Self-determination theory (SDT) is one of the most well established and powerful approaches to wellbeing in psychological research literature. Yet it doesn’t seem to have broken through into popular discussions about wellbeing, happiness and self-help. That’s a shame, because it has so much to contribute.
A foundational idea in self-determination theory is that we have three basic psychological needs: for autonomy, competence and relatedness.
Autonomy is the need to be in control of your own life rather than being controlled by others. Competence is the need to feel skilful at the tasks one values or needs to thrive. Relatedness refers to feeling loved and cared for, and a sense of belonging to a group that provides social support.
If our basic psychological needs are met, then we are more likely to experience wellbeing. Symptoms include emotions such as joy, vitality and excitement because we’re doing the things we love, for example. We’ll probably have a sense of meaning and purpose because we live within a community whose culture we value.
Get your news from actual experts, straight to your inbox.Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.
Conversely, when our basic needs are thwarted we should see symptoms of illbeing. Anger, frustration and boredom grow when our behaviour is controlled by parents, bureaucrats, bosses or other forces that press our energies towards their ends instead of ours.
Depression is liable when we our competence is overwhelmed by failure. And anxiety is often a social emotion that arises when we’re worried about whether our group cares for us.
So we should cultivate our basic psychological needs – but how? You need to discover what you want to do with your life, what skills to become competent in, who to relate to and what communities to contribute to.
Using motivation to find your way
Here’s where the second foundational idea in SDT can be super helpful, as I explain in my new book, Beyond Happy: How to rethink happiness and find fulfilment. SDT proposes a motivational spectrum running from extrinsic at one end to intrinsic at the other. Finding out where you are on the spectrum for a certain activity or task can help you work out how to be happier.
The more extrinsically motivated something is, the more self-regulation it requires. For example, when refugees flee their homes due to encroaching war, there is often a large part of them that wants to stay. Willpower is required to act. In contrast, intrinsically motivated behaviour springs spontaneously from us. You don’t need willpower to get stuck into your hobbies.
Each type of motivation comes with different emotional signals and deciphering them can help us find what values, behaviour and groups suit us.
The spectrum of motivation according to self-determination theory. CC BY-NC
“Identified” motivation, for example, sits between extrinsic and intrinsic motivation. It occurs when we value an activity but don’t inherently enjoy it. That’s why success in identified behaviour is usually met with a feeling of accomplishment or the warm and fuzzy feeling you get when you do the right thing, like going a bit out of your way to put your rubbish in a bin.
In contrast, “introjected” motivation is where you value something contingent to the behaviour itself. Many of us loathe the gym, for example, but we want to be healthy. A child might not want to practice the cello, but they do want their parent’s approval.
Because introjection is relatively extrinsic, it requires willpower, and probably a bit more of it than for identified behaviour. Completion of an introjected activity is often met with relief rather than accomplishment and little desire to keep going.
Sometimes things that are dependent on introjected behaviour can make us unhappy. In teen dramas, for example, the protagonist often does something because they want to be popular, but when they win the approval of the cool kids they realise those kids are mean and lame.
Why money, power and status won’t make you happy
If that’s how you feel, you’ve found something inauthentic to you. Then there’s very little chance the introjected activity will lead to your wellbeing. In fact, SDT has identified some common values. You’ll recognise them immediately: popularity, fame, status, power, wealth and success.
They’re extrinsic because they’re not peculiar to you. If you get rich doing the thing you love, that’s great, but many of us never even think about what we love because we’re too busy thinking about how to get rich.
Extrinsic pursuits are ultimately bad for our wellbeing because they’re all poor substitutes for basic psychological needs. When our autonomy is thwarted by strict parents or disciplinarian teachers, we crave power. When we don’t know what sort of life to build and thus what skills we need competence in, we adopt other people’s notions of success instead.
Extrinsic pursuits often emerge from a wounded place and a defensive reaction. When we’re lonely or feel unloved for who we are, for example, we might compensate by seeking fame or popularity. We’ll start talking about our accomplishments on LinkedIn, for example.
The problem is that the people this attracts don’t value you specifically, only your power, status or money. You sense that if you ever lost those things, you would lose these people too.
SDT can help you learn to listen to your emotions and interpret your motivations instead, and use them to guide you towards the values, activities and people that are right for you.
For example, if you feel joyful and fulfilled when you solve a complex puzzle, perhaps consider a career that involves that activity, such as law or engineering. If such puzzles feel like torture, that’s a signal too. Perhaps something more relational or intuitive, like social work, would work better.
When you pursue things that are authentic to you it will nourish your sense of autonomy. You’ll build competence in those activities because they’re intrinsically motivated. And you’ll form deep relationships with the people you encounter because you genuinely like each other. Wellbeing will follow.
Mark Fabian does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
The James Bond franchise has lain dormant for four years, since Daniel Craig’s swansong as 007, No Time to Die. A legal quarrel between Bond’s producers, Michael G. Wilson and Barbara Broccoli, and Amazon Studios resulted in a stalemate and production on a new Bond film has remained in limbo.
Nevertheless, speculation has been rife about which actor will next play Ian Fleming’s super-spy (the latest actor to be associated with the role is former Spider-man Tom Holland).
When news surfaced in February 2025 that Amazon MGM (Amazon purchased MGM in 2021) had effectively become Bond’s new custodians, critics and audiences alike expressed concern – to put it lightly. Many feared that Jeff Bezos was more interested in stimulating Amazon Prime membership by driving multiple content streams through spin-offs and merchandising than protecting Fleming’s legacy.
However, last week’s announcement that Denis Villeneuve has been appointed as the director of the 26th Bond film is a savvy move. It’s a declaration of intent that seeks to promote and market Amazon MGM as safe harbour for the Bond franchise.
Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.
The announcement positions the next era of Bond as a prestigious exercise helmed by “a cinematic master”, not a journeyman director. Villeneuve was previously offered the opportunity to direct No Time to Die, but turned the role down because of his commitment to the Dune films.
By appointing Villeneuve, Amazon has managed to radically shift the public debate. Villeneuve is “much more than a technical director”, wrote Guardian film critic Peter Bradshaw. “He is an alpha-grade auteur in the same league as Christopher Nolan.”
Other critics have pointed to his rare ability to “combine blockbuster momentum (and ticket sales) with the finer, more nuanced sensibilities of a filmmaker always concerned with slowing down, honing in on character and theme”.
Although Sam Mendes, director of Skyfall (2012) and Spectre (2015), came with artistic status, Villeneuve is something different – a marquee name frequently described as an auteur.
Villeneuve talks about his love for Bond.
Since his transition from making mostly low-key independent films in his native Canada to his arrival in Hollywood with Prisoners, starring Hugh Jackman and Jake Gyllenhaal (2013), Villeneuve has amassed an impressively eclectic filmography.
He has proven that he is as comfortable shooting realistic crime thrillers (Sicario, 2015) and surrealist cinema that David Lynch would be proud of (Enemy, 2013), as he is with science fiction (Arrival, 2016, Blade Runner 2049, 2017, and the Dune films, 2021 and 2024).
Villeneuve’s Bond
Although Sicario may be the closest in terms of genre to the Bond films, establishing Villeneuve as a director who can expertly shoot action sequences, it is nevertheless difficult at this stage to conceptualise what a Villeneuve Bond film might be like.
Some critics have suggested that the director’s cinematic resume, eclectic as it is, might not bode well for Bond. The Hollywood Reporter’s film critic Benjamin Svetkey, for instance, worries that Villeneuve’s “lugubrious, meditative filmmaking” is sorely lacking in humour – which could be fatal for 007. “A certain amount of wit and winking is critical to the character,” he claims.
It is early days for Amazon MGM and Villeneuve. As yet, there is reportedly no treatment, no script, no writer and – more pointedly – no actor appointed to the role. Whatever happens, the 26th Bond film is likely to be a hard reboot that wipes the slate clean (again) after the fate of 007 in No Time to Die.
Villeneuve’s choice for Bond is unlikely to be as cartoonish as Pierce Brosnan’s iteration.
Although Villeneuve has said that he intends to honour tradition and that Bond is “sacred territory” for him, Bond’s capacity for revision and regeneration has been key to the franchise’s longevity.
As socoiologists Tony Bennett and Janet Woollacott argue in their seminal study, Bond and Beyond, the figure of Bond has over the past six decades “been differently constructed at different moments,” with “different sets of ideological and cultural concerns”.
So what kind of Bond film Villeneuve ends up directing largely depends on the story and whichever actor is anointed as the next James Bond. It is doubtful that audiences will expect a campy pantomime Bond like Roger Moore, or a Bond with an invisible car, like Pierce Brosnan in the cartoonish Die Another Day (2002). Villeneuve’s choice of Casino Royale as his favourite 007 may provide a clue. But it is also unlikely that the director will be satisfied with slavishly repeating the past.
William Proctor does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: United States Senator for New York Kirsten Gillibrand
Today, U.S. Senator Kirsten Gillibrand, a member of the Senate Appropriations Committee, issued the following statement after Senate passage of the One Big Beautiful Bill Act:
“This destructive bill is a big, beautiful betrayal of the American people. President Trump and Senate Republicans are cutting health care and food assistance for working families in order to give massive tax cuts to the wealthiest Americans. Just as bad, this bill will raise the cost of living for working families by thousands of dollars. It’s outrageous and I will continue fighting to defeat it.”
Source: United States Senator Ben Ray Luján (D-New Mexico)
WATCH: Luján Holds Senate Floor During Midnight Session
WATCH: Luján Introduces Amendment to Save SNAP
Washington, D.C. – U.S. Senator Ben Ray Luján (D-N.M.) issued the following statement after Senate Republicans voted to pass their partisan budget reconciliation bill:
“Senate Republicans just pushed through a budget bill that hurts New Mexican families. In their rush to meet President Trump’s demands, they voted blindly, with no regard for the harm this bill will inflict on all of our constituents.
“This Republican bill guts health care for children and families, strips food assistance from our neighbors, and puts rural hospitals and grocery stores on the brink of closure – all to hand out massive tax cuts to the ultra-wealthy and big corporations. It also adds more than $3 trillion to the national debt – driving up interest rates across the board, making car loans and mortgages more expensive for families, and raising borrowing costs for small businesses and farmers.
“This bill is not just bad policy – it’s a failure of leadership and a betrayal of New Mexico families, rural communities, and American values.”
Senator Luján backed a series of amendments and motions to the Republican reconciliation bill aimed at protecting access to health care and nutrition programs and lowering costs for New Mexicans. Senate Republicans blocked these common-sense proposals from Senator Luján and Senate Democrats.Among those measures:
Keeping Food on the Table for New Mexicans:
Millions of families rely on nutrition assistance programs. Senator Luján led a motion to protect funding for SNAP that ensures New Mexico families and children have access to nutritious food. These programs also support New Mexico’s farmers, ranchers, and local communities that rely on these dollars to keep food on shelves and economies strong.
Defending Medicaid and the Affordable Care Act:
Republicans are trying to pay for tax breaks for the wealthy and big corporations by ripping away Medicaid coverage from millions of Americans. New Mexico has the highest per-capita Medicaid enrollment in the country, and children, pregnant women, and working families depend on it. Senator Luján supported a motion to strengthen Medicaid and protect health care for New Mexicans.
Keeping New Mexico Communities Safe:
Amid a nationwide shortage of police officers, Senator Luján proposed a motion to provide increased resources for local law enforcement by funding the COPS Hiring Program. Senator Luján previously led dozens of his colleagues in calling for additional funding for public safety.
Protecting New Mexicans from Wildfires:
As wildfires continue to devastate New Mexico and the West, Senator Luján supported a motion to invest in wildfire prevention and protect our communities from future disasters.
Protecting Clean Energy Investments:
As the climate crisis grows more urgent – and Republicans push to gut clean energy programs – Senator Luján supported amendments to safeguard investments in our energy future and reduce costs.
Lowering Taxes for Small Businesses and the Middle Class:
To bring down costs for New Mexico families and small businesses, Senator Luján supported amendments that would provide tax relief to the middle class and small businesses.
External Affairs Minister (EAM) S. Jaishankar on Tuesday reiterated India’s right to defend itself against terrorism and urged the Quad to understand this position, as the foreign ministers of the four-nation group gathered for their ministerial meeting.
“India has every right to defend its people against terrorism, and we will exercise that right,” he said, with U.S. Secretary of State Marco Rubio, Australian Foreign Minister Penny Wong, and Japanese Foreign Minister Takeshi Iwaya standing beside him.
“We expect our Quad partners to understand and appreciate that,” he emphasised.
This marks the first Quad ministerial where the four foreign ministers are meeting together following the heinous Pahalgam massacre on April 22, carried out by Pakistan-backed terrorists, and India’s subsequent decisive response — ‘Operation Sindoor’.
Referring to the Pahalgam attack, EAM Jaishankar said, “A word about terrorism in light of our recent experience: The world must display zero tolerance. Victims and perpetrators must never be equated.”
Counter-terrorism remains a core focus of the Quad agenda.
Prime Minister Narendra Modi is set to host the Quad leaders’ summit later this year, which will include U.S. President Donald Trump, Australian Prime Minister Anthony Albanese, and Japanese Prime Minister Shigeru Ishiba.
“We have some proposals on how to make that summit productive,” Jaishankar said. “I’m sure our partners do as well. We will discuss them, and I’m confident we can agree on a constructive way forward.”
“A lot is happening in the world, and I’m sure that our exchange of views will be very valuable for all of us,” he added.
He underlined that the Quad is committed to a rules-based international order, stating, “It is essential that nations of the Indo-Pacific have the freedom of choice — a prerequisite for making the right decisions.”
The task before the Quad, he said, is “deepening our convergence and expanding our common ground.”
“In recent months, we have made significant progress in various Quad initiatives,” he said.
“These include areas like the maritime domain, technology, education, and political coordination.”
Regarding their current meeting, he added, “We will also be discussing how the functioning of the Quad has been enhanced by streamlining working groups into a more cohesive, nimble, and focused structure.”
“I value our consultations on various dimensions of the Indo-Pacific,” he concluded.
OAKLAND – California Attorney General Rob Bonta today, leading a multistate coalition, is filing a lawsuit challenging the U.S. Department of Health and Human Services’ (HHS) decision to provide unfettered access to individual personal health data to the Department of Homeland Security (DHS), which houses Immigration and Customs Enforcement (ICE). In the seven decades since Congress enacted the Medicaid Act to provide medical assistance to vulnerable populations, federal law, policy, and practice has been clear: the personal healthcare data collected about beneficiaries of the program is confidential, to be shared only in certain narrow circumstances that benefit public health and the integrity of the Medicaid program itself. In today’s lawsuit filed in the U.S. District Court for the Northern District of California, Attorney General Bonta and the coalition argue that the mass transfer of this data violates the law and ask the court to block any new transfer or use of this data for immigration enforcement purposes.
“The Trump Administration has upended longstanding privacy protections with its decision to illegally share sensitive, personal health data with ICE. In doing so, it has created a culture of fear that will lead to fewer people seeking vital emergency medical care,” said Attorney General Bonta. “I’m sickened by this latest salvo in the President’s anti-immigrant campaign. We’re headed to court to prevent any further sharing of Medicaid data — and to ensure any of the data that’s already been shared is not used for immigration enforcement purposes.”
Created in 1965, Medicaid is an essential source of health insurance for lower-income individuals and particular underserved population groups, including children, pregnant women, individuals with disabilities, and seniors. The Medicaid program allows each participating state to develop and administer its own unique health plans; states must meet threshold federal statutory criteria, but they can tailor their plans’ eligibility standards and coverage options to residents’ needs. As of January 2025, 78.4 million people were enrolled in Medicaid and the Children’s Health Insurance Program (CHIP) nationwide.
California’s Medi-Cal program provides healthcare coverage for one out of every three Californians, including more than two million noncitizens. Noncitizens include green card holders, refugees, individuals who hold temporary protected status, Deferred Action for Childhood Arrival recipients, and others. Not all noncitizens are eligible for federally funded Medi-Cal services, and so California uses state-only funds to provide a version of the Medi-Cal program to all eligible state residents, regardless of their immigration status.
A certain amount of personal data is routinely exchanged between the states and the federal government for purposes of administering Medicaid, including verifying eligibility for federal funding. Historically, DHS has acknowledged that the Medicaid Act and other federal healthcare authorities foreclose the use of Medicaid personal information for immigration enforcement purposes. Yet now, the federal government appears to have — without formal acknowledgment — adopted a new policy that allows for the wholesale disclosure and use of state residents’ personal Medicaid data for purposes unrelated to Medicaid program administration. On June 13, 2025, California and other states learned through news reports that HHS has transferred en masse their state’s Medicaid data files, containing personal health records representing millions of individuals, to DHS. Reports indicate that the federal government plans to create a sweeping database for “mass deportations” and other large-scale immigration enforcement purposes.
The federal government claims it gave this data to DHS “to ensure that Medicaid benefits are reserved for individuals who are lawfully entitled to receive them.” But it is Congress that extended coverage and federal funds for emergency Medicaid to all individuals residing in the United States, regardless of immigration status. The states have and will continue to cooperate with federal oversight activities to ensure that the federal government pays only for those Medicaid services that are legally authorized.
In today’s lawsuit, Attorney General Bonta and the coalition highlight that the Trump Administration’s illegal actions are creating fear and confusion that will lead noncitizens and their family members to disenroll, or refuse to enroll, in emergency Medicaid for which they are otherwise eligible, leaving states and their safety net hospitals to foot the bill for federally mandated emergency healthcare services. They may not get the emergency health services they need and will suffer negative health consequences — and even death — as a result. The coalition asks that the court find the Trump Administration’s actions arbitrary and capricious and rulemaking without proper procedure in violation of the Administrative Procedure Act, contrary to the Social Security Act, Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Modernization Act, and Privacy Act, and in violation of the Spending Clause. They ask the court to enjoin HHS from transferring personally identifiable Medicaid data to DHS or any other federal agency and DHS from using this data to conduct immigration enforcement.
Attorney General Bonta leads the attorneys general of Arizona, Colorado, Connecticut, Delaware, Hawaii, Illinois, Massachusetts, Maine, Maryland, Michigan, Minnesota, Nevada, New Jersey, New Mexico, New York, Oregon, Rhode Island, Vermont, and Washinton in filing the lawsuit.
A copy of the lawsuit will be posted online here when available.
Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States
Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.
Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.
“This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”
“The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”
“Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”
“These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”
As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.
As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.
Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.
The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.
Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.
The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation.
The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.
A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)
CHARLESTON, W.Va. – Randy Price, 52, of Wayne, pleaded guilty today to being a felon in possession of a firearm.
According to court documents and statements made in court, on July 16, 2019, a law enforcement officer conducted a traffic stop of a vehicle driven by Price in Charleston. Price attempted to flee on foot but was captured. Law enforcement seized a Raven Arms MP-25 .25-caliber pistol from the vehicle.
Federal law prohibits a person with a prior felony conviction from possessing a firearm or ammunition. Price knew he was prohibited from possessing a firearm because of his prior felony convictions for involuntary manslaughter and aggravated robbery in Cuyahoga County, Ohio, Court of Common Pleas on June 28, 2002.
Price is scheduled to be sentenced on October 2, 2025, and faces a maximum penalty of 15 years in prison, up to three years of supervised release, and a $250,000 fine.
Acting United States Attorney Lisa G. Johnston made the announcement and commended the investigative work of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and the Charleston Police Department.
United States District Judge Joseph R. Goodwin presided over the hearing. Assistant United States Attorneys JC MacCallum and Negar M. Kordestani have prosecuted the case.
This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.
A copy of this press release is located on the website of the U.S. Attorney’s Office for the Southern District of West Virginia. Related court documents and information can be found on PACER by searching for Case No. 2:22-cr-97.
Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)
CHARLESTON, W.Va. – Randy Price, 52, of Wayne, pleaded guilty today to being a felon in possession of a firearm.
According to court documents and statements made in court, on July 16, 2019, a law enforcement officer conducted a traffic stop of a vehicle driven by Price in Charleston. Price attempted to flee on foot but was captured. Law enforcement seized a Raven Arms MP-25 .25-caliber pistol from the vehicle.
Federal law prohibits a person with a prior felony conviction from possessing a firearm or ammunition. Price knew he was prohibited from possessing a firearm because of his prior felony convictions for involuntary manslaughter and aggravated robbery in Cuyahoga County, Ohio, Court of Common Pleas on June 28, 2002.
Price is scheduled to be sentenced on October 2, 2025, and faces a maximum penalty of 15 years in prison, up to three years of supervised release, and a $250,000 fine.
Acting United States Attorney Lisa G. Johnston made the announcement and commended the investigative work of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and the Charleston Police Department.
United States District Judge Joseph R. Goodwin presided over the hearing. Assistant United States Attorneys JC MacCallum and Negar M. Kordestani have prosecuted the case.
This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.
A copy of this press release is located on the website of the U.S. Attorney’s Office for the Southern District of West Virginia. Related court documents and information can be found on PACER by searching for Case No. 2:22-cr-97.
Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)
ST. LOUIS – Two people have admitted to attempting to kidnap and rob a St. Louis apartment property manager at gunpoint in 2024, as well as other gun crimes.
Emma M. Cunningham, 32, pleaded guilty Monday in U.S. District Court to attempted kidnapping, transfer of a firearm to a convicted felon and making a false statement in connection with the purchase of a firearm.
Jervonz L. Williams, 49, pleaded guilty on June 23 to attempted kidnapping, robbery and possession of a firearm by a felon.
Both admitted that on Feb. 20, 2024, Cunningham bought a handgun for Williams, her boyfriend and a convicted felon who is thus barred from possessing firearms. Cunningham lied on Bureau of Alcohol, Tobacco, Firearms and Explosives Form 4473 when she claimed she was buying the gun for herself and when she denied being an unlawful user of a controlled substance.
Williams admitted using the gun to threaten others, including one of Cunningham’s neighbors. He also admitted using it to rob a drug dealer of $17, a gun and cocaine base in late June of 2024. Williams struck the dealer on the head with the revolver multiple times during the robbery.
Williams and Cunningham used that gun again on Aug. 5, 2024, in a failed bid to kidnap an apartment property manager in St. Louis. The property manager was meeting Cunningham, her tenant, for a final walkthrough. When the victim entered the apartment, Cunningham locked the door and Williams threatened to kill her when she tried to call 911. Williams then demanded cash and the password to her phone so that they could access her financial accounts. They secured her to a chair with duct tape, but she broke free and was able to escape, even though Cunningham and Williams ripped off her shirt and tore out clumps of her hair trying to prevent her from leaving. Two days later, police arrested the couple. Williams had the .38-caliber revolver Cunningham purchased and she had a box of ammunition.
Williams is scheduled to be sentenced on September 24 and Cunningham on September 30. The kidnapping and robbery charges each carry a potential penalty of up to 20 years in prison. The felon in possession and transfer of a firearm charge each carry a penalty of up to 15 years. The false statement charge carries a penalty of up to 10 years in prison.
The Bureau of Alcohol, Tobacco, Firearms and Explosives and the St. Louis Metropolitan Police Department investigated the case. Assistant U.S. Attorney Zachary Bluestone is prosecuting the case.
This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.
Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)
ST. LOUIS – Two people have admitted to attempting to kidnap and rob a St. Louis apartment property manager at gunpoint in 2024, as well as other gun crimes.
Emma M. Cunningham, 32, pleaded guilty Monday in U.S. District Court to attempted kidnapping, transfer of a firearm to a convicted felon and making a false statement in connection with the purchase of a firearm.
Jervonz L. Williams, 49, pleaded guilty on June 23 to attempted kidnapping, robbery and possession of a firearm by a felon.
Both admitted that on Feb. 20, 2024, Cunningham bought a handgun for Williams, her boyfriend and a convicted felon who is thus barred from possessing firearms. Cunningham lied on Bureau of Alcohol, Tobacco, Firearms and Explosives Form 4473 when she claimed she was buying the gun for herself and when she denied being an unlawful user of a controlled substance.
Williams admitted using the gun to threaten others, including one of Cunningham’s neighbors. He also admitted using it to rob a drug dealer of $17, a gun and cocaine base in late June of 2024. Williams struck the dealer on the head with the revolver multiple times during the robbery.
Williams and Cunningham used that gun again on Aug. 5, 2024, in a failed bid to kidnap an apartment property manager in St. Louis. The property manager was meeting Cunningham, her tenant, for a final walkthrough. When the victim entered the apartment, Cunningham locked the door and Williams threatened to kill her when she tried to call 911. Williams then demanded cash and the password to her phone so that they could access her financial accounts. They secured her to a chair with duct tape, but she broke free and was able to escape, even though Cunningham and Williams ripped off her shirt and tore out clumps of her hair trying to prevent her from leaving. Two days later, police arrested the couple. Williams had the .38-caliber revolver Cunningham purchased and she had a box of ammunition.
Williams is scheduled to be sentenced on September 24 and Cunningham on September 30. The kidnapping and robbery charges each carry a potential penalty of up to 20 years in prison. The felon in possession and transfer of a firearm charge each carry a penalty of up to 15 years. The false statement charge carries a penalty of up to 10 years in prison.
The Bureau of Alcohol, Tobacco, Firearms and Explosives and the St. Louis Metropolitan Police Department investigated the case. Assistant U.S. Attorney Zachary Bluestone is prosecuting the case.
This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.
New York City, July 01, 2025 (GLOBE NEWSWIRE) — Against the backdrop of drastic fluctuations in the global economy, cryptocurrencies have become the “number one” investment asset pursued by global investors. In particular, BTC, ETH, and XRP continue to influence the global cryptocurrency market. However, AQUARONE, Steffan Luke, CEO of WinnerMining Co., Ltd., believes that amid the market fluctuations that everyone is worried about, there are business opportunities that cannot be missed.
“Volatility” turns into business opportunities WinnerMining not only prevents market volatility, but also stimulates more active trading. WinnerMining offers a variety of different investment contracts for investors of all levels, allowing them to make investment decisions with confidence. Despite the uncertainty of US policies under President Trump, which may affect global cryptocurrencies, WinnerMining can cope with the challenges that may arise in the second half of the year and maintain its leading position in the international cryptocurrency market. “WinnerMining has experienced crises, whether it is COVID-19 that disrupts the world, US taxation, or regional political conflicts, and each time it has been able to manage in a professional manner and has good resources and connections in the global crypto market, so our customers will still be taken care of in the best way without being affected by irregular market behavior.”
What are the advantages of Winnermining? 1. Fund security: The biggest concern of any investor is fund security. There is no need to worry about it at Winnermining, because Winnermining adopts military-grade double protection and stores funds in cold wallets and the world’s top 10 authoritative banks. And it can protect users from asset loss or inflation problems between conflicts.
2. Registration bonus: In order to welcome novices or experienced miners who join Winnermining for the first time, as long as they join Winnermining, they will immediately receive a platform reward of $15.
3. Multiple choices: Provide more than 10 different levels of contracts, suitable for users of any class, and also support free cloud mining!
4. Flexible participation: Support global users to invest in popular currencies such as BTC, ETH, XRP, SOL, DOGE, USDT, USDC, LTC, BCH, etc.
5. Maintain sustainability: Winnermining has more than 100 large and small new energy power generation sites around the world to maintain the development of cloud mining and continue the mining process.
6. Customer Support: We provide 24-hour online customer service. Users can visit and consult at any time in any region. Adhering to the concept that customers are God, we serve users from all over the world wholeheartedly and let users have the experience of first love.
How to participate in Winnermining? Step 1: Visit the official website, fill in your email address and set your username/password to complete the registration. Step 2: Select the appropriate contract to purchase and lease (all lease contracts can refund the principal). Step 3: After the purchase is completed, no operation is required, just wait for 24 hours to get daily income.
How to earn income on Winnermining? Users can complete registration on the official website or application and purchase contracts on the platform. Some equity contracts of WinnerMining in 2025 can be viewed here: I- Antminer S17e: Investment amount of $100, total profit of $100 + $8. II – Shenma Miner M30S: Investment amount of $1000, total profit of $1000 + $130. III – Antminer S19J Pro: Investment amount of $3000, total profit of $3000 + $675. IV- AvalonMiner A1346: Investment amount of $5000, total profit of $5000 + $1600. V – Desiwe Miner K10Ultra: Investment amount of $30,000, total profit of $30,000 + $24300. VI – Rack-mounted Filecoin Miner 4300TiB S: Investment amount of $100,000, total profit of $100,000 + $92,500. (Visit WinnerMining.VIP to view more contracts)
Overview: Winnermining knows that in the ever-changing crypto market, no one can stand still. The fluctuating crypto market has bubbles and opportunities, and participating in WinnerMining cloud mining is a good choice for digital growth. Join now and get a $15 reward without applying. —— Click to download the APP to participate in WinnerMining to take you to experience the daily growth progress of digital assets.
Villers-lès-Nancy, 1st July 2025 – 07:00 p.m. (CET)
PRESS RELEASE
RESULTS OF THE VOTES ON THE RESOLUTIONS SUBMITTED TO THE ORDINARY ANNUAL SHAREHOLDERS’ MEETING OF 25 JUNE 2025
Number of shares comprising the share capital: 15,174,125
Number of shares with voting rights: 14,830,415
Number of shares with voting rights possessed by shareholders presents or represented or having voted by mail: 13,173,125
That means a quorum of 88.83% of the 14,830,415 shares with voting rights:the Ordinary Annual General Meeting was able to deliberate.
The Ordinary Annual General Meeting was held on Wednesday, 25 June 2025 at 5:30 p.m. at the Company’s headquarters and approved the separate parent company and consolidated financial statements for the 2024 financial year. The results of the votes on the resolutions proposed at this meeting by the Board of Directors were as follows:
Resolutions
Results of the votes
RESOLUTION ONE
Approval of the annual financial statements
Resolution adopted by:
13,170,684 votes in favour
0 vote against
2,441 abstentions
RESOLUTION TWO
Discharge of directors and discharge of the Statutory Auditors for the performance of their engagement
Resolution adopted by:
12,831,312 votes in favour
339,266 votes against
2,547 abstentions
RESOLUTION THREE Approval of the consolidated financial statements
Resolution adopted by:
13,170,684 votes in favour
0 vote against
2,441 abstentions
RESOLUTION FOUR
Appropriation of earnings, setting the dividend
Resolution adopted by:
13,138,631 votes in favour
34,494 votes against
0 abstention
RESOLUTION FIVE
Agreements and commitments governed by Articles L. 225-38 of the French Commercial Code
Resolution adopted by (*):
13,101,211 votes in favour
59,549 votes against
12,365 abstentions
RESOLUTION SIX
Approval of the information on the compensation of corporate officers paid in or granted for fiscal 2024 and mentioned in Article L. 22-10-9 of the French Commercial Code
Resolution adopted by:
12,507,815 votes in favour
665,242 votes against
68 abstentions
RESOLUTION SEVEN
Approval of the components of compensation paid in 2024 to Mr. Thierry CHAPUSOT, Chairman of the Board of Directors
Resolution adopted by:
13,115,547 votes in favour
57,510 votes against
68 abstentions
RESOLUTION EIGHT
Approval of the components of compensation paid in 2024 to Mr. Denis SUPPLISSON, Chief Executive Officer
Resolution adopted by:
10,782,118 votes in favour
2,390,939 votes against
68 abstentions
RESOLUTION NINE
Approval of the components of compensation paid in 2024 to Mr. Grégoire DE ROTALIER, Deputy CEO
Resolution adopted by:
10,782,118 votes in favour
2,390,939 votes against
68 abstentions
RESOLUTION TEN
Approval of the components of compensation paid in 2024 to Mr. Damien VALICON, Deputy CEO (non-Board member), as from 01/04/2024
Resolution adopted by:
10,762,253 votes in favour
2,410,804 votes against
68 abstentions
RESOLUTION ELEVEN
Approval of the compensation policy for Mr. Thierry CHAPUSOT, Chairman of the Board of Directors, for 2025
Resolution adopted by:
13,115,547 votes in favour
57,510 votes against
68 abstentions
RESOLUTION TWELVE
Approval of the compensation policy for Mr. Denis SUPPLISSON, Chief Executive Officer, for 2025
Resolution adopted by:
10,545,572 votes in favour
2,454,875 votes against
172,678 abstentions
RESOLUTION THIRTEEN
Approval of the compensation policy for Mr. Grégoire de ROTALIER, Deputy Chief Executive Officer, for 2025
Resolution adopted by:
10,537,207 votes in favour
2,463,240 votes against
172,678 abstentions
RESOLUTION FOURTEEN
Approval of the compensation policy for Mr. Damien VALICON, Deputy Chief Executive Officer, for 2025
Resolution adopted by:
10,537,207 votes in favour
2,463,240 votes against
172,678 abstentions
RESOLUTION FIFTEEN
Approval of the compensation policy for Directors
Resolution adopted by:
13,127,845 votes in favour
45,212 votes against
68 abstentions
RESOLUTION SIXTEEN
Setting total annual compensation for Directors for 2025
Resolution adopted by:
13,127,845 votes in favour
45,212 votes against
68 abstentions
RESOLUTION SEVENTEEN
Authorisation by the Company to repurchase its own shares
Resolution adopted by:
11,297,178 votes in favour
1,875,947 votes against
0 abstention
RESOLUTION EIGHTEEN
Powers for formalities
Resolution adopted by:
13,173,125 votes in favour
0 vote against
0 abstention
(*)After deduction of excluded voting rights
Upcoming financial communications
31 July 2025: Q2 2025 revenue – After the close of trading
26 September 2025: H1 2025 results: 26 September 2025
Founded over 35 years ago, Equasens Group, a leader in digital healthcare solutions, today employs over 1.300 people across Europe. Equasens Group’s specialised business applications facilitate the day-to-day work of healthcare professionals and their teams, working in private practice, collaborative medical structures or healthcare establishments. The Group also provides comprehensive support to healthcare professionals in the transformation of their profession by developing electronic equipment, digital solutions and healthcare robotics, as well as data hosting, financing and training adapted to their specific needs. And reflecting the spirit of its tagline “Technology for a More Human Experience”, the Group is a leading provider of interoperability solutions that improve coordination between healthcare professionals, their communications and data exchange resulting in better patient care and a more efficient and secure healthcare system.
Listed on Euronext Paris™ – Compartment B
Indexes: MSCI GLOBAL SMALL CAP – GAÏA Index 2020 – CAC®SMALL and CAC®All-Tradable Included in the Euronext Tech Leaders segment and the European Rising Tech label
Eligible for the Deferred Settlement Service (“Service à Réglement Différé” – SRD) and equity savings accounts invested in small and mid-caps (PEA-PME). ISIN: FR 0012882389 – Ticker Code: EQS
The Board of Directors of the African Development Bank Group (www.AfDB.org) has approved a ZAR 2.5 billion (approximately $139 million) corporate loan to the City of Johannesburg Metropolitan Municipality, marking the Bank’s first direct lending to a subnational entity in Africa.
The transaction will finance critical infrastructure projects in electricity, water, sanitation, and solid waste management, directly benefiting over 6 million residents in South Africa’s economic powerhouse.
The approval marks a transformative moment for municipal financing across Africa, operationalizing the African Development Bank’s Guidelines for Subnational Finance for the first time. The funding will exclusively support trading services infrastructure that generates revenue, ensuring sustainable debt repayment, while addressing urgent challenges in service delivery.
“This landmark transaction, led by the African Development Bank’s Infrastructure and Urban Development Department, in coordination with the Water and Sanitation Department, and the Power Department, signals a new era in how the African Development Bank can empower cities,” said the Bank’s Vice President for Private Sector, Infrastructure & Industrialization, Solomon Quaynor. “By directly financing Johannesburg, we are unlocking a scalable model for subnational lending that enables multi-sectoral infrastructure delivery and positions the Bank as a trusted partner in driving sustainable, inclusive urban development across Africa.”
The loan will finance over 100 carefully selected projects across four vital sectors: upgrading distribution networks, installing smart meters, expanding renewable energy capacity, and connecting 3,200 new households to the grid; rehabilitating aging pipelines, upgrading treatment facilities, and reducing water losses from 46% to 37%; and improving landfill compliance, expanding recycling facilities, and enhancing waste collection services.
“This historic transaction demonstrates the African Development Bank’s commitment to supporting creditworthy cities as engines of economic growth,” said the African Development Bank’s Director General for Southern Africa, Kennedy Mbekeani. “Johannesburg is not just South Africa’s largest city – it contributes 16% to the country’s GDP and serves as a gateway for investment across the continent. By strengthening its infrastructure backbone, we’re investing in Africa’s urban future.”
The City of Johannesburg faces significant infrastructure challenges, with annual electricity losses of 30% for the past three years and water losses of 46.1%. The project is expected to create 2,869 jobs during construction and substantially improve service reliability for millions of residents.
An additional $1.5 million grant through the Bank’s Urban and Municipal Development Fund is being sought to support municipal reforms, governance and climate-resilient planning initiatives.
Beyond infrastructure improvements, the project will deliver significant socioeconomic benefits:
592 full-time equivalent jobs, with 14% reserved for women and 23% for youth.
Reduced electricity and water interruptions will boost productivity for 65% of electricity and 5% of water consumed by industry.
Enhanced free basic services for 160,000 indigent households.
ZAR 500 million in contracts earmarked for small and medium enterprises, with 40% reserved for women-owned businesses and 50% for youth entrepreneurs.
The African Development Bank has included comprehensive safeguards in the project to assure robust monitoring and oversight, transparency, compliance, and sound financial management throughout the loan lifecycle.
Distributed by APO Group on behalf of African Development Bank Group (AfDB).
Media contact: Emeka Anuforo Communication and External Relations Department media@afdb.org
About the African Development Bank Group: The African Development Bank Group is Africa’s premier development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). On the ground in 41 African countries with an external office in Japan, the Bank contributes to the economic development and the social progress of its 54 regional member states.
On July 1, 2025 the Minister of Foreign Affairs of the Republic of Belarus, Maxim Ryzhenkov, held a meeting with the Minister of International Relations of the Republic of Botswana, Phenyo Butale, who is paying an official visit to Belarus.
This is the first visit by the head of Botswana’s foreign ministry to our country in the history of Belarusian-Botswana relations.
During the meeting, the parties discussed ways to strengthen political and interministerial dialogue, expand mutual trade, cooperation in the fields of agriculture and food security, healthcare, education, and the formation of a legal framework.
The parties reaffirmed their commitment to coordinate on all aspects of the bilateral and international agenda.
The ministers agreed on practical steps to intensify cooperation and confirmed their mutual interest in holding a series of bilateral events in 2025–2026.
Following the negotiations, a joint statement was signed by the foreign ministers of Belarus and Botswana, expressing their intention to strengthen multifaceted cooperation.
Distributed by APO Group on behalf of Ministry of Foreign Affairs of the Republic of Belarus.
On the morning of July 1, 2025, Aissatou, a young mother from Diamniadio, arrived early at the health center, her two-month-old baby snuggled against her. She hadn’t come for a routine consultation—today, her child was receiving the new hexavalent vaccine.
“Before, I was afraid of multiple injections for my baby. Today, the health workers explained to me that a single dose protects against six serious diseases. It’s reassuring to know that he’ll suffer less while being better protected,” confides Aissatou, gazing at her sleeping son.
Like her child, 640,000 infants are targeted this year by the new vaccination schedule. Thanks to the introduction of the hexavalent vaccine, they will be protected against diphtheria, tetanus, whooping cough, hepatitis B, Haemophilus influenzae type B (Hib), and poliomyelitis—all in a single shot.
Behind this apparent simplification lies a long process of preparation. The Expanded Programme on Immunization (EPI), with technical and financial support from partners such as Gavi and the World Health Organization (WHO), led an ambitious transition. WHO in particular trained nearly 6,000 health workers, ensured rigorous cold chain management (the vaccine must be kept between +2°C and +8°C), and deployed digital real-time monitoring tools.
“Hexavalent represents a qualitative leap for us vaccinators. A single injection means faster vaccination, less crying, and above all, greater protection,” explains Aminata, a vaccinator in Diamniadio.
1.6 million doses have been positioned across the country’s 14 regions. The aim is to achieve at least 90% vaccination coverage by the end of the year. And the expected benefits are considerable: according to Ministry of Health projections, the introduction of this vaccine could halve hospitalizations for the targeted diseases by 2030.
For Dr. Badiane, coordinator of the national EPI, this reform marks a turning point: “It’s not just a change of vaccine—it’s a new paradigm. We’re simplifying the schedule, strengthening immunity, and gaining in effectiveness in the field. WHO’s support has been decisive at every stage.”
Beyond the numbers and logistics, it’s families like Aissatou’s who are feeling the change in concrete terms: less stress at each vaccination appointment, a better understanding of health issues, and above all, renewed confidence in the healthcare system.
Dr. Jean-Marie Vianny Yameogo, WHO Representative in Senegal, sees this transition as an illustration of health equity: “Introducing the hexavalent vaccine means offering every Senegalese child the same chance to grow up in good health. It’s a concrete commitment to reducing inequalities and building a fairer future for all.”
As she leaves the health center, vaccination booklet in hand, Aissatou takes a moment to smile. “I’ll be back for the other doses. My child deserves the best possible protection.”
An individual decision—but a collective step towards a healthier future.
Distributed by APO Group on behalf of World Health Organization (WHO) – Senegal.
The Food and Agriculture Organization of the United Nations (FAO) announced the winners of the 2025 FAO Awards, recognizing organizations from Colombia, Egypt, and the Philippines, whose work has led to outstanding progress in building more efficient, inclusive, resilient and sustainable agrifood systems.
On Monday, FAO Director-General QU Dongyu presented the Champion Award and Partnership Award during the 44th FAO Ministerial Conference held in Rome.
“These Awards are more than an acknowledgment of achievements – they represent FAO’s core values and aspirations. The ceremony is a celebration of possibility and hope of what happens when commitment and innovation meet the urgent call to transform global agrifood systems,” he said.
The FAO Champion Award, the Organization’s highest corporate award, which carries a prize of USD 50,000 and recognizes significant and outstanding contributions towards advancing FAO’s overall goals, was conferred to la Confederación Mesa Nacional de Pesca Artesanal de Colombia (COMENALPAC), for its tangible results across organizational, social, economic and environmental dimensions, including championing social protection measures for fishers and played a key role in drafting laws against illegal fishing, thereby improving the welfare and rights of fishing communities.
Since 2017, COMENALPAC has represented over 800 groups of marine and freshwater fishers across Colombia. Its work has contributed to the design and implementation of key legislation, including Law 2268 of 2022, which guarantees social benefits for commercial and subsistence fishers.
Through an FAO–COMENALPAC partnership, the organization has strengthened fisher communities in Tumaco by eliminating intermediaries, increasing incomes, and promoting inclusive market opportunities. It has also led to the restoration of 83 wetlands, contributing to aquatic biodiversity and more sustainable food systems. The organization was further praised for helping secure the legal recognition of more than 120,000 fishers and for its role in incorporating the concept of “Aquatic Agrifood Ecosystems” into Colombia’s National Development Plan.
In addition, within the same category, a Special Mention was also awarded to Youth Uprising, a Philippine-based non-profit organization recognized for its intense engagement of young people in transforming agrifood systems.
The FAO Partnership Award — valued at USD 10,000 and recognizing outstanding cooperation with FAO in advancing the Organization’s work by its Members — was presented to The Egyptian Food Bank (EFB), the first Egypt NGO focused on addressing food insecurity, providing support to over 24 million people through comprehensive food assistance, nutrition, and empowerment programs.
Among the EFB’s most notable initiatives are the Community Nutrition Programme, the Ramadan Food Loss Initiative, and the Resilience Index Measurement and Analysis (RIMA). EFB’s programs have benefited over 150,000 families and more than 60,000 schoolchildren. Its work also includes capacity-building for small-scale producers and support to 1,200 farmers — particularly women — promoting sustainable agricultural practices and economic inclusion.
The FAO Director-General bestowed the awards to representatives of the organizations who attended the ceremony in person.
Adriana Rocío Cadena Cancino, Director of la Confederación Mesa Nacional de Pesca Artesanal de Colombia (COMENALPAC), received the Champion Award on behalf of the organization.
Mohsen Sarhan Ali Gamal Ali, Chief Executive Officer of The Egyptian Food Bank (EFB), accepted the Partnership Award on behalf of his organization.
Source: State University of Management – Official website of the State –
On July 1, 2025, a joint meeting of the commissions of the State Council of the Russian Federation in the areas of “Personnel”, “Youth and Children”, “Family” was held at the site of the State University of Management to consider the draft Strategy for the Development of Education in the Russian Federation until 2036.
The moderator of the meeting, Russian journalist and TV presenter Ernest Matskyavichyus, introduced the main participants in the discussion and reported that more than 1,000 experts worked on the text of the Education Development Strategy, many of whom are present at the meeting.
The Chairman of the Commission of the State Council of the Russian Federation on “Personnel”, Governor of the Kaluga Region, and graduate of the State University of Management Vladislav Shapsha noted in his welcoming speech that the education system should be flexible and adaptive, integrated into the real sector of the economy and continuous.
“Today, a situation has arisen where one specialty is no longer enough for an educated person; at least two are needed to always be prepared for the changing situation on the labor market. Qualified specialists of a new type must think innovatively and be able to solve problems in the context of rapid digital transformation and global competition. The key tasks now are: synchronizing education with the labor market, overcoming imbalances in personnel training and forming a system of advanced training, since in the future the situation will change even faster, and artificial intelligence can sharply reduce employment in many areas of labor activity,” warned Vladislav Shapsha.
The Chairman of the State Council of Russia Commission on “Youth and Children”, Governor of the Yamalo-Nenets Autonomous Okrug Dmitry Artyukhov expressed pleasure at the representative meeting on such a comprehensive topic.
“Education is a vital area that concerns absolutely everyone: teachers, parents, and millions of children and young people across the country. We have done serious work on the Education Development Strategy on the instructions of the President. Now it is time to move on to action – to focus on implementing our plans. Together, we are laying the foundation for the future of Russian education. This is a vital state task, because it is education that solves key problems for the country: it provides knowledge and skills, trains personnel for the economy, and most importantly, brings up a new generation of Russians,” said Dmitry Artyukhov.
The Chairman of the State Council of Russia’s Commission on the “Family” Direction, Head of the Republic of Mordovia Artem Zdunov drew the attention of those gathered to the fact that the document under discussion will determine the development vectors not only of education itself, but also through it of the entire country as a whole.
“I will note two key priorities of the Strategy. The first is the further implementation of high-quality education regardless of the place of residence and social status of the family. Much has already been done for this: new schools and kindergartens have been built, major repairs have been carried out, and institutions have been equipped with modern equipment. The second priority is that the education system should be built on the basis of traditional Russian values, including a strong family. Efforts in this direction should be systemic and continuous, starting from kindergarten to university. The cult of large families should be spread everywhere, similar to how this year we widely celebrate the 80th anniversary of Victory in the Great Patriotic War – information should be broadcast from TV screens, from the Internet, from billboards on city streets and in educational institutions,” said Artem Zdunov.
Deputy Minister of Education of the Russian Federation Irina Shvartsman said that a public opinion poll was conducted to prepare the draft Strategy for the Development of Education, which affected 338 thousand people. The structure of the Strategy was developed by 15 working groups, including representatives of all departments, the Presidential Administration, the Russian Academy of Education and other experts.
“The strategy does not hide the problems, it is designed to identify and eliminate them. These are the problems of a shortage of personnel and wages, dilapidated buildings, bureaucratic burden on teachers, and the ideological gap between teachers and students. One of the main values in the education system should be a person. The rights of children and teachers should be equally protected. And to achieve humanitarian and scientific-technical leadership of Russia in the world, it is necessary not only to train qualified specialists, but also to work systematically in the direction of patriotic education,” said Irina Shvartsman.
Deputy Minister of Science and Higher Education of the Russian Federation Dmitry Afanasyev noted that for the first time in Russia a single document on issues of education development is appearing.
“In response to current challenges, the Ministry of Education and Science proposes to create a new list of specialties that meet the country’s strategic objectives, reboot and update state programs such as “Priority 2030” and “Advanced Engineering Schools”, and continue to build new university campuses. In addition, it is necessary to strengthen the influence of domestic education abroad, develop online forms of education, and promote the Russian language as the language of international communication. In this area, the Strategy still requires revision,” Dmitry Afanasyev said.
Rector of the State University of Management Vladimir Stroyev noted the significant number of GUU graduates at a meeting of the State Council commissions and spoke about the work of the university.
“The need to change the education system is obvious, but its conservatism can also have its advantages. Until the 1990s, GUU was not a management university, but an engineering and economics university. And we managed to preserve elements of the previous system. Starting in 2022, we are actively reviving the system of training industry managers who understand and know the production base well. For this purpose, GUU is implementing a system of seamless project-based learning. The structure of the university includes the Pre-University – a budget school where, in addition to studying general subjects, students begin to get used to practice-oriented learning. GUU is probably the only university in the country where project-based learning is practiced in 100% of areas of education, starting from the 1st year, which by the end of the study leads to a high level of graduate employment. In addition, we do not forget about the meanings – we are a leading university in the field of educational work, we support student families, and we encourage employees to have children. Our task is not only to raise a competent manager, but also to educate him as a responsible citizen who works for the benefit of the state and society,” said Vladimir Stroyev.
In addition, the rector of the State University of Management introduced the meeting participants to the scientific and technical achievements of the university, in particular, to the system of work of the inter-university design bureau, and invited those interested to take a tour of the university.
The meeting was also attended by: Deputy Head of the Secretariat of the Deputy Prime Minister of the Russian Government Antony Shvindt, Director of the Department of Personnel Policy of the Ministry of Education and Science of the Russian Federation Alexey Svistunov, Deputy Governor of the Kaluga Region Tatyana Leonova, Deputy Head of the Federal Service for Supervision in Education and Science Evgeny Semchenko and many other experts.
Summing up the panel discussion, the Chairman of the State Council of the Russian Federation Commission on Personnel Vladislav Shapsha particularly highlighted the topic raised by many speakers about the key role of education within the Education Development Strategy. “You can teach a lot, but if a person does not have a moral core, then his technical skills can be harmful. The Russian person has always been spiritual. You cannot understand Russia with your mind, you cannot measure it with a common yardstick…”, Vladislav Valerievich concluded the meeting of the State Council commissions with a quote from a poem by Fyodor Tyutchev.
After the end of the panel discussion, the participants of the meeting of the State Council commissions were given a tour of the State University of Management, as promised by the rector. In addition to the experts, the moderator of the discussion, Ernest Matskyavichyus, did not miss this opportunity.
The guests were shown the new workshop of the student design bureau “Innovative Solutions”, the Engineering Project Management Center and the Media Center of the State University of Management. Antoniy Shvindt paid special attention to the scientific and technical developments of the State University of Management. Aleksey Svistunov appreciated the comfort and equipment of the premises. Ernest Matskyavichyus, naturally, was most interested in the studios, and Tatyana Leonova even proposed a project for a series of short educational videos on the topic of management science.
Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.
The following text contains opinion that is not, or not necessarily, that of MIL-OSI –
Chairwoman McClain Slams Democrats for Failing to Condemn Violent Attacks on Police Officers
Washington, June 27, 2025
WASHINGTON—House Republican Conference Chairwoman Lisa McClain (R-Mich.) released the following statement after the U.S. House passed H. Res. 516 – a resolution that condemns the violent riots in Los Angeles, California, and expresses support for law enforcement officers:
“Burning cars and attacking law enforcement officers should never be considered a ‘peaceful protest’ in America. Democrats just failed to condemn the violent riots in Los Angeles and to express support for our law enforcement officers. Their derangement is on full display,” Chairwoman McClain said. “The contrast is clear: Democrats side with violent criminal illegal aliens, while Republicans will always stand with our heroic law enforcement officers. Shame on them.”
BALTIMORE — An investigation conducted by U.S. Immigration and Customs Enforcement led to the sentencing of Amos Oluremi Nureni, 43, to 10 years in prison followed by four years of supervised release, for conspiracy to distribute 40 grams or more of fentanyl and possession of a firearm in furtherance of a drug trafficking crime.
“This sentence sends a clear message: Those who traffic fentanyl, a deadly drug fueling our nation’s overdose crisis, will be held accountable,” said ICE Homeland Security Investigations Baltimore acting Special Agent in Charge Evan Campanella. “In Maryland, we are seeing the devastating impact of fentanyl on our communities every day. Through our strong partnerships with the DEA and the U.S. attorney’s office, HSI will continue to pursue and dismantle the criminal networks responsible for pushing this poison into our neighborhoods. The sentencing of Amos Oluremi Nureni is a direct result of that commitment.”
In September 2023, HSI and the DEA began investigating Nureni in connection with suspected fentanyl trafficking. During the investigation, law enforcement conducted two controlled purchases in which Nureni sold an undercover officer approximately 400 to 500 pills.
The pills were blue in color and imprinted with “M30” — mimicking the markings on legitimate pills from a manufacturer containing oxycodone hydrochloride. As confirmed by laboratory analysis, the blue “M30” pills contained fentanyl. In total, Nureni sold approximately 866 fentanyl pills — or nearly 100 grams of a mixture and substance containing fentanyl — to the undercover officer.
Law enforcement executed a search warrant on Nureni’s Laurel residence March 27, 2024. During the search, law enforcement found a bag containing approximately 10.48 grams (98 pills) of a mixture and substance containing fentanyl and a silver Taurus pistol with an obliterated number in Nureni’s safe. The pistol was loaded with a 9mm round of ammunition in the chamber and a magazine containing six rounds of 9mm ammunition.
Additionally, law enforcement found a large silver and red hydraulic press; a small silver hydraulic press; a digital scale with white powder residue; and several bags containing approximately 6.44 grams (61 pills) of fentanyl, approximately 6.25 grams of cocaine base, approximately 0.859 grams of cocaine, approximately 3.04 grams of cocaine, approximately 3.02 grams of methamphetamine and approximately 1.478 grams of dipentylone in Nureni’s residence.
Campanella, U.S. Attorney for the District of Maryland Kelly O. Hayes and DEA Washington Special Agent in Charge Ibrar A. Mian announced the sentence.
Members of the public with information about criminal activity should contact the ICE Tip Line at 866-DHS-2-ICE (866-347-2423).
Learn more about HSI Baltimore’s mission to increase public safety in our Maryland communities on X at @HSIBaltimore.
Source: American Federation of State, County and Municipal Employees Union
WASHINGTON – AFSCME President Lee Saunders released the following statement after the Senate passed its version of the budget reconciliation bill, which would bring even deeper cuts to Medicaid while also slashing food assistance and public services nationwide:
“We are deeply disappointed by the Senate’s decision to pass a dangerous budget that tears health care away from over 20 million people, leaves millions without food assistance, and saddles working families with higher costs. From the caregivers who rely on Medicaid to keep their loved ones at home, to the hardworking parents struggling to afford groceries, to the nurses worried about their patients losing care, everyday people will foot the bill for a budget that hands more tax cuts to billionaires at the expense of our communities.
“For months, AFSCME members have urged Congress to reject this morally bankrupt budget and put working families ahead of debt-exploding tax cuts for the ultra-wealthy. Instead, a narrow majority in the United States Senate sold out their own constituents by gutting the health care, food assistance and public services our communities count on. Their distorted priorities will not only increase costs for working people but also ignite a fiscal catastrophe that will force states, counties, cities and towns to slash funding for local schools, hospitals, nursing homes, emergency response centers, colleges and other basic services or shut them down entirely.
“This budget bill is deeply unpopular for a reason: It is the largest transfer of wealth from working families to billionaires and big corporations in American history, and it will cost lives and jobs. But this fight is not yet over. As this budget bill moves back to the House for final passage, AFSCME members will be getting organized and fighting tooth and nail to protect our communities.”
Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States
Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.
Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.
“This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”
“The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”
“Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”
“These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”
As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.
As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.
Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.
The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.
Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.
The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation.
The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.
A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
Glendale, California, July 01, 2025 (GLOBE NEWSWIRE) — RadCred, a leading innovator in financial technology, has launched a new platform designed to provide no credit check loans with guaranteed approval for U.S. consumers with bad credit. Unlike traditional banks, which often deny loans based on FICO scores, RadCred’s platform evaluates borrowers based on their income and repayment ability, ensuring that even those with low credit scores can access the funds they need.
With same day funding and no hard credit checks, RadCred provides fast financial relief for urgent needs like medical bills, car repairs, or rent payments. RadCred’s platform guarantees approval for bad credit personal loans for eligible applicants, offering loans up to $5,000, making it an ideal solution for those who might otherwise be rejected by traditional lenders. Whether you’re seeking quick loans for bad credit or an emergency loan for bad credit with guaranteed approval, RadCred ensures you can get the funds you need when you need them most.
What are No Credit Check Loans?
No credit check loans are a type of personal loan for bad credit where the lender does not perform a hard credit inquiry, which can negatively impact a borrower’s credit score. Instead, these no credit check loans focus on a borrower’s income and ability to repay. RadCred’s no credit check loans guaranteed approval provide immediate access to cash without the usual barriers imposed by traditional lenders.
Unlike traditional loans, which rely heavily on a borrower’s credit history, RadCred’s no credit check loans allow individuals with bad credit to access fast funding. RadCred uses a soft credit check to evaluate applications, meaning your credit score remains unaffected by the loan application process. This makes RadCred’s no credit check payday loans and bad credit personal loans guaranteed approval $5,000 ideal for people with low credit scores looking for fast financial relief.
How RadCred Solves the Problem
Many individuals with bad credit face barriers when seeking financial help. Traditional banks often reject loan applications from borrowers with a low credit score, leaving them without options in times of need. RadCred’s no credit check loans address this gap by focusing on income verification rather than credit history, making it easier for individuals to obtain loans for bad credit even with a credit score below 600.
RadCred’s process is simple, transparent, and fast. Borrowers can apply for no credit check payday loans from the comfort of their home and get same day payday loans. By evaluating applicants based on income, RadCred ensures more inclusive access to bad credit personal loans guaranteed approval $5,000, making it one of the most reliable lenders for bad credit borrowers.
Key Features of RadCred’s No Credit Check Loans:
Guaranteed Approval: Guaranteed approval for eligible applicants based on income, not FICO score. Borrowers with bad credit have a high chance of approval.
No Hard Credit Check: RadCred uses a soft credit inquiry, ensuring your credit score is not impacted by the loan application.
Same-Day Funding: Funds are typically deposited directly into your bank account the same day, providing fast access to cash.
Flexible Loan Terms: RadCred offers flexible repayment plans, allowing borrowers to choose a term length that suits their financial situation.
Transparent Terms: RadCred discloses APR, fees, and repayment schedules upfront, ensuring no hidden charges.
How to Get Guaranteed Approval for No Credit Check Loans
Applying for no credit check loans with guaranteed approval is easy with RadCred’s streamlined online process:
Apply Online: Complete a short application form with basic personal and financial information.
Soft Credit Check: RadCred uses a soft credit check, so your credit score is not affected by the application.
Receive Multiple Offers: RadCred’s system matches you with lenders based on your income and requested loan amount, giving you options to compare.
Choose Your Offer: Select the loan offer that best fits your needs.
Receive Funds: After approval, funds are typically transferred to your bank account within hours.
Eligibility for No Credit Check Loans
To apply for no credit check loans through RadCred, borrowers must meet the following criteria:
Must be at least 18 years old.
Must be a U.S. resident with a valid U.S. address.
Must have stable income (e.g., employment, benefits).
Must have an active bank account for loan disbursement.
No credit score requirement, though income and repayment ability are key factors.
Why RadCred is the Ideal Choice for Bad Credit Borrowers
RadCred stands out as a reliable solution for individuals seeking no credit check loans with guaranteed approval, especially those with bad credit. Here are some key advantages of choosing RadCred:
Same-Day Funding: RadCred offers fast access to funds, ensuring you get the money you need when emergencies arise.
No Hidden Fees: The platform provides transparent APRs and terms, ensuring borrowers won’t face unexpected charges or surprises.
Flexible Terms: You can select a loan amount and repayment plan that best fits your financial situation, offering more control over your loan.
Trustworthy Network: RadCred partners exclusively with licensed lenders who adhere to ethical lending practices, ensuring a safe borrowing experience.
Safe and Secure: With advanced encryption, RadCred protects your personal and financial data, giving you peace of mind throughout the process.
RadCred’s no credit check loans provide a transparent, secure, and flexible way for bad credit borrowers to access urgent financial relief.
RadCred Offers Various No Credit Check Loan Options for Borrowers with Bad Credit
RadCred’s platform is designed to help individuals facing financial difficulties, especially those with bad credit, by providing a range of no credit check loan options. With a focus on income and repayment ability, RadCred ensures a quick and seamless loan process, making it a reliable choice for borrowers who may have been turned down by traditional banks.
Types of No Credit Check Loans Provided by RadCred
Payday Loans Online (Same Day): RadCred connects borrowers with lenders who offer payday loans online with same-day funding. These short-term loans are ideal for those who need urgent financial assistance before their next paycheck.
Bad Credit Payday Loans: Tailored for individuals with poor credit scores, RadCred’s bad credit payday loans provide quick access to funds with guaranteed approval based on income verification, rather than credit history.
Installment Loans No Credit Check: For larger expenses, RadCred offers installment loans with flexible repayment terms. These loans are ideal for those who need more time to repay their borrowed amount.
Emergency Loans Without Credit Checks: RadCred provides emergency loans to cover unexpected expenses such as medical bills or urgent home repairs. The process is fast and efficient, ensuring that funds are available when needed most.
1-Hour Payday Loans: For immediate financial needs, RadCred offers 1-hour payday loans, providing quick funding for those in urgent need of cash.
These loan types offer flexibility and quick access to cash, all while ensuring that borrowers do not face the traditional barriers imposed by credit score checks.
How RadCred’s No Credit Check Loans Compare to Traditional Loans
Traditional Loans:
Strict credit score requirements: Traditional lenders, such as banks and credit unions, heavily rely on credit scores to determine eligibility. Individuals with bad credit or a low credit score often face difficulty in securing loans. If your score is below 600, the chances of qualifying for a traditional loan are significantly reduced.
Longer approval processes: The approval process for traditional loans is often lengthy and involves numerous steps. Applicants typically need to submit extensive paperwork, including proof of income and assets. The long waiting time is a major disadvantage for those needing immediate access to funds for emergencies.
Higher risk of rejection for bad credit borrowers: Traditional loans are usually not accessible to individuals with bad credit. The rejection rate is high for bad credit borrowers because traditional lenders focus primarily on the applicant’s credit history. As a result, those with poor credit scores or limited credit history are often denied financial assistance.
RadCred No Credit Check Loans:
Focus on income and repayment ability: Unlike traditional lenders, RadCred evaluates applicants based on their income and repayment ability, rather than credit scores. This provides an opportunity for borrowers with bad credit to qualify for loans.
Guaranteed approval for eligible applicants: RadCred offers guaranteed approval to borrowers who meet the basic eligibility criteria, ensuring that more individuals can secure funds.
Fast, same-day funding with no hard credit checks: RadCred’s platform offers same day funding and does not perform hard credit checks, which means applying will not impact your credit score. This makes it an ideal choice for those needing immediate funds for emergencies.
In comparison to traditional loans, RadCred is a faster, more inclusive, and accessible lending solution, especially for individuals with bad credit.
Frequently Asked Questions (FAQs)
Q1: What is the maximum loan amount for no credit check loans? RadCred offers loans up to $5,000 for eligible applicants, depending on income and other factors. Some lenders in RadCred’s network may even offer amounts up to $10,000 based on your financial profile.
Q2: How fast will I receive the money? Once approved, RadCred typically transfers funds to your bank account the same day. The exact timing can depend on your bank’s processing times.
Q3: Will applying for a loan affect my credit score? No, RadCred uses a soft credit check, which will not impact your credit score. This ensures you can apply for loans with confidence, even with a low credit score.
Q4: Are there any hidden fees? No, RadCred is committed to transparency. All fees, APR, and repayment terms are disclosed upfront, so you won’t face any unexpected charges.
Final Thoughts on RadCred’s No Credit Check Loans
RadCred’s no credit check loans offer a flexible, accessible solution for individuals who need bad credit loans. With guaranteed approval based on income and a no credit check approach, RadCred makes it easier for U.S. residents to access funds when they need them most. Whether you need emergency loans for bad credit or are simply looking for a way to manage unexpected expenses, RadCred offers a fast, secure, and reliable platform for financial relief.
Disclaimer:
RadCred’s loan offers are subject to meeting lender requirements and state-specific regulations. While RadCred provides high approval rates for bad credit applicants, no loan is truly guaranteed for everyone. Borrowers must meet basic eligibility criteria. RadCred uses a soft credit check, so your credit score won’t be affected by applying. Loan terms and amounts vary based on lender and borrower profile. Funds are typically deposited the same day, though exact timing may differ.
Source: The Conversation – UK – By Labib Azzouz, Research Associate in Transport and Energy Innovation, University of Oxford
Electric vehicle chargers at a motorway service station in Grantham, England.Angus Reid/Shutterstock
The automotive and EV industry has repeatedly insisted that the UK needs more electric vehicle (EV) chargers to help motorists make the switch from conventional fossil-fuel burning cars.
The Labour government has announced £400 million to install EV chargers, mainly on streets in poorer residential neighbourhoods, in place of the Conservative’s £950 million rapid charging fund that was directed at installing chargers in motorway service stations.
Does it matter where these chargers are – and who pays to build them?
The short answer is yes, it does matter. Our research conducted at motorway and local EV charging stations across England – including those located in residential areas, high streets and community centres – indicates that these two types of infrastructure serve distinct groups of users and fulfil different purposes.
Suggesting that one can substitute for the other risks sending mixed signals to both the industry and the driving public.
We found that motorway charging stations tend to cater to wealthier men, who are more likely to own premium EVs with long-range batteries and better performance. Many of these drivers have access to home chargers, so their use of public chargers is only for occasional, long-distance travel for business, leisure, or holidays – trips that require chargers along motorways.
Convenience and charging speed are often more important than the price of public charging, particularly when the travel costs of these drivers are covered by their employers.
Local public charging stations, on the other hand, serve more diverse groups. These include drivers from lower-income households who are more likely to own older and smaller EVs with shorter ranges. Access to home charging is often limited, especially for people living in flats or urban areas without driveways, garages or off-street parking.
Local chargers are also vital for taxi and delivery drivers who depend on their vehicles for work and make frequent short trips throughout the day. There are many professional drivers without access to workplace charging stations who need alternative local provision – something the Conservative government recognised in its 2022 EV charging strategy.
Ultimately, the transition to EVs should take a balanced approach that carefully considers social equity, economic viability and environmental impact.
Different locations serve different drivers
Motorway charging stations are commercially attractive to private investors, such as energy companies, specialist charging providers and car manufacturers, despite their higher upfront costs and complex requirements.
This is because service stations offer greater short-term revenue due to their ability to set premium prices. This is a result of there being limited alternatives and high demand for rapid charging, especially among long-distance travellers, and the willingness of EV drivers to pay for speed and convenience – unlike in more price-sensitive neighbourhood settings.
Unsurprisingly, the government found that the rapid deployment of motorway chargers in recent years has been largely driven by the private sector. Our research highlighted that these revenues could be enhanced by a broader range of retail, dining and relaxation amenities, turning the time waiting for a car to charge into a more productive and pleasurable experience.
Residential charging stations may not offer high profits per charge, but they typically require lower capital investment and benefit from consistent and predictable use. They are also suited to measures for reducing strain on the grid and balancing energy supply and demand.
These measures include tariffs that make it cheaper to charge EVs during off-peak hours, or technology that allows cars to feed electricity stored in batteries back into the grid. These features make them appropriate for public funding, where return on investment is measured not just in profit but in value for the public.
Considering that local EV charging serves those who do not have access to home charging and who drive for a living, the case for public funding is even stronger. These sorts of chargers make switching to an EV easier for different groups.
For example, safe and carefully placed public chargers could help more women switch to EVs – although our research suggests that, while “careful placement” might refer to residential areas, it doesn’t necessarily mean on streets. Well-lit car parks and community destinations are sometimes considered safer options.
Charging points outside a community centre in the Outer Hebrides, Scotland. AlanMorris/Shutterstock
By helping EV drivers make frequent short trips, local chargers can also significantly reduce urban air pollution, emissions and noise, contributing to more liveable, healthier cities.
That said, motorway charging stations and those near key transport corridors still play a crucial role in a comprehensive national network, and public funding may be required in more peripheral and rural areas of the UK where installations lag and commercial interest is limited.
While long-distance trips are less frequent than short ones, they account for a disproportionately large share of energy use and emissions. Switching such trips to electric will be essential to reaching net zero goals.
It seems reasonable to prioritise public investment in local EV charging infrastructure to support a fairer EV transition, but this should not be limited to on-street chargers. Investment is needed in residential and non-residential areas, public car parks, community centres and workplaces.
Different types of EV charging are not interchangeable – all are needed to support the switch.
Don’t have time to read about climate change as much as you’d like?
Labib Azzouz has received funding from the UK Research and Innovation via the UK Energy Research Centre and Innovate UK as part of the Energy Superhub Oxford (ESO) project.
Hannah Budnitz receives government funding from UK Research and Innovation grants via the Economic and Social Research Council and the Engineering and Physical Sciences Research Council. She has also previously received funding from Innovate UK and the Department for Transport.
Source: The Conversation – UK – By Jane Steventon, Course Leader, BA (Hons) Screenwriting; Deputy Course Leader & Senior Lecturer, BA (Hons) Film Production, University of Portsmouth
Take a soupçon of identity crisis, a pinch of perfectionism, a scoop of burnout and mix thoroughly with a large measure of fraternal grief and sear over a hot grill and voilà! You have The Bear, a perfectly blended drama about a chef on the edge, driven by relentless ambition and exacting standards as he turns his family’s humble sandwich shop into a fine-dining restaurant.
This intoxicating family drama was eaten up by critics and audiences alike in 2022, its first season garnering a rare perfect 100% score on Rotten Tomatoes, the subsequent two reaching scores of 99% and 89% respectively. It’s certainly a hard act to follow for season four.
The first ten minutes of The Bear’s pilot episode thrillingly defined what was to come in high-octane style and scene-setting detail. The first season delivered a clever mix of authentic dialogue and setting, relatable family dysfunction and dynamic production style.
Showstopping scenes of stressful kitchen heat were served up alongside a delectable range of new and established talent in the form of Jeremy Allen White (Carmy), Ebon Moss-Bachrach (Richie), Ayo Edebiri (Sydney) and Oliver Platt (Cicero/Uncle Jimmy).
Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.
In charge is showrunner Christopher Storer, who came up with the concept after being inspired by his friend’s father Chris Zucchero, the owner of Chicago sandwich joint Mr Beef.
With his professional chef sister also serving as a consultant, Storer succeeded in creating a deliciously authentic and intensely real drama. Buoyed along the way by 21 Emmys and five Golden Globes, Storer also watched his cast ascend, the tortured-soul performance of White garnering particular praise.
Testing the parameters of a long-running show, Storer focused in on the entire cast of characters and their backstories, a successful tactic used by shows such as Orange is the New Black to keep the drama – largely confined to a kitchen set – fresh.
Pulling in Hollywood die-hards Oliver Platt and Jamie Lee Curtis for familial tough-love roles further enriched the mix, often using a non-chronological timeframe to go back to moments of family turbulence and tension. This made for three-dimensional characters and enabled evolution around difficult themes such as the aftermath of suicide and generational trauma.
The Bear has come a long way in three seasons, starting with a spit and sawdust establishment serving up the lunchtime beef sandwiches for its working customers.
Carmy’s experience and longing for the high-end restaurant of his dreams hurtled forward in season two, as he sent his core crew off in different directions to hone their skills and help form his vision. A restaurant trying to win success but plagued with challenges, there were exhausting familial tensions embedded in every episode of season three.
Several themes play out in The Bear: love, family, loyalty, community and purpose. The relationship between Carmy and cousin Richie (not a real cousin, but a term of endearment) is key to linking past and future. Richie provides some of the highlights of comedy and pathos as he spits truth bombs, most frequently at talented sous-chef Syd.
It is Syd who follows Carmy’s aspirations for gastronomic perfection but can’t abide the lack of order or the intense highs and lows that inevitably go hand in hand with his talent. And this is one central question to consider for the latest series: just how long will the audience remain loyal to Carmy and his endless quest for artistry in a high-failure rate industry?
It’s all in the sauce
Storer begins season four with a ghost. Carmy and his dead brother Mikey (Jon Berthal) banter in a seven-minute scene, with Carmy ultimately confiding the dream of a restaurant as Mikey watches him make tomato sauce (“too much garlic”). The tomatoes resonate: Mikey left behind money hidden in tomato cans that ended up saving Carmy’s sanity and his dream of a proper restaurant.
Just as oranges represent death to Frances Ford Coppola, Storer uses tomatoes to underscore themes; here they symbolise familial loyalty and history, a solid base to a meal, a core ingredient. Mikey was one of the core ingredients in Carmy’s life, and now he’s gone.
Carmy awakens to a rerun of Groundhog Day on late-night TV and fittingly, we too are back – same dish, now more seasoned and enriched with its core ingredients and ready to serve up a big bowlful of family, love, ambition, strife and grief.
The episode furthers the theme of loyalty as the restaurant receives The Tribune’s review – the cliffhanger of the season three finale. Naturally, Storer doesn’t let up – the food critic highlights “dissonance” and Carmy is back in emotional chaos, with Syd urging him to lighten up and lose the misery.
In truth, this series could do with adding some more humour in the mix; the teasing and frivolous banter of season one has got somewhat lost in the seasons that followed.
Storer ramps up the tension, setting several ticking clocks in place: chiefly Uncle Jimmy’s notice period for the business to turn a profit is literally installed on a digital clock in the kitchen. Then Syd’s headhunter calls, offering her desired autonomy and an exit strategy from the chaos.
And Carmy raises the stakes with an intention to gain a Michelin star. Thus a heroic journey is set in place for the whole cast, with future battles both internal and external laid out.
There’s too much going on at this feast and the feeling of being stuffed full of story is tangible by the end of the first episode. Still, with a season lining up more emotional turbulence steered by White, more celebrity cameos (Brie Larson and Rob Reiner are lined up) and the excellent cinematography and performances that we have come to expect, Storer stirs his secret sauce.
The Bear still offers an entertaining and enticing proposition, bingeable and mostly satisfying.
Jane Steventon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: The Conversation – UK – By Samantha Abbott, Doctoral Researcher, Department of Sport Science, Nottingham Trent University
England’s Beth Mead cheering on podium after win v Germany in the Women European Championship Final 2022photographyjp/Shutterstock
Think back to the last time you had a cold or the flu. Now imagine stepping onto the pitch for a European Cup final, while battling through those symptoms. For elite athletes, illness can strike at the worst possible time – and it could hit women harder.
Research suggests that female athletes are more susceptible to cold and flu-like illnesses than their male counterparts. For England women’s national football team, the Lionesses, this risk only increases before a major tournament like the Euros.
Close contact, shared kit, disrupted sleep and travel all add up to a perfect storm for infection. But targeted nutritional strategies, alongside good sleep and hand hygiene, can offer a crucial line of defence.
Get your news from actual experts, straight to your inbox.Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.
1. Fuel first: energy matters for immunity
Before anything else, players need to eat enough. Energy supports both performance and immune function. In fact, female athletes who didn’t meet their energy needs in the run-up to the 2016 Olympics were four times more likely to report cold or flu symptoms.
This is especially relevant in women’s football, where low energy and carbohydrate intake has been documented among professional players and recreational players too. Regular meals and snacks that include carbohydrate-rich foods like oats, bread and pasta, especially around training, are essential to meet energy demands and support immune health.
2. Eat the rainbow
Athletes are often encouraged to go beyond the public’s five-a-day fruit and veg target, aiming instead for eight to ten portions daily. Why? Because colourful plant foods are packed with vitamins, minerals, antioxidants and anti-inflammatory compounds: all vital for immunity.
Each colour offers unique benefits. For instance, red fruits and vegetables, such as tomatoes, contain lycopene, a powerful antioxidant. Orange produce like carrots get their colour from beta-carotene, which is converted by the body into vitamin A – a key vitamin for immune health.
Vitamin C has long been linked with reducing the risk and severity of cold and flu symptoms. One Cochrane review found that regular vitamin C intake halved the risk of illness in physically active people.
However, more isn’t always better. Long-term use of high-dose vitamin C supplements could blunt training adaptations – the structural and functional changes the body undergoes in response to repeated exercise – because of its anti-inflammatory effects. That’s why vitamin C is most effective when used strategically, such as during high-risk periods like travel or intense competition. Good food sources include oranges, kiwis, blackcurrants, red and yellow peppers, broccoli and even potatoes.
Probiotics, found in fermented foods like kefir and kimchi or in supplement form, have been shown to reduce the duration and severity of respiratory illnesses in athletes. Prebiotics have similarly shown promise. In one study, a 24-week prebiotic intervention in elite rugby players reduced the duration of cold and flu symptoms by over two days.
In the build-up to the Euros, including probiotic-rich foods in their diet or taking a daily prebiotic and probiotic supplement may help players stay healthy and return to training faster if they do get ill.
5. Zinc lozenges: first aid for a sore throat
If cold-like symptoms do appear, zinc lozenges can offer fast-acting relief. Zinc has antiviral, antioxidant and anti-inflammatory properties. When zinc is delivered as a lozenge, it acts directly in the throat, where many infections begin. Taken within 24 hours of symptoms starting, zinc lozenges could shorten illness duration by a third.
But caution is key. Long-term use of high-dose zinc supplements can actually suppress immune function. Zinc lozenges should only be used short-term at symptom onset, not as a daily supplement.
Staying match-ready during major tournaments means more than just tactical drills and fitness. Nutrition is a powerful ally in illness prevention, especially for women’s teams like the Lionesses. From fuelling adequately to supporting gut health and knowing when to supplement, these nutritional strategies can make the difference between sitting on the bench and bringing a trophy home.
The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.
Source: United States Senator Peter Welch (D-Vermont)
WASHINGTON, D.C. — U.S. Senator Peter Welch (D-Vt.), a member of the Senate Finance and Judiciary Committees, and Ranking Member of the Senate Agriculture Subcommittee on Rural Development, Energy, and Credit, released the following statement after voting in strong opposition against Senate Republicans’ disastrous tax bill:
“We have an obligation to put the constituents and hardworking families we represent first. Instead of helping everyday people, Republicans’ tax bill capitulates to President Trump and harms communities large and small. This cruel bill will take us back decades by exacerbating income inequality, ripping away health care, and rolling back progress on climate change. It will also raise costs and weaken the economy. All of this pain has been caused to help pay for tax cuts for the very wealthy—a top priority of President Trump. I am grateful to the few Republicans—Senators Tillis, Paul, and Collins—who voted against this terrible bill,” said Senator Welch. “The irony is all these hardships will be faced by citizens in red and blue states—the pain is bipartisan. It’s outrageous that families will now face untold hardships because of the Trump Administration’s cuts. I voted no on this bill and will fight to reverse these policies in any way I can.”
Republicans’ reckless tax and spending bill will block access to health care for 17 million people, rip away vital food assistance for millions, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.
Senator Welch filed amendments and changes to Republicans’ One Big Beautiful Bill Act to strengthen the economy, protect access to health care and nutrition programs, and provide more stability for families and rural communities, including provisions to:
Protect Access to Health Care and Support Rural Hospitals:
Welch proposed requiring the Finance Committee to rewrite the bill to prevent harm to rural health care and the fiscal wellbeing of rural hospitals;
Welch proposed requiring the Finance Committee to exempt managed care programs operated by state governments like Vermont from any changes proposed to state directed payments.
Welch proposed requiring the Finance Committee to strike any changes to provider taxes, including changes that would impact states like Vermont with Medicaid expansion;
Welch proposed requiring the Health, Education, Labor and Pensions (HELP) Committee to make it easier to verify eligibility for the Affordable Care Act’s premium tax credits and expand special enrollment periods under certain circumstances.
Defend Food Assistance Programs:
Welch proposed requiring the Agriculture Committee to strike any cost-shifts of administering SNAP to states, which would kick American families off the food assistance they need and strain state budgets;
Welch proposed an amendment to strike administrative cost-shifts for SNAP;
Welch proposed an amendment to adjust the Thrifty Food Plan for cities, counties, and regions where the price of food is 10% higher than the national average;
Welch proposed an amendment that places a floor on SNAP allotments to households instead of a ceiling;
Welch proposed an amendment preserving the standard utility deduction, which cuts administrative red tape and boosts benefits by providing a more accurate portrayal of a household’s available resources for food when determining SNAP eligibility;
Welch proposed requiring the Agriculture Committee to rewrite the bill to allow volunteer work to qualify under SNAP’s work requirements.
Protect Programs and Government Services:
Welch proposed requiring the Finance Committee to rewrite the bill to maintain the energy efficient home improvement tax credit at current levels through 2028;
Welch proposed an amendment to strike the repeal of several home energy efficiency tax credits, including credits for home energy, rooftop solar, energy efficient homes for homebuilders, and more;
Welch proposed striking language in the bill that would rescind funding for state-based contractor training grants, as required in Welch’s HOPE for HOMES Act, passed as part of the Inflation Reduction Act;
Welch proposed striking language in the bill that would institute taxes on international remittances.
Welch proposed an amendment to dedicate funding for residential reentry centers, which are needed in Vermont;
Welch proposed an amendment to dedicate funding for the federal public defenders program, which is currently underfunded.
Senator Welch has been an outspoken opponent of the President Trump’s One Big Beautiful Bill Act, which Republicans are advancing through reconciliation process without Democratic support. Late Sunday evening, Senator Welch took to the Senate floor to reveal how Republicans’ disastrous tax and spending bill will force millions of working Americans in Vermont, West Virginia, and across the country to lose their health coverage, rip away vital food assistance for more than 42 million Americans, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.
Welch has slammed the bill for threatening access to health care and cutting food assistance, and has sounded the alarm about how this bill will add more than $4 trillion to the national debt and tank the economy.
President Droupadi Murmu on Tuesday inaugurated and laid the foundation stone for multiple development projects at Mahayogi Gorakhnath University in Gorakhpur. The projects include the inauguration of the University’s Auditorium, Academic Block, and Panchkarma Kendra, as well as the foundation stone-laying for a new Girls’ Hostel.
Addressing the gathering, the President praised the University for promoting a holistic approach to medicine by integrating allopathy and Ayurveda education and healthcare services through its Medical College, Ayurveda College, and affiliated hospitals. She also acknowledged the efforts of Gorakshanath Medical College Hospital and Research Centre, which is in the process of establishing a state-of-the-art 1800-bed hospital.
Highlighting the role of private educational institutions in nation-building, the President emphasized that those committed to philanthropy and public service would play a key role in realizing the objectives of the National Education Policy (NEP) 2020.
Murmu noted that Mahayogi Gorakhnath University is the first private university in Gorakhpur and has, within just four years of its establishment, emerged as a significant centre for higher and employment-oriented education in eastern Uttar Pradesh.
The President expressed her particular delight in laying the foundation stone for the new Girls’ Hostel, calling it a vital initiative for women’s empowerment. She stressed that lack of safe residential facilities often hinders girls’ access to higher education. In this regard, the University’s step to build a dedicated hostel for female students would make higher education more accessible and secure for women.
“Education is the most effective means of empowerment,” the President said, applauding the University’s efforts in contributing to gender equity in education.
Murmu also said that the overall health and educational development of Purvanchal, the eastern region of Uttar Pradesh, would significantly contribute to the inclusive growth of the entire state. “When Uttar Pradesh, the most populous state in the country, progresses rapidly, India as a whole will set new benchmarks in development,” she added.
BALTIMORE — An investigation conducted by U.S. Immigration and Customs Enforcement led to the sentencing of Mark Rice, 38, to 30 years in prison followed by lifetime supervised release, for producing and distributing child sexual abuse material.
“This sentencing is a powerful reminder that those who exploit and abuse children will be relentlessly pursued and held accountable,” said ICE Homeland Security Investigations Baltimore Special Agent in Charge Michael McCarthy. “There is no place in society for predators who create and distribute child sexual abuse material. These crimes shatter lives, and HSI will never waver in our mission to bring justice to victims by targeting those who commit these horrific acts. We will continue to work with our partners to ensure the strongest possible consequences under the law.”
Rice previously pled guilty to one count of producing child sexual abuse material, one count of distributing child sexual abuse material and one count of possessing child sexual abuse material. These charges stem from Rice sexually abusing two minors in his care while using social media to distribute and solicit child sexual abuse material.
According to his plea agreement, Rice used his position of authority to sexually abuse a minor — beginning when she was less than 3 years old — as he created photographic evidence of the abuse. He also exploited a second minor through surreptitious photography. Rice actively participated in online communities dedicated to trading child sexual abuse material. He used platforms such as Reddit, Telegram and Kik to distribute images of his victims and obtain material depicting other children.
In April 2023, the National Center for Missing and Exploited Children received a CyberTip from Reddit regarding the transmission of child sexual abuse material. Authorities traced the tip to an IP address associated with Rice’s Elkton residence.
During a Maryland State Police interview, Rice denied the accusation but was observed deleting photos from his phone. When Rice showed officers his phone, investigators spotted child sexual abuse material in a thumbnail image. Through a deeper search, authorities uncovered additional material in his recently deleted folder.
Then, HSI Baltimore special agents discovered more than 600 child sexual abuse material images across Rice’s devices. Investigators also found that Rice used a public Reddit community to connect with people that he traded child sexual abuse material with using encrypted messaging platforms.
McCarthy, U.S. Attorney for the District of Maryland Kelly O. Hayes and Maryland State Police Superintendent Roland L. Butler Jr. announced the indictment.
Members of the public with information about criminal activity should contact the ICE Tip Line at 866-DHS-2-ICE (866-347-2423).
Learn more about HSI Baltimore’s mission to increase public safety in our Maryland communities on X at @HSIBaltimore.
Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.
North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.
Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.
Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.
Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.
This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.
From North Korea to the world: The remote IT workforce
Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.
North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.
North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.
Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.
North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.
Tactics and techniques
The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.
They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.
Figure 1. The North Korean IT worker ecosystem
Crafting fake personas and profiles
The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.
Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.
Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.
The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.
After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:
Figure 3. Example profile used by a North Korean IT worker that has since been taken down.
Using AI to improve operations
Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:
Figure 4. Photos of potential North Korean IT workers
The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:
VPS and VPN accounts, along with specific VPS IP addresses
Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
Wallet information and suspected payments made to facilitators
LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
Tracking sheet of work performed, and payments received by the IT workers
Image creation
Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.
Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profilesFigure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.
Communications
Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.
Facilitators for initial access
North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:
Figure 7. Example of a job opportunity for a facilitator role
The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:
Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
Purchase mobile phone numbers or SIM cards
During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.
Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.
Defense evasion and persistence
To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.
Attribution
Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.
How Microsoft disrupts North Korean remote IT worker operations with machine learning
Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.
Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.
Defending against North Korean remote IT worker infiltration
Defending against the threats from North Korean remote IT workers involves a threefold strategy:
Ensuring a proper vetting approach is in place for freelance workers and vendors
Monitoring for anomalous user activity
Responding to suspected Jasper Sleet signals in close coordination with your insider risk team
Investigate
How can you identify a North Korean remote IT worker in the hiring process?
To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:
Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
Search whether a potential employee is employed at multiple companies using the same persona.
Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
Keep records, including recordings of video interviews, of all interactions with potential employees.
Require notarized proof of identity.
Monitor
How can your organization prevent falling victim to the North Korean remote IT worker technique?
To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.
Monitor for identifiable characteristics of North Korean remote workers
Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.
The employee lists a Chinese phone number on social media accounts that is used by other accounts.
The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.
Monitor for activity associated with Jasper Sleet access
If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
Monitor for consistent user activity outside of typical working hours.
Remediate
What are the next steps if you positively identify a North Korean remote IT worker employed at your company?
Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:
Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
Rapidly evaluate the subject’s proximity to critical assets, such as:
Leadership or sensitive teams
Direct reports or vendor staff the subject has influence over
Suppliers or vendors
People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
Conduct preliminary link analysis to:
Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
Identify shared indicators (for example, shared IP addresses, behavioral overlap)
Avoid premature action that might alert other Jasper Sleet operators
Conduct a risk-based prioritization of efforts, informed by:
Placement and access to critical assets (not necessarily where you identified them)
Stakeholder insight from potentially impacted business units
Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
Conduct open-source intelligence (OSINT) collection and analysis to:
Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include:
Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning.
Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
Exaggerated facial expressions.
Duplicative or improperly placed appendages.
Pixelation or tearing at edges of face, eyes, ears, and glasses.
Engage counterintelligence or insider risk/threat teams to:
Understand tradecraft and likely next steps
Gain national-level threat context, if applicable
Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
Preserve evidence and document findings.
Share lessons learned and increase awareness.
Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.
After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.
For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).
Microsoft Defender XDR detections
Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.
Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.
Microsoft Defender XDR
Alerts with the following titles in the security center can indicate threat activity on your network:
Sign-in activity by a suspected North Korean entity
Microsoft Defender for Endpoint
Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.
Suspicious usage of remote management software
Suspicious connection to remote access software
Microsoft Defender for Identity
Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.
Atypical travel
Suspicious behavior: Impossible travel activity
Microsoft EntraID Protection
Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.
Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)
Microsoft Defender for Cloud Apps
Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.
Impossible travel activity
Microsoft Security Copilot
Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:
Incident investigation
Microsoft User analysis
Threat actor profile
Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.
Hunting queries
Microsoft Defender XDR
Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.
If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal.
Microsoft Sentinel
The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:
User principal name
Label name
Activity
City
State
Country/Region
Time generated
The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.
References
Acknowledgments
For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.
Learn more
Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.
For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog.
To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky.
To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast.