberto Neri, CEO of Ivors Academy, said:

    We welcome and wish to thank Minister Bryant for the introduction of per diems for songwriters and his support in securing this agreement. There is no music industry without songwriters and these payments will ensure that songwriters are not out of pocket when turning up to work. We look forward to working together over the next 12 months to assess how this package benefits music makers and ensuring that all creators share in the success of streaming remuneration.

    The Government will support industry to deliver these measures in full, in order to improve conditions for UK music makers. The impact of the measures will be monitored and reviewed in a year’s time, working closely with members of the group to understand the extent to which they are improving creator earnings as intended. 

    The Government will then assess the need for further intervention, to ensure this package delivers on its objective to bring about real change for creators. 

    Labels estimate these changes will deliver tens of millions of pounds in new investment to support creators by 2030, which will help drive growth in the creative industries as part of the Government’s Plan for Change.

    The Government has also committed to continuing to look at the issue of streaming pay for session musicians and has convened a meeting in September with key organisations from the music industry to take this forward.

    Further quotes

    The Council Of Music Makers said: 

    We greatly appreciate the efforts of the Government in seeking to improve the streaming economy for music-makers. Minister Chris Bryant has dedicated a great deal of time and resources trying to agree creator-friendly terms with the BPI and major labels, in an attempt to address unfair remuneration. Over the next year, we will work in good faith to support music-makers to test these initiatives and whether they can deliver meaningful change. 

    We will work closely with the Government during the one year monitoring of these measures. In 2021 Parliament’s Culture, Media & Sport Select Committee raised several fundamental issues regarding the streaming business model, calling for ‘a complete reset’. The Council Of Music Makers remains committed to achieving this objective and reaching a fairer settlement for all music-makers and we will now collectively pursue additional legislative measures to achieve positive change for those that create the work our industry is built on.

    Sophie Jones, Chief Strategy Officer at the BPI, said: 

    After five years of detailed scrutiny and analysis, we are pleased to put in place these creator remuneration principles for UK labels in response to specific concerns identified in the UK’s streaming debate. Many more artists are succeeding in the era of streaming than before – and we are confident that these targeted measures will lead to positive and sustainable outcomes and support for legacy artists, songwriters and session musicians, ensuring that our members’ significant ongoing investment into the development of British talent and the growth of our world leading UK music industry will be to the benefit of all. This has been a collaborative process and we are grateful to our members and fellow trade organisations for their expertise and to Minister Chris Bryant and the DCMS officials for their stewardship of this process.

    Baron Brennan of Canton, former Chair of the DCMS Select Committee which launched the inquiry into the Economics of Music Streaming, said: 

    Protecting the dignity of British songwriters by putting money in their pockets for writing sessions is a real first, and greater transparency over artist renegotiation is most welcome. I commend Minister Bryant for all his efforts. Further progress is needed on streaming but I’m encouraged by the Minister’s commitment to pursue progress through further talks this autumn on session musician income from streaming.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI Europe: Eurojust helps catch alleged author of threatening emails to schools in Czechia, Slovakia and Latvia

    Source: European Union 2

    Eurojust has assisted the authorities in the Czech Republic, Slovakia and Latvia with the apprehension of the alleged perpetrator who was responsible for sending thousands of emails in September last year threatening schools with explosions. The mass threats, which were also sent to other educational institutions and leisure centres, caused major public concern and led to the suspension of classes at the beginning of the school year.

    Eurojust supported the national authorities involved by setting up a joint investigation team (JIT) dedicated to the case, as well as providing additional cross-border judicial support.

    The alleged perpetrator also used the social network Telegram to spread his threats. He was apprehended in the Ukrainian city of Dnipro last week but was released pending potential further steps to be taken by the authorities.

    © Dnipropetrovsk Regional Prosecutor’s Office

    Given the mass scale of the threats at the same time across three countries, the police authorities involved coordinated their investigations, assisted by the setting up of the JIT. The joint investigative efforts, using the cybercrime expertise of the police, led to the identification of an alleged perpetrator, operating from the Ukrainian city of Dnipro.

    With the participation of Czech and Slovak police officers, a joint action took place in Dnipro last week, during which the alleged perpetrator was apprehended and one individual was questioned. Furthermore, two locations were searched, which led to the seizure of computer equipment.

    Thanks to the good and close cooperation of all the authorities concerned, the operation was successfully carried out under extremely difficult circumstances, very close to the frontline of the war in Ukraine, with Ukrainian, Czech and Slovak officers exposed to heavy risks.

    Eurojust offered support not only through the establishment of the JIT but also by organising a coordination meeting to prepare for the joint action day in Ukraine. The operation was carried out at the request of and by the following authorities:

    • Czech Republic: High Public Prosecutor’s Office in Prague; National Counterterrorism, Extremism and Cybercrime Agency (NCTEKK)
    • Latvia: Rīga Pārdaugava Prosecution Office; 1st Unit of Cybercrime Enforcement Department of the Central Criminal Police Department of the State Police
    • Slovakia: General Prosecutor´s Office of the Slovak Republic; Police Department West, Anti-Crime Unit, Bureau for Combating Organized Crime of the Presidium of the Police Corps (Police ACU); Counter Terrorism Centre, Presidium of the Police Corps
    • Ukraine: Dnipropetrovsk regional Prosecutor’s Office; Main Department of National Police in Dnipropetrovsk region; Division for Combating Cybercrime in Dnipropetrovsk region of the Cyber Police Department of National Police of Ukraine

    MIL OSI Europe News

  • MIL-OSI United Kingdom: UK Carrier Strike Group contributes to Exercise Talisman Sabre

    Source: United Kingdom – Executive Government & Departments 3

    News story

    UK Carrier Strike Group contributes to Exercise Talisman Sabre

    The UK Carrier Strike Group has led a major British contribution to the large multinational exercise in Australia.

    Crown copyright

    More than 3,000 British forces are taking part in the largest military exercise Australia has ever hosted, as the UK’s Carrier Strike Group (CSG25) demonstrates Britain’s unwavering commitment to Indo-Pacific security. 

    The Carrier Strike Group is in Australia as part of Operation Highmast, the major global deployment that demonstrates Britain’s strategic commitment to the Indo-Pacific. 

    From British Gurkhas to US Marines to Australian Defence Force amphibious specialists, Exercise Talisman Sabre 25 serves as one of the deployment’s key moments, bringing together multinational forces to strengthen and test how nations can work together to safeguard global trade routes and maintain regional stability. 

    Spanning across a vast area in Western Australia, the Northern Territory, Queensland, and New South Wales, the Australian-US led biennial exercise is bigger than ever, involving over 35,000 military personnel from 19 nations – making Talisman Sabre the largest exercise of the CSG’s deployment and one of the largest military exercises in the world this year. For the first time, offshore activities will also be conducted in Papua New Guinea.    

    Defence Secretary John Healey said:  

    The historic bonds between Britain and Australia run deep, and through AUKUS and exercises like Talisman Sabre we are strengthening these ties for the challenges of tomorrow.  

    Our commitment to the Indo-Pacific is unwavering, as this huge military exercise demonstrates. The unprecedented scale showcases the growing importance of cooperation in addressing shared challenges. We will continue to work alongside our closest allies to maintain the security and stability that underpins global prosperity. 

    Commodore James Blackmore said:  

    This is a real demonstration of the UK and our partners’ warfighting capabilities.   

    As the first UK-led multinational Carrier Strike Group to Talisman Sabre this is a powerful demonstration of our commitment to the Indo-Pacific region.  

    Exercise Talisman Sabre is also an opportunity for the UK to develop new levels of integration between systems and capabilities with the US, Australia, and other partners, enhancing our interoperability even further and to unprecedented levels.

     All three branches of the UK Armed Forces are engaged, with the Royal Marines playing a central role throughout the exercise alongside a Ranger Battalion from the Army and RAF Voyager aircraft. 

    The exercise strengthens operational cooperation with international partners, ensuring our collective ability to maintain the rules-based international order that underpins global trade and security.  

    The Royal Navy, alongside its AUKUS partners, is testing cutting-edge sub-sea and seabed warfare capabilities, showcasing interoperability across our navies. Additionally, for the first time, AUKUS nations will demonstrate the ability to remotely control Extra Large Uncrewed Underwater Vehicles (XL-UUVs) from a remote operating centre. 

    Through DSTL via the Resilience Autonomy and AI Technology collaboration, nations tested autonomy-enabled systems able to find and strike an advancing adversary. This experimentation provided a realistic combat environment for AUKUS to operate as an AI-enabled, integrated force, exploiting cutting-edge technology to ensure strategic advantage against a range of simulated adversaries. 
     
    The CSG25 deployment reinforces the government’s Plan for Change by strengthening international partnerships that underpin economic growth and national security, keeping Britain secure at home and strong abroad. Operation Highmast occurs against the backdrop of the government’s landmark commitment to increasing defence spending to 2.6% of GDP. 

    This historic investment underpins the government’s mission-led approach to securing Britain’s future, providing the economic stability necessary for growth whilst ensuring the UK maintains cutting-edge capabilities such as the Carrier Strike Group to meet emerging global threats.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: Secretary-General’s remarks to the Security Council – on Multilateralism and Peaceful Settlement of Disputes [bilingual as delivered; scroll down for all-English and all-French versions]

    Source: United Nations secretary general

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation. 

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.  

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.

    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.
    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    [all-English]

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.    

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  
    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.
    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the  sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of states.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.

    The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its 80th anniversary next year.

    Mr. President,    

    As we mark the 80th anniversary of our organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.

    I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    Thank you.

    [all-French]

    Monsieur le Président, Excellences,

    Je tiens à remercier le Vice-Premier Ministre et Ministre des affaires étrangères Ishaq Dar et le Pakistan d’avoir organisé le débat public de ce jour.

    Le thème de ce débat met en lumière le lien évident qui existe entre la paix internationale et le multilatéralisme.

    Il y a 80 ans, l’Organisation des Nations Unies a été fondée dans le but premier de préserver l’humanité du fléau de la guerre.

    Les architectes de la Charte des Nations Unies ont considéré que le règlement pacifique des différends était la seule issue possible lorsque les tensions géopolitiques s’intensifiaient, lorsque des différends non résolus attisaient les conflits et lorsque les États perdaient confiance les uns dans les autres.

    La Charte renferme un certain nombre d’outils majeurs destinés à forger la paix.

    Son Article 2.3 est clair :

    « Les Membres de l’Organisation règlent leurs différends internationaux par des moyens pacifiques, de telle manière que la paix et la sécurité internationales ainsi que la justice ne soient pas mises en danger ».

    Son Chapitre VI est tout aussi clair en ce qui concerne les responsabilités confiées au Conseil de sécurité, qui doit contribuer à assurer le règlement pacifique des différends « par voie de négociation, d’enquête, de médiation, de conciliation, d’arbitrage, de règlement judiciaire, de recours aux organismes ou accords régionaux, ou par d’autres moyens pacifiques » du choix des parties.

    La mesure 16 du Pacte pour l’avenir appelle les États Membres à démontrer leur attachement à la diplomatie préventive et au règlement pacifique des différends en recourant davantage à tous les mécanismes existants en la matière.

    Je félicite le Pakistan d’avoir mis à profit sa présidence pour présenter une résolution exhortant tous les États Membres à utiliser pleinement les outils en question dans le cadre de notre quête collective de la paix dans le monde.

    Nous en avons besoin plus que jamais.

    Partout dans le monde, nous observons un mépris total pour le droit international – voire des violations pures et simples de ce droit, notamment du droit international des droits humains, du droit international des réfugiés, du droit international humanitaire et de la Charte des Nations Unies elle-même –, sans que la responsabilité de quiconque ne soit engagée.

    Ces manquements aux obligations internationales surviennent à un moment où les divisions et les conflits géopolitiques s’aggravent.

    Et le coût – en vies humaines, en communautés brisées et en avenirs perdus – est accablant.

    Il suffit de regarder l’horreur qui se déroule à Gaza, avec un niveau de mort et de destruction sans équivalent dans l’histoire récente.

    La malnutrition explose.  La famine frappe à toutes les portes. 

    Et maintenant, nous assistons à l’agonie d’un système humanitaire fondé sur des principes humanitaires.

    Ce système se voit refuser les conditions nécessaires à son fonctionnement.  On lui refuse l’espace nécessaire pour agir.  On lui refuse la sécurité nécessaire pour sauver des vies.

    Alors que les opérations militaires israéliennes s’intensifient et que de nouveaux ordres de déplacement sont émis à Deir al-Balah, la dévastation s’ajoute à la dévastation.

    Je suis consterné que des locaux de l’ONU aient été touchés, notamment ceux du Bureau des Nations Unies pour les services d’appui aux projets et de l’Organisation mondiale de la Santé, y compris son entrepôt principal.

    Ceci alors que toutes les parties ont été informées de l’emplacement de ces installations de l’ONU.

    Ces locaux sont inviolables et doivent être protégés par le droit international humanitaire, sans exception.

    De Gaza à l’Ukraine, du Sahel au Soudan, de Haïti au Myanmar, et dans bien d’autres régions du monde, les conflits font rage, le droit international est bafoué, et la faim et les déplacements atteignent des niveaux record.

    Et le terrorisme, l’extrémisme violent et la criminalité transnationale restent des fléaux tenaces qui rendent la sécurité encore plus inaccessible.

    La diplomatie ne permet pas toujours de prévenir les conflits, la violence et l’instabilité.

    Mais elle a toujours le pouvoir de les arrêter.

    Monsieur le Président,

    La paix est un choix.

    Et le monde attend du Conseil de sécurité de l’Organisation qu’il aide les pays à faire ce choix.

    Ce Conseil est au cœur de l’architecture mondiale pour la paix et la sécurité.

    Sa création reposait sur une vérité fondamentale.

    La rivalité entre les États est une réalité géopolitique.

    Mais la coopération – ancrée dans des intérêts partagés et le bien commun – représente la voie durable vers la paix.

    Nous observons trop fréquemment que les divisions, les positions tranchées et la surenchère verbale bloquent la mise en place de solutions et sape l’efficacité de ce Conseil.

    Mais nous avons également observé des exemples admirables de cas où il a été possible de trouver un terrain d’entente et des solutions aux problèmes mondiaux.

    Ainsi, nous marquons aujourd’hui le troisième anniversaire de la signature de l’Initiative de la mer Noire et du mémorandum d’accord avec la Fédération de Russie – des mesures qui montrent ce que nous pouvons accomplir grâce à la médiation et aux bons offices de l’ONU, y compris dans les moments les plus difficiles.

    Et plus récemment, nous avons été témoins de bien d’autres exemples.

    De la Conférence de Séville sur le financement du développement à la Conférence de Nice sur l’océan, en passant par l’Accord sur la diversité biologique marine des zones ne relevant pas de la juridiction nationale, la Convention sur la cybercriminalité et le Pacte pour l’avenir, adopté l’année dernière.

    Le Pacte, en particulier, témoigne d’une claire volonté du monde de s’engager de nouveau à renforcer le système de sécurité collective des Nations Unies.

    Inspiré du Nouvel Agenda pour la paix, il donne la priorité à la diplomatie préventive et à la médiation, autant de domaines dans lesquels le Conseil peut jouer un rôle essentiel.

    En ce qui concerne le thème du débat qui nous réunit aujourd’hui, il y a selon moi trois domaines dans lesquels nous pouvons nous montrer à la hauteur de l’appel, contenu dans le Pacte, à renouveler notre engagement – et la confiance du monde – envers l’architecture multilatérale dont nous disposons pour régler les problèmes.

    Premièrement, les membres de ce Conseil, en particulier les membres permanents, doivent continuer à s’efforcer de surmonter les dissensions.

    La majorité des situations inscrites à l’ordre du jour du Conseil de sécurité sont complexes et ne se prêtent pas à des solutions rapides.

    Mais même dans les jours les plus sombres de la guerre froide, le dialogue et la prise de décision collective au sein de ce Conseil ont permis de maintenir un système de la sécurité mondiale commun et efficace.

    Un système qui a déployé avec succès toute une série de missions de maintien de la paix.

    Un système qui a ouvert la voie à l’acheminement d’une aide humanitaire vitale aux personnes dans le besoin.

    Et un système qui a permis d’éviter une troisième guerre mondiale.

    Je vous exhorte à adopter le même état d’esprit en maintenant la communication, en continuant d’écouter de bonne foi, en vous employant à surmonter les divergences et à rechercher le consensus.

    Nous devons également veiller à ce que ce Conseil soit à l’image du monde d’aujourd’hui, et non de celui d’il y a 80 ans.

    Ce Conseil devrait être plus représentatif des réalités géopolitiques actuelles.

    Et nous devons continuer de perfectionner ses méthodes de travail afin de le rendre plus inclusif, plus transparent, plus efficace, et plus responsable.

    Je vous demande instamment de continuer d’œuvrer à la recherche du consensus pour faire avancer les négociations intergouvernementales.

    Deuxièmement, ce Conseil doit continuer de renforcer la coopération avec les partenaires régionaux et sous-régionaux.

    L’adoption historique de la résolution 2719 du Conseil de sécurité, visant à financer les opérations d’appui à la paix menées par l’Union africaine au moyen de contributions statutaires, est un bon exemple de la manière dont nous pouvons unir nos forces à celles des organisations régionales pour favoriser la mise en place de mesures plus efficaces.

    Je salue également les mesures prises par ce Conseil pour renforcer et rebâtir les cadres de sécurité régionaux afin d’encourager le dialogue et de favoriser le règlement pacifique des différends.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    MIL OSI United Nations News

  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI

  • MIL-OSI: PureSky Energy Launches 100% LMI-Focused Clover Meadow Community Solar Project Under New York’s ESFA Program

    Source: GlobeNewswire (MIL-OSI)

    CLAVERACK, N.Y., July 22, 2025 (GLOBE NEWSWIRE) — PureSky Energy (“PureSky”) is proud to announce that its newest community solar farm, Clover Meadow Solar, located near Claverack, NY, is now fully operational and delivering clean, affordable energy exclusively to Low- to Moderate-Income (LMI) households. The 7.3 MWdc project is enrolled in New York State’s Expanded Solar for All (ESFA) program, which ensures that the benefits of renewable energy reach the communities that need them most.

    This milestone underscores PureSky’s deep commitment to energy equity, bringing the benefits of solar to income-qualified residents who often face the greatest barriers to accessing clean energy savings. Clover Meadow was developed by Eden Renewables (“Eden”), based in Troy NY, and is the seventh such project that PureSky and Eden have worked on together.

    Clover Meadow Solar Key Facts:

    • Location: Claverack, NY
    • Capacity: 7,269 kWDC
    • Solar Panels: 13,338 high-efficiency modules
    • Annual Generation: 10.3 million kWh
    • Equivalent Homes Powered: ~1,417 annually
    • Estimated Annual CO₂ Reduction: 14.9 million lbs
    • Estimated 30-Year Customer Savings: $3.4 million

    “Clover Meadow represents what community solar should be—a tool to make the clean energy transition equitable and inclusive,” said Nicholas Topping, Vice President of Community Solar at PureSky. “By enrolling the solar farm entirely under the ESFA program, we’re able to deliver immediate savings to thousands of income-eligible households while strengthening New York’s energy independence and supporting the state’s clean energy goals.”

    “Clover Meadow is another exciting milestone in our ongoing collaboration with PureSky Energy,” said Giovanni Maruca, Chief Development Officer at Eden Renewables. “At Eden, we’re committed to putting communities at the center of our projects That’s why we’re especially excited that this project will deliver clean, affordable energy to low-income households through the ESFA program.”

    This 100%-all LMI project exemplifies the growing capability of community solar to lower energy costs for households, particularly in rural and underserved areas. Households enrolled in the program will see guaranteed savings on their electricity bills—without needing to install rooftop panels or pay any upfront costs.

    Beyond household savings, the Clover Meadow Solar project brings broader benefits to the Claverack community by generating new local tax revenue and supporting clean energy jobs. The solar farm is designed to be pollinator-friendly, helping to tackle the global climate crisis, and includes Eden’s industry-leading education program as a community benefit. Projects like this help build more resilient, distributed energy systems while investing directly in local economies.

    About Expanded Solar for All (ESFA)
    New York’s ESFA program is designed to ensure that LMI households across the state can participate in and benefit from the growth of renewable energy. By connecting utility customers directly to solar projects like Clover Meadow, ESFA delivers monthly bill credits and long-term economic relief to income-qualified participants.

    PureSky Energy remains committed to developing and operating inclusive solar projects throughout New York. The company has additional anchor capacity available for future community solar projects and invites municipalities, housing authorities, and local organizations to explore partnership opportunities.

    For more information about the Clover Meadow project or PureSky Energy’s community solar offerings, please visit www.pureskyenergy.com or contact customercare@pureskyenergy.com.

    About PureSky Energy:
    PureSky Energy is a leading developer, owner, and operator of US community solar, C&I and storage projects with headquarters in Denver, Colorado. Since entering the US market in 2016, the company has rapidly expanded its scale and currently operates a portfolio with generation capacity of approximately 233MW across forty-four sites or under-construction projects expected to be completed in the short term. The company has a large pipeline of solar and battery storage projects across existing and new US markets, placing the platform in a primary position within the distributed generation market. The company’s mission is to make clean energy accessible and affordable to local communities across the United States, while shaping a brighter, more sustainable future for generations to come.

    Website: www.pureskyenergy.com

    Host A Solar Farm: https://www.pureskyenergy.com/community-host

    LinkedIn: https://www.linkedin.com/company/puresky-energy

    Media inquiries: Janet Janzen: marketing@pureskyenergy.com

    About Eden Renewables:

    Eden Renewables is an international developer of solar and energy storage projects in the US, UK, and sub-Saharan Africa. 

    Eden’s US office is based in Troy, NY, and currently has 21 pollinator-friendly community solar projects approved in the Capital Region and neighboring counties. All of Eden’s solar projects promote biodiversity and agricultural usage with excellent community and educational benefits. Subscribers to its community solar farms can benefit from savings of around 10% on their electricity bills.

    Website: https://edenrenewables.com/

    Media inquiries: sophy.fearnley-whittingstall@edenrenewables.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/ed3553da-f15c-4be8-a6a2-9f498be260fa

    The MIL Network

  • MIL-OSI: Buckeye Energy Holdings Spins Out Its Ownership Interest in Swift Current Energy to Funds Managed by IFM Investors

    Source: GlobeNewswire (MIL-OSI)

    HOUSTON, July 22, 2025 (GLOBE NEWSWIRE) — Buckeye Energy Holdings LLC (“Buckeye”), a premier energy infrastructure and logistics provider wholly owned by funds managed by IFM Investors (“IFM”), of which Buckeye Partners, L.P. is a wholly owned subsidiary, has completed the in-specie distribution of its majority ownership stake in Swift Current Energy, a leading renewable energy platform, to IFM. Swift Current Energy will operate as a standalone company going forward.

    Todd Russo, Chief Executive Officer of Buckeye, said “The distribution of Swift Current Energy to IFM will strengthen Buckeye’s ability to focus on leveraging our network of critical energy infrastructure to deliver targeted solutions that address the evolving energy needs of our customers. Looking ahead, we intend to continue driving new commercial opportunities to catalyze growth in our core business.”

    David Sparrow, Executive Director, Infrastructure at IFM Investors, said “This strategic distribution is an important milestone in the successful incubation of Swift Current Energy, leveraging the development, construction and operational expertise of the Buckeye platform to grow Swift Current Energy into a leading standalone renewable energy company held directly within the IFM portfolio. Looking ahead, Buckeye is ideally positioned with an attractive pipeline of proprietary growth opportunities, backing to pursue strategic synergies, and targeted solutions to enable less carbon-intensive offerings to its customer base.”

    About Buckeye Energy Holdings

    Buckeye is a premier infrastructure and logistics provider for the world’s energy needs, both today and tomorrow.

    Buckeye, a wholly-owned investment of IFM, owns and operates a diversified global network of integrated assets providing midstream infrastructure and logistics solutions. Across every aspect of the business – including its over 5,000 miles of domestic pipeline, more than 130 liquid petroleum products terminals and approximately 125 million barrels of tank capacity – Buckeye is committed to safely and responsibly providing world-class service to meet the continually evolving energy needs of its customers and the communities it serves. As part of this commitment to its customers, Buckeye is focused on providing for its customers’ increasingly diverse energy needs by continuing to diversify its platform and offerings to enable less carbon intensive energy solutions and undertaking decarbonization efforts on its operations. For more information, please visit buckeye.com.

    Media Contact
    buckeye@fticonsulting.com

    The MIL Network

  • MIL-OSI Africa: The International Islamic Trade Finance Corporation (ITFC) Reports Strong Results and Sustainability Progress in 2024 Annual Development Effectiveness Report

    Source: APO

    The International Islamic Trade Finance Corporation (ITFC) (www.ITFC-IDB.org), a member of the Islamic Development Bank (IsDB) Group, announced the release of its 2024 Annual Development Effectiveness Report (ADER).

    The ADER serves as an essential reporting and transparency tool, enabling ITFC to measure, communicate, and continually refine its strategies and interventions for achieving sustainable development outcomes. The 2024 report highlights ITFC’s expanding role as a driver of sustainable trade, economic resilience, and inclusive growth across its member countries.

    “The ADER showcases ITFC’s ability to provide innovative, impactful solutions that address the complex needs of our member countries,” said Eng. Adeeb Y. Al Aama, Chief Executive Officer of ITFC. “While we celebrate key milestones, we are also assessing our interventions to ensure we continue advancing toward a more inclusive, resilient, and sustainable future.”

    Key Highlights of 2024 ADER

    In 2024, ITFC delivered tangible results, demonstrating its focus on resilience and economic inclusion. The key highlights include:

    • Filling Trade Finance Gaps. ITFC allocated US$2.66 billion, 38% of its total portfolio, to LDMCs, supporting inclusive growth. Additionally, US$268 million directly benefited over 380,000 smallholder farmers, enabling the procurement of 840,000 metric tons of local agricultural products.
    • Securing Critical Supply Chains. Disbursements to the energy sector amounted to US$4 billion, bringing reliable electricity to approximately 13.8 million households. Food security interventions provided over 5.6 million metric tons of essential commodities worth US$1.45 billion, benefiting more than 30 million households.
    • Strengthening Private Sector Participation. ITFC financed 312 small and medium enterprises (SMEs) and corporates through partnerships with 23 financial institutions, promoting financial inclusion and economic diversification.
    • Fostering Regional Integration. Intra-OIC trade financing reached US$4.8 billion. Through strategic programs such as the Arab Africa Trade Bridges (AATB) and the Aid for Trade Initiative for Arab States (AfTIAS), ITFC strengthened regional value chains and institutional capacities.
    • Investing in Capacity Development. Technical assistance and training initiatives reached over 3,100 individuals, a 32% increase from the previous year, with nearly 40% women participants.

    Embedding Sustainability into Core Operations

    The Corporation adopted its first Environmental and Social (E&S) Policy and launched a Ten-Year E&S Action Plan. A new governance structure was also introduced to guide implementation, laying the foundation for more responsible trade finance operations.

    Empowering Growth through the SDGs

    ITFC made significant strides in advancing multiple Sustainable Development Goals through its trade finance and development initiatives. Its efforts have helped reduce poverty (SDG 1), strengthen food security (SDG 2), and expand access to clean and affordable energy (SDG 7). By supporting smallholder farmers, empowering local economies, and promoting intra-OIC trade, ITFC has also played a key role in fostering strong global partnerships to accelerate sustainable development across member countries (SDG 17).

    The 2024 ADER affirms ITFC’s deepening commitment to transparency, sustainability, and measurable impact. As the Corporation looks ahead, it remains focused on bold innovation, collaborative partnerships, and leveraging Islamic finance to build a more inclusive and sustainable global trade ecosystem.

    Access the full English version here – https://ADER.ITFC-IDB.org

    Distributed by APO Group on behalf of International Islamic Trade Finance Corporation (ITFC).

    Contact us:
    Tel: +966 12 646 8337  
    Fax: +966 12 637 1064   
    E-mail: ITFC@itfc-idb.org      

    Social media:
    Twitter: http://apo-opa.co/3GYB6PJ  
    Facebook: http://apo-opa.co/4f7UruK  
    LinkedIn: International Islamic Trade Finance Corporation (ITFC) (http://apo-opa.co/44Go3M4)  

    About the International Trade Finance Corporation (ITFC):
    The International Islamic Trade Finance Corporation (ITFC) is the trade finance arm of the Islamic Development Bank (IsDB) Group. It was established with the primary objective of advancing trade among OIC member countries, which would ultimately contribute to the overarching goal of improving the socio-economic conditions of the people across the world. Commencing operations in January 2008, ITFC has provided more than US$83 billion of financing to OIC member countries, making it the leading provider of trade solutions for these member countries’ needs. With a mission to become a catalyst for trade development for OIC member countries and beyond, the Corporation helps entities in member countries gain better access to trade finance and provides them with the necessary trade-related capacity-building tools, which would enable them to successfully compete in the global market.  

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Russia: There are no advantages – 40% of Russians do not see the advantages of the digital ruble

    Translation. Region: Russian Federal

    Source: Mainfin Bank –

    An important disclaimer is at the bottom of this article.

    What pros and cons do Russians see in the new digital currency?

    The citizens surveyed believe that the new currency, which is to be launched in the foreseeable future, has its advantages. 10% of respondents named security, reliability, protection from fraudsters as advantages, another 3% each – ease of payments and the possibility of state control. There were significantly more disadvantages:

    12% of Russians noted a low level of personal data protection; excessive control by the state – 8%; linking of electronic wallets to the Internet – 6%; difficulty of use – 4% of citizens.

    Only 6% of survey participants did not see any disadvantages to the new form of payment – the same result was recorded a year earlier. The majority of citizens are wary of digital assets, and consider state control over the personal finances of the population to be excessive.

    How do citizens rate their readiness to use digital rubles?

    Russians also assessed their own awareness of the electronic ruble – 7% of citizens know well how the new currency works, 45% have a general idea, 43% have only heard the term. At the same time, few Russians want to personally use digital rubles:

    24% would definitely not like to use a new form of payment; 27% said that they are rather not ready for experiments; another 14% of respondents found it difficult to answer; 26% of Russians are generally not against using the digital ruble; only 9% of people definitely want to try electronic currency.

    According to the survey results, only 35% of respondents agree to use digital rubles. It is interesting that over the past two years, this figure has increased – previously, only 30% of Russians expressed such readiness.

    Why are Russians wary of the digital ruble?

    Experts assured that the skepticism of the population is the result of low awareness of digital assets: people are afraid of everything unknown, especially in the area of personal finance. The possibility of total state control also raises concerns, although the authorities promise that the level of supervision will be the same as in the banking system.

    “It is necessary to conduct explanatory work and build up the information campaign as the digital ruble is prepared for a large-scale launch,” the Central Bank of the Russian Federation stated.

    Let us recall that the project was supposed to start on July 1, but the regulator was forced to postpone the deadline due to the banks’ unpreparedness to work with the platform. Now the Central Bank of the Russian Federation proposes to introduce the digital ruble no later than September 1, 2026. There is still more than a year left until the new deadline, but experts doubt that even then the new form of payment will be available to every citizen – commercial banks are actively opposing the project’s implementation due to the risk of a significant reduction in commission income.

    12:00 07/22/2025

    Source:

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI USA: Next Phase of Star Tax Relief Rolls Out

    Source: US State of New York

    overnor Kathy Hochul today announced the start of phase two of the School Tax Relief (STAR) program benefit season. Eligible homeowners in communities with school tax due dates in August or September will start receiving their STAR benefit in the coming weeks. Most homeowners eligible for a STAR credit will receive a check between $350 and $600. Most seniors eligible for an Enhanced STAR credit will receive a check between $700 and $1,500. STAR recipients can visit ny.gov/STAR to track their check delivery or enroll in direct deposit.

    “The STAR program provides needed school tax relief to millions of New York homeowners — and the program is now in full swing,” Governor Hochul said. “During a time of financial uncertainty due to funding cuts by Republicans in Washington, my administration is putting money back in the pockets of families with check and credit deliveries continuing to go out to hundreds of thousands of homeowners statewide.”

    New York State Department of Taxation and Finance Acting Commissioner Amanda Hiller said, “Visit our STAR resource page to sign up for STAR if you are a new homeowner and, if you’re an existing homeowner, to check on when your STAR credit or direct deposit will arrive.”

    Senate Majority Leader Andrea Stewart-Cousins said, “At a time when Republicans in Washington are slashing funding and leaving working families with uncertainty, the STAR program remains a lifeline for millions of homeowners, helping ease the burden of rising property taxes and helping working families stay afloat. With phase two of STAR benefits now underway, checks and credits of up to $1,500 are reaching hundreds of thousands of households. The Senate Democratic Majority worked closely with Governor Hochul and our colleagues in the Assembly to ensure that, in addition to STAR, we also delivered Inflation Rebate Checks, expanded child care assistance, and boosted child tax credits. These initiatives reflect our dedication to putting more money back in the pockets of hardworking New Yorkers.”

    Assembly Speaker Carl Heastie said, “While the administration in Washington is creating financial uncertainty for families across the country, here in New York, we’re working to put money back in the pockets of New York families. Because of the STAR program, more than three million homeowners across the state will receive $2.2 billion in tax relief, easing the financial burden on families and putting money back into our communities.”

    Phase one saw STAR credits and checks delivered to parts of the state with school tax due dates in June and July – including New York City, Yonkers, Buffalo, Rochester, and Syracuse. STAR deliveries to these regions were completed last week.

    The STAR program provides property tax relief to eligible New York State homeowners. During STAR benefit season, which runs from June to November, nearly three million homeowners will receive more than $2.2 billion in property tax relief through the program.

    Homeowners who are eligible and enrolled in the STAR program receive their benefit each year in one of two ways: as an exemption that reduces their school tax bill, or as a credit issued as a check or direct deposit.

    Those who receive the STAR credit as a check or direct deposit can visit the STAR Credit Delivery Schedule to learn when credits will be issued in their area. Property owners who are looking for details about STAR credits that have already been issued should visit the Property Tax Credit Lookup.

    Enroll in STAR Direct Deposit

    Homeowners can enroll in the STAR Credit Direct Deposit program through the Homeowner Benefit Portal within the Tax Department’s secure Online Services system. Homeowners can also use the Homeowner Benefit Portal to manage their STAR benefits easily and efficiently.

    The direct deposit option enables eligible STAR credit recipients to get their STAR credits without having to wait for and cash a check. To ensure they receive their STAR credit by direct deposit this year, homeowners should enroll as soon as possible. Homeowners who enroll fewer than 15 days before their STAR credit is issued will receive a check this year and direct deposit will begin next year. To find out when STAR credits will be issued in your area, use the STAR Credit Delivery Schedule lookup.

    Regional breakdown of this year’s $2.2 billion in STAR tax relief for nearly three million New Yorkers:

    REGION STAR TAX RELIEF RECIPIENTS
    Capital District $144.5 million 242,000
    Central New York $131.1 million 176,000
    Finger Lakes $205.2 million 279,000
    Long Island $698.4 million 582,000
    Mid-Hudson $488.5 million 404,000
    Mohawk Valley $66.3 million 101,000
    New York City $158.6 million 483,000
    North Country $47.2 million 88,000
    Southern Tier $109.6 million 156,000
    Western New York $178.5 million 320,000
    TOTAL $2.2 BILLION 2.83 MILLION

    State Senator Leroy Comrie said, “This next phase of the STAR program is welcome news for homeowners across Southeast Queens. Putting money back in people’s pockets helps ease the burden of rising costs and lets families stay rooted in the communities they’ve built their lives in. I thank Governor Hochul for keeping this commitment to New Yorkers.”

    State Senator Roxanne J. Persaud said, “This vital tax relief means eligible homeowners, especially seniors, can expect to receive their STAR or Enhanced STAR payments in the coming weeks. Nearly three million New Yorkers will receive over $2.2 billion this season, which is real support that eases financial strain and puts money back into our communities.”

    State Senator Luis R. Sepúlveda said, “I am pleased by Governor Kathy Hochul’s announcement of the next phase of the STAR tax relief program, which will directly benefit nearly three million New Yorkers. This program is putting money directly into the pockets of the working families and seniors who need it most. In communities like ours, in the Bronx, where the rising cost of living continues to affect so many people, this assistance means much more than just a check — it is essential financial relief that can make the difference between stability and hardship.”

    State Senator Shelley B. Mayer said, “I am pleased that millions of New Yorkers, including over 400,000 residents in the Hudson Valley, receive tax relief this summer and fall through the New York School Tax Relief (STAR) program. Many families in Westchester struggle with the high cost of living, and the STAR program will offer much-needed assistance. I encourage those eligible for STAR to enroll in direct deposit to simplify the process of receiving your STAR checks. I would also like to thank Governor Kathy Hochul for her commitment towards a hassle-free program that helps alleviate the burden of property taxes.”

    State Senator Rachel May said, “The STAR program helps make homeownership more affordable for seniors and families across New York. In Central New York, this kind of targeted tax relief makes a real difference. I’m grateful to Governor Hochul for continuing to support a program that helps so many of our neighbors stay in their homes.”

    State Senator Robert Jackson said, “In a state where working families shoulder some of the highest property taxes in the nation, this next phase of STAR is more than a benefit—it’s real relief. This is government at its best: directly returning hard-earned dollars to those who sustain our communities. From the Bronx to Buffalo, from seniors relying on fixed incomes to young families striving for stability, these checks aren’t just policy—they embody the principle that public dollars must serve the public good. I commend Governor Hochul and the Legislature for coming together and demonstrating precisely what good governance looks like—putting meaningful resources directly into the hands of the people we represent.”

    State Senator Jeremy Cooney said, “The STAR program is one of many ways we are tackling affordability in New York and making our state a place where everyone is able to live and thrive. With billions in relief being sent out, including over $205 million for the Finger Lakes region, I want to thank Governor Hochul for putting money back in the pockets of New Yorkers and for her commitment to increasing the quality of life across our state.”

    State Senator Michelle Hinchey said, “Over $630 million in property tax relief is headed straight to homeowners in the Mid-Hudson Valley and Capital Region, and I’m proud to have fought for it. For seniors on fixed incomes and working families trying to keep up, putting money back into people’s pockets through the STAR program is critical to making life more affordable. We’ll keep pushing to deliver the tax relief New Yorkers deserve through this program and beyond.”

    State Senator Lea Webb said, “The STAR program continues to be a vital lifeline for hardworking families and seniors across the Southern Tier, and I’m proud to see the second phase of disbursements reaching residents in my district. This additional round of tax relief helps ease the financial burden for millions of New Yorkers. It means more breathing room in family budgets and peace of mind for seniors. Whether it’s paying for essentials, catching up on bills, or planning for the future, this support strengthens our communities and helps people remain in the homes they’ve worked so hard to maintain.”

    State Senator April N.M. Baskin said, “Thanks to Governor Hochul, a substantial number of New York residents, including 320,000 in Western New York, will have more money in their pockets over the next few months because of the STAR tax relief program. In these uncertain economic times, this program is particularly helpful to working families and older residents who benefit from such meaningful financial relief.”

    State Senator Christopher Ryan said, “This is real, meaningful tax relief for Central New York homeowners. More than 176,000 families in our region will see a total of $131 million coming back to them through the STAR program. Whether you’re a senior on a fixed income or a working family trying to stay ahead, this puts money back in your pocket when it’s needed most. I’ll keep fighting to make sure programs like this continue to deliver for our communities.”

    Assemblymember Charles D. Lavine said, “This is welcome news for tens of thousands of hard-working families and seniors right here in Nassau County. Thanks to Governor Hochul’s continued commitment to this program and the economic needs of residents, real money will soon be back in their pockets which they can use however they would like.”

    Assemblymember Harry B. Bronson said, “Making New York more affordable for our seniors and middle-class families is one of my highest priorities. Phase 2 of the STAR Tax Relief Program, funded through the New York State budget, will deliver relief to thousands of residents in Monroe County and the City of Rochester, putting much-needed money back in people’s pockets as we head into the cooler days of fall. I am proud to have worked alongside my State Legislative colleagues and Governor Hochul to continue this critical tax cut.”

    Assemblymember Steve Otis said, “This announcement shares the next phase of STAR tax relief payments funded in this year’s budget by Governor Hochul, the Assembly and Senate. The focus of our adopted state budget was to address affordability issues for New York families through a range of state programs. I continue to focus on delivering state dollars directly to Westchester families and through state assistance to local governments and school districts to help lower the burden of property taxes. Established decades ago, Basic STAR and Enhanced STAR help reduce the burden of school property taxes across the state.”

    Assemblymember Rodneyse Bichotte Hermelyn said, “Governor Hochul’s rollout of Phase 2 of the STAR Tax Relief Program, represents a critical investment in the well-being of New York homeowners – particularly our seniors living on fixed incomes and hardworking families striving every day to make ends meet. At a time when the cost of living continues to rise, this property tax relief helps ensure residents can remain in their homes and maintain long-term financial stability. The STAR program does more than deliver a check—it delivers tranquility and strengthens the very foundation of our neighborhoods. I applaud Governor Hochul for prioritizing this vital support and for ensuring that these benefits are delivered efficiently and equitably to millions of New Yorkers.”

    Assemblymember Al Taylor said, “At a time when working families and seniors are feeling the weight of inflation, the STAR tax relief program is delivering real, tangible help. Phase 2 will bring hundreds of dollars in direct relief to millions of New Yorkers, including nearly half a million right here in New York City. I commend Governor Hochul for advancing this vital program and ensuring that homeowners, especially our seniors on fixed incomes, get the support they deserve. This is what government should do: make life more affordable and help people stay in their homes.”

    Assemblymember Clyde Vanel said, “Queens families continue to face rising costs. This next round of STAR tax relief comes at a critical time for all of them. I applaud Governor Hochul’s commitment to easing the burden on homeowners across New York State. Nearly three million New Yorkers, including thousands right here in Queens, will feel real financial relief this summer and fall.”

    Assemblymember Harvey Epstein said, “As the cost of living continues to increase in our state, it is important to put money back in the pockets of New Yorkers. The STAR tax credit will offer property tax relief to many homeowners who need it.”

    Assemblymember Jenifer Rajkumar said, “Governor Hochul is delivering real, meaningful relief to millions of New Yorkers. At a time when families are feeling the pinch, the Governor’s leadership is putting money back in people’s pockets, making life more affordable, and opening up opportunities for working families. By easing the burden of school property taxes, she is helping New Yorkers build a stronger future — with more financial security and more resources to invest in their families and communities. This is what people-first government looks like.”

    Assemblymember Jessica González-Rojas said, “As the second phase of the STAR Tax Credit rebate check distribution commences, I commend Governor Hochul, Speaker Heastie and my colleagues for ensuring New York homeowners get the support, especially in the midst of economic turmoil. The STAR rebate check disbursement is an opportunity to support homeowners throughout New York State. A $350 check can make a big difference for many families today. Thank you to all who helped make this happen so we can provide more relief to all New Yorkers.”

    Assemblymember Yudelka Tapia said, “Putting money back in the pockets of New Yorkers is one of the most important things we can do to help families put food on the table and keep our state affordable. Here in New York City, nearly half a million homeowners are receiving over $158 million in property tax relief. I applaud Governor Hochul for moving this effort forward and delivering for working families across every corner of our state.”

    Assemblymember Dana Levenberg said, “My constituents are extremely concerned about affordability, especially in light of the devastating cuts to the federal assistance programs on which many households rely to make ends meet. I am proud that in New York, we are looking out for your bottom line providing STAR program tax relief totaling $2.2 billion across the state, with payments coming via direct deposit, credit on your school tax bill, or a check in your mailbox in the coming weeks.”

    Assemblymember Gabriella A. Romero said, “I’m proud to see the successful implementation of phase two of the School Tax Relief (STAR) program across New York State begin this month. This important investment focuses on those most affected by rising school taxes, providing real, lasting relief. I’m honored to stand with Governor Hochul and my colleagues in the State Legislature for securing its place in this year’s budget.”

    Assemblymember MaryJane Shimsky said, “Some recipients have already received the STAR benefit in the form of a tax exemption this year, but many others will receive it by check in the coming weeks and months. With major funding cuts coming from Washington, this benefit will be even more crucial as our households struggle harder to make ends meet. I urge our homeowners to check their eligibility for both Basic STAR and Enhanced STAR, and to consult the delivery schedule for their area.”

    MIL OSI USA News

  • MIL-OSI Europe: AMERICA/ARGENTINA – Dialogue as a means of conflict resolution: solidarity of the Aboriginal Pastoral Care with the Mapuche communities

    Source: Agenzia Fides – MIL OSI

    Tuesday, 22 July 2025

    Internet

    Neuquén (Agenzia Fides) – “Let all forms of violence and, above all, the criminalization of the ongoing protest cease immediately. Social peace is only possible through dialogue as a tool to address different social situations.” This is the appeal of the Diocesan Team for Aboriginal Pastoral Care (EDIPA) of the Diocese of Neuquén, which has expressed its solidarity with the members of some Mapuche communities and deplored the acts of violence that occurred during the eviction ordered by a court following a complaint from the Executive.In a statement released by EDIPA, it reiterates the importance of “dialogue as a means of conflict resolution, convinced that it is the only way to address issues while respecting the rights of citizens.”Likewise, the diocesan organization urges the State to “effectively and immediately respect the indigenous rights recognized by the National Constitution (Article 75, paragraph 17), by the Constitution of the Province of Neuquén (Article 53), and by international instruments, including the right to legal personality, a request that the communities have been making for some time and to date, has not received a clear and concrete response.” (AP) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Submissions: Sylvia Plath’s ‘fig tree analogy’ from The Bell Jar is being misappropriated

    Source: The Conversation – UK – By Elisha Wise, English, University of Sheffield

    In chapter seven of Sylvia Plath’s The Bell Jar (1963), protagonist Esther Greenwood imagines her life branching out before her like a green fig-tree. Each individual fig on the branches represents a different “wonderful future” – a family, a successful career, romance, travel, fame, etc.

    High-achieving Esther has innumerable figs she can choose from, yet she envisages herself “starving to death” in the crook of the tree because she can’t make up her mind on which of the figs she should choose.

    Her indecision stems from the knowledge that choosing one wonderful future means losing out on the other, equally appealing opportunities. She wants to experience all of them, but knows she cannot, and, in the end, spends so long deciding that every single fig rots and falls to the ground, dead.

    By wanting to do everything, Esther misses her chance to do anything at all. This is a metaphor about wasted potential, fears of choosing the wrong pathway, and feeling rushed into making decisions before you truly know what you want. There is little wonder that it appeals to teenagers.

    The “fig tree analogy”, as it is known online, is beloved by gen Z and has become a TikTok staple over the last three years. It was first discussed on the platform as part of the 2023 “Roman Empire” meme, with female users citing it as an example of something they constantly think about.

    It then reached a new peak in early 2024 thanks to the “my fig tree” trend, in which users (again, predominantly young women) wrote future hopes and dreams onto a stock image of a fig branch in videos featuring accompanying audio of the passage being read aloud.


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    This trend was, in essence, a way for people to share their dream jobs – with career pathways as varied as “surgeon” and “influencer” sometimes appearing on a single branch. But it also allowed young users to express their anxieties about planning for the future.

    In one video, “I can’t help but wonder if I’m going to be truly happy in [my chosen career] forever” is written beside a beautifully illustrated fig tree. I remember feeling this way myself when I read The Bell Jar for the first time in the middle of university applications and big life choices.

    When you are young, it can feel like you have only one choice and can never remake it, which is why Plath’s words spoke to me then and seem to be speaking to hundreds now.

    But why exactly is this metaphor resonating so strongly with gen Z?

    The girls who are participating in the “my fig tree” trend are not subject to the same binary choice of marriage or career that Esther faced. It is now possible to have loads of lovers and then a husband and family, and neither disqualifies you from also being a “brilliant professor” or “amazing editor” or anything else you wish to be.

    In The Bell Jar, Plath treats these things as distinct because they would truly have felt that way in Esther’s time of enforced purity and nuclear families. She was, after all, writing pre-second-wave feminism.

    So why, in our fourth-wave feminist world, do women still feel their options are so narrow? It could be because women workers are disproportionately at risk of being displaced by AI, or because other TikTok sensations like the “trad wife” are promoting to young women the very purity culture that Plath rallied against.

    Perhaps, for this generation, it really seems urgent to grasp hold of one fig before all are lost.

    However, as the “fig tree analogy” goes more and more viral, it is at risk of being removed from its original context. The signs of this are already visible on TikTok, as the passage has in the last month been used to soundtrack #romanticisinglife content and promote fig-themed homeware at a garden centre.

    It was also referenced in a recent episode of reality dating show Love Island, where it was incorrectly named the “fig theory” and not attributed to Plath.

    All of this suggests that the passage has now reached an audience of people who have not read The Bell Jar and see the analogy more as some generic life wisdom than a literary device. Indeed, TikTok videos by self-styled philosophers encouraging watchers to pick any or every fig off the tree instead of being paralysed by indecision like Esther are gaining traction.

    While these may prove helpful to Zoomers unsure about their future pathway, I feel that the conversation around this metaphor is increasingly overlooking the fact that Esther is unable to choose a fig because she is depressed.

    The real meaning of the fig tree analogy

    The Bell Jar may be a novel about coming of age as a woman, but it’s also, at its core, the story of a woman having a breakdown. In the pages preceding the “fig tree analogy”, Esther calls herself “dreadfully inadequate” and claims that “I was only purely happy until I was nine years old”.

    So, in the context of the novel, the metaphor can be read as a product of depressive thinking. It is not meant to be a universal truth.

    Instead, it represents the subjective thoughts of a narrator who feels herself a failure, despite her plentiful opportunities, because she is mentally ill. Turning Plath’s prose into a theory or philosophy or meme minimises its darker aspects, particularly as the popular TikTok audio that accompanies “fig tree analogy” videos often cuts off before the figs fall, due to the app’s preference for short content.

    Some users may well have participated in the “my fig tree” trend without even realising that the quotation ends with Esther losing everything.

    Perhaps it should be concerning so many young people relate to a narrator who becomes so overwhelmed by her conflicting ambitions that she attempts to kill herself. I certainly wonder how Plath would feel about her words now being treated as emblematic of a collective female experience. If nothing else, I am sure she would be disappointed at how little has changed in 60 years.


    This article features references to books that have been included for editorial reasons, and may contain links to bookshop.org. If you click on one of the links and go on to buy something from bookshop.org The Conversation UK may earn a commission.

    Elisha Wise will receive funding from the White Rose College of Arts and Humanities (ARCH) from October 2025.

    ref. Sylvia Plath’s ‘fig tree analogy’ from The Bell Jar is being misappropriated – https://theconversation.com/sylvia-plaths-fig-tree-analogy-from-the-bell-jar-is-being-misappropriated-261597

    MIL OSI

  • MIL-OSI USA: Garbarino Selected To Lead Powerful Homeland Security Committee

    Source: United States House of Representatives – Representative Andrew Garbarino (R-NY)

    WASHINGTON, D.C.Congressman Andrew R. Garbarino (R-NY-02) has been selected as the next Chairman of the powerful House Committee on Homeland Security. He will be the seventh Member to hold this position since the Committee was first established as a Select Committee in 2002 and later constituted as a Standing Committee in 2005.

    “I am honored to have earned the trust and confidence of my colleagues to lead the House Committee on Homeland Security. As a lifelong New Yorker and representative of a district shaped by 9/11, I understand the stakes of this responsibility. ‘Never forget’ is more than a slogan. It is a commitment I have carried with me throughout my entire adult life and one that will continue to drive my work as Chairman,” said Congressman Garbarino.

    “We have serious work ahead of us. Securing the border, confronting terrorism, strengthening our cybersecurity, and hardening our national defenses are all critical to keeping Americans safe. I look forward to working with my colleagues on the committee to take on these challenges and deliver on the mission the American people expect us to carry out,” Garbarino continued.

    Congressman Garbarino has served on the Homeland Security Committee since entering office in the 117th Congress. He was selected to chair the Subcommittee on Cybersecurity and Infrastructure Protection in the 118th Congress, after previously serving as its Ranking Member.

    ###

    MIL OSI USA News

  • MIL-OSI United Nations: Secretary-General’s remarks on Climate Action “A Moment of Opportunity: Supercharging the Clean Energy Age” [as delivered; scroll down for All-French]

    Source: United Nations secretary general

    Excellencies,

    Ladies and gentlemen,

    Friends joining us from around the world,  

    The headlines are dominated by a world in trouble. 

    By conflict and climate chaos.

    By rising human suffering.

    By growing geo-political divides.

    But amidst the turmoil, another story is being written.

    And its implications will be profound.

    Throughout history, energy has shaped the destiny of humankind – from mastering
    fire, to harnessing steam, to splitting the atom.

    Now, we are on the cusp of a new era. 

    Fossil fuels are running out of road.

    The sun is rising on a clean energy age.

    Just follow the money.

    $2 trillion went into clean energy last year – that’s $800 billion more than fossil fuels, and up almost 70% in ten years.

    And new data released today from the International Renewable Energy Agency shows that solar – not so long ago four times the cost of fossil fuels – is now 41% cheaper.

    Offshore wind – 53%.

    And over 90% of new renewables worldwide produced electricity for less than the cheapest new fossil fuel alternative.

    This is not just a shift in power.  This is a shift in possibility.

    Yes, in repairing our relationship with the climate.

    Already, the carbon emissions saved by solar and wind globally are almost equivalent to what the whole European Union produces in a year.

    But this transformation is fundamentally about energy security and people’s security.

    It’s about smart economics.

    Decent jobs, public health, advancing the Sustainable Development Goals. 

    And delivering clean and affordable energy to everyone, everywhere.

    Today, we are releasing a special report with the support of UN agencies and partners — the International Energy Agency, the IMF, IRENA, the OECD and the World Bank.

    The report shows how far we have come in the decade since the Paris Agreement sparked a clean energy revolution.  And it highlights the vast benefits – and actions needed – to accelerate a just transition globally.

    Renewables already nearly match fossil fuels in global installed power capacity.

    And that’s just the beginning. 

    Last year, almost all the new power capacity built came from renewables. 

    And every continent on Earth added more renewables capacity than fossil fuels.

    The clean energy future is no longer a promise.  It’s a fact. 

    No government.  No industry.  No special interest can stop it. 

    Of course, the fossil fuel lobby of some fossil fuel companies will try – and we know the lengths to which they will go.

    But I have never been more confident that they will fail – because we have passed the point of no return.  

    For three powerful reasons. 

    First, market economics.

    For decades, emissions and economic growth rose together.

    No more.

    In many advanced economies, emissions have peaked, but growth continues.

    In 2023 alone, clean energy sectors drove 10% of global GDP growth.

    In India, 5%.  The United States, 6%. China – a leader in the energy transition – 20%.

    And in the European Union, nearly 33%.

    And clean energy sector jobs now outnumber fossil fuel jobs – employing almost 35 million people worldwide.

    Even Texas – the heart of the American fossil fuel industry – now leads the US in renewables.

    Why?  Because it makes economic sense.

    And yet fossil fuels still enjoy a 9 to 1 advantage in consumption subsidies globally – a clear market distortion. 

    Add to that the unaccounted costs of climate damages on people and planet – and the distortion is even greater.

    Countries that cling to fossil fuels are not protecting their economies – they are sabotaging them.

    Driving up costs.

    Undermining competitiveness.

    Locking-in stranded assets.

    And missing the greatest economic opportunity of the 21st century.

    Excellencies,
    Dear friends,

    Second — renewables are here to stay because they are the foundation of energy security and sovereignty.

    Let’s be clear:  The greatest threat to energy security today is in fossil fuels.

    They leave economies and people at the mercy of price shocks, supply disruptions, and geopolitical turmoil. 

    Just look at Russia’s invasion of Ukraine.  

    A war in Europe led to a global energy crisis.

    Oil and gas prices soared.

    Electricity and food bills followed.
     
    In 2022 average households around the world saw energy costs jump 20%. 

    Modern and competitive economies need stable, affordable energy.  Renewables offer both.

    There are no price spikes for sunlight.

    No embargoes on wind.

    Renewables can put power – literally and figuratively – in the hands of people and governments.

    And almost every nation has enough sun, wind, or water to become energy self-sufficient.

    Renewables mean real energy security.  Real energy sovereignty. And real freedom from fossil-fuel volatility.

    Dear friends,

    The third and final reason why there is no going back on renewables:  Easy access.

    You can’t build a coal plant in someone’s backyard.

    But you can deliver solar panels to the most remote village on earth.

    Solar and wind can be deployed faster, cheaper and more flexibly than fossil fuels ever could.

    And while nuclear will be part of the global energy mix, it can never fill the access gaps.

    All of this is a game-changer for the hundreds of millions of people still living without electricity – most of them in Africa, a continent bursting with renewable potential.

    By 2040, Africa could generate 10 times more electricity than it needs – entirely from renewables.   

    We are already seeing small-scale and off-grid renewable technologies lighting homes, and powering schools and businesses in remote areas.

    And in places like Pakistan for example, people-power is fueling a solar surge – consumers are driving the clean energy boom. 

    Excellencies,
    Dear friends,

    The energy transition is unstoppable.

    But the transition is not yet fast enough or fair enough. 

    OECD countries and China account for 80% of renewable power capacity installed worldwide.

    Brazil and India make up nearly 10%.

    Africa — just 1.5%.

    Meanwhile, the climate crisis is laying waste to lives and livelihoods.

    Climate disasters in small island states have wiped out over 100% of GDP. 

    In the United States, they are pushing insurance premiums through the roof. 

    And the 1.5 degree limit is in unprecedented peril.

    To keep it within reach, we must drastically speed up the reduction of emissions – and the reach of the clean energy transition.

    With manufacturing capacity racing, prices plummeting, and COP30 fast approaching…

    This is our moment of opportunity.

    We must seize it.

    We can do so by taking action in six opportunity areas.  

    First – by using new national climate plans to go all-out on the energy transition. 

    Too often, governments send mixed messages:

    Bold renewable targets on one day.  New fossil fuel subsidies and expansions the next. 

    The next national climate plans, or NDCs, are due in a matter of months.

    They must bring clarity and certainty.

    G20 countries must lead.  They produce 80% of global emissions. 

    The principle of common but differentiated responsibilities must apply but every country must do more.

    Ahead of COP30 in Brazil this November, they must submit new plans.

    I invite leaders to present their new NDCs at an event I will host in September, during General Assembly High-level week. These must:

    Cover all emissions, across the entire economy.

    Align with the 1.5 degree limit.

    Integrate energy, climate and sustainable development priorities into one coherent vision.

    And deliver on global promises:

    To double energy efficiency and triple renewables capacity by 2030.

    And to accelerate the transition away from fossil fuels.

    These plans must be backed by long-term roadmaps for a just transition to net-zero energy systems – in line with global net-zero by 2050.

    And they must be underpinned by policies that show that the clean energy future is not just inevitable – but investable. 

    Policies that create clear regulations and a pipeline of projects.

    That enhance public-private partnerships – unlocking capital and innovation.

    That put a meaningful price on carbon.

    And that end subsidies and international public finance for fossil fuels – as promised. 

    Second, this is our moment of opportunity to build the energy systems of the 21st century. 

    The technology is moving ahead.   

    In just fifteen years, the cost of battery storage systems for electricity grids has dropped over 90%. 

    But here’s the problem. 

    Investments in the right infrastructure are not keeping up. 

    For every dollar invested in renewable power, just 60 cents go to grids and storage. 

    That ratio should be one-to-one. 

    We are building renewable power – but not connecting it fast enough.

    There’s three times more renewable energy waiting to be plugged into grids than was added last year.

    And fossil fuels still dominate the global total energy mix.

    We must act now and invest in the backbone of a clean energy future:

    In modern, flexible and digital grids – including regional integration.

    In a massive scale-up of energy storage.

    In charging networks – to power the electric vehicle revolution.

    On the other hand we need energy efficiency but also  electrification — across buildings, transport and industry.

    This is how we unlock the full promise of renewables – and build energy systems that are clean, secure and fit for the future.

    Third, this is our moment of opportunity to meet the world’s surging energy demand sustainably.

    More people are plugging in.

    More cities are heating up – with soaring demand for cooling.

    And more technologies – from AI to digital finance – are devouring electricity.

    Governments must aim to meet all new electricity demand with renewables.

    AI can boost efficiency, innovation, and resilience in energy systems. And we must take profit in it.

    But it is also energy-hungry.

    A typical AI data-center eats-up as much electricity as 100,000 homes.

    The largest ones will soon use twenty times that. 

    By 2030, data centres could consume as much electricity as all of Japan does today.

    This is not sustainable – unless we make it so.

    And the technology sector must be out front.

    Today I call on every major tech firm to power all data centres with 100% renewables by 2030.

    And – along with other industries – they must use water sustainably in cooling systems.

    The future is being built in the cloud.

    It must be powered by the sun, the wind, and the promise of a better world.  

    Excellencies
    Dear friends,

    Fourth, this is the moment of opportunity for a just energy transition.

    The clean energy that we must deliver  must also deliver equity, dignity and opportunity for all.

    That means governments leading a just transition.

    With support, education and training – for fossil fuel workers, young people, women, Indigenous Peoples and others – so that they can thrive in the new energy economy.

    With stronger social protection – so no one is left behind. 

    And with international cooperation to help low-income countries that are highly-dependent on fossil fuels and struggling to make the shift.

    But justice doesn’t stop here.

    The critical minerals that power the clean energy revolution are often found in countries that have long been exploited.

    And today, we see history repeating. 

    Communities mistreated.

    Rights trampled.

    Environments trashed.

    Nations stuck at the bottom of value chains – while others reap rewards.

    And extractive models digging deeper holes of inequality and harm.

    This must end.

    Developing countries can play a major role in diversifying sources of supply. 

    The UN Panel on Critical Energy Transition Minerals has shown the way forward – with a path grounded in human rights, justice and equity.

    Today, I call on governments, businesses and civil society to work with us to deliver its recommendations.

    Let’s build a future that is not only green – but just.

    Not only fast – but fair. 

    Not only transformative – but inclusive.

    Fifth, we have a moment of opportunity to use trade and investment to supercharge the energy transition.

    Clean energy needs more than ambition.

    It needs access – to technologies, materials, and manufacturing.

    But these are concentrated in just a few countries.

    And global trade is fragmenting.

    Trade policy must support climate policy.

    Countries committed to the new energy era must come together to ensure that trade and investment drive it forward.

    By building diverse, secure, and resilient supply chains.

    By cutting tariffs on clean energy goods.

    By unlocking investment and trade – including through South-South cooperation.

    And by modernizing outdated investment treaties – starting with Investor-State Dispute Settlement provisions.

    Today, fossil fuel interests are weaponizing these provisions to delay the transition, particularly in several developing countries.

    Reform is urgent.

    The race for the new must not be a race for the few.

    It must be a relay – shared, inclusive and resilient.

    Let’s make trade a tool for transformation. 

    Sixth and finally, this is our moment of opportunity to unleash the full force of finance – driving investment to markets with massive potential.

    Despite soaring demand and vast renewables potential — developing countries are being locked out of the energy transition.

    Africa is home to 60% of the world’s best solar resources.  But it received just 2% of global clean energy investment last year.

    Zoom out, and the picture is just as stark. 

    In the last decade, only one in every five clean energy dollars went to emerging and developing countries outside China.

    To keep the 1.5 degree limit alive — and deliver universal energy access – annual clean energy investment in those countries must rise more than fivefold by 2030. 

    That demands bold national policies.  And concrete international action to: 

    Reform the global financial architecture.

    Drastically increase the lending capacity of multilateral development banks — making them bigger, bolder, and better able to leverage massive amounts of private finance at reasonable costs;

    And take effective action on debt relief – and scale up proven tools like debt for climate swaps. 

    Today, developing countries pay outlandish sums for both debt and equity financing – in part because of outdated risk models, bias and broken assumptions that boost the cost of capital.

    Credit ratings agencies and investors must modernize.
     
    We need a new approach to risk that reflects:

    The promise of clean energy.

    The rising cost of climate chaos.

    And the danger of stranded fossil fuel assets.

    I urge parties to unite to solve the complex challenges facing some developing countries in the energy transition – such as early retirement of coal plants. 

    Excellencies,
    Dear friends,

    The fossil fuel age is flailing and failing.

    We are in the dawn of a new energy era.

    An era where cheap, clean, abundant energy powers a world rich in economic opportunity.

    Where nations have the security of energy autonomy.

    And the gift of power is a gift for all.

    That world is within reach.

    But it won’t happen on its own.

    Not fast enough.

    Not fair enough.

    It is up to us. 

    We have the tools to power the future for humanity.   

    Let’s make the most of them. 

    This is our moment of opportunity. 

    And I Thank you.

                                                                                                                                                                                                  ****
    [All-French]

    Excellences,

    Mesdames et Messieurs,

    Chers amis présents avec nous depuis le monde entier,

    L’actualité est dominée par les maux de la planète.

    Par les conflits et le chaos climatique.

    Par la multiplication des souffrances humaines.

    Par des dissensions géopolitiques croissantes.

    Mais au milieu de cette tourmente, autre chose est en train de se jouer.

    Quelque chose qui aura de profondes répercussions.

    Tout au long de l’histoire, l’énergie a présidé aux destinées de l’humanité
    – du feu à l’atome, en passant par la vapeur.

    Aujourd’hui, nous entrons dans une ère nouvelle.

    Les énergies fossiles sont en bout de course.

    Nous sommes à l’aube d’une ère des énergies propres.

    Il suffit d’observer les flux financiers.

    L’année dernière, 2 000 milliards de dollars ont été investis dans les énergies propres : c’est 800 milliards de dollars de plus que pour les énergies fossiles et cela représente une hausse de près de 70 % en 10 ans.

    Et de nouvelles données publiées aujourd’hui par l’Agence internationale pour les énergies renouvelables montrent que l’énergie solaire, qui était quatre fois plus chère que les énergies fossiles il y a peu de temps encore, est aujourd’hui 41 % moins chère.

    L’éolien en mer – 53 % moins cher.

    Et le coût de l’électricité produite par plus de 90 % des nouvelles énergies renouvelables dans le monde est inférieur au coût du nouveau combustible fossile le moins cher.

    C’est un tournant. Non seulement sur le plan énergétique, mais aussi du point de vue des possibilités qui s’offrent à nous.

    Car oui, nous pouvons assainir notre rapport au climat.

    Les énergies solaire et éolienne permettent d’ores et déjà d’économiser au niveau mondial une quantité d’émissions de carbone presque équivalente à l’ensemble des émissions annuelles de l’Union européenne.

    Mais plus fondamentalement, il y va de la sécurité énergétique et de la sécurité des personnes.

    De la gestion avisée de l’économie.

    Des emplois décents, de la santé publique et de la réalisation des objectifs de développement durable.

    Et de la capacité de mettre à la disposition des populations du monde entier une énergie propre et abordable.

    Aujourd’hui, nous publions un rapport spécial avec le soutien d’organismes des Nations Unies et d’organisations partenaires – l’Agence internationale de l’énergie, le Fonds monétaire international, l’Agence internationale pour les énergies renouvelables, l’Organisation de coopération et de développement économiques et la Banque mondiale.

    Ce rapport illustre le chemin parcouru au cours de la décennie écoulée, depuis que l’Accord de Paris a ouvert la voie à une révolution de l’énergie propre. Il montre que nous avons beaucoup à gagner d’une transition rapide et juste à l’échelle mondiale, pour peu que nous prenions les mesures voulues.

    Au niveau mondial, la puissance installée des énergies renouvelables est déjà presque comparable à celle des énergies fossiles.

    Et ce n’est qu’un début.

    L’année dernière, la quasi-totalité de l’énergie fournie par les nouvelles capacités de production était renouvelable.

    Sur tous les continents, on a créé plus de capacités de production d’énergie provenant de sources renouvelables que provenant de combustibles fossiles.

    Les sources d’énergie renouvelable ont généré près d’un tiers de l’électricité mondiale.

    L’énergie propre n’est plus une promesse d’avenir. C’est une réalité.

    Aucun gouvernement, aucune industrie, aucun intérêt particulier ne saurait l’arrêter.

    Bien entendu, le lobby des combustibles fossiles de certaines entreprises s’y emploiera, et nous savons jusqu’où il peut aller.

    Mais – j’en ai désormais la certitude – tous ses efforts sont voués à l’échec, car il est trop tard pour revenir en arrière.

    Il y a trois raisons de poids à cela.

    Premièrement, les marchés.

    Pendant des décennies, l’augmentation des émissions est allée de pair avec celle de la croissance économique.

    Ce n’est plus le cas.

    Dans de nombreuses économies avancées, les émissions plafonnent, mais l’économie continue de croître.

    Rien qu’en 2023, le secteur de l’énergie propre a contribué à hauteur de 10 % à la croissance du PIB mondial.

    En Inde, 5 %. Aux États-Unis, 6 %. En Chine – l’un des leaders de la transition énergétique –, 20 %.

    Et dans l’Union européenne, près de 33 %.

    Et le secteur des énergies propres emploie désormais 35 millions de personnes dans le monde, soit plus que le secteur des énergies fossiles.

    Même le Texas, cœur de l’industrie fossile américaine, est aujourd’hui le premier producteur d’énergies renouvelables aux États-Unis.

    Pourquoi ? Parce que c’est une question de bon sens économique.

    Et ce, en dépit d’une distorsion manifeste du marché au profit des énergies fossiles, qui bénéficient de subventions à la consommation neuf fois plus importantes que les renouvelables au niveau mondial.

    Si l’on ajoute à cela le coût non comptabilisé des dommages subis par les populations et la planète à cause des changements climatiques, la distorsion est encore plus marquée.

    Les pays qui s’accrochent aux énergies fossiles ne protègent pas leur économie, ils la sabotent.

    Ils poussent les coûts à la hausse.

    Ils freinent leur compétitivité.

    Ils se condamnent à avoir des actifs bloqués.

    Et ils passent à côté de la plus grande promesse économique du XXIe siècle.

    Excellences, Chers amis,

    En deuxième lieu, les énergies renouvelables sont promises à un bel avenir, car elles sont au cœur de la sécurité et de la souveraineté énergétiques.

    Disons-le clairement : les combustibles fossiles constituent aujourd’hui la plus grande menace pour la sécurité énergétique.

    Ils laissent les économies et les populations à la merci des variations de prix, des ruptures d’approvisionnement et des turbulences géopolitiques.

    C’est ce que l’on a vu lors de l’invasion de l’Ukraine par la Russie.

    Une guerre en Europe a entraîné une crise énergétique mondiale.

    Les cours du pétrole et du gaz ont grimpé en flèche.

    Et les factures d’électricité et les dépenses alimentaires leur ont emboîté le pas.
     
    En 2022, les ménages ont vu leurs dépenses énergétiques augmenter de 20 % en moyenne dans le monde.

    Les économies modernes et compétitives ont besoin d’un approvisionnement énergétique stable, à un prix abordable. Les énergies renouvelables permettent d’avoir les deux.

    La lumière du soleil n’est pas sujette aux flambées de prix.

    Le vent ne peut être soumis à aucun embargo.

    En leur fournissant de l’électricité, les énergies renouvelables peuvent mettre le pouvoir entre les mains des citoyens et des États.

    Or, presque tous les pays ont suffisamment de soleil, de vent ou d’eau pour devenir autosuffisants sur le plan énergétique.

    Les énergies renouvelables sont la solution pour une véritable sécurité énergétique. Une véritable souveraineté énergétique. Et une véritable protection contre la volatilité associée aux combustibles fossiles.

    Chers amis,

    Troisième et dernière raison pour laquelle les énergies renouvelables sont désormais incontournables : la facilité d’accès.

    On ne peut pas construire une centrale à charbon au fond d’un jardin.

    Mais on peut installer des panneaux solaires dans le village le plus isolé de la planète.

    Le solaire et l’éolien peuvent être déployés plus rapidement, plus facilement, et pour moins cher que les énergies fossiles ne pourront jamais l’être.

    Et bien que le nucléaire soit amené à faire partie du bouquet énergétique mondial, il ne pourra jamais résorber les inégalités d’accès.

    Tout cela change la donne pour les centaines de millions de personnes qui vivent encore sans électricité, pour la plupart en Afrique, continent qui regorge de sources d’énergies renouvelables inexploitées.

    À l’horizon 2040, l’Afrique pourrait avoir une production d’électricité 10 fois supérieure à ses besoins, uniquement grâce au renouvelable.

    Déjà, des dispositifs autonomes de production d’énergie renouvelable à petite échelle servent à éclairer des maisons et à alimenter des écoles et des entreprises dans les zones reculées.

    Et dans des pays comme le Pakistan, le solaire s’impose grâce à l’impulsion des citoyens : ce sont les consommateurs qui sont à l’origine du boom des énergies propres.

    Excellences, Chers amis,

    Rien ne peut arrêter la transition énergétique.

    Mais cette transition n’est encore ni assez rapide ni assez équitable.

    Les pays de l’OCDE et la Chine représentent 80 % de la capacité de production d’énergie renouvelable installée dans le monde.

    Le Brésil et l’Inde, près de 10 %.

    L’Afrique, seulement 1,5 %.

    Pendant ce temps, des vies et des moyens de subsistance sont anéantis par la crise climatique.

    Dans certains petits États insulaires, les catastrophes climatiques ont coûté plus de 100 % du PIB.

    Aux États-Unis, elles font exploser les primes d’assurance.

    Et la limite de 1,5 degré devient plus que jamais un vœu pieux.

    Pour que cet objectif reste à notre portée, nous devons au plus vite réduire les émissions et étendre l’envergure de la transition vers les énergies propres.

    Les capacités de production se multiplient, les prix chutent et la COP30 approche à grands pas.

    Nous nous trouvons donc à un moment décisif.

    Ne le laissons pas passer.

    Le moment est venu d’agir dans six domaines porteurs.

    Premièrement, nous devons saisir l’occasion de faire des nouveaux plans climatiques nationaux le moteur d’une transition énergétique irréversible.

    Trop souvent, les gouvernements envoient des messages contradictoires :

    Un jour, des objectifs ambitieux en matière d’énergies renouvelables. Le lendemain, de nouvelles subventions aux combustibles fossiles et des mesures qui favorisent leur expansion.

    Les prochains plans d’action nationaux sur le climat – également connus sous le nom de contributions déterminées au niveau national – doivent être présentés dans quelques mois.

    Ils devront être source de clarté et de certitude.

    Les pays du G20 doivent être à la manœuvre. Ils sont responsables de 80 % des émissions mondiales.

    Le principe des responsabilités communes mais différenciées doit être appliqué, mais tous les pays doivent redoubler d’effort.

    En prévision de la COP30, qui se tiendra au Brésil en novembre, ils doivent présenter de nouveaux plans.

    J’invite les dirigeants à présenter leurs nouvelles contributions déterminées au niveau national lors d’une manifestation que j’organiserai en septembre, durant la semaine de haut niveau de l’Assemblée générale. Ces contributions devront :

    Couvrir toutes les émissions, dans tous les secteurs de l’économie.

    Ne pas dépasser la limite de 1,5 degré.

    Se fonder sur une approche cohérente intégrant les priorités liées à l’énergie, au climat et au développement durable.

    Et tenir les promesses qui ont été faites au niveau mondial, à savoir :

    Multiplier par deux l’efficacité énergétique et par trois les capacités en énergies renouvelables d’ici à 2030.

    Et accélérer l’abandon progressif des combustibles fossiles.

    Ces plans devront être assortis de feuilles de route à long terme permettant d’assurer une transition équitable vers des systèmes énergétiques à zéro émission nette, conformément à l’objectif fixé pour 2050.

    Et ils doivent s’accompagner de politiques qui montrent qu’un avenir alimenté par des énergies propres est inéluctable et mérite d’être soutenu par des investissements.

    Des politiques qui instaurent un cadre réglementaire clair et favorisent l’émergence d’un vivier de projets.

    Qui renforcent les partenariats public-privé en mobilisant des capitaux et en stimulant l’innovation.

    Qui assurent la tarification effective du carbone.

    Et qui marquent la fin des subventions et des financements publics internationaux destinés aux combustibles fossiles – comme promis.

    Deuxièmement, nous devons saisir l’occasion de bâtir les systèmes énergétiques du XXIe siècle.

    La technologie progresse.

    En l’espace de quinze ans seulement, le coût des systèmes de stockage par batterie pour réseaux électriques a chuté de plus de 90 %.

    Mais il y a un problème.

    Les investissements dans les infrastructures nécessaires ne suivent pas.

    Pour chaque dollar investi dans les énergies renouvelables, 0,6 dollar seulement est consacré aux réseaux et au stockage.

    Le rapport devrait être d’un pour un.

    Nous produisons de l’énergie renouvelable, mais nous ne l’intégrons pas assez vite aux réseaux.

    La quantité d’énergie renouvelable en attente de raccordement est trois fois supérieure à celle effectivement mise en service l’an dernier.

    Et le bouquet énergétique mondial reste dominé par les combustibles fossiles.

    Nous devons agir dès maintenant et investir dans l’architecture d’un avenir placé sous le signe des énergies propres.

    Dans des réseaux modernes, souples et informatisés – ainsi que dans l’intégration régionale.

    Dans une augmentation massive de la capacité de stockage d’énergie.

    Dans les réseaux de recharge – pour alimenter la révolution des véhicules électriques.

    D’un autre côté, nous avons besoin l’efficacité énergétique et l’électrification dans les secteurs du bâtiment, des transports et de l’industrie.

    C’est ainsi que nous tirerons pleinement parti des possibilités offertes par les énergies renouvelables et que nous bâtirons des systèmes propres, sûrs et adaptés au monde de demain.

    Troisièmement, nous devons saisir l’occasion de répondre durablement à l’augmentation de la demande énergétique mondiale.

    De plus en plus de personnes sont raccordées aux réseaux.

    De plus en plus de villes se réchauffent, ce qui entraîne une hausse de la demande de climatisation.

    Et de plus en plus de technologies – de l’intelligence artificielle à la finance numérique – consomment une quantité d’électricité colossale.

    Pour répondre à l’augmentation de la demande d’électricité, les gouvernements doivent privilégier le renouvelable.

    L’intelligence artificielle peut rendre les systèmes énergétiques plus efficaces, plus innovants et plus résilients.

    Mais elle est aussi extrêmement énergivore.

    Un centre de données IA typique engloutit autant d’électricité que 100 000 foyers.

    Bientôt, les plus grands centres consommeront 20 fois plus.

    D’ici à 2030, ils pourraient utiliser autant d’électricité que l’ensemble de la population japonaise actuelle.

    Cette situation n’est pas viable – et c’est à nous d’y remédier.

    Le secteur de la technologie doit montrer la voie.

    Aujourd’hui, je demande à toutes les grandes entreprises technologiques de faire en sorte que tous leurs centres de données fonctionnent aux énergies renouvelables d’ici à 2030.

    Elles doivent également veiller – tout comme d’autres secteurs – à utiliser durablement l’eau nécessaire aux systèmes de refroidissement.

    L’avenir se construit dans le nuage.

    Il doit être alimenté par le soleil, le vent et la promesse d’un monde meilleur.

    Excellences, Chers amis,

    Quatrièmement, nous devons saisir l’occasion d’assurer une transition énergétique juste.

    L’ère de l’énergie propre doit garantir l’équité et la dignité et ouvrir de nouvelles perspectives pour l’humanité tout entière.

    Cela signifie que les gouvernements doivent prendre les rênes d’une transition juste.

    En assurant l’accompagnement, l’éducation et la formation des personnes qui travaillent pour l’industrie fossile, des jeunes, des femmes, des peuples autochtones et d’autres, afin qu’ils puissent prospérer dans une économie reposant sur les énergies nouvelles.

    En assurant une meilleure protection sociale pour que personne ne soit laissé pour compte.

    Et en renforçant la coopération internationale en vue d’aider les pays à faible revenu qui sont largement tributaires des combustibles fossiles et pour lesquels la transition est difficile.

    Mais la justice ne se limite pas à cela.

    Les minéraux critiques qui alimentent la révolution des énergies propres se trouvent souvent dans des pays qui ont longtemps été exploités.

    Aujourd’hui, nous voyons l’histoire se répéter.

    Des populations malmenées.

    Leurs droits bafoués.

    Leur environnement saccagé.

    Des nations reléguées aux échelons inférieurs des chaînes de valeur, tandis que d’autres en accaparent le produit.

    Et des modèles d’extraction qui creusent encore les inégalités et amplifient les dégradations.

    Il faut que cela cesse.

    Les pays en développement peuvent jouer un rôle majeur dans la diversification des sources d’approvisionnement.

    Le Groupe chargé de la question des minéraux critiques pour la transition énergétique a défini une trajectoire ancrée dans le respect des droits humains, de la justice et de l’équité.

    Aujourd’hui, je demande aux gouvernements, aux entreprises et à la société civile de se joindre à nous pour mettre en œuvre ses recommandations.

    Bâtissons un avenir qui soit respectueux de l’environnement et fondé sur l’équité.

    Qui advienne rapidement et soit guidé par le principe de justice.

    Qui soit porteur de transformation et favorise l’inclusion.

    Cinquièmement, nous devons saisir l’occasion de mettre le commerce et l’investissement au service de l’accélération de la transition énergétique.

    L’ambition seule ne suffira pas à assurer le passage à une énergie propre.

    Il faut aussi des technologies, des matériaux et des minéraux critiques.

    Mais ces éléments sont concentrés dans quelques pays seulement.

    Et le commerce mondial se fragmente.

    La politique commerciale doit soutenir l’action climatique.

    Les pays mobilisés en faveur d’une nouvelle ère énergétique doivent unir leurs forces pour lui donner corps grâce au commerce et à l’investissement.

    En diversifiant les chaînes d’approvisionnement et en les rendant plus sûres et plus résilientes.

    En abaissant les droits de douane sur les biens nécessaires à la production d’énergie propre.

    En débloquant les investissements et en renforçant les échanges, notamment dans le cadre de la coopération Sud-Sud.

    Et en actualisant des traités d’investissement dépassés, à commencer par les dispositions relatives au règlement des différends entre investisseurs et États.

    À l’heure actuelle, le secteur des combustibles fossiles instrumentalise ces dispositions pour retarder la transition, en particulier dans plusieurs des pays en développement.

    Une réforme s’impose d’urgence.

    La course à l’innovation ne doit pas être réservée à une minorité privilégiée.

    Il doit s’agir d’une course de relais – collective, inclusive et source de résilience.

    Faisons du commerce un outil de transformation.

    Sixièmement, nous devons saisir l’occasion d’exploiter toute la puissance de la finance en dirigeant les investissements vers des marchés à très fort potentiel.

    Malgré une demande en forte hausse et un potentiel indéniable en matière d’énergies renouvelables, les pays en développement sont exclus de la transition énergétique.

    L’Afrique abrite 60 % des meilleures ressources solaires au monde. Mais elle n’a comptabilisé que 2 % des investissements mondiaux dans les énergies propres au cours de l’année écoulée.

    En élargissant le cadre, on obtient un tableau tout aussi alarmant.

    Au cours des dix dernières années, seul un dollar sur cinq consacré à l’énergie propre est allé à des pays émergents ou en développement autres que la Chine.

    Si nous voulons contenir le réchauffement à 1,5 degré et assurer un accès universel à l’énergie, les investissements annuels dans les énergies propres doivent être multipliés par plus de cinq dans ces pays d’ici à 2030.

    Cela exige de prendre des mesures audacieuses à l’échelon national, mais aussi de mener une action concrète au niveau mondial pour :

    Réformer l’architecture financière internationale.

    Renforcer considérablement la capacité de prêt des banques multilatérales de développement, afin qu’elles gagnent en envergure et en audace et soient plus à même de canaliser des flux massifs de capitaux privés à un coût raisonnable.

    Et prendre des mesures efficaces en matière d’allégement de la dette, notamment en intensifiant le recours à des outils éprouvés tels que la conversion de dettes en mesures en faveur du climat.

    À l’heure actuelle, les pays en développement paient des sommes exorbitantes pour accéder à des financements par emprunt et par prise de participation, en partie à cause de modèles de risque obsolètes, de préjugés et d’hypothèses erronées qui accroissent considérablement le coût du capital.

    Les agences de notation et les investisseurs doivent moderniser leurs pratiques.
     
    Il nous faut une nouvelle approche du risque qui tienne compte :

    Du potentiel des énergies propres.

    Du coût croissant du chaos climatique.

    Et du danger associé aux actifs fossiles échoués.

    Je demande instamment aux parties de s’atteler ensemble à régler les problèmes complexes auxquels se heurtent certains pays en développement dans le cadre de la transition énergétique, notamment la mise hors service anticipée des centrales à charbon.

    Excellences, chers amis,

    L’ère des combustibles fossiles est à bout de souffle et en bout de course.

    Nous sommes à l’aube d’une nouvelle ère énergétique.

    Une ère dans laquelle une énergie abondante, propre et peu coûteuse viendra alimenter un monde riche en perspectives économiques.

    Où la sécurité énergétique des nations sera assurée.

    Et où l’énergie sera un bien universel.

    Ce monde est à notre portée.

    Mais cela ne se fera pas tout seul.

    Pas assez rapidement.

    Pas assez équitablement.

    C’est à nous de prendre les choses en main.

    Nous disposons des outils nécessaires pour doter l’humanité de l’énergie de demain.

    Utilisons-les à bon escient.

    Nous ne devons pas laisser passer ce moment.

    Je vous remercie.
     

    MIL OSI United Nations News