Category: Transport

  • MIL-OSI United Nations: Global experts meet in Sendai, Japan, to bridge knowledge and technology gaps in disaster risk reduction

    Source: UNISDR Disaster Risk Reduction

    Experts from around the world met in Sendai, Japan, on 8 March 2025 to explore how emerging and disruptive technologies can reshape disaster risk reduction (DRR) and resilience-building, particularly in the Global South. 

    The ‘Leveraging Emerging and Disruptive Technologies for Disaster Risk Reduction (DRR): Bridging Science, Technology, Academia, and Private Sector Nexus’ workshop, on the sidelines of the World Bosai Forum, brought together national and local governments, academia, the private sector, and financial institutions to overcome barriers and identify opportunities in integrating innovations such as AI, satellite systems, IoT, blockchain, and advanced analytics into DRR strategies. 

    The workshop emerged from to the Sendai Framework’s midterm review, which called on the DRR community to address persistent gaps in applying scientific and technological advances in disaster resilience efforts. 

    As disasters grow more complex, there’s a pressing need to ensure that countries, especially those most vulnerable, can access and use emerging technologies effectively, Sujit Mohanty, Chief of Intergovernmental, Interagency Cooperation and Partnerships at UNDRR, remarked during his opening remarks. 

    Mr Mohanty emphasised that while new tools are being rapidly developed, countries face challenges related to affordability, infrastructure, expertise, and cross-sector collaboration. Overreliance on untested technologies, he warned, may introduce new risks if not managed with care. 

    Real-world barriers and solutions 

    A highlight of the event was the roundtable discussion featuring speakers from Bangladesh, the Philippines, Mexico City, Sendai City, Japan’s private sector and academia. 

    Bangladesh’s representative, Mr Mohammad Nazmul Abedin, noted how the country has drastically reduced disaster-related deaths—from over 100,000 in 1991 to near zero in 2024—yet struggles to scale satellite-based flood monitoring and data-sharing mechanisms. He said the Bangladesh needs a national technology policy that integrates AI and blockchain, along with more investment and public-private partnerships. 

    Echoing similar constraints, Assistant Secretary Bernardo Rafaelito R. Alejandro IV of the Philippines outlined his country’s efforts, such as the GeoRisk platform and IoT-enabled early warning systems. Technology is part of the solution, but it must be paired with good governance, inclusive policies and international collaboration, he noted. 

    Sendai City showcased successful collaboration through initiatives like BOSAI-TECH—a public-private-academic platform fostering DRR innovation and technology commercialisation. Ms. Satoko Shibuya, Director at Sendai’s Disaster-Resilient and Environmentally Friendly City Promotion Office, explained that local partnerships have yielded practical tools like evacuation guidance drones and voice-enhanced disaster alerts. 

    Financing innovation and building trust 

    Speakers representing private sector participants discussed the financial and regulatory environments needed to bring DRR technologies to scale. Mr. Yoshiki Hiruma of the Development Bank of Japan shared insights into DRR-linked financing that rewards clients with reduced loan rates for resilience-building initiatives. He noted that risk financing must embrace a challenge mindset to support DRR innovation. 

    Mr. Shoichi Tateno, of Weathernews Inc., stressed the importance of mutual understanding and trust between governments and private weather service providers – particularly in countries where state meteorological services dominate the sector. He offered the inclusive platform approach of Japan’s Meteorological Service Act as a model of such trust. 

    Academia can offer reliable innovation and policy integration 

    Participants from academia stressed the need for adaptive governance and robust dialogue.  

    Professor Rajib Shaw of Keio University called for more systematic evaluation of successful DRR tech collaborations and piloting through initiatives like the upcoming Association of Pacific Rim Universities (APRU) DRR Innovation Hub. He pointed out that governments and technology developers operate at different speeds, and that it requires structure, trust, and experimentation in order to bridge that divide. 

    Professor Kimio Takeya of the Japan International Cooperation Agency (JICA) and Tohoku University said that while proven technologies remain essential for national governments, they must be extended with emerging tools that offer new ways to improve operations. He cited JICA’s Science and Technology Research Partnership for Sustainable Development (SATREPS) programme – which funds international research on disaster risk reduction – as a model for innovation grounded in collaboration. 

    A global partnership and a dedicated knowledge resource 

    In closing, Mr Mohanty said that UNDRR will facilitate Global Partnership on Emerging and Disruptive Technologies for Disaster Resilience which will foster long-term collaboration and ensure that the next wave of DRR innovation is inclusive, actionable, and globally accessible. 

    He remarked that the workshop had spotlighted the urgent need for a dedicated knowledge resource – one that captures good practices and deepens understanding of how emerging technologies are shaping the current DRR landscape.  

    Such a tool could bridge persistent gaps and drive more effective, widespread integration of innovation into disaster risk reduction efforts. 

    Read the full summary report on the workshop

    MIL OSI United Nations News

  • MIL-OSI Australia: Police seek intruders and ute at Paradise

    Source: New South Wales – News

    Police are investigating a break-in and theft at Paradise earlier this week and are looking for a white ute that was involved.

    About 7.15am on Monday 31 March, two men gained access to a garage in Darcy Court, Paradise through an open roller door.  They accessed cupboards and stole tools.

    The occupants of the house, about to leave for work, disturbed the intruders and chased them off.

    The men left in a white Mitsubishi ute, that had been parked in the street.  The ute had a red cage on the back.

    Anyone recognises the vehicle or who has any information, CCTV or dashcam footage that may assist the investigation is asked to contact Crime Stoppers on 1800 333 000 or online at www.crimestopperssa.com.au

    Reference 25-38M

    MIL OSI News

  • MIL-OSI Africa: Why was South Africa’s ambassador to the US expelled? A view of the Ebrahim Rasool affair

    Source: The Conversation – Africa – By Peter Vale, Senior Research Fellow, Centre for the Advancement of Scholarship, University of Pretoria., University of Pretoria

    In a rare move, the Trump administration expelled Ebrahim Rasool, South Africa’s ambassador to Washington, in mid-March 2025. In a post on X, US secretary of state Marco Rubio accused Rasool of hating the US and President Donald Trump, and said the ambassador was “no longer welcome in our great country”. The expulsion came after comments Rasool had made during a webinar organised by a South African think-tank, the Mapungubwe Institute for Strategic Studies. Rasool had said he thought that Trump was “mobilising a supremacism” and trying to “project white victimhood as a dog whistle” as the white population faced becoming a minority in the US.

    Relations between the two countries had reached a new low in the first weeks of the Trump administration. Trump had lashed out at South Africa for taking Israel to the International Court of Justice on accusations of genocide in Gaza; frozen all funding to South Africa; and offered asylum to white Afrikaners from South Africa, emboldening fringe far-right groups in the country. Peter Vale, regarded as an authority on South Africa’s place in the world, answers questions about the ambassador’s expulsion.

    What was your initial reaction to the Rasool appointment?

    I know and respect Ebrahim Rasool – we worked together at the University of the Western Cape 30 years ago – and I also thought he had done a fine job as ambassador to the US during the Obama years.

    Remember, his appointment under the Trump administration was announced a week after the November poll. Preparations for this would have been months in the making. So, one question was, did the South African government think Joe Biden would win? If so, they were not following the polls very closely. South Africa’s relations with the US under Biden, although at times testy, were managable and Rasool was familiar with the individuals responsible for their making.

    More importantly, both Rasool and the Department of International Relations and Cooperation seemed to ignore the ancient Greek philosopher Heraclitus’ warning:

    Never step into the same river twice, for it is not the same river, and he is not the same man.

    Politics in the US has changed in paradigmatic proportions since Obama.

    Then there was the fact that Rasool’s politics are rooted at the sharpest edge of the African National Congress: the United Democratic Front faction. Speaking plainly in the language of the country’s streets was the gift the United Democratic Front gave national politics. It was the most important internal anti-apartheid movement in the 1980s, bringing together youth, student and civic organisations.

    Nevertheless, this, the language of the heart (as we might call it), has been eclipsed by the rise of techno-speak of the 2020s – a language that consists of buzzwords, esoteric language, or technical jargon and has become a kind of diplo-speak: diplomatic language in which the careful use of euphemism and noncontroversial language obscures points that might cause contention. Both bedevil South Africa’s domestic politics and mute the country’s foreign policy because racial justice, gender equality and compensation for colonialism seemingly have no place in everyday political discourse.

    What happened at the Mapungubwe seminar?

    The fracas arose during a virtual seminar organised by a leading South African think-tank which discussed the deepening tension in the relations between Pretoria and Washington.

    The late South African politician Frederik van Zyl Slabbert, who was brilliant with words, used to distinguish between (what he called) a conspiracy and a cock-up. Sometimes, however, it can be a mix of both.

    I think that Rasool was confounded by the audience to which he spoke – was it local or was it local and foreign?

    If there was deceit in the gathering itself, this was not to Rasool’s account. This points instead to a journalist looking to trip up any position South Africa took in the matter seemingly to advance his career. This is said to be the Breitbart journalist Joel Pollack, who made no secret of his desire to be the US ambassador in South Africa. He was registered as “Anonymous” on the webinar call. He did not disclose his name, or profession, when he asked Rasool a question.

    In my opinion, disclosure is a professional responsibility.

    Interestingly, there is no indication that the meeting was operating under the well-known Chatham House Rule by which

    participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor any other participant, may be revealed.

    Although not without its critics, myself included, this rule binds participants to non-disclosure by creating a safe space for candid and honest discussion.

    Where does the responsibility of an ambassador lie?

    The consensus among observers and commentators that’s emerged since the expulsion is that it was Rasool’s responsibility to hold his tongue – a kind of golden rule in diplomacy.

    There is another way of thinking about this.

    There have been many cases where the professional responsibility of diplomatic representation should follow a higher standard than that set by the incumbent government.

    This choice faced diplomats in the country during apartheid. So, for instance, in 1986, the apartheid government expelled the Swedish ambassador following that country’s strong opposition to apartheid. There were other expulsions, too. These moves were part of the broader international pressure surrounding apartheid, where responsibility of the diplomats shifted from the minority incumbent government to the country’s people.

    However, most famously, this understanding emerged in the writing of Thomas Paine, the American pamphleteer, that Benjamin Franklin (then the ambassador of the fledgling United States to Paris) was “not the diplomat of a Court, but (that the Ambassador) represented MAN (KIND)”.

    This intervention is regarded as the first recognition that human – as opposed to state – rights enjoyed currency in international relations.

    The age of turbulence through which we live has further muddied this water.

    What do you make of the reaction to Rasool’s explusion?

    A cacophony of voices, both within and without the country, have debated the pros and cons of the American decision.

    Much has been predictable in content and source. Some garbled. Former South African president Thabo Mbeki was schoolmasterish during a lecture he gave following Rasool’s expulsion, but he reminded the country of the tremendous power that ambassadors had at hand.

    Of concern to those with an ethical interest in international relations was that the trope “the national interest” appeared again and again and that, as it did so, the form it took was economic. So, it is in the national interest that South Africa “grow the economy”, “create jobs” and “fight HIV” with American money.

    Nevertheless, le affaire Rasool has reminded South Africans that the country also has other “national interests” like fighting climate change and defending human rights worldwide.

    – Why was South Africa’s ambassador to the US expelled? A view of the Ebrahim Rasool affair
    – https://theconversation.com/why-was-south-africas-ambassador-to-the-us-expelled-a-view-of-the-ebrahim-rasool-affair-253640

    MIL OSI Africa

  • MIL-OSI: Bitget Secures El Salvador Digital Asset Service Provider (DASP) License After BSP Approval

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, April 04, 2025 (GLOBE NEWSWIRE) — Bitget, the leading cryptocurrency exchange and Web3 company, has obtained the Digital Asset Service Provider (DASP) license from El Salvador’s National Commission of Digital Assets (CNAD), expanding its regulatory framework within the country. This development comes after the earlier acquisition of the Bitcoin Services Provider (BSP) license in 2024. El Salvador is one of the pioneering jurisdictions passing comprehensive legislation supporting the integration of Bitcoin and digital assets into its financial ecosystem and acting as its official currency. It has started to emerge as a hub for global crypto businesses.

    With both the DASP and BSP licenses in place, Bitget gains the ability to offer a broad range of digital asset services within El Salvador. The DASP license covers operations such as spot and derivatives trading, staking, and other yield-based financial products alongside infrastructure that facilitates access to crypto-powered savings and investment solutions. Regulatory clarity in the region enables global platforms to expand under a well-defined legal structure, offering users a higher degree of operational transparency and institutional-grade safeguards.

    “Our focus at Bitget is to enter countries with a regulated framework for crypto and provide our best services as we expand on our global regulatory strategy,” said Hon Ng, Chief Legal Officer at Bitget. “We are thrilled to be able to offer an array of products through this license, and we are honored by the trust of El Salvador’s National Commission of Digital Assets. El Salvador has been ahead of many with its progressive and transparent approach to Bitcoin and digital asset regulation, making it an attractive jurisdiction for good quality Web3 companies aiming to operate responsibly at scale. Bitget will continue to support jurisdictions that offer clear frameworks and support the development of a secure, efficient crypto economy.”

    El Salvador’s regulatory environment has gained attention for attracting global crypto firms. Popular crypto entities have already relocated strategic operations to the country. Bitget’s licensing strategy aligns with this emerging shift and enables the platform to deliver its services without any disruption. This structure allows the platform to meet demand across both retail and institutional markets with greater legal and operational agility.

    The development reflects ongoing trends in jurisdictional competition among nations seeking to attract digital asset innovation. El Salvador’s CNAD has become increasingly active in evaluating and approving service providers, signaling broader regulatory maturity in the region. As firms navigate evolving global standards, Bitget’s licenses provide a bridge for cross-border growth and the ability to offer compliant financial products to its users worldwide.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 100 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin priceEthereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a world-class multi-chain crypto wallet that offers an array of comprehensive Web3 solutions and features including wallet functionality, token swap, NFT Marketplace, DApp browser, and more.

    Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    For more information, visit: WebsiteTwitterTelegramLinkedInDiscordBitget Wallet

    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/c3d0313a-2dcc-4a9f-b25c-150a8b077d28

    The MIL Network

  • MIL-OSI Video: Mine Action Day – Press Conference | United Nations

    Source: United Nations (Video News)

    Press Conference by Richard Boulter, Chief of Design, Operational Support and Oversight, UNMAS (in person); along with Edwin Faigmane, Chief of the Mine Action Programme in Nigeria (virtual), and Fatma Zourrig, Chief of the Mine Action Programme in Libya (virtual), ahead of the International Day for Mine Awareness and Assistance in Mine Action 2025.

    —————————————

    An investigation on the attack that happened against the UNOPS compound in Gaza on the 19th of March is underway, being led by the United Nations Department of Safety and Security, with UNOPS and UNMAS participating, according to the UN Mine Action Service.

    The United Nations Mine Action Service (UNMAS) officials briefed the reporters today (03 Apr) in New York ahead of the International Day for Mine Awareness and Assistance in Mine Action (04 Apr), under the theme “Safe Futures Start Here”. The UN mine action community brought attention to the progress made over the last year and the challenges that remain in countries around the world.

    Giving an update on Gaza, UNMAS’s Lee Woodyear said that the office is still working in the Strip, “we have six people there as of this morning,” adding that the office is doing the best to escort the United Nations missions that are taking place there.

    He stated that UNMAS escorted the mission that went to investigate the killing of the health workers in Gaza.

    For his part, Richard Boulter, UNMAS’s Chief of Design, Operational Support and Oversight told reporters, “Landmines, improvised explosive devices and unexploded ordnance continue to cause death and injury on a daily basis.”

    “On average, one person is killed or injured by such explosive devices every hour. Many children among the victims,” he stated.

    Boulter said, “The use of improvised explosive devices has expanded, terrorizing civilians and threatening humanitarian actors and the United Nations missions and personnel.”

    The senior UNMAS official stressed that building on the Pack of the Future, there’s need for funding micro and quick impact projects to address urgent needs of persons with physical disabilities affected by conflict.

    He said, “This initiative reinforces the global commitment to civilian protection and to scaling up technology and innovation capacities in developing countries.”

    Briefing the reporters via video link, Fatma Zourrig, Chief of the Mine, Action Programme in Libya reiterated, “every life lost or changed by explosive contamination, delays Libya recovery, undermines the stability on the ground.”

    She continued, “The threats range from anti-personnel and anti-vehicle mines to UXOs, IED and unsecured contamination. Libya’s vast ammunition storage area, many of which were damaged and destroyed, still hold hundreds of bunkers, some of which are unsecured and pose serious risk.”

    “Mine action in Libya is not just the technical task, it is a humanitarian and peace building in person. It is about saving lives, restoring confidence and enabling people to return home,” Zourrig highlighted.

    For his part, Edwin Faigmane, Chief of the Mine Action Programme in Nigeria said that his office has recorded the increasing use of IEDs in northwest Nigeria and in northeast Nigeria.

    “UNMAS is working with the Nigerian government to mitigate the risks from explosive ordnance. UNMAS deliveries basic education with national NGOs working across the region,” he added.

    Faigmane said that UNMAS is also working with the police and civil defense to deliver risk education areas that are not accessible by humanitarian actors, which is an initiative funded by the British Government.

    “In addition, UNMAS with funding from the Japanese government, is beginning to work with the police and civil defense through the newly established National Mine Action Center to train the first two humanitarian demining teams in the country,” he concluded.

    https://www.youtube.com/watch?v=2ynSop2RP1w

    MIL OSI Video

  • MIL-OSI United Kingdom: Minibuses donated to community groups

    Source: Scotland – City of Perth

    Last year, the Council agreed a new minibus disposal policy that offers community groups and sports clubs the opportunity to receive one of Perth and Kinross Council’s 17 minibuses at the end of their operational service period with the Council.

    This is only being offered on these assets based upon their prospective use by community groups.

    All the vehicles come with a minimum six-month MOT certificate and inspection report on its condition.

    The three groups receiving minibuses on Thursday are the Royal Voluntary Service, Perthshire Welfare Society and Mantalk.

    The Royal Voluntary Service will use their minibus to help vulnerable people attend more activities. The minibus will allow them to offer greater support to people who live further away from activities in Perth, Bridge of Earn, Crieff and surrounding villages.

    Perthshire Welfare Society will use their minibus to provide travel to those who do not qualify for free bus travel while Blairgowrie-based Mantalk will use theirs to support activities around mental health and wellbeing for men. They will also allow other groups in the Blairgowrie area, such as the local boxing club and over 35s football team, to use the bus.

    Councillor Grant Laing, leader of Perth and Kinross Council said: We are delighted to see these minibuses being put to such valuable use within our community.

    “By supporting groups like the Royal Voluntary Service, Perthshire Welfare Society, and Mantalk, we are helping to ensure that vital services and activities are accessible to everyone, regardless of their location or circumstances.

    “This fantastic initiative reflects our commitment to fostering a supportive and inclusive community and making best use of our resources.”

    Councillor Steven Carr added: “When I first discussed the idea of donating PKC minibuses to communities I was told that it would require a complete change of Council policy.

    “It’s great to see that the enthusiasm to make this positive change has resulted in that permanent policy change and it’s great to see the first official handover of minibuses to some excellent community led organisations, and  we look forward to hearing about how big a difference having the use of a minibus is making within our communities.”

    Terry Comiskey, chair of Mantalk said: “This is massive for us. It’s going to help open up ways to help people in the community.”

    Samaira Ali from the Perthshire Welfare Society said: “It will make a massive difference because a lot of people aren’t able to go out or can’t afford transport.

    “This will help people from all communities and I would like to say a massive thank you to Perth and Kinross Council.”

    David Reilly, service manager with the Royal Voluntary Service, said the organisation’s new minibus would help combat social isolation.

    He said: “We are absolutely delighted. We support the elderly in Perth and Kinross and organise outings once a year – this will let us do it once a week instead.”

    MIL OSI United Kingdom

  • MIL-OSI Asia-Pac: On the occasion of Ram Navami, PM to visit Tamil Nadu and inaugurate New Pamban Rail Bridge connecting Rameswaram to the mainland

    Source: Government of India

    On the occasion of Ram Navami, PM to visit Tamil Nadu and inaugurate New Pamban Rail Bridge connecting Rameswaram to the mainland

    PM to also lay the foundation stone and dedicate to the nation various rail and road projects worth over Rs 8,300 crore in Tamil Nadu

    PM to flag off Rameswaram-Tambaram (Chennai) new train service

    Posted On: 04 APR 2025 2:35PM by PIB Delhi

    Prime Minister Shri Narendra Modi will visit Tamil Nadu on 6th April. On the occasion of Ram Navami, at around 12 noon, he will inaugurate the new Pamban Rail Bridge – India’s first vertical lift sea bridge and flag off a train and a ship from the road bridge and witness the operation of the bridge.

    Thereafter at around 12:45 PM, he will perform darshan and pooja at Ramanathaswamy temple at Rameswaram. At around 1:30 PM in Rameswaram, he will lay the foundation stone and dedicate to the nation various rail and road projects worth over Rs 8,300 crore in Tamil Nadu. He will also address the gathering on the occasion.

    Prime Minister will inaugurate the New Pamban Rail Bridge and flag off Rameswaram-Tambaram (Chennai) new train service. The bridge carries a deep cultural significance. According to the Ramayana, the construction of Ram Setu was initiated from Dhanushkodi near Rameswaram.

    The Bridge, linking Rameswaram to the mainland, stands as a remarkable feat of Indian engineering on the global stage. It is built at a cost of over Rs 550 crore. It is 2.08 km in length, features 99 spans and a 72.5-metre vertical lift span that rises up to a height of 17 metres, facilitating smooth movement of ships while ensuring seamless train operations. Constructed with stainless steel reinforcement, high-grade protective paint, and fully welded joints, the bridge boasts increased durability and reduced maintenance needs. It is designed for dual rail tracks to accommodate future demands. A special polysiloxane coating protects it from corrosion, ensuring longevity in the harsh marine environment.

    Prime Minister will lay the foundation stone and dedicate to the nation various rail and road projects worth over Rs 8,300 crore in Tamil Nadu. These projects include foundation stone for four-laning of 28 Km long Walajapet – Ranipet section of NH-40 and dedication to the Nation of 4-laned 29 Km long Viluppuram – Puducherry section of NH-332; 57 Km long Poondiyankuppam – Sattanathapuram section of NH-32 and 48 Km long Cholapuram – Thanjavur section of NH-36. These highways will connect many pilgrim centres and tourist places, reduce distance between cities and enable faster access to Medical College and Hospital, Ports besides empowering local farmers to transport agricultural products to the nearby markets and boost economic activity of local leather and small scale industries.

     

    ***

    MJPS/SR

    (Release ID: 2118700) Visitor Counter : 85

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: List of Initiatives : Prime Minister’s participation in the 6th BIMSTEC SUMMIT

    Source: Government of India

    Posted On: 04 APR 2025 2:32PM by PIB Delhi

    Business

    * Establishment of BIMSTEC Chamber of Commerce.

    * Organization of BIMSTEC Business Summit every year.

    * Feasibility study on the possibilities of trade in local currency in the BIMSTEC region.

    IT

    * Pilot study to understand the needs of BIMSTEC countries to share the experience of Digital Public Infrastructure (DPI)

    * Connectivity between UPI and payment systems in the BIMSTEC region.

    Mitigation and Disaster Management

    * Establishing the BIMSTEC Centre of Excellence for Disaster Management in India to cooperate in disaster management, relief and rehabilitation.

    * Fourth joint exercises between BIMSTEC Disaster Management Authorities to be held in India this year.

    Security

    * Holding the first meeting of the Home Ministers’ Mechanism in India

    Space

    * Setting up ground stations for manpower training for BIMSTEC countries, manufacturing and launching of Nano Satellites, and use of remote sensing data.

    Capacity Building and Training

    * “BODHI”, i.e., “BIMSTEC for Organised Development of Human resource Infrastructure” initiative. Under this, 300 youth from BIMSTEC countries will be trained in India every year.

    * Scholarships to BIMSTEC students in the Forestry Research Institute of India and expansion of the scholarship scheme at Nalanda University.

    * Taining programme every year for young diplomats from BIMSTEC countries.

    * Tata Memorial Centre to support training and capacity building in cancer care in BIMSTEC countries.

    * Establishment of Centre of Excellence for research and dissemination in traditional medicine

    * Centre of Excellence in India for exchange of knowledge and best practices, research and capacity building for the benefit of farmers.

    Energy

    * BIMSTEC Energy Centre in Bengaluru has started working.

    * Faster work on electric grid interconnection.

    Youth engagement

    * BIMSTEC Young Leaders’ Summit to be held this year.

    * The BIMSTEC Hackathon and Young Professional Visitors programme will be launched.

    Sports

    * Holding ‘BIMSTEC Athletics Meet’ in India this year.

    * Hosting the first BIMSTEC Games in 2027

    Culture

    * BIMSTEC Traditional Music Festival to be held in India this year

    Connectivity

    * Establishment of Sustainable Maritime Transport Centre in India to work to enhance coordination in capacity building, research, innovation and maritime policies.

     

    ***

    MJPS/SR

    (Release ID: 2118698) Visitor Counter : 81

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Prime Minister participates in the 6th BIMSTEC Summit, Thailand

    Source: Government of India

    Posted On: 04 APR 2025 2:29PM by PIB Delhi

    Prime Minister Shri Narendra Modi today participated in the 6th BIMSTEC (Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation) Summit hosted by Thailand, the current chair. The theme of the Summit was – “BIMSTEC: Prosperous, Resilient and Open”. It reflected the priorities of the leaders and the aspirations of the peoples of the BIMSTEC region, as well as the efforts of BIMSTEC in ensuring shared growth in times of global uncertainties.

    Prime Minister began his address by offering condolences on the loss of lives in the devastating earthquake in Myanmar and Thailand. He thanked Prime Minister Shinawatra for successfully steering the Group. Highlighting BIMSTEC as a vital bridge between South Asia and South-East Asia, Prime Minister underlined that the Group had become an impactful platform for regional cooperation, coordination and progress. In this regard, he called for further strengthening the agenda and capacity of BIMSTEC.

    Prime Minister announced several India-led initiatives towards institution and capacity building in BIMSTEC. These include setting up of BIMSTEC Centres of Excellence in India on Disaster Management, Sustainable Maritime Transport, Traditional Medicine, and Research and Training in Agriculture. He also announced a new programme for skilling the youth – BODHI [BIMSTEC for Organized Development of Human Resource Infrastructure] under which training and scholarships would be provided to professionals, students, researchers, diplomats and others. He also offered a pilot study by India to assess regional needs in Digital Public Infrastructure and a capacity building programme for cancer care in the region. Calling for greater regional economic integration, Prime Minister offered to establish BIMSTEC Chamber of Commerce and to organize BIMSTEC Business Summit every year in India.

    Emphasizing on the need to build upon the historic and cultural ties that bring the region together, Prime Minister announced several initiatives to further strengthen people-to-people linkages. India would be hosting a BIMSTEC Athletics Meet this year and the first BIMSTEC Games in 2027 when the group celebrates its 30th anniversary. It would also host a BIMSTEC Traditional Music Festival. To bring the youths of the region closer, Prime Minister announced a Young Leaders’ Summit, a Hackathon and a Young Professional Visitors programme. The full list of initiatives announced by the Prime Minister may be seen here.

    The Summit adopted the following:

    i. Summit Declaration

    ii. BIMSTEC Bangkok Vision 2030 document, which lays out the road map for the collective prosperity of the region.

    iii. Signing of the BIMSTEC Maritime Transport Agreement, which provides for – National Treatment and assistance to vessels, crew and cargo; mutual recognition of certificates/ documents; Joint Shipping Coordination Committee; and dispute settlement mechanism.

    ⅳ. Report of the BIMSTEC Eminent Persons Group constituted to make recommendations for future direction for the BIMSTEC.

     

    ***

    MJPS/SR

    (Release ID: 2118696) Visitor Counter : 96

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Prime Minister’s meeting with Sr. Gen. Min Aung Hlaing, Chairman of State Administration Council on the sidelines of the BIMSTEC Summit

    Source: Government of India

    Posted On: 04 APR 2025 2:55PM by PIB Delhi

    Prime Minister Shri Narendra Modi met today with Senior General Min Aung Hlaing, Chairman of State Administration Council and Prime Minister of Myanmar, on the sidelines of the BIMSTEC Summit in Bangkok.

    The two leaders discussed the situation in the aftermath of the devastating earthquake in Myanmar, including India’s ongoing efforts under “Operation Brahma” to provide humanitarian aid, disaster relief and medical assistance to Myanmar. The Senior General expressed his gratitude for India’s assistance efforts. Prime Minister conveyed that, as the First Responder, India stands with Myanmar in this time of crisis and is ready to deploy more material assistance and resources if required.

    PM underlined the importance of early restoration of a democratic process through inclusive and credible elections, adding that India supported efforts aimed at fostering trust and advancing a Myanmar-owned and Myanmar-led transition towards a peaceful, stable and democratic future. Alluding to the human cost of the ongoing ethnic violence in Myanmar, PM underlined that there was no military solution to the conflict and stressed that enduring peace could only be achieved through an inclusive dialogue.

    Prime Minister appreciated the support extended by Myanmar for the rescue and repatriation of Indian nationals from cyber-scam centres along the Myanmar–Thailand border. Both sides agreed on the need to cooperate in addressing insurgent activities, transnational crimes and human trafficking along the India-Myanmar border.

    The two leaders also discussed the ongoing India-supported infrastructure development projects in Myanmar. Prime Minister underlined India’s readiness to support the developmental needs of all communities in Myanmar.

     

    ***

    MJPS/SR

    (Release ID: 2118719) Visitor Counter : 93

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Wagon Production Hits Record 41,929 Units in FY 2024-25, Marking a 11% YoY Growth and a Threefold Surge Over 2004-14 Average

    Source: Government of India

    Wagon Production Hits Record 41,929 Units in FY 2024-25, Marking a 11% YoY Growth and a Threefold Surge Over 2004-14 Average

    Total wagon production in the last three years reaches 1,02,369 units, boosting Railways’ freight capacity

    Freight bottlenecks to reduce significantly, enhancing coal, cement, and steel transport efficiency

    Increased rail freight capacity to cut fuel consumption, lower emissions, and curb logistics costs

    Aligned with India’s economic vision, bolstering industrial growth and trade competitiveness

    Posted On: 04 APR 2025 3:18PM by PIB Delhi

    Indian Railways has achieved a historic milestone in wagon production, reaching an all-time high of 41,929 wagons in FY 2024-25, surpassing the 37,650 wagons produced in FY 2023-24. This marks a remarkable leap from the annual average of 13,262 wagons produced between 2004-2014, showcasing a significant boost in manufacturing capacity and efficiency.

    This growth is expected to reduce freight bottlenecks and enhance Rail cargo movement. The numbers suggest a significant increase in the annual wagon production, highlighting the government’s vision of not only increasing domestic manufacturing but also improving its freight movement that will enhance convenience and also provide a major boost to the Indian economy, empowering India towards its goal of becoming an economic prowess.

    Period

    Production

    2004-2014 (Average)

    13,262

    2014-2024 (Average)

    15,875

    2022-2023

    22,790

    2023-2024

    37,650

    2024-2025

    41,929

    Total production in last three years

    1,02,369

    Economic Boost

    This surge in wagon production is expected to have a profound economic and environmental impact. With more wagons available, transport bottlenecks will be significantly reduced, ensuring faster cargo movement and improved efficiency for industries reliant on bulk transportation, such as coal, cement and steel. By reducing dependence on road freight, this shift will also lower fuel consumption and emissions, contributing to sustainability goals. Additionally, the improved efficiency in freight movement will help curb transportation costs, ultimately benefiting businesses and consumers by mitigating inflationary pressures.

    Strengthening India’s Industrial Sector

    As Indian Railways continues to expand its freight capacity, it is playing a crucial role in strengthening India’s industrial infrastructure and economic resilience. This growth aligns with India’s broader vision of boosting domestic manufacturing and trade competitiveness, reinforcing the country’s path toward becoming a global economic powerhouse.

    ****

    Dharmendra Tewari/Shatrunjay Kumar

    (Release ID: 2118737) Visitor Counter : 19

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Cabinet approves four multitracking projects across Indian Railways

    Source: Government of India

    Cabinet approves four multitracking projects across Indian Railways

    To enhance line capacity, Indian Railways plans to undertake four multitracking projects aimed to ensure seamless and faster transportation of both passengers and goods; These initiatives will improve travel convenience, reduce logistic cost, decrease oil imports and contribute to lower CO2 emissions, supporting sustainable and efficient rail operations

    The projects aim to enhance logistical efficiency by increasing the line capacity along the key routes for coal, iron ore, and other minerals; These improvements will streamline the supply chains, thereby contributing to accelerated economic growth

    The total estimated cost of the projects is Rs.18,658 crore and will be completed upto 2030-31

    The projects will also generate direct employment for about 379 lakh human-days during construction

    Posted On: 04 APR 2025 3:02PM by PIB Delhi

    The Cabinet Committee on Economic Affairs, chaired by the Prime Minister Shri Narendra Modi, has approved Four projects of Ministry of Railways with total cost of Rs. 18,658 crore (approx.). The Four projects covering 15 Districts in 3 States i.e., Maharashtra, Odisha, and Chhattisgarh will increase the existing network of Indian Railways by about 1247 Kms.

    These projects include:

    1. Sambalpur – Jarapda 3rd and 4th Line                             
    2. Jharsuguda – Sason 3rd and 4th Line                      
    3. Kharsia – Naya Raipur – Parmalkasa 5th and 6th Line     
    4. Gondia – Balharshah doubling    

    The enhanced line capacity will improve mobility, providing enhanced efficiency and service reliability for Indian Railways. These multi-tracking proposals will ease operations and reduce congestion, providing the much-required infrastructural development on the busiest sections across Indian Railways. The projects are in line with the Prime Minister Shri Narendra Modiji’s Vision of a New India which will make people of the region “Atmanirbhar” by way of comprehensive development in the area which will enhance their employment/ self-employment opportunities.

    The projects are result of PM-Gati Shakti National Master Plan for multi-modal connectivity which have been possible through integrated planning and will provide seamless connectivity for movement of people, goods and services.

    With these projects 19 New Stations will be constructed, enhancing connectivity to Two Aspirational Districts (Gadchiroli and Rajnandgaon). Multi-tracking project will enhance connectivity to approx. 3350 villages and about 47.25 lakh population.

    Kharsia – Naya Raipur – Parmalkasa will provide direct connectivity to new areas such as Baloda Bazar, this will create possibilities for setting up of new industrial units including cement plants in the region.

    These are essential routes for transportation of commodities such as agriculture products, fertilizer, coal, iron ore, steel, cement, limestone etc. The capacity augmentation works will result in additional freight traffic of magnitude 88.77 MTPA (Million Tonnes Per Annum). The Railways being environment friendly and energy efficient mode of transportation, will help both in achieving climate goals and minimizing logistics cost of the country, reduce oil import (95 Crore Litres) and lower CO2 emissions (477 Crore Kg) which is equivalent to plantation of 19 Crore trees.

    ***

    MJPS/SKS

    (Release ID: 2118723) Visitor Counter : 145

    MIL OSI Asia Pacific News

  • MIL-OSI: SafeCard Reviews [Urgent Update]: Read This Before Buying!

    Source: GlobeNewswire (MIL-OSI)

    WOODHAVEN, N.Y., April 04, 2025 (GLOBE NEWSWIRE) — In 2025, searches for terms like “SafeCard reviews,” “SafeCard consumer reports,” and “best RFID & NFC blockers” are surging as more people seek clarity on SafeCard’s effectiveness, safety, and overall value. With the rise of digital threats, consumers are asking: Is SafeCard worth the investment? Does it truly protect against RFID and NFC skimming? In this detailed SafeCard review, we’ll dive into its features, benefits, and real-world performance to help you decide.

    SafeCard RFID Blocking Card Reviews

    SafeCard: My Experience with This Game-Changing RFID Protector

    I used to carry a wallet stuffed with credit and debit cards, constantly worrying about the risk of RFID skimming and digital theft. That all changed when I discovered SafeCard. This sleek, lightweight RFID-blocking card has transformed how I think about data security, offering effortless protection for my sensitive financial and personal information—all in a stylish package.

    What sets SafeCard apart is its advanced RFID-blocking technology, which effectively prevents unauthorized scanning of contactless cards. To put it to the test, I visited one of the busiest shopping malls, filled with contactless payment terminals. The result? Zero interference. SafeCard delivered on its promise, shielding my data like no other product I’ve tried.

    SafeCard Reviews: Why It’s the Best RFID & NFC Blocker in 2025

    All over Canada, The Uk, Australia, New Zealand and the United States, customers have consistently praised SafeCard for its top-tier RFID protection.

    Its ease of use and affordability is another driving force behind its numerous 4.95 star rating, SafeCard is recognized as one of the most reliable RFID protective device on the market.

    Many SafeCard reviews highlight:
    ✔ Superior RFID & NFC blocking technology
    ✔ Affordable pricing compared to competitors
    ✔ Compact, travel-friendly design
    ✔ Trusted by thousands across the US, UK, Canada & Australia

    SafeCard Consumer Reports: The #1 RFID & NFC Blocker in the US, UK & Canada

    According to numerous sources (online surveys, polls and websites) SafeCard is one of thebest RFID and NFC blockers of 2025 in multiple countries. These include the United States, Canada, UK, Australia and New Zealand.

    After a month of consistent use, I can confidently say I made the right choice with this product. It is proven, reliable and a hassle free way to protect your credit cards, debit cards and ID from Digital theft.

    If you are looking for the best RFID and NFC blocker in 2025? Then read on, SafeCard just might be your best bet.

    What Is SafeCard? (SafeCard Reviews)

    SafeCard is a credit-card shaped device that fits perfectly into your wallet. It is made of a special material that blocks RFID scanners. It is basically a shield for your credit cards in your wallet.

    This innovative technology makes it almost impossible for digital thieves or skimming devices to steal your sensitive information and with the rise of contactless payments and smart cards, this risk has never been higher.

    SafeCard is equipped with advanced RFID and NFC blocking technology. It shields your credit cards, debit cards and ID cards from unauthorized scanners

    Users praise Safe Card for its durability, ease of use and sleek design. Better yet, Safecard doesn’t require batteries, charging or maintenance.

    It is hassle free and reliable and fits right into your daily life.

    Why SafeCard Stands Out (SafeCard Customer Reviews)

    Electronic theft is on the rise in our modern-day technological age, and thieves are resorting to highly advanced methods and devices to rob the unsuspecting public.

    SafeCard is like your 24/7 silent guardian, providing peace of mind while shopping, traveling, or just being out and about.
    The **sleek and slim design** ensures that it does not take up any extra space in your wallet, a convenient choice for any person who cares about security and privacy.

    The majority of SafeCard user reviews call it a very effective product for stopping unauthorized scanning and securing sensitive personal data.

    They love its next-generation look, value, and reliability; it is a must-have for any user who wishes to secure his personal and financial details.

    As more and more digital threats rise, SafeCard has been a trusted protector against identity theft, financial scams, and unauthorized access to data.

    The Growing Need for SafeCard

    Every minute without SafeCard is a gamble.

    Thieves are everywhere, eager and ready to steal financial information from unsuspecting folks. Busy places like malls, subways and airports are notorious for RFID skimmers. Don’t wait until it’s too late, take responsibility for your safely today with SafeCard

    What Are the Features of SafeCard? (SafeCard Reviews)

    SafeCard is an advanced security solution in a sleek modern design, that is exceptionally good at protecting your personal details.

    Filled with innovative features inside, the SafeCard changes how you do your data security from modern digital threats. That said, let’s further review what customers consider special with the SafeCard, according to the SafeCard customer reviews that follow:

    1. Advanced RFID-Blocking Technology
    Equipped with advanced RFID-blocking technology, SafeCard prevents any unauthorized attempts to wirelessly scan your sensitive data. It safeguards credit cards, ID cards, and other RFID-enabled items from the most common skimming techniques used by identity thieves. Whether you’re in a crowded subway or a bustling shopping mall, SafeCard ensures your information remains secure.

    2. Slim and Lightweight Design
    One of the fan-favorite features of safeCard is the fact that it is slim and light weight. It seamlessly integrates into your waller and current card collection, never taking up additional space or making your wallet/purse bulky.

    This make it a perfect product for daily use

    3. Durability and High-Quality Materials
    It is made with the highest grade materials, built to last. Even when used frequently, it can last for years unlike flimsy alternatives.

    Safcard won’t degrade overtime. Its quality assurance is a common theme amongst customers that have purchased Safe card.

    4. Effortless Protection
    SafeCard simplifies security—no batteries, charging, or complicated setup needed. Just place it in your wallet to instantly block RFID signals. With effortless plug-and-play functionality, it provides round-the-clock protection with zero extra effort.

    5. Universal Compatibility
    It works on 99% of all cards. We’re talking ID cards, debit cards, credit cards even a hotel key.
    SafeCard is compatible with most RFID enabled cards and secures all your personal information wherever you go.
    SafeCard has got you covered to keep your data out of harm’s way from any unwanted electronic intrusions.

    CLICK HERE TO BUY YOUR SAFECARD FROM THE OFFICIAL WEBSITE AT A MASSIVE DISCOUNT TODAY

    Why SafeCard’s Features Matter (SafeCard Reviews)

    In an era of ever-evolving digital threats, SafeCard provides a robust solution to safeguard your information.

    By merging cutting-edge technology with a sleek, user-friendly design, it stands out as the ideal choice for anyone looking to enhance their personal security. More than just a protective tool, SafeCard is an essential everyday accessory—just as countless reviews affirm.

    How Does SafeCard Actually Work? (SafeCard Reviews)

    RFID and NFC scanning is a common tactic among criminals who steal personal data from your credit, debit or ID cards.

    SafeCard is designed to provide seamless protection agains these attacks but how exactly does it achieve this, we’re going to explain it here.

    The Science Behind SafeCard Protection

    At the heart of SafeCard’s functionality is advanced RFID-blocking technology. RFID, or Radio Frequency Identification, enables seamless, contactless communication between devices, cards, and scanners. While this makes transactions and data access more convenient, it also leaves your information vulnerable to unauthorized access. With a simple portable RFID scanner, thieves can easily steal your card data without you even realizing it.

    How does SafeCard solve this problem?
    It solves this by creating a protective shield around your cards.
    Safe Card is made with a specialized metal alloy, and this creates a Faraday cage effect that blocks RFID scanners from reading your cards without consent.

    This effectively blocks criminals from accessing your sensitive information, even if they’re standing nearby with a skimming device.

    NFC Protection for Modern Threats
    In addition to RFID protection, SafeCard also blocks NFC (Near Field Communication) signals used in modern payment systems like Apple Pay and Google Wallet. By neutralizing these signals, it provides comprehensive protection against all forms of electronic pickpocketing.

    Ease of Use – Hassle-Free Security
    Users consistently praise SafeCard for its simplicity. With no batteries, setup, or maintenance required, it works instantly—just place it in your wallet or cardholder, and you’re protected. Its slim, lightweight design ensures it won’t take up extra space, making it a practical and convenient addition to your everyday essentials.

    Silent, Reliable Protection
    It works excellently in the background, providing protection 24/7 without any conscious effort on your part.

    Whether you’re traveling, shopping, or commuting, SafeCard protects your data from unauthorized scans and potential theft. Its perfect blend of security and convenience has earned widespread praise and glowing testimonials from users around the world.

    CLICK HERE TO BUY YOUR SAFECARD FROM THE OFFICIAL WEBSITE AT A MASSIVE DISCOUNT TODAY

    Why SafeCard’s Technology Matters (SafeCard Reviews)

    This device is like a silent guardian that keeps your data safe wherever you go.
    With the widespread occurrence of digital theft, the peace of mind safe card will give you is immeasurable.

    Its capability for blocking RFID and NFC signals alike makes it a must-have device for anyone who takes his or her privacy and security seriously

    How to Use SafeCard (SafeCard Consumer reports)

    Using SafeCard to protect your personal details is as easy as ABC.
    You don’t need to be a tech expert or have any extra knowledge to protect yourself form RFID skimming scams.
    In fact, Safecard is so ridiculously simple to use that you might be surprised.

    Here is how it works.
    Step 1 – Place SafeCard in your wallet or Card holder
            Simply insert your SafeCard into your wallet, cardholder or purse. Due to its slim and light weight design, it can easily fit into most wallets and purses.

    Step 2 – Enjoy peace of mind
            That’s basically it, enjoy peace of mind and know your cards are protected from RFID skimming events.
    You see, SafeCard works passively, its basically like a helmet for your cards, so once its in your wallet, it will shield your contact less credit cards.

    CLICK HERE TO BUY YOUR SAFECARD FROM THE OFFICIAL WEBSITE AT A MASSIVE DISCOUNT TODAY

    Why SafeCard’s Ease of Use Stands Out (SafeCard Reviews)

    A standout feature frequently mentioned in SafeCard reviews is its ease of use and reliability. Unlike traditional security solutions that demand installation, battery replacements, or ongoing upkeep, SafeCard delivers instant protection with zero hassle.

    Its modern, compact design and effortless functionality make it a top choice for individuals who prioritize both convenience and security.

    With numerous positive customer testimonials, this device is an essential tool for safeguarding personal information in today’s digital landscape.

    CLICK HERE TO BUY YOUR SAFECARD FROM THE OFFICIAL WEBSITE AT A MASSIVE DISCOUNT TODAY

    Pros (SafeCard Reviews)

    SafeCard has been taking over the internet lately because of the amount of positive reviews it has been able to garner, its boasts a slew of pros which we will discuss below;

    Effective RFID blocking tech – The best option in the market for its price point, SafeCard is affordable and offers top-notch personal protection.

    Affordable Price point – Priced appropriately so it is easily accessible to all, more info on the pricing is further down below.

    Easy to use and Hassle-Free – Very easy and straightforward to use, just insert it in your wallet and you’re good to go.

    Compact and slim design – Its ultra-slim and lightweight design effortlessly slips into your wallet or purse without adding any extra bulk.

    Offers constant protection against identity theft – Safeguards your personal information 24/7, even in busy or high-risk environments.

    Lightweight and portable for daily use – Its portable design makes it easy to carry everywhere you go.

    Cons (SafeCard Reviews)

    Requires Careful handling – Damage to SafeCard can compromise its integrity and reduce its ability to effectively protect you.

    Protection Scope – Effectively shields against RFID and NFC skimming threats but does not safeguard against other online risks like phishing scams.

    Limited Availability – Can only be purchased from its online website.

    Where to Buy the Original SafeCard (SafeCard Reviews)

    You should only purchase SafeCard from their official website, to prevent accidentally purchasing a counterfeit product.
    Avoid purchasing from third party platforms or resellers, counterfeit products do not offer the highest form of protection.

    As an additional bonus we have partnered with the official site and will be able to offer you some discounts there directly, just click on any of the links in this article to take advantage of these discounts.

    SafeCards Pricing: (SafeCards Reviews)

    How much is your peace of mind and how much is your funds security worth to you?

    That is the main question you need to ask yourself before thinking about the price.
    If you have $10,000 in your bank account, would it be out of place to spend $500 protecting it?

    Luckily you don’t have to cough up anywhere close to $500 to protect yourself from RFID skimming.

    The SafeCard comes in packs of 3 and initially cost $102.

    However if you buy through any of our discount links provided throughout this article you will be able to get a pack of 3 for just $45.99!

    That boils down to just $15.33 for one SafeCard.

    Our discount expires soon, so take advantage of it while it lasts.

    CLICK HERE TO BUY YOUR SAFECARD FROM THE OFFICIAL WEBSITE AT A MASSIVE DISCOUNT TODAY

    Each purchase comes with a 30-day money-back guarantee, allowing you to try the SafeCard risk-free. If you’re not fully satisfied within the first month, you can return it for a full refund, making it a no-risk investment for enhancing your security.

    SafeCard Frequently Asked Questions (FAQs) (SafeCard Reviews)

    What is SafeCard used for?
    SafeCard is used to protect your credit cards and debit cards from RFID skimming. It is intended to give you another layer of security and peace of mind when you’re up and about.

    Rfid skimmers are devices that work the same way as contactless point of sale device when you go shopping, meaning you can have your funds stolen from you, all the perpetrator needs to do is stay close enough to you for a few seconds.

    This is more common in busy venues, queues etc, however, having a SafeCard in your wallet acts as a protect shield as this device scrambles Rfid devices when they try to skim information off your card.

    Can I reuse my safecard?
    Absolutely! Simply place the SafeCard in your wallet, and you’re all set. No additional steps are required, and it remains effective for up to five years.

    How does an RFID protector work?
    An RFID protector, such as SafeCard works by creating a passive barrier (due to the special materials it is made from ) that block or scramble the radio waves emitted by RFID tags, preventing unauthorized readers from accessing the information stored on the contactless cards next to it, so for it to work effectively, you just need to place it in your wallet with your other cards.
            
    Are SafeCards difficult to use
    No they are not, all you need to do is have it in your wallet with your other cards and it does its job of shielding them from RFID skimmers

    Can Safecards be used internationally
    Yes, they can be used anywhere in the globe, there is no geographical restrictions.

    How long does SafeCard last?
    5 years

    Are there any subscription fees?
    No there is none

    SafeCard Reviews Consumer Reports

    “While traveling through Rio, I discovered my bank account had been drained by scammers. I was devastated. A fellow traveler recommended SafeCard, and it’s been a lifesaver ever since. No more stolen data, no more stress. Now I can travel with confidence knowing my wallet is secure.”

    Melissa H – I love going to holiday markets, but after watching my friend lose hundreds to a scammer, I knew I needed protection. SafeCard blocks thieves silently, and I haven’t had an issue since. It’s the best purchase I’ve made for my security!”

    Hannah – I’ve had my cards skimmed in airports twice, and it was terrifying. Since using SafeCard, I finally feel safe while traveling. It’s lightweight, discreet, and has stopped several attempted scans already.”

    Conclusion For SafeCard Review

    In today’s day and age, it is so easy to fall victim to cybercriminals, RFID skimming is on the rise at an alarming rate, all a criminal has to do is stay within a few feet of you for up to a minute and they are able to siphon funds off your credit card.

    How easy is that for the criminals, especially when you are in crowded areas like the subway or a mall.

    With SafeCard you can eliminate that risk and rest easy at night knowing your funds are safe.

    Its RFID blocking technology means you can rest easy knowing you won’t ever fall victim to a scam that is rampant in society today.

    However, should you get it?

    Is it a right fit for you?

    If you want to eliminate the possibility of cybertheft through credit card skimming and other kinds of cybertheft then SafeCard is your best bet.

    CLICK HERE TO BUY YOUR SAFECARD FROM THE OFFICIAL WEBSITE AT A MASSIVE DISCOUNT TODAY

    Media Contact:
    Name: David Mark
    Email: support@safecardshield.com
    Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/477cb65e-c680-499e-a698-922248eac853

    https://www.globenewswire.com/NewsRoom/AttachmentNg/6788d20d-7f0d-466b-b191-9a34726c7cfb

    https://www.globenewswire.com/NewsRoom/AttachmentNg/782a655b-d89c-4e67-8fcd-e168a8fc33a4

    https://www.globenewswire.com/NewsRoom/AttachmentNg/b58a86bf-9039-4aac-89e5-0d922801f863

    https://www.globenewswire.com/NewsRoom/AttachmentNg/df1ed7f4-f511-49ef-b1aa-d59b1c1b6069

    The MIL Network

  • MIL-Evening Report: NZ’s refreshingly candid ex-envoy Phil Goff – why I spoke out on Trump

    Now that Phil Goff has ended his term as New Zealand’s High Commissioner to the UK, he is officially free to speak his mind on the damage he believes the Trump Administration is doing to the world. He has started with these comments he made on the betrayal of Ukraine by the new Administration.

    By Phil Goff

    Like many others, I was appalled and astounded by the dishonest comments made about the situation in Ukraine by the Trump Administration.

    As one untruthful statement followed another like something out of a George Orwell novel, I increasingly felt that the lies needed to be called out.

    I found it bizarre to hear President Trump publicly label Ukraine’s leader Volodymyr Zelenskyy a dictator. Everyone knew that Zelenskyy had been democratically elected and while Trump claimed his support in the polls had fallen to 4 percent it was pointed out that his actual support was around 57 percent.

    Phil Goff speaking as Auckland’s mayor in 2017 on the nuclear world 30 years on . . . on the right side of history. Image: Pacific Media Centre

    Trump made no similar remarks or criticism of Russia’s Vladimir Putin and never does. Yet Putin’s regime imprisons and murders his opponents and suppresses democratic rights in Russia.

    Then Trump made the patently false accusation that Ukraine started the war with Russia. How could he make such a claim when the world had witnessed Russia as the aggressor which invaded its smaller neighbour, killing thousands of civilians, committing war crimes and destroying cities and infrastructure?

    That President Trump could lie so blatantly is perhaps explained by his taking offence at Zelenskyy’s refusal to comply with unreasonable and self-serving demands such as ceding control of Ukraine’s mineral wealth to the US. What was also clear was that Trump was intent on pressuring Ukraine to capitulate to Russian demands for a one sided “peace settlement” which would result in neither a fair nor sustainable peace.

    It is astonishing that the US voted with Russia and North Korea in the United Nations against Ukraine and in opposition to the views of democratic countries the US is normally aligned with, including New Zealand.

    Withdrew satellite imaging
    It then withdrew satellite imaging services Ukraine needed for its self defence in an attempt to further pressure Zelenskyy to agree to a ceasefire. No equivalent pressure has yet been placed on Russia even while it has continued its illegal attacks on Ukraine.

    Trump and Vance’s disgraceful bullying of Zelenskyy in the White House as he struggled in his third language to explain the plight of his nation was as remarkable as it was appalling.
    What Trump was doing and saying was wrong and a betrayal of Ukraine’s struggle to defend its freedom and nationhood.

    Democratic leaders around the world knew his comments to be unfair and untrue, yet few countries have dared to criticise Trump for making them.

    Like the Hans Christian Anderson fairy tale, everyone knew that the emperor had no clothes but were fearful of the consequences of speaking out to tell the truth.

    As New Zealand’s High Commissioner to the UK, I had on a number of occasions met and talked with Ukrainian soldiers being trained by New Zealanders in Britain. It was an emotionally intense experience knowing that many of the men I met with would soon face death on the front line defending their country’s freedom and nationhood.

    They were extremely grateful of New Zealand’s unwavering support. Yet the Trump Administration seemed to care little for that country’s cause and sacrifice in defending the values that a few months earlier had seemed so important to the United States.

    The diplomatic community in London privately shared their dismay at Trump’s treatment of Ukraine. The spouse of one of my High Commissioner colleagues who had been a teacher drew a parallel with what she had witnessed in the playground. The bully would abuse a victim while all the other kids looked on and were too intimidated to intervene. The majority thus became the enablers of the bully’s actions.

    Silence condoning Trump
    By saying nothing, New Zealand — and many other countries — was effectively condoning and being complicit in what Trump was doing.

    It was in this context, at the Chatham House meeting, that I asked a serious and important question about whether President Trump understood the lessons of history. It was a question on the minds of many. I framed it using language that was reasonable.

    The lesson of history, going back to the Munich Conference in 1938, when British Prime Minister Chamberlain and his French counterpart Daladier ceded the Sudetenland part of Czechoslovakia to Hitler, was clear.

    Far from satisfying or placating an aggressor, appeasement only increases their demands. That’s always the case with bullies. They respect strength, not weakness.

    Czechoslovakia could have been part of the Allied defence against Hitler’s expansionism but instead it and the Czech armaments industry was passed over to Hitler. He went on to take over the rest of Czechoslovakia and then invaded Poland.

    As Churchill told Chamberlain, “You had the choice between dishonour and war. You chose dishonour and you will have war.”

    The question needed to be asked because Trump was using talking points which followed closely those used by the Kremlin itself and was clearly setting out to appease and favour Russia.

    A career diplomat, trained as a public servant to be cautious, might have not have asked it. I was appointed, with bipartisan support, not as a career diplomat but on the basis of political experience including nine years as Foreign, Trade and Defence Minister.

    Question central to validity, ethics
    “The question is central to the validity as well as the ethics of the United States’ approach to Ukraine. It is also a question that trusted allies, who have made sacrifices for and with each other over the past century, have a right and duty to ask.

    The New Zealand Foreign Minister’s response was that the question did not reflect the view of New Zealand’s Government and that asking it made my position as High Commissioner untenable.

    The minister had the prerogative to take the action he did and I am not complaining about that for one moment. For my part, I do not regret asking the question which thanks to the minister’s response subsequently received international attention.

    Over the decades New Zealand has earned the respect of the world, from allies and opponents alike, for honestly standing up for the values our country holds dear. The things we are proudest of as a nation in the positions we have taken internationally include our role as one of the founding states of the United Nations in promoting a rules-based international system including our opposition to powerful states exercising a veto.

    They include opposing apartheid in South Africa and French nuclear testing in the Pacific. We did not abandon our nuclear free policy to US pressure.

    In wars and in peacekeeping we have been there when it counted and have made sacrifices disproportionate to our size.

    We have never been afraid to challenge aggressors or to ask questions of our allies. In asking a question about President Trump’s position on Ukraine I am content that my actions will be on the right side of history.

    Phil Goff, CNZM, is a New Zealand retired politician and former diplomat. He served as leader of the Labour Party and leader of the Opposition between 11 November 2008 and 13 December 2011. Goff was elected mayor of Auckland in 2016, and served two terms, before retiring in 2022. In 2023, he took up a diplomatic post as High Commissioner of New Zealand to the United Kingdom, which he held until last month when he was sacked by Foreign Minister Winston Peters over his “untenable” comments.

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI United Kingdom: Derby parks are spring-ready thanks to improvements

    Source: City of Derby

    Work to upgrade footpaths in parks across the city has been completed in time for spring. Visitors to Chaddesden Park, Alvaston Park, Allestree Park, South Avenue Park and Gravel Pit Lane Recreation Ground in Spondon will enjoy a better experience as a result of the improvements.

    The new smoother paths have been designed to make the parks more accessible and ensure that everyone can enjoy the benefits of the city’s green spaces as the weather improves. 

    At Chaddesden Park, the main footpath connecting the library, the café and the play area, has been widened and resurfaced. At Alvaston Park, an upgrade of the well-used path between the park and Lakeside Primary School has made the route much more accessible, while improvements have also been made to paths at Allestree Park.

    South Avenue Park and Gravel Pit Lane Recreation Ground have also had their paths revamped, while the entrance from South Avenue has been improved and new railings installed to create a more welcoming and accessible entry point. 

    Alongside the various path upgrades, the entrances to Chaddesden Wood Local Nature Reserve have been improved to make them more accessible, thanks to Section 106 funding for the site. Visitors may have noticed new signs at three of the entrances, with the main signage to be installed in the coming months. 

    The owl sculpture at Chaddesden Wood

    Two new benches have been installed by the Friends of Chaddesden Wood with six more due to be installed soon. The wood also has an amazing new wooden sculpture of an owl and a cheeky mouse near the Diamond Drive entrance. It joins the family of hedgehogs and juicy worm sculptures installed in 2024. 

    The animals were carved by the talented Derbyshire wood sculptor Andrew Frost from a selection of sustainable British timber.

    Councillor Ndukwe Onuoha, Derby City Council Cabinet Member for Streetpride, Public Safety and Leisure, said:

    We’re so fortunate to have so many parks and green spaces in our city and we want as many people as possible to be able to enjoy them. Improving the footpaths to make our parks more accessible means everyone can enjoy the benefits of the outdoors, while the developments at Chaddesden Wood will improve visitors’ experience.

    Spending time in nature has positive effects on our physical and mental wellbeing, so we hope the improvements we’ve made will encourage more people to visit their local park or green space.

    Find more information about our parks on the Derby Parks website.

    MIL OSI United Kingdom

  • MIL-OSI Europe: Spain: EIB and Aragón regional government sign €234 million loan financing projects to back the green and digital transition, small businesses, innovation, jobs and rural development

    Source: European Investment Bank

    • The Aragón regional government will use this loan to co-finance investments under European regional development funds.
    • The investments will go to various projects to offer more public services, promote the dual green and digital transition, innovation, business competitiveness, employability and economic development in rural areas affected by depopulation.
    • The loan will make it possible to finance specific projects for the province of Teruel with a focus on the energy transition and environmental sustainability, entrepreneurship, social infrastructure and more.
    • The agreement will make a significant contribution to climate action and economic, social and territorial cohesion, two of the EIB Group’s strategic priorities.

    The European Investment Bank (EIB) has signed a €234 million loan with the government of the Spanish region of Aragón to co-finance investments promoting the dual green and digital transition, boosting the competitiveness of local industry, helping to provide better public services and supporting economic development in rural areas at risk of depopulation. This is the first tranche of a loan totalling €260 million approved by the EIB.

    The loan will co-finance diverse projects including transferring knowledge in advanced technologies to businesses in Aragón; the One Health Teruel health biotechnology project; the reuse of local waste and decontamination of land affected by lindane use; improved energy efficiency in public healthcare and educational buildings in Aragón; and local social employment and active inclusion initiatives.

    The finance contract falls under the EU regional development and cohesion funds operational programme for 2021-2027 and will channel financing from the European Regional Development Fund (ERDF), the European Social Fund Plus (ESF+) and the Just Transition Fund.

    The EU Just Transition Fund aims to support regions facing serious socioeconomic challenges in transitioning to climate neutrality. Here, its financing will focus on the province of Teruel, funding projects in green industrial transformation, sustainable mobility, the circular economy, energy efficiency, renewable energy (including self-consumption, energy storage and green hydrogen), support for small and medium-sized enterprises (SMEs) and entrepreneurs, research, development and innovation (RDI), digitalisation, environmental restoration and conservation, sustainable tourism and social infrastructure, among other things.

    This agreement highlights the commitment of the European Investment Bank Group (EIB Group) to climate action and economic, social and territorial cohesion, two of the eight core priorities outlined in the Group’s Strategic Roadmap for 2024-2027.

    Background information  

    EIB 

    The European Investment Bank (ElB) is the long-term lending institution of the European Union, owned by its Member States. Built around eight core priorities, we finance investments that contribute to EU policy objectives by bolstering climate action and the environment, digitalisation and technological innovation, security and defence, cohesion, agriculture and bioeconomy, social infrastructure, high-impact investments outside the European Union, and the capital markets union.  

    The EIB Group, which also includes the European Investment Fund (EIF), signed nearly €89 billion in new financing for over 900 high-impact projects in 2024, boosting Europe’s competitiveness and security.  

    All projects financed by the EIB Group are in line with the Paris Climate Agreement, as pledged in our Climate Bank Roadmap. Almost 60% of the EIB Group’s annual financing supports projects directly contributing to climate change mitigation, adaptation, and a healthier environment.  

    Fostering market integration and mobilising investment, the Group supported a record of over €100 billion in new investment for Europe’s energy security in 2024 and mobilised €110 billion in growth capital for startups, scale-ups and European pioneers. Approximately half of the EIB’s financing within the European Union is directed towards cohesion regions, where per capita income is lower than the EU average.

    High-quality, up-to-date photos of our headquarters for media use are available here.

    MIL OSI Europe News

  • MIL-OSI Europe: Sweden: EIB finances ground-breaking carbon capture plant in Stockholm

    Source: European Investment Bank

    • Project to capture CO2 volumes corresponding to more than the emissions of all of Stockholm’s road traffic in one year
    • This is EIB’s first carbon capture financing operation and part of climate strategy
    • Investment contributes to Sweden’s goal of net zero emissions by 2045

    The European Investment Bank (EIB) has granted a loan of €260 million to Stockholm Exergi for the construction of Sweden’s first large-scale bioenergy plant with carbon capture and storage (BECCS).

    Beccs Stockholm, which will begin construction at Värtaverket, is expected to be fully operational in 2028 and is projected to capture up to 800,000 tonnes of carbon dioxide per year. The captured carbon dioxide corresponds to more than the total emissions from Stockholm’s road traffic during a year. The technology is based on the separation, liquefaction and permanent storage of biogenic carbon dioxide from the combustion of biofuels – resulting in so-called negative emissions.

    After capture, the carbon dioxide will be temporarily stored and then shipped to Norway where it will be permanently stored in the bedrock under the North Sea. This is done in collaboration with the Northern Lights project, a joint venture between Equinor, Shell and TotalEnergies.

    This is the first CCS project to be financed by the EIB and an important contribution to achieving the world’s climate goals and establishing negative emissions as a new global industry. There is currently a consensus that global warming cannot be limited to 1.5 or below 2 degrees Celsius without negative emissions. The technology also contributes to improved air quality in urban environments and strengthens Europe’s leadership in the climate transition.

    “With this initiative, Sweden shows that it is possible to combine technological leadership with concrete climate benefits, said EIB vice-president Thomas Östros. “By supporting Beccs Stockholm, we are taking an important step to enable negative emissions in Europe and globally. It is an example of how the EIB’s climate mission is being implemented in practice.”

    Stockholm Exergi has also signed extensive agreements for future deliveries of negative emissions in the voluntary carbon market, including a record-breaking commitment from Microsoft – the largest single agreement of its kind to date globally.

    “We have a very constructive and trusting dialogue with the EIB, and I look forward to continuing our cooperation,” said Stockholm Exergi chief executive officer Anders Egelrud. “Their support enables the construction of one of the world’s largest facilities for the capture and permanent storage of biogenic carbon dioxide. Together, we are laying the foundation for a new, green and competitive Nordic industry – an industry that will play a crucial role in achieving the long-term climate goals.”

    Background information  

    EIB 

    The European Investment Bank (ElB) is the long-term lending institution of the European Union, owned by its Member States. Built around eight core priorities, we finance investments that contribute to EU policy objectives by bolstering climate action and the environment, digitalisation and technological innovation, security and defence, cohesion, agriculture and bioeconomy, social infrastructure, high-impact investments outside the European Union, and the capital markets union.  

    The EIB Group, which also includes the European Investment Fund (EIF), signed nearly €89 billion in new financing for over 900 high-impact projects in 2024, boosting Europe’s competitiveness and security.  

    All projects financed by the EIB Group are in line with the Paris Climate Agreement, as pledged in our Climate Bank Roadmap. Almost 60% of the EIB Group’s annual financing supports projects directly contributing to climate change mitigation, adaptation, and a healthier environment.  

    Fostering market integration and mobilising investment, the Group supported a record of over €100 billion in new investment for Europe’s energy security in 2024 and mobilised €110 billion in growth capital for startups, scale-ups and European pioneers. Approximately half of the EIB’s financing within the European Union is directed towards cohesion regions, where per capita income is lower than the EU average.

    High-quality, up-to-date photos of our headquarters for media use are available here.

    Bio-CCS och Beccs Stockholm

    Bio-CCS is a technology that captures biogenic carbon dioxide before it reaches the atmosphere and is then permanently stored in the bedrock, which creates negative emissions because the carbon dioxide is separated from the biogenic cycle. Permanent negative emissions are the tool that can be used to counteract emissions that are not possible or will be very difficult to avoid. It is a necessary piece of the puzzle to achieve the climate goals and net-zero emissions. 

    Stockholm Exergi’s facility, Beccs Stockholm, will be built in the Energy Port in Värtan.  Värtaverket already produces sustainable heat and electricity from residual products from the forestry and sawmill industry, such as wood chips, branches and tops. By now adding capture and storage of the biogenic carbon dioxide, we create even more climate benefits.

    Beccs Stockholm is made possible through a combination of support from the EU Innovation Fund, state aid and private purchases of certificates for negative emissions from companies with high climate ambitions.

    Stockholm Exergi

    Stockholm Exergi is the energy company of Stockholmers and with resource-efficient solutions, we secure the growing Stockholm region’s access to heating, electricity, cooling and waste services. We heat over 800,000 Stockholmers and our 300-mile long district heating network is the hub for the societal benefits that we create together with our customers and partners. Through Beccs Stockholm, we are pushing for negative emissions to become a reality. We are owned by the City of Stockholm and Ankhiale, a consortium of leading European pension funds (APG, PGGM, Alecta, Keva and AXA IM Alts), and have over 800 employees who work every day to reduce Stockholmers’ climate impact.

    MIL OSI Europe News

  • MIL-OSI Economics: A journey into forgotten Null Session and MS-RPC interfaces, part 2

    Source: Securelist – Kaspersky

    Headline: A journey into forgotten Null Session and MS-RPC interfaces, part 2

    In the first part of our research, I demonstrated how we revived the concept of no authentication (null session) after many years. This involved enumerating domain information, such as users, without authentication. I walked you through the entire process, starting with the difference between no-auth in the MS-RPC interfaces and the well-known null session, and ending with the methodology used to achieve our goal.

    Today, as promised, we’ll dive into part two. Here, we’ll explore why Windows behaves the way it does – allowing domain information to be enumerated without authentication. I’ll also explain why this activity is difficult to prevent and monitor.

    First, we’ll examine why this activity is hard to stop by looking at how WMI works. We’ll also discuss the methods available for detecting and addressing this issue.

    After that, we’ll cover some basics about MS-RPC security and how to secure your RPC server. Then we’ll analyze the security of the MS-NRPC interface using two approaches: theoretical insight and reverse engineering to gain a deeper understanding.

    So, buckle up and let’s continue our journey!

    The group policy that punches your domain in the face

    When it comes to stopping certain activities in Windows, group policies are often the first line of defense, and our case is no exception. As we discussed in part one, the Restrict Unauthenticated RPC Clients policy can be used to block no-auth activity against interfaces. This policy comes with three settings: “None”, “Authenticated”, and “Authenticated without exceptions”.

    While testing, we discovered that even with the policy set to “Authenticated”, it’s still possible to enumerate domain information using MS-NRPC and network interfaces using the IObjectExporter interface. Naturally, the next logical step would be to use the “Authenticated without exceptions” setting to completely block such activity.

    At first, enabling “Authenticated without exceptions” seems to work perfectly – blocking all enumeration activity with no authentication. Over time, however, we would notice significant issues: many of the domain controller’s functions would stop working. This is not surprising, as Microsoft has explicitly warned that using this policy setting can severely disrupt domain controller functionality. In fact, it has been described as “the group policy that punches your domain in the face,” effectively rendering the domain controller inoperable.

    To better understand this issue, let’s use WMI as an example and examine why setting this policy to “Authenticated without exceptions” causes domain functionality to fail.

    WMI as DCOM object

    Windows Management Instrumentation (WMI) is the infrastructure for managing data and operations on Windows-based operating systems. It’s widely used by system administrators for everyday tasks, including remote management of Windows machines.

    To test the effect of setting the Restrict Unauthenticated RPC Clients policy to “Authenticated without exceptions”, let’s try to access WMI on a remote machine using the wmic command to list processes. In this case, we’ll use valid administrator credentials for the remote machine.

    Listing remote processes using wmic

    As shown in the screenshot above, the attempt to list remote processes fails with an “Access Denied” error, even with valid administrator credentials. But why does this happen?

    Remote WMI access relies on the DCOM architecture. To interact with the WMI server, a DCOM object must first be created on the remote machine. As explained in part one, interfaces such as IObjectExporter ( IOXIDResolver) are responsible for locating and connecting to DCOM objects.

    In simpler terms native Windows libraries typically use the IObjectExporter interface by default during the initial steps of creating a DCOM object, although it is technically optional. When binding the interface, the authentication level is set to “no authentication” (level 1). Next, the libraries use the ServerAlive2 function.

    When the Restrict Unauthenticated RPC Clients policy is set to “Authenticated without exceptions”, it blocks these no-auth activities. This prevents the creation of DCOM objects, so the WMIC command that creates a DCOM object fails and returns an “Access Denied” error, even if the credentials are valid.

    Furthermore, since DCOM object creation is integral to many domain controller functions, blocking these activities can disrupt most operations on the domain controller. In short, setting the policy to “Authenticated without exceptions” not only breaks remote WMI access, it also impacts broader domain functionality.

    To better understand this behavior, let’s examine what happens under the hood when we set the Restrict Unauthenticated RPC Clients policy to “Authenticated” or “None”. Using Wireshark, we’ll capture the traffic while running the same PowerShell command as before.

    Network traffic for remote WMI

    In the captured traffic, we can see that before the DCOM object is created, the IOXIDResolver interface must be bound, and the ServerAlive2 function is called (packets 21-24).

    If we inspect packet 21, which contains the bind request, we see that the native libraries bind the interface without authentication – because the authentication length is zero.

    Binding without authentication

    Next, let’s inspect the traffic when the Restrict Unauthenticated RPC Clients policy is set to “Authenticated without exceptions”.

    Network traffic for WMI

    From the captured traffic, we can see several “Access Denied” responses when attempting to call the ServerAlive2 function with valid credentials. This happens because the policy blocks the no-authentication behavior, effectively stopping the initial binding of the IOXIDResolver interface (which binds without authentication by default). The failure to bind the interface at the beginning of the process is what causes this error, proving that it does not come from WMI itself.

    The event that never occurs

    As we saw earlier, preventing enumeration of domain information seems impossible, but detecting it might be another story. The first place to look for detection is Windows audit policies. I found the audit policy under event ID 5712, which should generate an event like “Audit RPC Events 5712(S): A Remote Procedure Call (RPC) was attempted.”

    However, Microsoft states that this event never occurs, and after enabling this audit policy, I indeed found no related events in the event viewer for any RPC attempts.

    The event that never occurs seemed like a dead end for detecting RPC activity. However, after further research, I found two additional ways to detect RPC activity.

    The first method is Event Tracing for Windows, which logs RPC-related events. However, it lacks useful details such as the IP address of the RPC client and generates many events, including local RPC activity, making it difficult to parse.

    The second method is to use third-party open source software called RPC-Firewall. This tool audits all remote RPC calls, allowing you to track RPC UUIDs and opnums, block specific ones, and filter by source address. It integrates with the event viewer to display logs, as shown in the screenshot below of an RPC event generated by RPC-Firewall.

    RPC-Firewall RPC event

    Prior to conducting this research, I had found these three ways to detect such activity that I mentioned earlier. However, due to the lack of native detection, the process remains challenging. You can rely on third-party tools or develop your own detection method. But even with these approaches, it’s difficult because you need to identify which machines in your domain are making RPC requests without authentication and track the frequency of this activity.

    MS-RPC security

    Now let’s explore why Windows behaves this way, why there are issues with policies, and what exceptions really mean. But before diving into all that, we need to discuss MS-RPC security – basically, how to secure your RPC server.

    From this point on, I’ll be referring to a new term, the RPC server. The RPC server is where the logic of the interface is defined. A single server can have multiple interfaces.

    Securing an RPC server is a complex process because of the variety of access methods, such as named pipes or TCP endpoints. In addition, security measures for RPC servers have evolved over time.

    In this research, I will focus on the security methods relevant to our study, but there are several other methods, some of which are described in this post.

    Registration flags

    When registering an interface for an RPC server, specific flags can be set using the RpcServerRegisterIf2 function. Three flags are of particular relevance:

    • RPC_IF_ALLOW_LOCAL_ONLY: Rejects calls from remote clients.
    • RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH: Invokes a security callback for authentication checks.
    • RPC_IF_ALLOW_SECURE_ONLY: Limits connections to clients with an authentication level higher than RPC_C_AUTHN_LEVEL_NONE.

    The RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH flag registers a security callback (e.g., MySecurityCallback), as shown in the examples below, which takes over security checks from the RPC runtime.

    RPCServerRegisterIf2 with security callback

    If the callback returns RPC_S_OK (mapped to 0), the client passes; otherwise, the client fails the security check.

    The security callback

    By default, the RPC runtime ( rpcrt4.dll library) handles client authentication using mechanisms such as NTLM or Kerberos. However, its behavior is influenced by two factors:

    1. The Restrict Unauthenticated RPC Clients policy:
    • If set to “None”, unauthenticated clients are allowed.
    • If set to “Authenticated”, only authenticated clients can connect.
  • The RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH flag:
    This flag overrides the default policy, allowing the security callback to handle authentication even when clients are unauthenticated. The only exception is the “Authenticated without exceptions” policy value, which blocks all unauthenticated clients regardless of this flag.
  • This explains the exceptions we discussed earlier: they occur when interfaces inside RPC servers are registered with this flag, enabling unauthenticated connections even when the policy is set to “Authenticated”. The source and behavior of these exceptions should now be clear.

    Securing the endpoint

    As mentioned earlier, RPC servers can be accessed through various transport layers. For remote connections, TCP ports and named pipes are commonly used.

    When registering an endpoint for an RPC server using the RpcServerUseProtseqEp function, you can include a security descriptor (SD) to control who can connect to the endpoint. It’s important to note that this SD only applies to named pipes, not TCP ports. Additionally, it can also be used for local connections using ALPC ports as endpoints.

    Securing the interface

    Microsoft has introduced a newer version of the RpcServerRegisterIf2 function, called RpcServerRegisterIf3, which allows you to add an optional SD when registering your interface. This enables you to control who can connect directly to the interface.

    This security mechanism raises an important question: if an interface has registered an SD, and a client connects via TCP without authentication (authentication level = 1), how is the security check performed? Specifically, what security token is assigned to the client for the SD check?

    To answer this, we need to do some reverse engineering magic against the RPC runtime library ( rpcrt4.dll).

    The figure below shows the decompiled view from IDA for the function called when a client connects without authentication. As you can see, it uses the ImpersonateAnonymousToken function, which allows the thread to impersonate the system’s anonymous logon token. In other words, a client connecting via a TCP endpoint without authentication is represented as an anonymous user.

    Called function for unauthenticated clients

    After that, the access check is performed using the AccessCheck function:

    Access check

    Binding authentication

    The final RPC security issue to discuss is binding authentication. As you recall, the authentication method is specified in the binding packet (the first packet in an RPC connection). But what does that mean?

    An RPC server can register its preferred authentication method for clients using the RpcServerRegisterAuthInfo function. For instance, in the following example, NTLM authentication is registered as the chosen method.

    After that, the client can connect using RPCBindSetAuthInfoEx and specify the correct authentication service and authentication level.

    Now that we’ve covered RPC security, it’s time to answer questions about our interface (MS-NRPC): What security is applied on the server that defines this interface, and why were we able to access it without authentication?

    To do this, I used two approaches:

    1. Surface analysis: I examined the internal security checks of the RPC server using a flowchart from a great RPC toolkit. This chart provides valuable insight for our research, allowing us to analyze the security applied by the RPC server in more detail. I’ll go through it step by step, following the path described in the chart to conduct the investigation.
    2. In-depth analysis: In this approach, I interacted directly with the RPC server using reverse engineering to gain further insight into the enabled security.

    Surface analysis

    I will now attempt to determine the security mechanism used by the RPC server that’s related to the MS-NRPC (Netlogon) interface. I will assume that we are the RPC client calling a function from (MS-NRPC) Netlogon to enumerate domain information without using any authentication.

    Let’s start with transport protocols, as outlined in the flowchart:

    In the chart above, the RPC client has two options for connecting to the RPC server: via TCP or SMB named pipes. In our research, we are using TCP, which is highlighted.

    Next, we encounter the Restrict Unauthenticated RPC Client policy, which has two values: “None” or “Authenticated”. If set to “None”, we proceed to the next step. If set to “Authenticated”, a check is performed to see if the client has authenticated. If it has, the flow continues; however, if the client connects without authentication (as in our case), the RPC runtime checks for the RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH flag and either accepts or denies the connection based on its presence.

    Since the policy is set to “Authenticated” and our client does not perform authentication, we need the RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH flag to be registered in order to proceed to the next step, thereby making an exception to the policy. The presence of this flag allows us to conclude that a security callback has also been registered.

    Our path now looks like this:

    Next, there is another check to see if the server has registered an authentication service. If the server hasn’t registered one and the client tries to authenticate, it will be denied with an “authentication service unknown” error. However, if the client doesn’t attempt authentication, the process continues.

    If the server has registered an authentication service, the check against the endpoint (the SD registered via RpcServerUseProtseqEp) is performed. If the client passes this, another check is made against the interface SD (registered using RpcServerRegisterIf3). Failure to pass either of these checks will result in access being denied.

    In our case, we know the server has already registered an authentication service because it’s a well-known Microsoft protocol. We don’t need to worry about the endpoint check either, as it’s intended for clients connecting via named pipes. As for the interface security descriptor, we either passed this check if the SD doesn’t exist at all, or the SD does exist and it allows anonymous users (representing clients without authentication).

    Next, we check two flags: the first, RPC_IF_ALLOW_LOCAL_ONLY, determines if the interface can be accessed remotely, and the second checks for RPC_IF_ALLOW_SECURE_ONLY. If the latter is present, it ensures that we are using an authentication level higher than “None”, denying or allowing access based on the authentication level. Finally, we check for the presence of a security callback. If it doesn’t exist, we can access the server immediately. If it does exist, we must pass the custom checks within the security callback to access the server.

    In our case, we know that RPC_IF_ALLOW_LOCAL_ONLY doesn’t exist because we can access the interface remotely. We also know that RPC_IF_ALLOW_SECURE_ONLY isn’t present because we’re using an authentication level of “None”. Finally, we conclude that a security callback is registered based on the previous use of RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH, and we successfully pass the security callback check to gain access to the server.

    Our final path looks like this:

    Surface analysis conclusion

    At this stage, we can conclude that the RPC server has the following characteristics:

    1. Regarding registration flags:
    • Has RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH (indicating a security callback).
    • Doesn’t have RPC_IF_ALLOW_LOCAL_ONLY.
    • Doesn’t have RPC_IF_ALLOW_SECURE_ONLY.
  • Regarding the interface:
    • We’re unsure if it has a security descriptor (SD) or not.
  • Regarding registered binding authentication:
    • The RPC server registers authentication.

    As shown, the surface analysis couldn’t provide a complete security overview for the Netlogon (MS-NRPC) interface, so I decided to proceed with an in-depth analysis.

    In-depth analysis

    The goal of our in-depth analysis is to leverage reverse engineering techniques to assess the security of the RPC server under the MS-NRPC interface. As we saw before, the interface is accessible through the LSASS process, specifically via the Netlogon DLL. Here we have two approaches to analysis:

    1. Use automated tools to examine the security of the interface.
    2. Go directly to IDA and manually locate the interface and its associated security mechanisms.

    Automated tools

    Let’s begin with a tool called PE RPC Scraper. If we provide the Netlogon DLL as an argument, this tool reveals information about the RPC server, its interfaces, functions and security details.

    PE RPC Scraper output

    The output of the tool shows that it successfully identified the Netlogon interface (UUID) and confirmed that it contains 59 functions. It also revealed the presence of a security callback and a set of flags with a value of 0x91. After decoding this value, we can see that the following flags have been registered:

    • RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH
    • RPC_IF_SEC_CACHE_PER_PROC
    • RPC_IF_AUTOLISTEN

    The output from PE RPC Scraper also indicates that the interface has no security descriptor.

    The information obtained from both the surface analysis and the automated tool provides the answer to the security bypass issue and allows me to conclude the investigation at this point. However, I personally don’t trust automated tools, and I have a good reason for that. So, for further confirmation, let’s dive into IDA.

    IDA like a superhero

    At this point, I’ve loaded netlogon.dll into IDA and started my investigation.

    A. Locate the interface

    The first step is to determine where the interface is registered. As shown in the figure below, the UUID registered using RPCServerRegisterIf3 is related to the MS-NRPC interface.

    MS-NRPC interface registration

    B. Endpoint registration

    At this stage, we’ll check the endpoint registration for the server. As you can see in the screenshot below, RpcServerUseProtseqEpW and RpcServerUseProtseqExW have been used to register three endpoints:

    1. SMB named pipe, lsass
    2. Local ALPC port, NETLOGON_LRPC
    3. High dynamic TCP ports

    Endpoint registration

    C. Interface registration

    As I mentioned earlier, RpcServerRegisterIf3 is used to register the interface.

    Interface registration

    The function used the 0x91 value as a set of flags, which are: RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH | RPC_IF_SEC_CACHE_PER_PROC | RPC_IF_AUTOLISTEN. RpcServerRegisterIf3 also has a security callback ( sub_18002EF60), in addition to a security descriptor ( hMem). This finding contradicts what was previously confirmed by an automated tool – that’s why I don’t trust them for reverse engineering.

    D. Security callback

    Now let’s go inside the security callback and see how the security check is performed. From the screenshot below, we can see that RpcServerInqCallAttributesW is called first with the Flags field inside the RpcCallAttributes struct set to 96. After decoding this value, we can see that this function used two flags – RPC_QUERY_IS_CLIENT_LOCAL | RPC_QUERY_NO_AUTH_REQUIRED – to request the client information.

    The security callback has a condition statement.

    The security callback conditions

    First, the callback verifies that the RpcServerInqCallAttributesW function was called successfully, then it checks if the opnum is less than 59. If both previous conditions are met and the client is local, access to the server is granted. If the client is remote, the callback uses an access array (a matrix) to determine if the opnum is allowed to be called by the remote client.

    The access matrix is just hardcoded bytes in memory:

    Access matrix

    All of the previously mentioned functions in the MS-NRPC interface that can be accessed without authentication (as outlined in the table in the first part) pass the access matrix check.

    Now, let’s analyze what happens when the conditions are met or not, using assembly language since the IDA decompiler tab lacks precise interpretations.

    The security callback conditions in assembly

    • For the security callback, as we mentioned earlier, returning 0 indicates a successful call.
    • For the first condition (RpcServerInqCallAttributesW), failure results in an error value.
    • For the second condition (operation number compared to 59), failure still returns 0. This only ensures that the matrix index doesn’t exceed its size and doesn’t validate implemented functions that are handled elsewhere.
    • For the third condition, if both the access matrix and local client checks fail, the callback returns 5 (access denied). If either of them succeeds, execution continues.

    If all of the above checks in the IF statement are passed, the security callback proceeds to check the Windows version with another IF statement that verifies the value of a DWORD in memory.

    The second IF statement

    This DWORD is initialized using the code shown below. The value is set based on whether or not the machine is a domain controller (DC).

    Checking the machine type

    • If the machine is a DC, execution continues and returns 0, indicating that the security callback check was successfully passed.
    • If it is not a DC, further checks are performed.

    This sequence of checks shows that passing the security callback for the remote client on a DC requires only that the access matrix check be successfully passed.

    E. Interface security descriptor

    As we saw before, the security descriptor is assigned through the RpcServerRegisterIf3 function. It is set up by calling another function that contains many instructions. The security descriptor definition language (SDDL) for the security descriptor is shown below.

    SDDL for security descriptor

    From the SDDL, we can see that the following groups of users have read access: Anonymous Logon, Everyone, Restricted Code, Built-in Administrators, Application Package, and a specific security identifier (SID).

    But I ran into a problem. The function where the security descriptor is set up contained numerous operations, and I wasn’t sure if any changes had been made to the SDDL representation of the security descriptor. That’s why I decided to find an alternative method to verify that the SDDL interpretation remained the same.

    To achieve this goal, I considered two approaches:

    1. Memory search: I considered searching memory at runtime for the known value in the header of the relative security descriptor to intercept and extract the discretionary access control list (DACL) inside LSASS. However, since this involves interacting with the LSASS process, which is risky, I took a different approach.
    2. ALPC Port Security Descriptor: The ALPC port NETLOGON_LRPC, registered during endpoint setup, shares the same security descriptor as the interface:

    Endpoint and interface registration

    Using the ALPC port’s name, I used the NtObjectManager PowerShell module (you can use any programming alternative) to extract the security descriptor from the ALPC port.

    Extracting the SD from the ALPC port in PowerShell

    After that, I obtained the DACL from the security descriptor.

    Security descriptor for ALPC port

    The screenshot above shows that the DACL obtained from the ALPC port’s security descriptor matches the SDDL representation we obtained earlier. As we can see in the first line of the ACL entries, anonymous login is allowed on the interface, which explains why we can pass the security descriptor access check for the interface (if there is no client token, the Anonymous LOGON token is assigned).

    In-depth analysis conclusion

    From the in-depth analysis, we now have the whole scenario of the MS-NRPC security mechanism, which allowed us to understand how we could successfully pass the security checks of the MS-NRPC interface and call multiple functions without authentication, even if the RPC policy is set to “Authenticated”.

    To summarize, here’s how we were able to bypass the security of MS-NRPC:

    1. Registration flags:
    2. We found that the interface has the RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH flag: for this reason, we were able to get past the RPC policy.

    3. Security callback:
    4. We found that this flag has a security callback, which in our case is used to check if we pass the check against the access array, and all of our functions passed the check.

    5. Interface security descriptor:

    The interface has a security descriptor that permits multiple user groups to connect, including anonymous users. Since we are using no authentication, the access check is performed against the anonymous user, allowing to access the interface’s functions.

    Research conclusion

    At the end of this part and my research, I hope I was able to provide all the details related to this research and the approaches that I used. I also hope that you are now able to understand why we have this kind of no-authentication enumeration. Furthermore, I hope you are now equipped to develop your own ways to detect this kind of activity.

    Thank you for reading, and see you soon with more research projects.

MIL OSI Economics

  • MIL-OSI USA: Congresswoman Ramirez Statement on DHS Granting DOGE Access to Sensitive Naturalization and Immigration Data

    Source: United States House of Representatives – Representative Delia Ramirez – Illinois (3rd District)

    Washington, DC — Today, Congresswoman Delia C. Ramirez (IL-03) released the following statement after reports that the United States Citizenship and Immigration Services (USCIS) provided DOGE and Elon Musk with access to sensitive individual information related to immigration and naturalization.

    “The Administration’s decision to allow a group of unprepared, unqualified, and untrustworthy Musk loyalists to run amok through our nation’s private, sensitive data should raise the alarm. Trump, Noem, and Rubio have weaponized the federal government to pursue a campaign of persecution, mass incarceration, and deportation – disregarding immigrants’ rights and their status. They have ordered the abduction of immigrant activists, the erratic cancellation of visas, the use of infamous off-shore mega prisons, and the violation of due process. It is deplorable that the sensitive information of Temporary Protected Status, DACA applicants and recipients, visa holders, and naturalized individuals would be used to violate their rights. 

    As Members of Congress, the Administration must be held accountable and owe us answers about their abuses of power. We can’t normalize what is happening. We can’t normalize the misuse of our data, the disappearance of our neighbors, the dehumanization of people, or the erosion of our constitutional rights. The 47.8 million immigrants making our nation great are NOT the enemy. We must remember that fascism and authoritarianism are the real threats to our nation. Today, Trump will tell you the enemy is immigrants; tomorrow, it will be whoever they deem “undesirable.”  Fascism always demands a public enemy.”

    MIL OSI USA News

  • MIL-OSI Russia: Representatives of the Tariff Committee of St. Petersburg visited IPMET

    Translartion. Region: Russians Fedetion –

    Source: Peter the Great St Petersburg Polytechnic University – Peter the Great St Petersburg Polytechnic University –

    Representatives of the St. Petersburg Tariff Committee visited the Institute of Industrial Management, Economics and Trade.

    During the visit, a working meeting with the institute’s management took place. It was attended by the director of IPMEiT Vladimir Shchepinin, director of the Higher School of Engineering and Economics Dmitry Rodionov, acting director of the Higher School of Public Administration Olga Nadezhina and deputy director of IPMEiT for educational and organizational work Maxim Ivanov.

    The meeting participants discussed promising areas of cooperation, including the possibility of developing a joint educational program on tariff regulation, forming topics for final qualifying works and student projects on the committee’s core topics, holding regular expert lectures, student internships in the committee, and implementing additional educational programs.

    This is not just a meeting, this is the start of a large joint work. We highly value cooperation with the Committee on Tariffs of St. Petersburg. I am sure that the implementation of joint educational initiatives will make a significant contribution to the training of professional personnel, – noted the Director of IPMEiT Vladimir Shchepinin.

    After the meeting, the committee experts gave a lecture as part of the educational track “Tariffs: what, why and for what?” of the student association “Public Administration Laboratory”. The speakers covered key aspects of tariff policy. Chairman of the St. Petersburg Tariff Committee Alexey Malukhin spoke about the main areas of work, while Deputy Chairman Elena Zolina explained the principles of tariff formation in the electric power industry. Head of the Tariff Regulation Department Alexander Kolbas analyzed the formation of tariffs in the housing and communal services sector using the example of the service for handling solid municipal waste. Head of the Consumer Market Department Yana Khazova presented the mechanisms of tariff formation in the public transport sector, as well as the methodology for forming fees for housing services.

    Then the chairman of the committee was accepted as an honorary resident of the student association “Laboratory of Public Administration” for his contribution to the development of practice-oriented training in the field of public administration and the creation of conditions for effective dialogue between the university and government bodies.

    “Interaction between the St. Petersburg Tariff Committee and the city’s leading universities is one of the priority areas of work. Such cooperation contributes to the implementation of common tasks in training professional personnel,” said Alexey Malukhin. “We are pleased to have the opportunity to meet with students of Peter the Great St. Petersburg Polytechnic University. We were able to not only talk about the work of the St. Petersburg Tariff Authority, but also establish a dialogue with the guys. It is nice that young people are interested in new knowledge and were involved in joint work. The St. Petersburg Tariff Committee is interested in increasing intellectual resources, and we hope that interaction with Peter the Great St. Petersburg Polytechnic University will bear fruit in this area.”

    The Polytechnic University has established cooperation with the St. Petersburg Tariff Committee, and this is great, I know guys who have completed or are planning to complete their internship there. I am glad that cooperation will continue to develop in the future, – shared 3rd year student in the direction of “State and Municipal Administration” Maxim Konoplev.

    Participants of the educational track were invited to an excursion organized by the committee to the North-West Thermal Power Plant named after A. G. Boris – one of the most modern stations in Russia for the production of electric and thermal energy. The guys will also have to defend a practical assignment on the topics of the committee.

    IPMET and the St. Petersburg Tariff Committee are interested in further cooperation, which will open up new opportunities for training specialists in the field of public administration and economics.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Europe: Answer to a written question – ETS2 – P-000650/2025(ASW)

    Source: European Parliament

    The Commission and the Member States are working towards the timely implementation of the new Emissions Trading System for buildings, road transport and additional sectors (ETS2), which was adopted by the European Parliament and the Council in 2023. This includes regular technical level discussions and exchanges at the political level with all Member States, including Poland.

    Several safeguards are already in place to allow for a smooth start of ETS2, including a safeguard to delay the start of the system from 2027 to 2028 in case energy prices are exceptionally high in the first half of 2026.

    In addition, several triggers would release additional ETS2 allowances from the Market Stability Reserve in case of sharp prices increase or imbalances in the supply of ETS2 allowances.

    Furthermore, the total number of allowances auctioned in the first year of the system will be 30% higher than the ETS2 cap, to ensure a smooth start of the system.

    Finally, by taking early action, Member States can help keep ETS2 prices in check. Member States can finance such measures from the revenues ETS2 will raise.

    Part of the revenues will fund the new Social Climate Fund (SCF) in order to protect vulnerable groups and alleviate the ETS2’s impacts. Poland is the biggest beneficiary of the SCF.

    Last updated: 4 April 2025

    MIL OSI Europe News

  • MIL-OSI Europe: Answer to a written question – Public transport price hike in Bologna and EU climate targets – E-000750/2025(ASW)

    Source: European Parliament

    Specific features of local public transport systems, such as pricing or routes, are regulated at national, regional or local level.

    To ensure that urban public transport across the EU is aligned with, and supportive of EU objectives for sustainable and smart mobility, the Commission has developed a policy framework for urban mobility[1], recognising public transport as backbone for sustainable urban mobility, together with active modes (cycling and walking) as well as shared mobility services.

    One of the tools to ensure that local policies are aligned with EU objectives is the new provision of the revised trans-European transport network Regulation[2], which requires 431 urban nodes to have a sustainable urban mobility plan by 2027.

    Bologna is a mission city under the EU Climate-neutral and Smart Cities Mission[3]. It was awarded the Mission Label in 2024 after a positive review of its Climate City Contract.

    Bologna’s strategy and action portfolio to decarbonise the transport sector tackles all the sources of emissions concerning transport and mobility present in the city, with particular emphasis on the creation of an enabling environment to reduce private car usage, offering alternative modes of transport, including a comprehensive revision of tariffs for tickets and passes for different categories of users.

    Promoting sustainable multimodal urban mobility as part of the transition to a carbon-neutral economy is also one of the Policy Objectives of the 2021-2027 European Regional Development Fund (ERDF) financial allocation to the region.

    Through a total of EUR 40 million, the programme will promote measures consistent with the EU’s climate targets with a focus on soft mobility, in particular pedestrian and bicycle mobility.

    • [1] https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12916-Sustainable-transport-new-urban-mobility-framework_en
    • [2] https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52021PC0812
    • [3] https://research-and-innovation.ec.europa.eu/funding/funding-opportunities/funding-programmes-and-open-calls/horizon-europe/eu-missions-horizon-europe/climate-neutral-and-smart-cities_en

    MIL OSI Europe News

  • MIL-OSI Europe: Written question – Job losses in the German automotive industry – Commission countermeasures – E-001251/2025

    Source: European Parliament

    Question for written answer  E-001251/2025
    to the Commission
    Rule 144
    Anja Arndt (ESN)

    According to a study by audit firm EY, the German automotive and supplier industry shed 19 000 jobs in 2024, meaning that the sector now employs only 761 000 people in Germany – its lowest figure since 2013. Audi intends to cut 7 500 posts in the next few years, and ZF Friedrichshafen 14 000.

    • 1.Does the Commission acknowledge that these horrendous statistics are primarily the result of anti-industry EU legislation based on the Paris Agreement and the Green Deal, i.e., of, first, the factually incorrect and misleading statement in Regulation (EU) 2019/631 that electric vehicles are ‘zero emission’ vehicles, while manufacturers of combustion engine vehicles face penalties, and, second, of the actual ban in Regulation (EU) 2023/851 on fitting new vehicles with combustion engines?
    • 2.What would the Commission say to changing tack in EU legislation in order to stem the demise of a key industrial sector in Germany and the rest of Europe (which is benefiting the competition in Asia and the United States), thus preventing further deindustrialisation and the associated loss of prosperity?

    Submitted: 26.3.2025

    Last updated: 4 April 2025

    MIL OSI Europe News

  • MIL-OSI Europe: Answer to a written question – Weapons trafficking to Sudan – E-000350/2025(ASW)

    Source: European Parliament

    Since the start of the conflict in Sudan in April 2023, the European External Action Service has been discussing the situation in this country during its political dialogues and exchanges with the Emirati authorities at various levels.

    The EU Special Representative for the Horn of Africa, has also been engaging with the Emirati and other regional stakeholders. In this context, the EU representatives have raised concerns about reported United Arab Emirates (UAE) support to the rapid support forces, while emphasising the importance of the UAE’s constructive engagement for reaching a sustainable cease-fire in Sudan.

    The negotiated outcome documents of two high-level meetings on Sudan co-organised by the EU, Germany and France in New York[1] and Paris[2] — attended by UAE — urge foreign actors to cease support to the warring sides.

    Situation in Sudan has also been discussed in the meetings with the Gulf Cooperation Council (GCC), including the first EU-GCC Summit in Brussels on 16 October 2024, where the EU and GCC leaders (UAE represented at the level of Deputy Prime Minister and Minister of Finance) underscored the importance of stopping the war and eventually returning to a political process leading to civilian rule in Sudan, and urged the Sudanese armed forces and the rapid support forces to engage seriously and effectively with crisis resolution initiatives, including the Jeddah platform.

    The Commission will continue to follow closely the conflict in Sudan and engage with the key regional stakeholders, including the UAE, in the regional efforts aimed at achieving a lasting peace and justice in Sudan. In the meantime, the EU has already adopted three listings of restrictive measures[3], including against entities that are based in the UAE, and stand ready to consider additional sanctions against those who are fuelling the war.

    • [1] https://www.auswaertiges-amt.de/en/newsroom/news/2677588-2677588
    • [2] https://www.diplomatie.gouv.fr/en/country-files/sudan/news/article/ministerial-meeting-for-advancing-the-sudan-peace-initiatives-paris-le-15-04-24
    • [3] https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202403154
    Last updated: 4 April 2025

    MIL OSI Europe News

  • MIL-OSI Asia-Pac: Oil Spill Update – No New Oil Sightings At Sea; Clean-Up At Changi Beach And Pasir Ris Beach Ongoing

    Source: Government of Singapore

    JOINT NEWS RELEASE BETWEEN MPA, NEA, NPARKS AND SFA

    Singapore, 4 April 2025 – As of 4.00pm, there are no visible oil patches off Pulau Ubin and no new oil sightings at sea.

    2.           Clean-up of the beaches at Changi and Pasir Ris is ongoing. The bulk of the clean-up is expected to be completed within the next few days. The affected areas remain cordoned off to facilitate clean-up operations.

    3.           Oil sheen have been observed at several fish farms along East Johor Strait. The Singapore Food Agency (SFA) is working closely with the affected farms on mitigation measures, with support from the Maritime Port Authority (MPA). SFA is also assisting other farms to take preventative measures, such as providing absorbent pads. As a precautionary measure, SFA is also testing seafood from farms in the East Johor Strait and imported seafood.

    4.           The National Parks Board (NParks), together with research partners, has carried out visual assessments of the biodiversity-sensitive areas in the vicinity of the oil patches this morning, and post-impact surveys are underway. Thus far, there has been no observable impact to wildlife at Chek Jawa Wetlands, Changi Beach Park, and Pasir Ris Park.

    5.           Preventive measures, including the deployment of booms, have been put in place at coastal drains including Changi Creek, Sungei Tampines, and Sungei Api Api, as well as key locations such as Chek Jawa and around fish farms in the East Johor Strait. As a precautionary measure, national water agency PUB has also deployed containment booms across the tidal gates at Punggol and Serangoon Reservoirs. These measures will remain in place until further assessment by the relevant agencies.

    6.           Public access to affected areas remains restricted. Members of the public are advised to refrain from swimming or engaging in other water activities at Changi Beach and Pasir Ris Beach until further notice. For the latest advisories, please refer to the National Environment Agency’s (NEA) website (www.nea.gov.sg), NEA’s Facebook page, NParks’ website (www.nparks.gov.sg), and NParks’ Facebook page.

    7.           Agencies thank organisations and individuals who have volunteered their service. Agencies have assessed that there is no need for volunteer assistance at this time.

    8.           MPA and partner agencies continue to monitor the situation closely and will provide further updates as necessary

    For more information, please submit your enquiries electronically via the Online Feedback Form or myENV mobile application.

    MIL OSI Asia Pacific News

  • MIL-OSI United Kingdom: Global experts in nuclear technology share expertise in Cumbria

    Source: United Kingdom – Executive Government & Departments

    Press release

    Global experts in nuclear technology share expertise in Cumbria

    International experts in robotics, remote technologies and AI took part in a Nuclear Energy Agency (NEA) and Sellafield Ltd co-hosted workshop.

    Nuclear Energy Agency (NEA) and Sellafield Ltd at a co-hosted workshop at the RaiCo facility in Whitehaven, West Cumbria.

    The week-long workshop showcased best practice in innovative technologies to support nuclear decommissioning.

    Held at Energus in West Cumbria, the event brought together experts from around the globe to share their opportunities, benefits and challenges in harnessing robotics and advanced technologies for safer, more efficient activities.

    The Nuclear Energy Agency (NEA) visitors also took part in a Sellafield tour organised by Claire Cleaver-Jones, who said:

    The NEA brings together a selection of countries dedicated to sharing state of the art knowledge in the field of nuclear energy, and we were delighted to be part of the event.

    The workshops focused on the role of innovation in harnessing robotics for safer, more efficient activities for decommissioning. It’s imperative that the nuclear industry continues to learn, share best practice and policies to support robotics as business as usual to achieve our mission in a quicker and safer way.

    NEA and Sellafield Ltd representatives

    Chief technology officer Robin Ibbotson, who opened the event said:

    Throughout its history, Sellafield has been leading on nuclear innovation.

    We need to manage and maintain the legacy, whereas in new sectors you have a green field on which to grow.

    This is why conferences focused on innovation in our stage of the nuclear lifecycle are so important. It provides the opportunity to learn, share and transfer best practice.

    I’m hugely proud of the work delivered across the business in innovation, from our new IT solutions in AI, our pragmatic approach on our major projects and our recent world firsts on robotics in remediation and engineering.

    Also, how we support collaboration across the UK nuclear enterprise and deployments across the Nuclear Decommissioning Authority (NDA) group.

    Gabriele Grassi, NEA deputy head of radioactive waste management division said:

    The nuclear back end is a driving force for innovation, where new technologies can transform our work.

    Automation, robotics, remote operations, digitalisation, and artificial intelligence – to name a few – have tremendous potential to enhance efficiency, improve safety, and reduce costs. Beyond operational benefits, these innovations can also strengthen public confidence in the nuclear sector.

    They demonstrate that decommissioning and waste management can be carried out safely, effectively, and cost-efficiently, which is essential for the future of nuclear energy.

    Melanie Brownridge, NDA chief research and development officer added:

    The integration of robotics and AI in the decommissioning of the UK’s nuclear estate is essential for increasing value for taxpayers.

    Events like this provide a platform to bring together leading experts, fostering collaboration and knowledge sharing, while showcasing the world- class work being undertaken at Sellafield and across the rest of the NDA group.

    Updates to this page

    Published 4 April 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Crackdown on nuisance bikes revving up again

    Source: City of Stoke-on-Trent

    A joint Stoke-on-Trent City Council and Staffordshire Police crackdown on nuisance bikes will hit the streets again in the coming weeks.

    Operation Transom targets riders who damage green spaces and put the public at risk through the use of off-road motorbikes.

    The operation is a partnership between Stoke-on-Trent City Council’s Anti-Social Behaviour (ASB) Team and Staffordshire Police. It will see increased patrols in hotspot areas, with officers seizing bikes that are used to commit anti-social behaviour.

    The increased council and police presence will also serve as a visible deterrent to those causing a nuisance in the community.

    This crackdown is strategically timed with the start of the warmer months, as reports of nuisance bikes often increase as the weather improves.

    Signage is displayed in hot spot areas, warning offenders of the laws that give Staffordshire Police the power to seize vehicles that are being driven in a way that causes – or is likely to cause – nuisance, alarm or distress.

    The ASB Team will take enforcement action against anyone who is found to be a Stoke-on Trent City Council tenant or in any way linked to a tenancy.

    Councillor Majid Khan, cabinet member for community resilience for Stoke-on-Trent City Council, said: “We are continuing to work closely with colleagues at Staffordshire Police to tackle, deter and educate those who continue to blight our communities with anti-social behaviour.

    “I want to reassure residents that we hear you, and action is being taken.

    “We are so fortunate to have so many green spaces in the city. We will not let people ruin them with mindless, arrogant behaviour.

    “Every one of us has the right to live in a cleaner, greener and safer city.”

    In 2024, over 350 reports were received concerning nuisance bikes.

    The local policing and ASB teams jointly investigated and took enforcement action including home visits, issuing Community Protection Warnings, and taking action against city council tenants.

    Since October 2024, the Roads Policing Team has conducted 12 proactive operations across the city, leading to three arrests, the seizure of two stolen quad bikes, and the recovery of six off-road pit bikes.

    Chief Inspector Dave Barrow, from the Stoke South local policing team, said: “Tackling reports of anti-social behaviour remains a neighbourhood priority for the team, and nuisance bikers are no different.

    “They can be a constant source of concern within our communities and can put both the public and themselves in danger. We simply will not tolerate that.”

    Alongside enforcement activity, a new programme of education will ensure potential riders – and their parents – know it is illegal to ride off-road bikes in any public space in Stoke-on-Trent. This includes parks, pavements, waste grounds and parkways.

    It was announced in February 2025 that, under the Crime and Policing Bill, new powers will mean police officers no longer need to issue a warning before seizing off-road bikes.

    Home Secretary Yvette Cooper recently met with Assistant Chief Constable Stuart Ellison, Staffordshire Police and Fire Commissioner Ben Adams, and officers from the ASB Team and Road Crime Team at Staffordshire Police Headquarters.

    The Home Secretary heard how Operation Transom had been jointly launched by Staffordshire Police and Stoke-on-Trent City Council’s ASB Team in 2021 – and that the work had seen increased patrols, along with regular operations in hotspot areas of the city.

    To report nuisance bikes in your area to Operation Transom, please email operationtransom@stoke.gov.uk. You can also ring 01782 233400. Please provide as much detail as possible.

    Incidents that are happening live should be reported directly to Staffordshire Police through the live chat on the website www.staffordshire.police.uk or by calling 101.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Repairing Roker Pier

    Source: City of Sunderland

    A 12 week programme of repairs for Sunderland’s storm damaged Roker Pier is due to begin at the end of this month.

    The grade II listed pier has been closed to the public for safety reasons since it was damaged by Storm Babet in October 2023.

    Planning approval for repair works was granted in January this year. The £236,000 repair programme is timetabled to start on Thursday 24 April and scheduled to be complete by Thursday 31 July.

    The City Council’s Cabinet Member for Business, Regeneration and Housing, Councillor Kevin Johnston said: “We all know and recognise that Roker Pier is a key part of our seafront, our heritage and our sea defences for the city and the Port of Sunderland.

    “The very heavy seas of Storm Babet washed away several sections of the deck near the lighthouse, railings were washed away, along with other sections of decking and coping stones.

    “Most of this damage was to the northern and eastern facing sections of the pier and, of course, we have a duty to keep the public safe so we’ve kept the pier closed.

    “Roker Pier and coastal structures all along the east coast suffered damage in Storm Babet. I’m pleased to confirm we are getting on with the repairs programme. This programme is a complex marine engineering job and, weather permitting, we look forward to seeing Roker Pier open again to the public by August.”

    Approximately 100 metres (more than 300ft) of railings were washed away in Storm Babet and as a Grade II listed structure the council has worked closely with heritage organisations on the repairs programme. The council has also had to be mindful of roosting and nesting seabirds.

    The contractor for the repairs is North East-based Southbay Civil Engineering Limited, who are currently working on repairs to the River Tyne piers following damaged caused by Storm Babet. They previously worked on Roker Pier slab repairs in 2014.

    Antony Ballantyne, Operations Director for Southbay Civil Engineering Limited, said: “As a local contractor, we are delighted to be involved in the delivery of a project that will retain one of the North East region’s most iconic coastal structures.

    “As a specialist marine contractor we are aware of the constant pressures such marine structures are under through events such as Storm Babet. Using our specialist experience together with that of our supply chain, we will ensure the aesthetic appearance of this grade II listed structure is maintained.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: DVLA’s top tips for avoiding scams

    Source: United Kingdom – Executive Government & Departments

    News story

    DVLA’s top tips for avoiding scams

    Tips for motorists on how to recognise and avoid scams, including emails and text messages.

    DVLA is reminding motorists how they can keep themselves safe from vehicle and driving licence scams. Latest figures show that in 2024, almost 20,000 customers called DVLA’s contact centre to report fraudulent activity.

    With fraudsters increasingly using more sophisticated ways to trick their victims, it has never been more important for motorists to be vigilant and aware of how to recognise fraudulent emails, texts, websites and calls. 

    Here are DVLA’s top tips on how you can stay safe online.

    Only use GOV.UK

    The only place to access official information on DVLA and its services is GOV.UK. Using any other website could mean you’ll be charged more for services that are either cheaper or completely free on GOV.UK. Other websites may even be fraudulent, so our advice is to always use GOV.UK when transacting with DVLA.

    Never share your driving licence or vehicle information online

    Getting your driving licence is a big milestone, and you may be tempted to share your new shiny licence or V5C (log book) on social media.

    However, both documents contain key identifying details that scammers can use to steal your identity or even clone your vehicle. And before you know it, you could be receiving parking, congestion or speeding fines that you were not responsible for.

    Beware of emails and texts asking you to confirm personal details

    Fraudsters will often send emails or text messages to unsuspecting victims asking them to confirm personal details, such as bank or payment information. They may even send messages that claim you are entitled to a hefty vehicle tax refund. 

    DVLA will never ask you for your bank account details or ask you to confirm payment details. We will only ask you to confirm your personal details by email or text if you have a live enquiry with us.

    And vehicle tax refunds are issued automatically – never via an email with a link!

    If you receive one of these emails or texts, do not click on any links. Instead, report it to the National Cyber Security Centre and delete it immediately.

    Beware of websites impersonating DVLA

    Scammers create websites that attempt to impersonate DVLA and may appear legitimate. These sites will often charge additional fees for services you can get for free or at a lower cost on GOV.UK, including driving licence applications, vehicle tax transactions and Clean Air Zone (CAZ) payments. If you need to use these or any other government services, always search for them on GOV.UK.

    How to report online scams

    If you come across any of these scams or any other suspicious activity, you can play your part in helping us combat fraud by:

    The majority of our services are available online at GOV.UK. For the latest information about DVLA, you can sign up to our email alerts.

    Updates to this page

    Published 4 April 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Helping the Department for Transport increase data resilience

    Source: United Kingdom – Executive Government & Departments

    Case study

    Helping the Department for Transport increase data resilience

    The DfT needed to understand data flows within cargo shipments to identify and mitigate potential supply chain risks.

    The Department for Transport (DfT) needed to understand data flows within cargo shipments so that it could identify potential supply chain risks and how to mitigate them, increasing resilience. 

    The Accelerated Capability Environment (ACE) was asked to develop a reusable methodology that could map the types of data that flow through cargo systems, including third-party integrations, and identify potential vulnerabilities.  

    While this methodology would initially be focused on airports, it also needed to be reusable at road, rail and maritime hubs handling cargo. A second requirement was creating guidance that would enable other transport operators to map supply chain flows and data in their own systems. 

    A call out to ACE’s Vivace supplier community resulted in 12 submissions of interest, with four shortlisted to give presentations at an accelerator day. 

    From these, Arup was chosen to be the supplier because of its strong team and varied experience and a medium-sized airport was identified as a suitable pilot site. 

    Data discovery 

    This commission came from the DfT’s cyber arm, which had not worked with ACE before, and so the first step was working together to fully scope the problem.  

    This involved identifying exactly what data is captured around cargo planes flying in and out of an airport, including where data came in and left airport systems, where cargo is going next, the suppliers and systems involved at every stage, and defining the processes data goes through. 

    This phase also involved interviews with key stakeholders in the cargo handling process and exploring whether learning from other industries and government departments about how cybersecurity risks are captured and mitigated could be applied here. 

    Work for the remainder of the eight-week commission then shifted to consolidating the data model, mapping the data flows and the cybersecurity risk assessment. 

    Ultimately, a standardised methodology approach was created, covering three key steps of understanding data flows, reviewing threats and vulnerabilities, and identifying risks and implementing cost-effective security controls.

    Guidance that could be used by other teams to easily create their own processes was created, and cybersecurity risks outlined at a high level. Four potential next steps for this work were also suggested. 

    A show-and-tell explaining the findings in greater detail, and how these were repeatable elsewhere, was held for DfT stakeholders in maritime policy, aircraft security, aviation strategy and rail resilience and the methodology shared. Next steps are now being considered.

    Updates to this page

    Published 4 April 2025

    MIL OSI United Kingdom