Category: Russian Federation

  • MIL-OSI Russia: New Xinjiang-Chongqing Power Transmission Project Begins

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, June 10 (Xinhua) — State Grid Corporation of China on Tuesday announced the start of a ±800 kV ultra-high-voltage direct current (UHVDC) transmission project linking Hami City in eastern northwest China’s Xinjiang Uygur Autonomous Region with Chongqing City in southwest China.

    This is China’s third major project to transmit electricity from the energy-rich Xinjiang Uyghur Autonomous Region to other parts of the country.

    The transmission line is 2,260 km long and has an installed capacity of 14.2 million kW, including 10.2 million kW supplied by wind, solar and solar thermal energy. New energy sources account for more than 70 percent of the total installed capacity.

    Xinjiang is a key hub in China’s west-east power transmission program. The new line is expected to supply more than 36 billion kWh of electricity annually to the power supply hub of Chongqing, greatly increasing the municipality’s power supply capacity.

    It is also expected to contribute to the economic development of both Xinjiang and Chongqing, strengthen the coordinated development of regions, promote rural revitalization and help improve people’s livelihoods, the corporation said.

    Currently, China National Grid Corporation operates the world’s largest ultra-high-voltage power transmission network, providing strong support for ensuring reliable electricity supply and promoting green and low-carbon development. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: The best volunteers were awarded at SPbGASU

    Translation. Region: Russian Federal

    Source: Saint Petersburg State University of Architecture and Civil Engineering – Saint Petersburg State University of Architecture and Civil Engineering – Deputy Head of the Youth Policy Department Ekaterina Kovalenko, Irina Peretokin, Ekaterina Rodevich, Maria Dushinova, Anna Kozhemyak and Marina Malyutina

    The most active volunteers of our university received gratitude from the Vice-Rector for Youth Policy Marina Malyutina. On behalf of the university administration, Marina Viktorovna thanked the students for their work and called on the student body to pay attention to this promising type of activity, which is supported at the university and national level.

    Under the supervision of the youth policy department, the children participated in events of great importance for our university throughout the year. We asked them to tell us how they joined the volunteer movement, what they remembered most about the outgoing academic year.

    Irina Peretokin, a second-year undergraduate student at the Faculty of Civil Engineering, has headed the SPbGASU Volunteer Club since February 1. Irina has a large family, and so she is used to sharing her energy with others. In middle and high school, she participated in sponsorship trips to an orphanage, then as a volunteer, she conducted classes on the development of fine motor skills for people with Down syndrome, autism, and cerebral palsy.

    “I am pleased to realize the importance of my work. When I entered SPbGASU, I noticed the announcement of the Volunteer Club and immediately joined it,” the student said.

    Irina took part in organizing the Olympiad in the field of training “Construction”, the All-Russian TIM Championship of St. Petersburg State University of Architecture and Civil Engineering (SPO League 2025), the VIII International Scientific and Practical Conference BIMAX-2025. Her plans include continuing volunteer activities and developing them at the university.

    “We will create a volunteer environment at the university, form a university team, for this we need people. We plan to develop social networks, there are requests for future events. We are preparing to participate in the St. Petersburg International Economic Forum and the Scarlet Sails festival,” Irina said.

    Third-year bachelor’s student of the construction faculty Ekaterina Rodevich has been volunteering for about two years. According to the student, it gives experience in communicating with people, which will be useful in the professional sphere.

    “We constantly participate in events. They were all bright, but the most memorable of the past year was probably the TIM championship,” said Ekaterina.

    Second-year bachelor’s student of the construction faculty, Maria Dushinova, was drawn into the volunteer movement by her classmate Irina Peretokin.

    “If you doubt, but have an idea to try – try! We will always help, support. Especially Irina,” said Maria.

    For personal contribution to the development of the volunteer movement and active participation in the implementation of youth events and projects at the St. Petersburg State University of Architecture and Civil Engineering, the following were recognized:

    Irina Peretokin, a second-year student of the Faculty of Civil Engineering; Ekaterina Rodevich, a third-year student of the Faculty of Civil Engineering; Yulia Avdeeva, a first-year student of the Faculty of Civil Engineering; Dmitry Gorlov, a second-year student of the Faculty of Forensic Science and Law in Construction and Transport; Maria Dushinova, a second-year student of the Faculty of Civil Engineering; Anna Kozhemyak, a second-year student of the Faculty of Civil Engineering; Anna Chekanauskaite, a second-year student of the Faculty of Civil Engineering.

    We wish the SPbGASU Volunteer Club new successes and interesting events!

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-Evening Report: In Trump’s America, the shooting of a journalist is not a one-off. Press freedom itself is under attack

    Source: The Conversation (Au and NZ) – By Peter Greste, Professor of Journalism and Communications, Macquarie University

    The video of a Los Angeles police officer shooting a rubber bullet at Channel Nine reporter Lauren Tomasi is as shocking as it is revealing.

    In her live broadcast, Tomasi is standing to the side of a rank of police in riot gear. She describes the way they have begun firing rubber bullets to disperse protesters angry with US President Donald Trump’s crackdown on illegal immigrants.

    As Tomasi finishes her sentence, the camera pans to the left, just in time to catch the officer raising his gun and firing a non-lethal round into her leg. She said a day later she is sore, but otherwise OK.

    Although a more thorough investigation might find mitigating circumstances, from the video evidence, it is hard to dismiss the shot as “crossfire”. The reporter and cameraman were off to one side of the police, clearly identified and working legitimately.

    The shooting is also not a one-off. Since the protests against Trump’s mass deportations policy began three days ago, a reporter with the LA Daily News and a freelance journalist have been hit with pepper balls and tear gas.

    British freelance photojournalist Nick Stern also had emergency surgery to remove a three-inch plastic bullet from his leg.

    In all, the Los Angeles Press Club has documented more than 30 incidents of obstruction and attacks on journalists during the protests.

    Trump’s assault on the media

    It now seems assaults on the media are no longer confined to warzones or despotic regimes. They are happening in American cities, in broad daylight, often at the hands of those tasked with upholding the law.

    But violence is only one piece of the picture. In the nearly five months since taking office, the Trump administration has moved to defund public broadcasters, curtail access to information and undermine the credibility of independent media.

    International services once used to project democratic values and American soft power around the world, such as Voice of America, Radio Free Europe and Radio Free Asia, have all had their funding cut and been threatened with closure. (The Voice of America website is still operational but hasn’t been updated since mid-March, with one headline on the front page reading “Vatican: Francis stable, out of ‘imminent danger’ of death”).

    The Associated Press, one of the most respected and important news agencies in the world, has been restricted from its access to the White House and covering Trump. The reason? It decided to defy Trump’s directive to change the name of the Gulf of Mexico to Gulf of America.

    Even broadcast licenses for major US networks, such as ABC, NBC and CBS, have been publicly threatened — a signal to editors and executives that political loyalty might soon outweigh journalistic integrity.

    The Committee to Protect Journalists is more used to condemning attacks on the media in places like Russia. However, in April, it issued a report headlined: “Alarm bells: Trump’s first 100 days ramp up fear for the press, democracy”.

    A requirement for peace

    Why does this matter? The success of American democracy has never depended on unity or even civility. It has depended on scrutiny. A system where power is challenged, not flattered.

    The First Amendment to the US Constitution – which protects freedom of speech – has long been considered the gold standard for building the institutions of free press and free expression. That only works when journalism is protected — not in theory but in practice.

    Now, strikingly, the language once reserved for autocracies and failed states has begun to appear in assessments of the US. Civicus, which tracks declining democracies around the world, recently put the US on its watchlist, alongside the Democratic Republic of Congo, Italy, Serbia and Pakistan.

    The attacks on the journalists in LA are troubling not only for their sake, but for ours. This is about civic architecture. The kind of framework that makes space for disagreement without descending into disorder.

    Press freedom is not a luxury for peacetime. It is a requirement for peace.

    Peter Greste is Professor of Journalism at Macquarie University and the Executive Director for the advocacy group, the Alliance for Journalists’ Freedom.

    ref. In Trump’s America, the shooting of a journalist is not a one-off. Press freedom itself is under attack – https://theconversation.com/in-trumps-america-the-shooting-of-a-journalist-is-not-a-one-off-press-freedom-itself-is-under-attack-258578

    MIL OSI AnalysisEveningReport.nz

  • Frederick Forsyth, ‘Day of the Jackal’ author, dies at 86

    Source: Government of India

    Source: Government of India (4)

    British novelist Frederick Forsyth, who authored best-selling thrillers such as “The Day of the Jackal” and “The Dogs of War,” has died aged 86, his publisher said.

    A former correspondent for Reuters and the BBC, and an informant for Britain’s MI6 foreign spy agency, Forsyth made his name by using his experiences as a reporter in Paris to pen the story of a failed assassination plot on Charles de Gaulle.

    “The Day of the Jackal”, in which an English assassin, played in the film by Edward Fox, is hired by French paramilitaries angry at de Gaulle’s withdrawal from Algeria, was published in 1971 after Forsyth found himself penniless in London.

    Written in just 35 days, the book was rejected by a host of publishers who worried that the story was flawed and would not sell as de Gaulle had not been assassinated. De Gaulle died in 1970 from a ruptured aorta while playing Solitaire.

    But Forsyth’s hurricane-paced thriller complete with journalistic-style detail and brutal sub-plots of lust, betrayal and murder was an instant hit. The once poor journalist became a wealthy writer of fiction.

    “I never intended to be a writer at all,” Forsyth later wrote in his memoire, “The Outsider – My Life in Intrigue”. “After all, writers are odd creatures, and if they try to make a living at it, even more so.”

    So influential was the novel that Venezuelan militant revolutionary Illich Ramirez Sanchez, was dubbed “Carlos the Jackal”.

    Forsyth presented himself as a cross between Ernest Hemingway and John le Carre – both action man and Cold War spy – but delighted in turning around the insult that he was a literary lightweight.

    “I am lightweight but popular. My books sell,” he once said.

    His books, fantastical plots that almost rejoiced in the cynicism of an underworld of spies, criminals, hackers and killers, sold more than 75 million copies.

    Behind the swashbuckling bravado, though, there were hints of sadness. He later spoke of turning inwards to his imagination as a lonely only child during and after World War Two.

    The isolated Forsyth discovered a talent for languages: he claimed to be a native French speaker by the age of 12 and a native German speaker by the age of 16, largely due to exchanges.

    He went to Tonbridge School, one of England’s ancient fee-paying schools, and learned Russian from two emigre Georgian princesses in Paris. He added Spanish by the age of 18.

    He also learned to fly and did his national service in the Royal Air Force where he flew fighters such as a single seater version of the de Havilland Vampire.

    THE REPORTER

    Impressing Reuters’ editors with his languages and knowledge that Bujumbura was a city in Burundi, he was offered a job at the news agency in 1961 and sent to Paris and then East Berlin where the Stasi secret police kept close tabs on him.

    He left Reuters for the BBC but soon became disillusioned by its bureaucracy and what he saw as the corporation’s failure to cover Nigeria properly due to the government’s incompetent post-colonial views on Africa.

    It was in 1968 that Forsyth was approached by the Secret Intelligence Service, known as MI6, and asked by an officer named “Ronnie” to inform on what was really going on in Biafra.

    By his own account, he would keep contacts with the MI6, which he called “the Firm”, for many years. His novels showed extensive knowledge of the world of spies and he even edited out bits of The Fourth Protocol (1984), he said, so that militants would not know how to detonate an atomic bomb.

    His writing was sometimes cruel, such as when the Jackal kills his lover after she discovers he is an assassin.

    “He looked down at her, and for the first time she noticed that the grey flecks in his eyes had spread and clouded over the whole expression, which had become dead and lifeless like a machine staring down at her.”

    THE WRITER

    After finally finding a publisher for “The Day of the Jackal,” he was offered a three-novel contract by Harold Harris of Hutchinson.

    Next came “The Odessa File” in 1972, the story of a young German freelance journalist who tries to track down SS man Eduard Roschmann, or “The Butcher of Riga”.

    After that, “The Dogs of War” in 1974 is about a group of white mercenaries hired by a British mining magnate to kill the mad dictator of an African republic – based on Equatorial Guinea’s Francisco Macias Nguema – and replace him with a puppet.

    The New York Times said at the time that the novel was “pitched at the level of a suburban Saturday night movie audience” and that it was “informed with a kind of post‐imperial condescension toward the black man”.

    Divorced from Carole Cunningham in 1988, he married Sandy Molloy in 1994. But he lost a fortune in an investment scam and had to write more novels to support himself. He had two sons – Stuart and Shane – with his first wife.

    His later novels variously cast hackers, Russians, al Qaeda militants and cocaine smugglers against the forces of good – broadly Britain and the West. But the novels never quite reached the level of the Jackal.

    A supporter of the United Kingdom’s exit from the European Union, Forsyth scolded Britain’s elites for what he cast as their treachery and naivety.

    In columns for The Daily Express, he gave a host of withering assessments of the modern world from an intellectual right-wing perspective.

    The world, he said, worried too much about “the oriental pandemic” (known to most as COVID-19), Donald Trump was “deranged”, Vladimir Putin “a tyrant” and “liberal luvvies of the West” were wrong on most things.

    He was, to the end, a reporter who wrote novels.

    “In a world that increasingly obsesses over the gods of power, money and fame, a journalist and a writer must remain detached,” he wrote. “It is our job to hold power to account.”

    (Reuters)

  • MIL-OSI Russia: Delegation from Lobnya, Moscow Region, Visits Mount Taishan

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, June 10 (Xinhua) — A delegation from Lobnya City District of the Moscow Region of the Russian Federation visited Mount Taishan in Shandong Province, where they experienced the unique charm of traditional Chinese culture at the Daimiao Temple and felt the continuity of the spiritual origins of Chinese civilization at the peak of Mount Taishan.

    Founded during the Han Dynasty (206 BC – 220 AD), the Daimiao Temple is the largest surviving ancient architectural complex at the foot of Mount Taishan. It was designated a national cultural heritage site by the State Council of China in 1988.

    As reported by the Shandong Province information portal “sdchina.com.cn”, on the morning of May 29, the delegation members visited the Daimiao Temple. The ancient buildings and priceless relics, preserving a thousand-year history, aroused genuine interest among the guests. Olga Felyaeva, a member of the delegation, was especially delighted by the majestic “fused cypresses of the Han Dynasty”, whose crowns proudly reach into the sky.

    The delegation then ascended to the “Southern Gate of Heaven” /”Nantianmen”/. Since ancient times, Mount Taishan has symbolized the stability of the state and the prosperity of the nation. Despite their prior acquaintance with Mount Taishan, the majestic scenery left an indelible impression on the guests.

    “It is a great honor for us to visit Taishan. We hope that more and more tourists will be able to appreciate its unique beauty. Lobnya intends to deepen friendship with the city of Tai’an, expand cultural exchanges and mutual enrichment of civilizations,” said O. Felyaeva.

    Sister cities Lobnya /Moscow region/ and Tai’an /Shandong province, eastern China/ have maintained friendly ties since 2006, actively developing cooperation in the fields of culture, sports, education and economics. The current visit has strengthened mutual understanding and trust, taking inter-municipal relations to a new level.

    MIL OSI Russia News

  • MIL-OSI Russia: California Sues Trump for ‘Illegal’ Deployment of National Guard

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    SACRAMENTO, United States, June 10 (Xinhua) — The U.S. state of California on Monday sued the Donald Trump administration for deploying National Guard troops to Los Angeles amid protests against immigration raids, calling it “an undeniable step toward authoritarianism.”

    California Gov. Gavin Newsom and state Attorney General Rob Bonta announced Monday that they had filed a lawsuit against the Trump administration to stop the “unlawful and unjustified deployment” of National Guard troops, which they said “has led to an unnecessary escalation of chaos and violence in Los Angeles County.”

    The lawsuit names President Trump, Defense Secretary Pete Hegseth and the Department of Defense. It alleges that the deployment of National Guard troops violates the U.S. Constitution and exceeds the president’s authority because it was done without the governor’s consent or participation and was unjustified, the governor’s office said in a press release Monday.

    The protests initially began in response to immigration enforcement. Tensions between protesters and law enforcement escalated on Friday, with some demonstrators throwing objects and police using tear gas and flash-bang grenades.

    In response, Trump ordered the deployment of 2,000 National Guard troops on Saturday. Protests intensified on Sunday, with clashes between demonstrators and law enforcement officers increasing.

    “President Trump’s order to deploy federal National Guard troops to Los Angeles over the objections of the Governor and local law enforcement is unnecessary and counterproductive,” California Attorney General Robert Bonta said in a statement Monday.

    According to G. Newsom, the deployment of the National Guard is a “man-made crisis.” The state governor accused D. Trump of “deliberately creating chaos, terrorizing the population, and threatening the principles of our great democracy.”

    “This is an undoubted step towards authoritarianism. We cannot allow this,” the governor added.

    After the lawsuit was announced, Trump wrote on social media that his administration would “fight back” if protesters “spit” on National Guard troops.

    On Monday, D. Trump called for the arrest of the governor of California. “The President of the United States just called for the arrest of a sitting governor. I hoped I would never see this day in America,” Newsom wrote in response on social media. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: President of Uzbekistan held a meeting with the Prime Minister of Slovakia

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Tashkent, June 10 (Xinhua) — Uzbek President Shavkat Mirziyoyev and Slovakian Prime Minister Robert Fico held a meeting, the press service of the Uzbek leader reported on Monday.

    “On June 9, negotiations were held at the Kuksaroy residence between the President of the Republic of Uzbekistan Shavkat Mirziyoyev and the Prime Minister of the Slovak Republic Robert Fico,” the statement said.

    As reported, current issues of further development of practical cooperation between Uzbekistan and Slovakia were discussed. At the beginning of the meeting, the leader of Uzbekistan particularly emphasized that the current visit opens a qualitatively new stage in the history of Uzbek-Slovak multifaceted relations.

    It is noted that special attention was paid to issues of increasing trade turnover, primarily by expanding the range of mutual deliveries. “We are talking about deliveries from Uzbekistan of textile, agricultural, electrical, chemical products, polymers, and from Slovakia – rubber, auto components, pharmaceuticals, and other industrial goods,” the report says.

    In conclusion, an agreement was reached that, in order to ensure timely and high-quality implementation of the decisions and agreements made, the governments of the two countries will adopt a comprehensive “road map.” –0–

    MIL OSI Russia News

  • MIL-OSI Russia: All members of CDC’s immunization advisory committee fired

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    NEW YORK, June 10 (Xinhua) — U.S. Surgeon General Robert Kennedy Jr. on Monday fired all 17 members of the Centers for Disease Control and Prevention (CDC)’s immunization advisory committee, saying the move would restore public confidence in vaccines.

    About two-thirds of the commission’s members were appointed in the final year of the Biden administration, Kennedy Jr. said in announcing his decision in a column for the Wall Street Journal.

    “The CDC’s immunization advisers wield enormous influence,” the New York Times commented. They scrutinize vaccine data, debate the evidence, and decide who should get shots and when. Insurance companies and federal health insurance programs like Medicaid are required to pay for vaccines recommended by the committee.

    The committee was scheduled to meet from June 25 to 27. It is not yet known when the new members will be announced, but the meeting will go ahead as planned, according to a statement released by the Department of Health and Human Services.

    “This is the latest in a series of steps by Mr. Kennedy, a vaccine skeptic, to destroy decades of immunization standards,” the statement said. The advisory committee, which is more aligned with the views of R. Kennedy Jr., could significantly change or even reverse recommendations for immunizations for Americans, including childhood vaccinations. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: Pakistan sees gradual economic recovery, GDP grows 2.7 percent – Economic Review

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    ISLAMABAD, June 10 (Xinhua) — Pakistan’s economy registered a 2.7 percent growth in its gross domestic product (GDP) in the outgoing fiscal year, according to the Economic Survey 2024-25 released by Finance Minister Muhammad Aurangzeb on Monday.

    Although the figure remained below the government’s initial target of 3.6 percent, the growth was achieved despite the difficult global economic situation, the minister said.

    “I think this is the right way forward in terms of sustainable growth,” Aurangzeb said, describing the 2.7 percent figure as a sign of gradual economic recovery.

    Pakistan’s GDP contracted by 0.2 percent in the previous fiscal year, but has grown to 2.5 percent this year. The minister stressed that the government is keen to avoid a return to cyclical fluctuations. –0–

    MIL OSI Russia News

  • MIL-OSI Russia: Automated container berth in Qingdao Port, Shandong Province

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    QINGDAO, June 10 (Xinhua) — This photo shows an automated container berth at the Qingdao Port in east China’s Shandong Province.

    QINGDAO, June 10 (Xinhua) — This photo shows an automated container berth at the port of Qingdao in east China’s Shandong Province.

    QINGDAO, June 10 (Xinhua) — This photo shows an automated container berth at the Qingdao Port in east China’s Shandong Province.

    QINGDAO, June 10 (Xinhua) — This photo shows an automated container berth at the Qingdao Port in east China’s Shandong Province.

    MIL OSI Russia News

  • MIL-OSI Russia: Symposium on “One State – Two Systems” Held in Beijing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, June 10 (Xinhua) — An academic symposium on “one country, two systems” was held in Beijing on Monday to mark the fifth anniversary of the enactment of the Law on Safeguarding National Security in the Hong Kong Special Administrative Region (SAR).

    The event was attended by about 100 guests, experts and scholars from mainland China, Hong Kong and Macao Special Administrative Regions, as well as 11 countries including the UK, Portugal and Malaysia.

    The symposium, hosted by the Chinese Academy of Social Sciences, included sub-forums on topics such as the theory and practice of national security legislation, national security and economic development, and national security and social governance.

    The guests and scholars present agreed that the Law on Safeguarding National Security in the Hong Kong Special Administrative Region has played a comprehensive and fundamental role in curbing unrest in Hong Kong, ensuring the implementation of the “one country, two systems” policy, and promoting economic development and human rights protection in the Hong Kong Special Administrative Region.

    The Law on Safeguarding National Security in the Hong Kong Special Administrative Region is a model for maintaining and improving the “one country, two systems” policy, said symposium participants, adding that the law has not only played a decisive role in restoring order and ensuring prosperity in Hong Kong, but has also served as a valuable guide for other countries and regions in shaping their legal systems related to national security.

    According to the guests and scholars present, the successful implementation of the “one state – two systems” course will open up new prospects for advancing global governance. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: China’s Defense Ministry Warns DPP Administration That US Weapons Won’t Save Taiwan

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, June 10 (Xinhua) — Chinese Defense Ministry spokesperson Jiang Bin on Monday warned Taiwan’s Democratic Progressive Party (DPP) administration that U.S. weapons will not save them and seeking outside help to support “Taiwan independence” is doomed to fail.

    Jiang Bin made this comment at the request of journalists on reports that the United States is supplying Taiwan with a new batch of M1A2 tanks and plans to increase arms sales to Taiwan over the next four years.

    The reporters’ request also cited a former US military official as saying there were about 500 American troops in Taiwan, more than ten times the number previously released by the US Congress.

    “This is further convincing evidence that the US side and the separatist forces advocating ‘Taiwan independence’ are violating China’s core interests, trying to change the status quo in the Taiwan Strait region and promote escalation of tensions in the region,” Jiang Bin said.

    The Taiwan issue lies at the core of China’s core interests and is the first red line in Sino-US relations that must not be crossed, he confirmed.

    “We urge the American side to stop its military collusion with Taiwan in any form. Otherwise, it will bring trouble upon itself, and what it gains will not compensate for what it loses,” Jiang Bin said.

    The People’s Liberation Army will continue to strengthen its military training and combat readiness and comprehensively enhance its ability to win the war, Jiang Bin stressed, adding that China will take resolute measures to defeat secessionist activities aimed at achieving “Taiwan independence” and thwart plans of external interference. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: The number of China-Europe freight trains sent from China has exceeded 110 thousand.

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    JINAN, June 10 (Xinhua) — The 110,000th freight train to operate on the China-Europe international freight train route departed from Qingdao in east China’s Shandong Province on Tuesday morning, marking a milestone in the high-quality development of the railway service.

    The train, loaded with 55 containers of home appliances worth nearly 20 million yuan (about $2.78 million), including LCD monitors and refrigerators, will leave China through the Ereen Port in Inner Mongolia Autonomous Region, the largest land border crossing on the China-Mongolia border, and is expected to arrive in Europe in 17 days, according to Gao Yitian, an employee of the Jiaozhou branch of the Jinan Railway Logistics Center.

    Over the past decade, China-Europe freight rail services have expanded significantly, with not only the number of trains leaving China increasing but also the range of goods carried expanding, Gao Yitian said, adding that the international logistics network in Shandong not only transports Chinese export products but also cross-border goods from Japan, the Republic of Korea and Southeast Asian countries.

    “I believe these trains will continue to deliver more Made in China products while providing better services to Belt and Road countries and their people,” Gao Yitian added.

    Currently, China-Europe routes link 128 Chinese cities with 229 cities in 26 European countries and more than 100 cities in 11 Asian countries. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: Lightning: Xi Jinping Calls on China, South Korea to Jointly Safeguard Multilateralism, Free Trade, and Ensure Stability and Smooth Operation of Global Industrial and Supply Chains

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Xinhua | 10. 06. 2025

    Key words: China,Republic of Korea

    Source: Xinhua

    Flash: Xi Jinping Calls on China, South Korea to Jointly Safeguard Multilateralism, Free Trade, and Ensure Stability and Smoothness of Global Industrial and Supply Chains Flash: Xi Jinping Calls on China, South Korea to Jointly Safeguard Multilateralism, Free Trade, and Ensure Stability and Smoothness of Global Industrial and Supply Chains

    MIL OSI Russia News

  • MIL-OSI Russia: Urgent: China, ROK Should Elevate Strategic Cooperation and Partnership to Higher Level – Xi Jinping

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, June 10 (Xinhua) — Chinese President Xi Jinping said Tuesday that China and the Republic of Korea (ROK) need to take their strategic partnership to a higher level.

    Xi Jinping made the statement during telephone talks with South Korean President Lee Jae-myung.

    China and the ROK should bring more certainty to the regional and international situation, he said, adding that the two countries should jointly safeguard multilateralism and free trade, and ensure the stability and smoothness of global and regional supply chains. –0–

    MIL OSI Russia News

  • Russia’s latest drone strikes hit Kyiv, maternity ward in Odesa, Ukraine says

    Source: Government of India

    Source: Government of India (4)

    Russia launched another prolonged drone attack on Ukraine, killing one person and damaging swathes of Kyiv as well as striking a maternity ward in the southern port of Odesa, regional officials said early on Tuesday.

    The overnight strikes followed Russia’s biggest drone assault on Ukraine on Monday – part of stepped-up operations that Moscow said were retaliatory measures for Kyiv’s recent brazen attacks in Russia.

    At least four people were hospitalised as a result of the hours-long attacks that hit seven of the city’s 10 districts, city officials said.

    “You can’t break Ukrainians with terror,” Andriy Yermak, President Volodymyr Zelenskiy’s chief of staff, said in a Telegram post after the attacks.

    Air raid alerts in Kyiv and most Ukrainian regions lasted five hours until around 5 a.m. (0200 GMT), according to military data.

    “A difficult night for all of us,” Timur Tkachenko, head of Kyiv’s military district, said on Telegram. “Throughout the night, the enemy relentlessly terrorized Kyiv with attack drones. They targeted civilian infrastructure and peaceful residents of the city.”

    The attack sparked fires in residential and non-residential neighbourhoods and open space areas, city officials said. Reuters’ witnesses heard and saw countless loud explosions shaking the city and lighting the night sky.

    Photos and videos posted on Telegram channels showed heavy smoke rising in the darkness in different parts of Kyiv. The scale of the attack was not immediately known.

    Moscow has dramatically increased the pace of its attacks on Ukraine following Kyiv’s strikes on strategic bombers at air bases inside Russia on June 1. Moscow also blamed Kyiv for bridge explosions on the same day that killed seven and injured scores.

    The attacks come despite pressure from U.S. President Donald Trump on both sides to move towards a resolution on the war. Moscow and Kyiv returned to negotiations for the first time in more than three years, but outside an agreement on the exchange of war prisoners, there has been no tangible progress.

    In addition to swarms of drones and missiles launched in recent days, Russia has also been advancing further on the ground along the frontline in eastern Ukraine, claiming on Tuesday to take more territory there.

    In the southern port of Odesa, a “massive” overnight drone attack targeted an emergency medical building and a maternity ward, as well as residential buildings, Oleh Kiper, governor of the broader Odesa region, said on Telegram.

    A 59-year-old man was killed in the attack on a residential area, and four people were injured, but patients and staff were safely evacuated from the maternity hospital, Kiper said.

    He posted photos of broken windows in what looked like a medical facility and of damage to the facade of several buildings.

    Both sides deny targeting civilians in the war. But thousands of civilians have been killed in the conflict, the vast majority of them Ukrainian.

    (Reuters)

  • MIL-OSI Russia: Giant Radio Telescope Under Construction in China’s Xinjiang

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    URUMQI, June 10 (Xinhua) — A giant radio telescope is under construction in northwest China’s Xinjiang Uygur Autonomous Region. Its main tower was completed on Sunday, marking the official start of its interior decoration.

    Located in a valley in Qitai County, Changji Hui Autonomous Prefecture, the radio telescope has an aperture of 110 meters and is expected to be completed and put into operation in 2028.

    The height of the radio telescope’s antenna structure system exceeds the height of a 35-story building, the telescope’s collecting area is equal to 23 basketball courts, and the weight of the antenna exceeds 6,000 tons.

    Once completed, the telescope will be the world’s leading large-aperture radio telescope, fully steerable, highly sensitive, and multidisciplinary. Compared to fixed radio telescopes of the same size, fully steerable radio telescopes can observe a larger portion of the sky.

    In addition to meeting the needs of scientific observations and experimental research, it will also serve as a base for the popularization of astronomical science and its education. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: Canadian scholar delves into Chinese literature in Nanchang

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    In 2005, Canadian Brandon Collins-Green moved to Shanghai to join his girlfriend and live with a family who didn’t speak English. “The first few weeks [of communication] were really tough, but that’s when I fell in love with Mandarin,” he recalls. This passion for the language changed the trajectory of his life – he abandoned an exchange program in Singapore and earned a bachelor’s degree in Chinese language education from Jiamusi University. After that, after reading the famous novel “Dream of the Red Chamber,” he became fascinated with ancient Chinese literature and in 2018 entered the doctoral program at Jiangxi Normal University, where he continued his “deep immersion” in academia.

    Since 2018, Brandon has painted over 4,800 paintings inspired by ancient Chinese literature and poetry (Source: China Daily)

    The decision to live in Nanchang (Jiangxi Province) was a conscious one for the young scientist. Although the city is inferior in development to some megacities, Brandon admires its rich history and culture, as well as the atmosphere filled with energy and movement: “There is peace, safety and trust here.”

    MIL OSI Russia News

  • MIL-OSI USA: Ranking Member McCollum: Defense Funding Bill Hurts Our Servicemembers, Undermines Military Readiness and Our Allies in Ukraine

    Source: United States House of Representatives – Congresswoman Betty McCollum (DFL-Minn)

    WASHINGTON — House Appropriations Committee Republicans today released their 2026 Defense funding bill, which will be considered by the Defense subcommittee tomorrow. Instead of working with House Democrats to strengthen our national security and prioritize the quality of life for our servicemembers and their families, the bill undermines democracy at home and abroad and includes harmful and divisive policy riders that would hurt military readiness.

    For fiscal year 2026, the bill provides $831.5 billion, which is equal to current funding levels and $1.3 billion above the Administration’s fiscal year 2026 request.

    Republicans have included language directing the Department of Defense to determine $7.75 billion in cuts to amounts listed in the bill. This jeopardizes every program other than intelligence activities. If made uniformly, it would reduce everything by approximately 1 percent, which would mean cuts of almost $2 billion for troop pay, over $2 billion for troop readiness, $409 million for health programs, $5 million each for Israel and Jordan, and over $2 billion for the procurement and modernization of weapons systems. At a time when the Trump Administration is already illegally stealing from American communities by refusing to spend funds, it is unfathomable that the Appropriations Committee would allow the administration to unilaterally make nearly $8 billion in cuts to defense investments.

    The legislation:

    • Weakens Ukraine and empowers Russia by eliminating support for the Ukraine Security Assistance Initiative.
    • Undermines democracy at home and abroad by allowing disinformation and extremist views to flourish.
    • Limits women’s access to abortion by preventing service personnel from traveling to seek reproductive health care
    • Harms our military readiness with divisive provisions that undermine morale and fail to support our service personnel, by:
      • Continuing DOGE and the Administration’s cuts to vital civilian positions;
      • Attacking the LGBTQ+ community with hateful policies; and
      • Banning funding for diversity, equity, and inclusion efforts.

    “It disappoints me that I’m unable to support this bill as written, and we find ourselves in this position because the Trump administration has failed to get us the information we need in time to produce a complete budget request. The nation’s defense programs require a detailed annual review. But without the President’s budget request, this committee is unable to complete its work in a thoughtful and timely manner,” Defense Appropriations Subcommittee Ranking Member Betty McCollum (D-MN-04) said. “The president proposes, Congress disposes – that’s the way our system works. There are consequences to the taxpayer and to our military’s readiness when this process is not adhered to. It is deeply unfortunate that the Trump administration has put the Committee in this position. I look forward to working with the committee to improve the bill as it goes through the process in the subcommittee, in full committee, on the floor, and in conference. Our national security and strategic defense priorities are too important to risk getting it wrong.”

    “Our allies and our adversaries are watching as House Republicans propose a Defense funding bill that will empower Russia, impair our own military readiness and national security, and put politics above our own servicemembers,” Appropriations Committee Ranking Member Rosa DeLauro (D-CT-03) said. “This is not a bill meant to responsibly fund our nation’s defense and promote and protect democracy. Instead, this bill advances and acquiesces to Elon Musk’s and President Trump’s reckless purging of critical civilian personnel, their equivocation on support for Ukraine, and their relentless politicizing of our troops. It is deeply regrettable that the conflicts our military must confront abroad, the issues we must confront within the Department of Defense, and the quality of life for our servicemembers and military families are not priorities of President Trump and House Republicans.”

    A summary of House Republicans’ 2026 Defense bill is here. A fact sheet of the bill is here. The full text of the bill is here.

    MIL OSI USA News

  • MIL-OSI China: Russia to build 8 nuclear plants in Iran: atomic chief

    Source: People’s Republic of China – State Council News

    People work at the construction site of the second phase of Iran’s Bushehr Nuclear Power Plant in Bushehr, southern Iran, on Nov. 10, 2019. [Photo/Xinhua]

    Iranian atomic chief has announced that Russia will construct eight nuclear power plants in Iran under a previously signed contract between the two countries, the official news agency IRNA reported.

    President of the Atomic Energy Organization of Iran (AEOI) Mohammad Eslami made the remarks on Monday during a visit by members of the Iranian parliament’s national security and foreign policy committee to the AEOI headquarters in Tehran.

    Eslami stated that four of the eight planned nuclear reactors would be constructed in the southern province of Bushehr.

    He also updated lawmakers on the ongoing construction of units 2 and 3 at the existing Bushehr Nuclear Power Plant, emphasizing that those units are being built by Iranian companies.

    Speaking to reporters after the parliamentary delegation’s visit, Eslami added that the AEOI has plans to triple Iran’s nuclear power generation capacity, as part of the country’s broader energy development strategy.

    Completed by Russia in May 2011, the Bushehr plant, Iran’s first and only operational nuclear power facility, has been central to the country’s civilian nuclear energy program and has long involved cooperation with Russia’s state nuclear agency, Rosatom. 

    MIL OSI China News

  • MIL-OSI Economics: Sleep with one eye open: how Librarian Ghouls steal data by night

    Source: Securelist – Kaspersky

    Headline: Sleep with one eye open: how Librarian Ghouls steal data by night

    Introduction

    Librarian Ghouls, also known as “Rare Werewolf” and “Rezet”, is an APT group that targets entities in Russia and the CIS. Other security vendors are also monitoring this APT and releasing analyses of its campaigns. The group has remained active through May 2025, consistently targeting Russian companies.

    A distinctive feature of this threat is that the attackers favor using legitimate third-party software over developing their own malicious binaries. The malicious functionality of the campaign described in this article is implemented through command files and PowerShell scripts. The attackers establish remote access to the victim’s device, steal credentials, and deploy an XMRig crypto miner in the system.

    Our research has uncovered new tools within this APT group’s arsenal, which we will elaborate on in this article.

    Technical details

    Initial infection vector

    Attacks by Librarian Ghouls continued almost unabated throughout 2024. We observed a slight decline in the group’s activity in December, followed immediately by a new wave of attacks, which is ongoing. The group’s primary initial infection vector involves targeted phishing emails that contain password-protected archives with executable files inside. These malicious emails are typically disguised as messages from legitimate organizations, containing attachments that appear to be official documents. The infection process is as follows: the victim opens the attached archive (the password is usually provided in the email body), extracts the files inside, and opens them.

    We managed to get hold of a malicious implant from an archive disguised as a payment order. The sample is a self-extracting installer made with the Smart Install Maker utility for Windows.

    The installer contains three files: an archive, a configuration file, and an empty file irrelevant for our analysis. They are later renamed into data.cab, installer.config and runtime.cab respectively.

    The primary malicious logic resides in the installer’s configuration file. It uses a variety of registry modification commands to automatically deploy the legitimate window manager, 4t Tray Minimizer, onto the system. This software can minimize running applications to the system tray, allowing attackers to obscure their presence on the compromised system.

    Once 4t Tray Minimizer is installed, the installer pulls three files from data.cab and puts them into the C:Intel directory, specifically at:

    File Name when archived Path on the infected system
    Legitimate PDF as a decoy 0  IntelPayment Order # 131.pdf
    Legitimate curl utility executable 1 Intelcurl.exe
    LNK file 2 IntelAnyDeskbat.lnk

    The PDF decoy resembles an order to pay a minor amount:

    PDF document imitating a payment order

    rezet.cmd

    Once data.cab is unpacked, the installer generates and executes a rezet.cmd command file, which then reaches out to the C2 server downdown[.]ru, hosting six files with the JPG extension. rezet.cmd downloads these to C:Intel, changing their file extensions to: driver.exe, blat.exe, svchost.exe, Trays.rar, wol.ps1, and dc.exe.

    • driver.exe is a customized build of rar.exe, the console version of WinRAR 3.80. This version has had user dialog strings removed: it can execute commands but provides no meaningful output to the console.
    • blat.exe is Blat, a legitimate utility for sending email messages and files via SMTP. Attackers use this to send data they steal to an email server they control.
    • svchost.exe is the remote access application AnyDesk. Attackers use this to remotely control the compromised machine.
    • dc.exe is Defender Control, which allows disabling Windows Defender.

    After downloading the files, the script uses the specified password and the driver.exe console utility to extract Trays.rar into the same C:Intel directory and run the unpacked Trays.lnk. This shortcut allows starting 4t Tray Minimizer minimized to the tray.

    Next, the script installs AnyDesk on the compromised device and downloads a bat.bat file from the C2 server to C:IntelAnyDesk. Finally, rezet.cmd runs bat.lnk, which was previously extracted from data.cab.

    bat.bat

    Opening the bat.lnk shortcut runs the bat.bat batch file, which executes a series of malicious actions.

    Disabling security measures and a scheduled task

    First, the BAT file sets the password QWERTY1234566 for AnyDesk, which allows the attackers to connect to the victim’s device without asking for confirmation.

    Next, the script uses the previously downloaded Defender Control (dc.exe) application to disable Windows Defender.

    To verify that the victim’s computer is on and available for remote connections, the batch file runs the powercfg utility six times with different parameters. This utility controls the local machine’s power settings.

    Next, bat.bat runs the schtasks utility to create a ShutdownAt5AM scheduler task, which shuts down the victim’s PC every day at 5 AM as the name suggests. It is our assessment that the attackers use this technique to cover their tracks so that the user remains unaware that their device has been hijacked.

    Disabling security measures and the power management configuration in bat.bat

    Wakeup script and data theft

    Next, the batch file executes the wol.ps1 script via PowerShell.

    Contents of the “wol.ps1” script

    This script launches Microsoft Edge every day at 1 AM. We found no evidence of msedge.exe being replaced or compromised, leading us to believe it is a genuine Microsoft Edge executable. This daily browser activation wakes the victim’s computer, giving attackers a four-hour window to establish unauthorized remote access with AnyDesk before the scheduled task shuts the machine down at 5 AM.

    Following the execution of the PowerShell script, bat.bat removes the curl utility, the Trays.rar archive, and the AnyDesk installer. The attackers no longer need these components: at this stage of the infection, all necessary malicious files and third-party utilities have been downloaded with curl, Trays.rar has been unpacked, and AnyDesk has been installed on the device.

    After that, the batch file sets environment variables for Blat. These variables contain, among other things, the email addresses where the victim’s data will be sent and the passwords for these accounts.

    The next step is to collect information stored on the device that is of interest to the attackers:

    • Cryptocurrency wallet credentials and seed phrases
    • Dumps of the HKLMSAM and HKLMSYSTEM registry keys made with reg.exe

    Data collection by bat.bat

    The BAT file uses driver.exe to pack data it has collected into two separate password-protected archives. Then, the script runs blat.exe to send the victim’s data and AnyDesk configuration files to the attackers via SMTP.

    Miner installation and self-deletion

    Next, bat.bat deletes the files generated during the attack from the C:Intel folder and installs a crypto miner on the compromised system. To do this, the script creates a bm.json configuration file containing the mining pool address and the attackers’ identifier, and then downloads install.exe from hxxp://bmapps[.]org/bmcontrol/win64/Install.exe.

    install.exe is an installer that checks for the JSON configuration file and the bmcontrol.exe process in the system. If the process is detected, the installer terminates it.

    Then, install.exe downloads an archive with mining tools from hxxps://bmapps[.]org/bmcontrol/win64/app-1.4.zip.

    The archive contains the following files:

    • _install.exe: a new version of the installer. While the samples in the attacks we analyzed were identical, we suspect the attackers have a scenario for updating the malware.
    • bmcontrol.exe: miner controller
    • run.exe, stop.cmd, uninstall.cmd: tools for starting, stopping, and removing the controller
    • XMRig miner

    Depending on the parameters of the JSON file, the unmodified original installer file is used, or _install.exe is renamed to install.exe and run. After that, the installer adds run.exe to autorun. This utility checks for an already running bmcontrol.exe controller on the compromised system, and if it doesn’t find one, runs it from the downloaded archive.

    Once running, bmcontrol.exe creates two processes: master and worker. The master process launches and constantly monitors the worker, and also restarts it if the latter quits unexpectedly. In addition, the master passes the JSON configuration file to the worker process.

    Before launching the XMRig miner, the worker process collects the following system information:

    1. Available CPU cores
    2. Available RAM
    3. GPU

    This data is used to configure the miner on the compromised device and also sent to the attackers’ server. While XMRig is running, the worker maintains a connection to the mining pool, sending a request every 60 seconds.

    After installing the miner on the system, bat.bat removes itself from the victim’s device.

    Legitimate software utilized by the attackers

    It is a common technique to leverage third-party legitimate software for malicious purposes (T1588.002), which makes detecting and attributing APT activity more difficult. We have seen this pattern in current campaigns by various APT groups, in particular in the Likho cluster.

    Beyond the utilities discussed above, we also identified the following software in Librarian Ghouls attacks:

    • Mipko Personal Monitor: a DLP system that the attackers use to monitor the victim. The application can collect screenshots and record keystrokes among other things.
    • WebBrowserPassView: a password recovery utility that can extract passwords stored in web browsers. The attackers use this to steal victims’ credentials.
    • ngrok: a global reverse proxy that secures and accelerates network services. Used by the attackers to connect to target machines.
    • NirCmd: a legitimate utility that facilitates various OS tasks without a visible user interface. The attackers use this to covertly run scripts and executables.

    Phishing campaign

    Our investigation revealed several domains that we assess with low confidence to be associated with the ongoing Librarian Ghouls campaign. At the time of the investigation, some of them remained active, including users-mail[.]ru and deauthorization[.]online. These domains hosted phishing pages, generated with PHP scripts and designed to harvest credentials for the mail.ru email service.

    Example of a phishing page associated with the APT campaign

    Infrastructure

    The implant detailed in this article communicated with the command-and-control servers downdown[.]ru and dragonfires[.]ru. Both resolve to the IP address 185.125.51[.]5.

    Our analysis of the attackers’ infrastructure revealed a notable characteristic: several malicious web servers associated with this campaign had directory listing enabled, allowing us to inspect files they stored.

    Directory listing on a malicious server

    Victims

    Our telemetry indicated that, during the investigation period, hundreds of Russian users fell victim to this campaign. It primarily focuses on industrial enterprises, with engineering schools also being a target of interest. Furthermore, the attacks described also impacted users in Belarus and Kazakhstan.

    The phishing emails are notably composed in Russian and include archives with Russian filenames, along with Russian-language decoy documents. This suggests that the primary targets of this campaign are likely based in Russia or speak Russian.

    About the attackers

    Librarian Ghouls APT exhibits traits commonly associated with hacktivist groups, such as the use of self-extracting archives and a reliance on legitimate, third-party utilities rather than custom-built malware binary modules.

    Since the beginning of the current campaign in December 2024, we have seen frequent updates to the implants, which vary in configuration files and the bundled sets of legitimate utilities. At the time of publishing this, our data encompassed over 100 malicious files connected to this campaign.

    Takeaways

    At the time of this report’s release, the Librarian Ghouls APT campaign described in it is still active, as evidenced by attacks we observed in May 2025. Consistent with previous activity, the attackers leverage third-party legitimate utilities rather than developing custom tools. All of the malicious functionality still relies on installer, command, and PowerShell scripts. We observe that the attackers are continuously refining their tactics, encompassing not only data exfiltration but also the deployment of remote access tools and the use of phishing sites for email account compromise. We constantly monitor this threat actor and will continue to share up-to-date information about its activity.

    Indicators of compromise

    * Additional indicators of compromise and a YARA rule for detecting Librarian Ghouls activity are available to customers of our APT Intelligence Reporting service. Contact intelreports@kaspersky.com for more details.

    Implants

    d8edd46220059541ff397f74bfd271336dda702c6b1869e8a081c71f595a9e68
    2f3d67740bb7587ff70cc7319e9fe5c517c0e55345bf53e01b3019e415ff098b
    de998bd26ea326e610cc70654499cebfd594cc973438ac421e4c7e1f3b887617
    785a5b92bb8c9dbf52cfda1b28f0ac7db8ead4ec3a37cfd6470605d945ade40e
    c79413ef4088b3a39fe8c7d68d2639cc69f88b10429e59dd0b4177f6b2a92351
    53fd5984c4f6551b2c1059835ea9ca6d0342d886ba7034835db2a1dd3f8f5b04

    Implant configuration files

    f8c80bbecbfb38f252943ee6beec98edc93cd734ec70ccd2565ab1c4db5f072f
    4d590a9640093bbda21597233b400b037278366660ba2c3128795bc85d35be72
    1b409644e86559e56add5a65552785750cd36d60745afde448cce7f6f3f09a06
    7c4a99382dbbd7b5aaa62af0ccff68aecdde2319560bbfdaf76132b0506ab68a
    702bf51811281aad78e6ca767586eba4b4c3a43743f8b8e56bb93bc349cb6090
    311ec9208f5fe3f22733fca1e6388ea9c0327be0836c955d2cf6a22317d4bdca

    Malicious archive attachments

    fd58900ea22b38bad2ef3d1b8b74f5c7023b8ca8a5b69f88cfbfe28b2c585baf
    e6ea6ce923f2eee0cd56a0874e4a0ca467711b889553259a995df686bd35de86
    6954eaed33a9d0cf7e298778ec82d31bfbdf40c813c6ac837352ce676793db74

    Malicious BAT files

    e880a1bb0e7d422b78a54b35b3f53e348ab27425f1c561db120c0411da5c1ce9
    c353a708edfd0f77a486af66e407f7b78583394d7b5f994cd8d2e6e263d25968
    636d4f1e3dcf0332a815ce3f526a02df3c4ef2890a74521d05d6050917596748
    c5eeec72b5e6d0e84ff91dfdcbefbbbf441878780f887febb0caf3cbe882ec72
    8bdb8df5677a11348f5787ece3c7c94824b83ab3f31f40e361e600576909b073
    2af2841bf925ed1875faadcbb0ef316c641e1dcdb61d1fbf80c3443c2fc9454f

    Decoy documents

    cab1c4c675f1d996b659bab1ddb38af365190e450dec3d195461e4e4ccf1c286
    dfac7cd8d041a53405cc37a44f100f6f862ed2d930e251f4bf22f10235db4bb3
    977054802de7b583a38e0524feefa7356c47c53dd49de8c3d533e7689095f9ac
    65f7c3e16598a8cb279b86eaeda32cb7a685801ed07d36c66ff83742d41cd415
    a6ff418f0db461536cff41e9c7e5dba3ee3b405541519820db8a52b6d818a01e
    6c86608893463968bfda0969aa1e6401411c0882662f3e70c1ac195ee7bd1510

    Malicious PS1 scripts

    8b6afbf73a9b98eec01d8510815a044cd036743b64fef955385cbca80ae94f15
    7d6b598eaf19ea8a571b4bd79fd6ff7928388b565d7814b809d2f7fdedc23a0a
    01793e6f0d5241b33f07a3f9ad34e40e056a514c5d23e14dc491cee60076dc5a

    Miner installer (install.exe)
    649ee35ad29945e8dd6511192483dddfdfe516a1312de5e0bd17fdd0a258c27f

    Miner controller (bmcontrol.exe)
    9cce3eaae0be9b196017cb6daf49dd56146016f936b66527320f754f179c615f

    Miner launcher (run.exe)
    d7bcab5acc8428026e1afd694fb179c5cbb74c5be651cd74e996c2914fb2b839

    Legitimate software

    AnyDesk
    Blat
    curl
    Defender Control
    Customized RAR 3.80
    AnyDesk
    Mipko Personal Monitor
    ngrok
    NirCmd
    4t Tray Minimizer
    WebBrowserPassView

    Librarian Ghouls malicious domains

    vniir[.]space
    vniir[.]nl
    hostingforme[.]nl
    mail-cheker[.]nl
    unifikator[.]ru
    outinfo[.]ru
    anyhostings[.]ru
    center-mail[.]ru
    redaction-voenmeh[.]info
    acountservices[.]nl
    accouts-verification[.]ru
    office-email[.]ru
    email-office[.]ru
    email-informer[.]ru
    office-account[.]ru
    deauthorization[.]online
    anyinfos[.]ru
    verifikations[.]ru
    claud-mail[.]ru
    users-mail[.]ru
    detectis[.]ru
    supersuit[.]site
    downdown[.]ru
    dragonfires[.]ru
    bmapps[.]org

    MIL OSI Economics

  • MIL-OSI Economics: Rosneft holds the first open academic competition for schoolchildren in Bashkiria

    Source: Rosneft

    Headline: Rosneft holds the first open academic competition for schoolchildren in Bashkiria

    Bashneft (Rosneft subsidiary) held the first open academic competition for schoolchildren at the Ufa State Petroleum Technical University (USPTU). The winners will receive additional points to the Unified State Examination when entering USPTU.

    More than 100 schoolchildren from Ufa and other cities and districts of Bashkortostan took part in the academic competition. Students of 10-11 grades could test their knowledge in mathematical chemistry and mathematical physics.

    The winners of the competition will be awarded at the All-Russian Employment Fair to be held in Ufa on 18 April 2025. Bashneft will also offer the winners an opportunity to go on an “oil quest” at the fair, which is dedicated to the profession of an oil worker. The Rosneft academic competition in USPTU is planned to be held on an annual basis with an increase in the number of participants.

    As a part of the corporate program of continuous education “school – college/university – enterprise”, Rosneft implements projects to attract talented young people and form an external talent pool. The program has been implemented in the Republic of Bashkortostan for several years already. 49 schoolchildren were enrolled in the 10th grade “Rosneft Classes” in 2024. In addition, 25 9th grade students were enrolled in the Rosneft Class in Ufa on a pilot basis. The Ufa Fuel and Energy College (UFEC) became a partner.

    USPTU and UFEC have six corporate groups of Bashneft in various training areas, including: solid fuel, oil and gas processing technology, design and operation of oil and gas processing equipment, oil and gas geology and geophysics, etc. In profile groups, students combine work at the production site with individualized training. Training in specialized subjects is conducted with the involvement of expert teachers among Bashneft’s employees.

    In partnership with Bashneft’s enterprises, USPTU has established basic departments: Petrochemical Process Technology, Welding of Oil and Gas Structures, Bashneft Refining and Bashneft Environmental Engineering.

    For reference:

    Basheft is one of the oldest oil and gas enterprises in the country engaged in oil extraction and processing. The key assets of Bashneft, including the refinery and petrochemical complex, are located in the Republic of Bashkortostan.Oil and gas exploration and production are also carried out in Khanty-Mansi Autonomous Area–Yugra, Nenets Autonomous Area, Orenburg Region and the Republic of Bashkortostan.

    USPTU is Bashneft’s key partner in personnel training. More than 50% of Bashneft’s employees are graduates of this university.

    Department of Information and Advertising
    Rosneft
    April 11, 2025

    MIL OSI Economics

  • MIL-Evening Report: A 10-fold increase in rocket launches would start harming the ozone layer – new research

    Source: The Conversation (Au and NZ) – By Laura Revell, Associate Professor in Atmospheric Chemistry, University of Canterbury

    Han Jiajun/VCG via Getty Images

    The international space industry is on a growth trajectory, but new research shows a rapid increase in rocket launches would damage the ozone layer.

    Several hundred rockets are launched globally each year by a mix of commercial companies and nation-state space programmes. These take place at around 20 sites, almost all in the northern hemisphere, with the most prolific launch rates currently from the United States, China, New Zealand and Russia.

    Our latest research explores the tipping point when launching more rockets will begin to cause problems. Our findings show that once rates reach 2,000 launches a year – about a ten-fold increase on last year – the current healing of the ozone layer slows down.

    We argue that with care, we can avoid this future. The economic benefits of industry growth can be realised, but it will take a collaborative effort.

    Rocket launches thin the ozone layer

    The ozone layer protects life on Earth from harmful solar ultraviolet (UV) rays. It is slowly healing from the effects of chlorofluorocarbons and other damaging chemicals emitted last century, thanks to global cooperative agreements under the Montreal Protocol.

    Gases and particulates emitted by rockets as they punch through the atmosphere are known to thin the ozone layer. So far, they don’t cause appreciable ozone depletion, as relatively few launches take place each year.

    However, launches are steadily increasing. In 2019, there were 102 launches. By 2024, that increased to 258 worldwide. There are expected to be even more in 2025. At multiple sites worldwide, the launch industry projects impressive levels of future growth.

    For US-based launches, a three-fold increase in the number of rockets launched in 2023 is expected as soon as 2028.

    One driver of this growth is the effort to build out satellite constellations to tens of thousands of units, positioned low in Earth’s orbit. These require many launches to create and are happening in several nations, run by a number of companies.

    Once in place, these constellations require ongoing launches to keep them supplied with active satellites.

    Potential delay in ozone recovery

    To figure out how future launches could affect the ozone layer, we first built a database of ozone-depleting chemicals emitted by rockets currently in use. We then fed this database into a model of Earth’s atmosphere and climate, and simulated atmospheric composition under several scenarios of higher rates of rocket launches.

    We found that with around 2,000 launches worldwide each year, the ozone layer thins by up to 3%. Due to atmospheric transport of rocket-emitted chemicals, we saw the largest ozone losses over Antarctica, even though most launches are taking place in the northern hemisphere.

    Fortunately, the ozone losses are small. We wouldn’t expect to see catastrophic damage to humans or ecosystems. However, the losses are significant given global efforts underway to heal the ozone layer. The global abundance of ozone is still around 2% lower than before the onset of losses caused by chlorofluorocarbons.

    Future ozone losses are not locked in

    Encouragingly, we found no significant ozone loss in a scenario of more modest rates of around 900 launches per year. However, this is for the types of rockets that are in use right now around the world.

    We focus on current launch vehicles because it is uncertain when the new and massive rockets currently in development will enter use. But these larger rockets often require far more fuel, which creates more emissions at each launch.

    Rocket propellant choices make a big difference to the atmosphere. We found fuels emitting chlorine-containing chemicals or black carbon particulates have the largest effects on the ozone layer. Reducing use of these fuels as launch rates increase is key to supporting an ongoing recovery of the ozone layer.

    Re-entering spacecraft and satellite debris can also cause damage. However, the global scientific community doesn’t yet fully understand the chemistry around re-entry. Our work provides a realistic “floor” for the lowest level of damage that will occur.

    But it is important to remember that these effects are not locked in. It is entirely possible to create a launch industry where we avoid harmful effects, but that would require reducing use of chlorine-containing fuels, minimising black carbon emissions by new rockets and monitoring emissions.

    It will take keen effort and enthusiasm from industry and regulators, working together with scientists. But this needs to start now, not after the damage is done.

    Laura Revell is a member of the International Ozone Commission and the UNEP Environmental Effects Assessment Panel, which assesses the effects of ozone depletion on life on Earth. She is a Rutherford Discovery Fellow, funded by the Royal Society of NZ Te Apārangi.

    Michele Bannister is the NZ delegate for the International Astronomical Union, serves on the COSPAR-NZ national committee, is a voting member of Aerospace New Zealand, and has research collaborations with the IAU Centre for Protection of the Dark & Quiet Sky. She is a Rutherford Discovery Fellow, funded by the Royal Society of NZ Te Apārangi.

    ref. A 10-fold increase in rocket launches would start harming the ozone layer – new research – https://theconversation.com/a-10-fold-increase-in-rocket-launches-would-start-harming-the-ozone-layer-new-research-257480

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Global: Can Israel still claim self-defence to justify its Gaza war?

    Source: The Conversation – Global Perspectives – By Donald Rothwell, Professor of International Law, Australian National University

    On October 7 2023, more than 1,000 Hamas militants stormed into southern Israel and went on a killing spree, murdering 1,200 men, women and children and abducting another 250 people to take back to Gaza. It was the deadliest massacre of Jews since the Holocaust.

    That day, Israeli Prime Minister Benjamin Netanyahu told the country, “Israel is at war”. The Israel Defence Forces (IDF) immediately began a military campaign to secure the release of the hostages and defeat Hamas. Since that day, more than 54,000 Palestinians have been killed, mostly women and children.

    Israel has maintained its response is justified under international law, as every nation has “an inherent right to defend itself”, as Netanyahu stated in early 2024.

    This is based on the right to self-defence in international law, which is outlined in Article 51 of the 1945 United Nations Charter as follows:

    Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations[…]

    At the start of the war, many nations agreed Israel had a right to defend itself, but how it did so mattered. This would ensure its actions were consistent with international humanitarian law.

    However, 20 months after the October 7 attacks, fundamental legal issues have arisen around whether this self-defence justification still holds.

    Can Israel exercise self-defence ad infinitum? Or is it now waging a war of aggression against Palestine?

    Self-defence in the law

    Self-defence has a long history in international law.

    The modern principles of self-defence were outlined in diplomatic exchanges over an 1837 incident involving an American ship, The Caroline, after it was destroyed by British forces in Canada. Both sides agreed that an exercise of self-defence would have required the British to demonstrate their conduct was not “unreasonable or excessive”.

    The concept of self-defence was also extensively relied on by the Allies in the second world war in response to German and Japanese aggression.

    Self-defence was originally framed in the law as a right to respond to a state-based attack. However, this scope has broadened in recent decades to encompass attacks from non-state actors, such as al-Qaeda following the September 11 2001 terror attacks.

    Israel is a legitimate, recognised state in the global community and a member of the United Nations. Its right to self-defence will always remain intact when it faces attacks from its neighbours or non-state actors, such as Hamas, Hezbollah or the Houthi rebels in Yemen.

    However, the right of self-defence is not unlimited. It is constrained by the principles of necessity and proportionality.

    The necessity test was met in the current war due to the extreme violence of the Hamas attack on October 7 and the taking of hostages. These were actions that could not be ignored and demanded a response, due to the threat Israel continued to face.

    The proportionality test was also met, initially. Israel’s military operation after the attack was strategic in nature, focused on the return of the hostages and the destruction of Hamas to eliminate the immediate threat the group posed.

    The legal question now is whether Israel is still legitimately exercising self-defence in response to the October 7 attacks.

    This is a live issue, especially given comments by Israeli Defence Minister Israel Katz on May 30 that Hamas would be “annihilated” unless a proposed ceasefire deal was accepted.

    These comments and Israel’s ongoing conduct throughout the war raise the question of whether proportionality is still being met.

    A test of proportionality

    The importance of proportionality in self-defence has been endorsed in recent years by the International Court of Justice.

    Under international law, proportionality remains relevant throughout a conflict, not just in the initial response to an attack.

    While the law allows a war to continue until an aggressor surrenders, it does not legitimise the complete destruction of the territory where an aggressor is fighting.

    The principle of proportionality also provides protections for civilians. Military actions are to be directed at the foreign forces who launched the attack, not civilians.

    While Israel has targeted Hamas fighters in its attacks, including those who orchestrated the October 7 attacks, these actions have caused significant collateral deaths of Palestinian civilians.

    Therefore, taken overall, the ongoing, 20-month military assault against Hamas, with its high numbers of civilian casualties, credible reports of famine and devastation of Gazan towns and cities, suggests Israel’s exercise of self-defence has become disproportionate.

    The principle of proportionality is also part of international humanitarian law. However, Israel’s actions on this front are a separate legal issue that has been the subject of investigation by the International Criminal Court.

    My aim here is to solely assess the legal question of proportionality in self-defence and international law.

    Is rescuing hostages in self-defence?

    Israel could separately argue it is exercising legitimate self-defence to rescue the remaining hostages held by Hamas.

    However, rescuing nationals as an exercise of self-defence is legally controversial. Israel set a precedent in 1976 when the military rescued 103 Jewish hostages from Entebbe, Uganda, after their aircraft had been hijacked.

    In current international law, there are very few other examples in which this interpretation of self-defence has been adopted – and no international consensus on its use.

    In Gaza, the size, scale and duration of Israel’s war goes far beyond a hostage rescue operation. Its aim is also to eliminate Hamas.

    Given this, rescuing hostages as an act of self-defence is arguably not a suitable justification for Israel’s ongoing military operations.

    An act of aggression?

    If Israel can no longer rely on self-defence to justify its Gaza military campaign, how would its actions be characterised under international law?

    Israel could claim it is undertaking a security operation as an occupying power.

    While the International Court of Justice said in an advisory opinion last year that Israel was engaged in an illegal occupation of Gaza, the court expressly made clear it was not addressing the circumstances that had evolved since October 7.

    Israel is indeed continuing to act as an occupying power, even though it has not physically reoccupied all of Gaza. This is irrelevant given the effective control it exercises over the territory.

    However, the scale of the IDF’s operations constitute an armed conflict and well exceed the limited military operations to restore security as an occupying power.

    Absent any other legitimate basis for Israel’s current conduct in Gaza, there is a strong argument that what is occurring is an act of aggression. The UN Charter and the Rome Statute of the International Criminal Court prohibit acts of aggression not otherwise justified under international law.

    These include invasions or attacks by the armed forces of a state, military occupations, bombardments and blockades. All of this has occurred – and continues to occur – in Gaza.

    The international community has rightly condemned Russia’s invasion as an act of aggression in Ukraine. Will it now do the same with Israel’s conduct in Gaza?

    Donald Rothwell receives funding from the Australian Research Council.

    ref. Can Israel still claim self-defence to justify its Gaza war? – https://theconversation.com/can-israel-still-claim-self-defence-to-justify-its-gaza-war-257822

    MIL OSI – Global Reports

  • MIL-OSI Security: ICE Continues to Arrest Vicious Illegal Alien Criminals as Rioters Continue to Disrupt Law Enforcement

    Source: US Department of Homeland Security

    California sanctuary politicians and rioters are defending heinous illegal alien criminals including child pedophiles and other violent criminal illegal aliens at the expense of Americans’ safety

    WASHINGTON – Today, the Department of Homeland Security (DHS) released more information about some of the worst of the worst criminal illegal aliens arrested during the ongoing Immigration and Customs Enforcement (ICE) operation in Los Angeles. These arrests occurred on June 8 despite violent riots and assaults on ICE law enforcement. 

    “These heinous criminals, including child abusers and pedophiles, are some of the illegal aliens arrested yesterday in Los Angeles. Why do Governor Newsom and Los Angeles Mayor Karen Bass care more about violent criminal illegal aliens than they do about protecting their own citizens?” said Assistant Secretary Tricia McLaughlin. “These rioters in Los Angeles are fighting to keep rapists, murderers, and other violent criminals loose on Los Angeles streets. Instead of rioting, they should be thanking ICE officers who every single day wake up and make our communities safer.”

    Below is a list of some of the violent criminal illegal aliens arrested in ICE’s Los Angeles Operation on Sunday:

    Eswin Uriel Castro

    ICE arrested Eswin Uriel Castro, a previously deported illegal alien. Castro has criminal convictions for child molestation and being armed with a dangerous weapon. He has also been arrested for robbery and domestic violence. 

    Anastacio Enrique Solis-Salinas

    ICE arrested Anastacio Enrique Solis-Salinas, a convicted criminal from Nicaragua. His criminal history includes convictions for domestic violence and hit and run. Additionally, he’s been arrested for willful cruelty to a child.

    Rafael Gamez-Sanchez

    ICE arrested Rafael Gamez-Sanchez, an illegal alien, with a criminal conviction for vehicular manslaughter

    Miguel Angel Palafox-Montes

    ICE arrested Miguel Angel Palafox-Montes, an illegal alien, with criminal convictions for grand theft, narcotics violations, and identity theft. He has also been arrested for battery and burglary. Palafox-Montes has previously been voluntarily returned to Mexico twice. 

    Dzhakhar Aslambekov

    ICE arrested Dzhakhar Aslambekov, an illegal alien from Russia. Aslambekov was recently detained for fraud related to Electronic Benefit Transfer (EBT) cards used to access government assistance programs. 

    ###
     

    MIL Security OSI

  • MIL-OSI USA: Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

    Source: US State of North Dakota

    Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

    A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

    According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

    “The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

    “As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

    “Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

    As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

    To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

    Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

    In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

    If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

    Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

    Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Security News: Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

    Source: United States Department of Justice

    Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

    A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

    According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

    “The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

    “As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

    “Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

    As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

    To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

    Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

    In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

    If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

    Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

    Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Russia: Dmitry Chernyshenko: The Kurchatov Institute should honorably preserve the memory of the era of scientist Evgeny Velikhov

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – An important disclaimer is at the bottom of this article.

    At the National Research Center “Kurchatov Institute”, Deputy Prime Minister Dmitry Chernyshenko greeted the participants at the opening of a memorial plaque to the outstanding scientist and public figure Evgeny Velikhov. The event was also attended by Minister of Science and Higher Education Valery Falkov, Presidential Aide Andrey Fursenko, President of the Russian Academy of Sciences Gennady Krasnikov, and President of the National Research Center “Kurchatov Institute” Mikhail Kovalchuk.

    “Our institute was headed by outstanding individuals who had a huge impact on the history of both the country and civilization. This is Igor Kurchatov – thanks to his talent and efforts, the atomic era began in our country. This is his comrade-in-arms and successor Anatoly Aleksandrov, who embodied and developed what Kurchatov began. And Evgeny Velikhov, whose achievements include new approaches to nuclear energy, the tokamak and the international ITER project, supercomputers, modern computing technologies and much more. Today we pay tribute to the memory of this great scientist – the third in a row of titans,” said Mikhail Kovalchuk.

    Dmitry Chernyshenko noted that it was a great honor for him to be present at a historical event that perpetuates the memory of an outstanding personality – Yevgeny Velikhov.

    “Evgeny Pavlovich is one of the few who was awarded the titles of Hero of Socialist Labor and Hero of Labor of the Russian Federation. And here it is important to understand that he is, first and foremost, a reference point for us. It is known that he headed the Kurchatov Institute during difficult times. But the institute was always ahead, took on the most difficult tasks in fundamental and applied science, and always achieved success. And the entire staff of the Kurchatov Institute, of course, must honorably preserve the memory of this era,” the Deputy Prime Minister emphasized.

    He added that, just as they once counted on Yevgeny Velikhov, today they are counting on Mikhail Kovalchuk.

    The Deputy Prime Minister also noted the importance of republishing the academician’s book of memoirs.

    In turn, the head of the Ministry of Education and Science, Valery Falkov, noted the enormous contribution of the Kurchatov Institute team to working with young people.

    “Today, about 4.5 million students are studying at Russian universities, some of whom will come to research institutes, including the Kurchatov Institute. It is important to remember that in universities, along with strong professional knowledge, a personality is formed – a person who has a certain attitude towards his country, understands its history, and clearly sees its prospects. And of course, it is important to orient students, future scientists and specialists, to such examples as the life of Evgeny Pavlovich Velikhov,” said Valery Falkov.

    Gennady Krasnikov added that Evgeny Pavlovich was vice-president of the USSR Academy of Sciences for many years, and then vice-president of the Russian Academy of Sciences. He stood at the origins of the creation of the department, which is today called the Department of Nanotechnology and Information Technology of the Russian Academy of Sciences.

    “Evgeny Pavlovich Velikhov is a truly world-class scientist. He was truly passionate about his work, helped everyone, was a multifaceted person and worked in several scientific fields at the same time. And I would like to say a big thank you to Mikhail Valentinovich for initiating the perpetuation of the memory of this outstanding researcher. This is necessary not only for the employees of the Kurchatov Institute, but also for all our scientists. And most importantly, it is important for the younger generation, for the youth, so that they know what great people stood at the origins of this or that scientific field, how large-scale they were. This plaque will remind us all of this great man,” he said.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI USA: Online open house for SR 167 Completion Project construction in Pierce County begins June 9

    Source: Washington State News 2

    Public can learn where, when and how construction will affect them

    PUYALLUP – Construction work on a new stage of the State Route 167 Completion Project in Pierce County will begin picking up steam in summer 2025. To help people in the Puyallup, Edgewood, Sumner and Milton areas understand how construction will affect them, the Washington State Department of Transportation is launching an online open house on Monday, June 9.

    People who visit the online open house will learn more about the project, which builds a portion of a new expressway between SR 410 and North Meridian Avenue in Puyallup. It also includes a new interchange at North Meridian Avenue, two new bridges, a section of the spuyaləpabš Trail, and ramp and surface street improvements. The online open house outlines the phases of construction and what people can expect if they live, work or travel through the area.

    SR 167 online open house information

    When:  Monday, June 9 – Saturday, Aug. 9

    Where:  engage.wsdot.wa.gov/sr-167-completion-project/

    Details:  The online open house will be available in Spanish, Russian, Korean and Tagalog. Visitors also can leave comments or ask questions.

    Internet access

    • Free, temporary internet access is available to those who do not have broadband service and wish to participate in the online open house:
    • Sumner Library, 1116 Fryar Ave., Sumner
    • WSU Puyallup Research Center, 2606 W. Pioneer Ave., Puyallup
    • Milton/Edgewood Library, 900 Meridian E., Suite 29, Milton
    • Fife Library, 6622 20th St. E., Fife
    • Bonney Lake Library, 18501 90th St. E., Bonney Lake

    SR 167 Completion Project information

    The SR 167 Completion Project builds 6 miles of new tolled highway between Puyallup and the Port of Tacoma. The new expressway will be built in stages. The first stage of work completed the new Wapato Way East bridge and SR 99 roundabout in Fife. The second stage builds the expressway between I-5 and the Port of Tacoma. It’s scheduled to open in 2026.  Work on the third stage between SR 161/North Meridian Avenue and SR 410 began in 2025. Construction of the last stage between North Meridian Avenue and I-5 will begin in 2026. The entire project is planned for completion by 2030. 

     Photos of construction work are available on the project’s Flickr page. A 3D video tour is also available on WSDOT’s YouTube page.

    Puget Sound Gateway Program overview

    The SR 167 Completion Project is part of WSDOT’s Puget Sound Gateway Program, which also includes the SR 509 Completion Project in south King County. Together, the two completion projects finish critical missing links in Washington’s highway and freight network.
     

    MIL OSI USA News

  • MIL-OSI Security: Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

    Source: United States Attorneys General 8

    Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

    A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

    According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

    “The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

    “As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

    “Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

    As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

    To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

    Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

    In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

    If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

    Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

    Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI