Patrick Harvie MSP calls on the UK Government to fix broken energy market
More in Economy
High energy bills are punishing households and families and baking in high rates of inflation for years to come, say the Scottish Greens.
The Scottish Greens have called for UK Labour to listen to climate experts, take urgent action to fix the broken energy market, and end the artificial high price for clean green electricity, which is cheap to generate but expensive to consume.
This comes following the publication of new monthly figures from the Office for National Statistics showing that inflation has jumped to 3.5% in April, the highest level since February last year.
The ONS has revealed that big increases in utility bills – including electricity and gas bills – have impacted inflation, after changes to the Ofgem energy price cap earlier this year sent April rates soaring.
Independent climate advisors have advised that the UK Government must act urgently to make electricity cheaper, through rebalancing prices to remove policy levies from electricity bills.
The Scottish Greens’ climate spokesperson, Patrick Harvie, said:
“At a time when so many are already struggling to make ends meet, households and families across our country are now facing the highest rates of inflation since February last year.
“Labour promised to make energy bills cheaper, but they have only gone up. Keir Starmer and his colleagues must urgently step in to make sure that households get the benefit of the low price of renewable energy, to help get inflation under control.
“This isn’t just about the price cap. Climate experts are clear – out-of-date policy levies on electricity bills are stopping costs from coming down for consumers, and that’s a barrier to people switching away from fossil fuels for heat and transport. So even though home-grown renewable energy is very cheap to generate, that’s not being reflected in the bills people are paying.
“We desperately need to fix the broken energy market that is plunging people into poverty all while keeping our reliance on climate-wrecking fossil fuels.”
Patrick Harvie calls for UK to take action on Israeli aid blockade
More in Peace
Israeli forces must urgently allow aid to reach extremely vulnerable children, says Scottish Greens Co-Leader Patrick Harvie MSP, ahead of a Parliamentary committee hearing from aid agencies working in Gaza and the West Bank.
It comes after warnings yesterday from the United Nations that 14,000 babies could die in Gaza unless extra aid arrived. Israel claims to have ended their 11-week aid blockade of Gaza, but the UN has warned that the aid trucks allowed in so far are just a “drop in the ocean” compared to what Gaza needs.
Scottish Greens have continually called for the UK & Scottish Governments to end complicity in the war crimes being committed by Israel.
The Labour UK Government has provided more arms to Israel in three months than the previous three years under Conservative governments, and the SNP Scottish Government have continued to fund arms manufacturers who produce parts for the F-35 fighter jets which have been used by Israel.
Scottish Greens Co-Leader Patrick Harvie MSP said:
“The situation in Gaza is unprecedented in modern times, with the world allowing Israel to inflict collective punishment on a grotesque scale. Aid blockades and genocide are never acceptable yet governments across the West have overlooked Israel’s war crimes.
“Israeli forces have withheld urgent aid from civilians for over 11 weeks, and despite their claims to be allowing aid into Palestinian territory, we have heard from the front lines that what is being allowed to enter is nowhere near enough.
“Senior Ministers in the Israeli Government are quite explicit about their intention to destroy Palestinian life in Gaza, and their utter contempt for international law.
“The UK Labour Government have blood on their hands, they have continued to enable and support Israel’s war crimes throughout this disgraceful campaign. They must now surely end all trade with Israel, and join with other countries to ensure that urgent aid is provided to meet the immediate needs of the people of Gaza.”
Today, the Canadian Nuclear Safety Commission (CNSC) announced the Commission’s decision to release the final set of 27 decommissioned Beaverlodge properties from licensing under the Nuclear Safety and Control Act (NSCA), and to revoke the waste facility operating licence held by Cameco Corporation (Cameco) for the decommissioned Beaverlodge mine and mill site. The Beaverlodge mine and mill site is located near Uranium City in northern Saskatchewan, situated within historic Treaty 8 (1899) and the Homeland of the Métis, and within the traditional territories of the Dene, Cree, and Métis peoples.
The Commission concluded that the properties meet appropriate performance objectives and performance indicators to enable them to be transferred to Saskatchewan’s Institutional Control Program. As part of its decision in this matter, the Commission exempted the Province of Saskatchewan from CNSC licensing for the properties.
The Commission further concluded that it had fulfilled its constitutional responsibility to consult and, where appropriate, accommodate Indigenous rights in respect of its decision on this matter.
In making its decision, the Commission carefully considered all submissions and perspectives received during a public hearing held in person in Saskatoon, Saskatchewan on January 30, 2025.
The record of decision, which contains the Commission’s rationale for its decision, is available upon request from the Commission Registry by contacting interventions@cnsc-ccsn.gc.ca. Once available in both official languages, the record of decision will be published on the CNSC website. The submissions considered by the Commission during the hearing are available on the CNSC website.
As a lifecycle regulator, the CNSC focuses on continuous engagement and consultation with Indigenous Nations and communities, as well as other interested groups before, during and after Commission proceedings in respect of licensed activities.
Related links
Contact
Media Relations Canadian Nuclear Safety Commission Tel: 613-996-6860
Source: Federal Bureau of Investigation FBI Crime News (b)
ALBUQUERQUE – A Shiprock man has been charged with assault with a dangerous weapon following a shooting incident outside a restaurant.
According to court documents, Navajo Nation Police responded to a 911 call reporting that an individual was shot in the hand in front of the Little Caesars Restaurant in Shiprock. Officers located the suspect, identified as TerroldTyler, 35, an enrolled member of the Navajo Nation, near the scene carrying a black backpack that contained a homemade firearm and five live shotgun shells. Tyler was detained without incident.
Investigators determined that Tyler and the victim were involved in an argument behind the restaurant prior to the shooting. Tyler allegedly produced the homemade shotgun and shot the victim in the left hand. Paramedics responded to the scene, but the victim declined medical treatment. A social media video depicting Tyler with the firearm was also recovered as evidence.
Tyler is charged with assault with a dangerous weapon and will remain in custody pending trial, which has not yet been scheduled. If convicted of the current charges, Tyler faces up to 10 years in prison.
U.S. Attorney Ryan Ellison and Philip Russell, Acting Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office made the announcement today.
The Farmington Resident Agency of the Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Navajo Nation Police Department and Navajo Department of Criminal Investigations. Assistant U.S. Attorney Amy Mondragon is prosecuting the case.
A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
For the first time in three years, government has proposed an inflation-linked increase to the general fuel levy.
“For the 2025/26 fiscal year, this is the only new tax proposal that I am announcing. It means from 4 June this year, the general fuel levy will increase by 16 cents per litre for petrol, and by 15 cents per litre for diesel,” Minister of Finance Enoch Godongwana said on Wednesday, in Parliament.
The general fuel levy has remained unchanged for the past three years to provide consumers with relief from high fuel price inflation.
Re-tabling the 2025 Budget Review, Godongwana said unfortunately, this tax measure alone will not close the fiscal gap over the medium term.
“The 2026 Budget will therefore need to propose new tax measures, aimed at raising R20 billion. We have allocated an additional R7.5 billion over the medium-term expenditure framework (MTEF), to increase the effectiveness of the South African Revenue Service (SARS) in collecting more revenue.
“Part of this allocation will be used to increase collections from debts owed to the fiscus. SARS has indicated that this could raise between R20 billion to R50 billion in additional revenue per year,” the Minister said.
Another part of the additional allocation to SARS will be used to improve modernisation.
This will include targeting illicit trade in tobacco and other areas, which should boost revenue over the medium term.
“As SARS utilises this investment to raise additional revenue, which I believe can be at least R35 billion, the R20 billion to close the current revenue gap will not have to be raised through taxes.
“Madam Speaker, let me call on every South African, be they individuals, small business operators or large corporates, to honour their tax obligations and contribute to building a better and more equitable nation,” the Minister said.
He thanked all the taxpayers that continue to pay their taxes while emphasising that government does not take taxpayers for granted.
“As a government, we know that we must earn the taxpayer’s trust every day, by spending public money with care and ensuring that every rand collected is spent on its intended purpose.
“We recognise the urgent need to do more to achieve this goal. We are not deaf to the public’s concern about wasteful and inefficient expenditure.
“Our commitment to collect taxes must be matched by better efficiency in how that money is spent. It must be matched by much stricter oversight that quickly identifies problems and provides timely solutions when things go wrong,” the Minister explained.
Expansion of the zero-rated basket withdrawn
Meanwhile, as a result of the withdrawal of the proposed increases in the VAT rate, the expansion of the zero-rated basket, which was included to cushion poorer households from the VAT rate increase, falls away.
Last month, the Minister requested the Speaker of the National Assembly to maintain the Value-Added Tax (VAT) rate at its current level of 15% , reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.
“Madam Speaker, compared to the March estimates, tax revenue projections have been revised down by R61.9 billion over the three years. This reflects the reversal of the VAT increase and the much weaker economic outlook.
“In this difficult environment, it remains vital that we still take actions to increase revenue to protect and bolster frontline services, while expanding infrastructure investments to drive economic activity,” the Minister said. –SAnews.gov.za
In an ongoing effort to grow the economy, government will continue to implement growth enhancing structural reforms as part of Operation Vulindlela.
“Madam Speaker, a bigger, faster-growing economy, and the larger fiscal resources that come with it, are the key to building up the fiscal room we need to meet more of our developmental goals,” Minister of Finance, Enoch Godongwana, said on Wednesday during the re-tabling of the 2025 Budget Review, in Parliament.
Through the first phase of Operation Vulindlela, bold and far-reaching reforms were implemented in the network sectors and the visa regime.
“As a result, numerous economic bottlenecks have eased, new investments unlocked, and the growth potential of the economy enabled. Yet the economy still faces constraints,” the Minister said.
Operation Vulindlela is a joint initiative of the Presidency and the National Treasury to accelerate the implementation of structural reforms and support economic recovery.
The unit monitors progress and actively supports implementation. Its aim is to fast-track the implementation of high impact reforms, addressing obstacles or delays to ensure execution on policy commitments.
The first phase of Operation Vulindlela aimed to reduce power cuts, fix the transport system, lower data costs, increase water supply, attract skills and support tourism.
The second phase of Operation Vulindlela, launched by President Cyril Ramaphosa earlier this month, will not only prioritise new areas for implementation but will also deepen the implementation of current reforms.
Upcoming reforms will focus on making it easier to find work and hire people – particularly by addressing spatial inequalities, using cities to drive economic activity and improve municipal service delivery.
The second phase will therefore focus on the following areas:
Seeing-through existing reforms in energy, water, logistics and in the visa regime.
Improving the performance of local government. This includes professionalising utilities, appointing suitably qualified people to senior positions, and reviewing the local government fiscal framework.
Harnessing digital transformation, in order to drive the adoption of digital technologies in government and build digital public infrastructure for use by all South Africans.
Addressing the apartheid legacy of spatial inequality. Reforms will include changes to housing policy and accelerating the release of publicly owned land and buildings. This will also entail clearing the backlog of title deeds for affordable housing, and a comprehensive regulatory review aimed at removing barriers to the development of low-cost housing.
Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.
“Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said.
The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.
The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes.
These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society. The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria.
This as the international community also celebrated the 10th anniversary of the rules.
The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected.
The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.
In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration.
“In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”
The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.
He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025.
The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”
The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.
“Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained.
He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.
“We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.”
He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za
Increases to all social grants, barring the Social Relief of Distress (SRD) grant, will not be affected by the re-tabled budget.
This according to National Treasury’s 2025 Budget Overview released on Wednesday.
The number of social grant beneficiaries – excluding those receiving the SRD grant – is expected to rise to 19.3 million people by March 2028.
The grant increases for 2025/26 are as follows:
Old age grant will increase from R2185 to R2315
War veterans grant will increase from R2205 to R2335
Disability grant will go up from R2185 to R2315
Foster care grant rises from R1180 to R1250
Care dependency grant will increase from R2185 to R2315
Child support grant will go up from R530 to R560
The grant-in-aid will increase from R530 to R560
“The increase in the social grants budget of R1.6 billion in 2025/26 remains. The temporary COVID-19 Social Relief of Distress grant will be extended until 31 March 2026, with R35.2 billion allocated to maintain the current R370 per month per beneficiary, including administration costs,” National Treasury said.
While delivering the Budget Speech in Parliament on Wednesday, Finance Minister Enoch Godongwana said government is “actively exploring various options to better integrate” the SRD grant with employment opportunities.
“This includes considering a job-seeker allowance and other measures, as part of the review of Active Labour Market Programmes.
“Our goal is to not only provide immediate relief. It is also to create pathways to employment, empowering our citizens to build better futures for themselves and their families,” Godongwana said. – SAnews.gov.za
Infrastructure investment remains a key component in driving economic growth and government has maintained its R1 trillion allocation for infrastructure investment over the medium term to support this growth.
This according to Finance Minister Enoch Godongwana, who delivered the Budget Speech in Parliament on Wednesday.
“[Quality] infrastructure investment expands the productive capacity of the economy and responds to the diverse needs of the citizens. Infrastructure is also a rich source of jobs in construction, engineering, and related industries across a range of skill levels.
“It is for these reasons that infrastructure is the fourth pillar of the growth strategy, and this budget demonstrates our resolve to change the composition of spending from consumption to investment. Allocations towards capital payments remain the fastest-growing area of spending by economic classification. Public infrastructure spending over three years will exceed the R1 trillion mark,” Godongwana said.
Spending will focus on “maintaining and repairing existing infrastructure, building new infrastructure, and acquiring equipment and machinery” primarily in transport and logistics, energy and water and sanitation.
“Of the R402 billion for transport and logistics, R93.1 billion is for the South African National Roads Agency to keep the 24 000-kilometer national road network in active maintenance and rehabilitation. R53.1 billion is for the maintenance and refurbishment of provincial roads.
“R66.3 billion is allocated to PRASA, out of which R18.2 billion is for the rolling stock fleet renewal programme and R12.3 billion is provisionally allocated for the renewal of the signalling system. The spending will sustain progress in rebuilding the infrastructure to provide affordable commuter rail services. This will enable PRASA to increase passenger trips from 60 million in 2024/25 to 186 million by the end of the MTEF [Medium Term Expenditure Framework] period.
“The energy sector will invest R219.2 billion on strengthening the electricity supply network, from generation to transmission and distribution. The water and sanitation sector will spend R156.3 billion on expanding our water resource and service infrastructure, including dams, bulk infrastructure to service mines, factories and farms,” Godongwana explained.
Reforms for private sector participation
The Minister announced that new regulations for public-private partnerships (PPPs), which were gazetted earlier this year, are expected to take effect next month.
“These will reduce the procedural complexity of undertaking PPPs, increasing the deal flow and allowing government to leverage its limited resources to fast-track infrastructure provision. The National Treasury has developed enabling guidelines and frameworks to support the new regulations.
“Specifically, the unsolicited proposals framework will create clear rules for managing proposals from the private sector. And the framework for fiscal commitments and contingent liabilities will strengthen fiscal risk governance. These guidelines and frameworks will be published in the next few weeks,” he said.
Furthermore, the process of issuing the first infrastructure bonds in 2025/26 remains in place.
“We are also exploring alternative financing instruments to allow pension funds, commercial banks, development banks and international financial institutions to participate in financing our infrastructure plans.
“These reforms are how we plan to leverage infrastructure investment to ease supply side constraints to the economy and improve access to social services the people get,” Godongwana said.
Employment boost
Meanwhile, in the 2025 Budget Overview, National Treasury said additional funding of some R8.8 billion has been allocated to public employment programmes (PEPs).
“Although the number of people employed was 16.8 million in the first quarter of 2025, South Africa’s unemployment rate remained very high at 32.9%.
“Public employment programmes are crucial to address persistently high unemployment,” National Treasury noted.
Key beneficiaries for the additional funding include:
The Department of Basic Education: R5.8 billion for the basic education schools employment initiative.
The Department of Sport, Arts and Culture: R350 000 000 for the creative industry stimulus.
The Department of Trade, Industry and Competition: R1.3 billion for the Social Employment Fund.
“In addition, National Treasury and the Presidency, working with other state institutions, have begun a comprehensive review of active labour market programmes, PEPs and the social support system to improve efficiency and effectiveness.
“With these efforts, government hopes to make significant strides in reducing unemployment,” the overview read. – SAnews.gov.za
President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office.
The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.
The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.
According to The Presidency of SA, President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.
At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.
President Ramaphosa is expected to depart from the White House at 6:30pm.
Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.
The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.
Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.
President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.
In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.
The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi.
They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.
Meanwhile, President Trump will be flanked by several key officials during his event.
These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.
SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals.
President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.
A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.
Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.
Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.
Speaking to the media on Tuesday, the President appeared cheerful and optimistic.
He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.
For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za
Source: United Kingdom – Executive Government & Departments
News story
Waste packaging company director pays high price in data fraud
A Birmingham-based director and his company has been ordered to pay a Proceeds of Crime confiscation order, fines and costs totalling £476,995.
An officer on inspection duty. Please note the photo is an example of EA’s work not directly from this case.
This follows an Environment Agency investigation into fraudulent entry of waste packaging data.
At Birmingham Crown Court on Friday 16 May 2025, Shaobo Qin, a director of EDU Case Ltd, pleaded guilty to fraud by false representation. He was given a 2 year prison sentence suspended for 18 months.
Qin, age 42, of Sutton Coldfield, West Midlands, was also ordered to pay a Proceeds of Crime confiscation order of £255,057. He must pay within 2 months or face 3 years in prison.
He was also disqualified as a director for 4 years and ordered to do 200 hours of unpaid work.
His company, EDU Case Ltd of Portway Road, Rowley Regis, was fined £200,000. The Environment Agency were also awarded £21,995 in investigation costs.
The court was told Qin’s company was a plastics and recycling exports enterprise. The offences were discovered by the Environment Agency towards the end of 2022.
The company, orchestrated by Qin, was deliberately and systematically entering false data on to the Environment Agency’s National Packaging Waste Database (NPWD) for non-existent waste exports.
This resulted in Qin receiving a benefit for himself and his company in the sum of approx. £255,000. He was arrested on Wednesday 10 January 2024 where he was interviewed by Environment Agency officers.
EDU Case were accredited to carry out plastic packaging exports and able to issue “evidence” of that activity in the form of tonnage figures on the database.
This evidence could be bought by businesses who are obliged to account for their plastic packaging waste under the Producer Responsibility Obligations (Packaging Waste) Regulations 2007.
An audit conducted by Environment Agency officers in 2023 and information following that work identified discrepancies between the amount of waste exported and the amount of evidence issued.
The false entries represented nearly two-thirds of the business’ entire trade in 2022 towards the end of that year.
As part of that audit, a legal notice was served on Qin and the company in September 2023.
This notice required the production of their evidence of plastic waste exports. In response, Qin sent a computer memory stick containing his business’ waste export evidence and a letter explaining a large discrepancy, described as an “overclaim.”
The letter stated that the company had carried out 1,239 metric tonnes of plastic waste exports in 2022, only 453.60 metric was genuine and that the majority of his trading, 785.40 metric tonnes was ‘a mistake.’
In sentencing the judge said this was without doubt deliberate offending and pre-planned. There had been a significant undermining of the regulatory regime.
He accepted that there had been a guilty plea entered at first opportunity and that money had been put aside to repay the financial benefit made. The company was also fined to mark the seriousness of the offending.
Sham Singh, Senior Environmental Crime Officer for the Environment Agency, said:
“This case shows that the Environment Agency will pursue individuals and their enterprises who profit illegally.
“This was a fraud on a large scale and undermines legitimate business and the investment and economic growth that go with it.
“We support legitimate businesses and are proactively supporting them by disrupting and stopping the criminal element backed up by the threat of tough enforcement as in this case.
“If anyone suspects that a company is doing something wrong, please contact the Environment Agency on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”
The Charges
Shaobo Qin
Between 1st January 2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that he claimed EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.
EDU Case UK Limited (Company No. 08888722)
Between 1st January 2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.
Background Information
The Packaging Producer Responsibility Regulations were introduced to oblige the producers of waste packaging such as plastic, glass and cardboard (e.g. supermarkets) to contribute towards the financial cost of recycling and the disposal of waste. Any large organisation that meets the criteria for this obligation is required to prove they have made such financial contributions by the purchasing of credits known as Packaging Recovery Notes (PRNs) or Packaging Export Recovery Notes (PERNs) from UK waste reprocessors and waste exporters.
This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.
Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.
This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.
The following authors and co-sealers are releasing this CSA:
United States National Security Agency (NSA)
United States Federal Bureau of Investigation (FBI)
United Kingdom National Cyber Security Centre (NCSC-UK)
Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
Czech Republic Military Intelligence (VZ) Vojenské zpravodajství
Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
United States Cybersecurity and Infrastructure Security Agency (CISA)
United States Department of Defense Cyber Crime Center (DC3)
United States Cyber Command (USCYBERCOM)
Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
Canadian Centre for Cyber Security (CCCS)
Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
Estonian Foreign Intelligence Service (EFIS) Välisluureamet
Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions. In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments. Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.
Description of Targets
The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations:
Defense Industry
Transportation and Transportation Hubs (ports, airports, etc.)
Maritime
Air Traffic Management
IT Services
In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].
The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].
The countries with targeted entities include the following, as illustrated in Figure 1:
Bulgaria
Czech Republic
France
Germany
Greece
Italy
Moldova
Netherlands
Poland
Romania
Slovakia
Ukraine
United States
Figure 1: Countries with Targeted Entities
Initial Access TTPs
To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):
The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]
Credential Guessing/Brute Force
Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573].
Spearphishing
GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient.
Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:
Webhook[.]site
FrgeIO
InfinityFree
Dynu
Mocky
Pipedream
Mockbin[.]org
The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].
CVE Usage
Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].
Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE.
Post-Compromise TTPs
After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].
The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:
C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit
Figure 2: Example Active Directory Domain Services command
Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].
Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]
After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].
After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including:
sender,
recipient,
train/plane/ship numbers,
point of departure,
destination,
container registration numbers,
travel route, and
cargo contents.
In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.
Malware
Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:
While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise.
Persistence
In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence.
Exfiltration
GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure.
The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected.
Connections to Targeting of IP Cameras
In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams.
The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.
Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration.
From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:
Table 1: Geographic distribution of targeted IP cameras
Country
Percentage of Total Attempts
Ukraine
81.0%
Romania
9.9%
Poland
4.0%
Hungary
2.8%
Slovakia
1.7%
Others
0.6%
Mitigation Actions
General Security Mitigations
Architecture and Configuration
Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.
Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].
*.000[.]pe
*.1cooldns[.]com
*.42web[.]io
*.4cloud[.]click
*.accesscan[.]org
*.bumbleshrimp[.]com
*.camdvr[.]org
*.casacam[.]net
*.ddnsfree[.]com
*.ddnsgeek[.]com
*.ddnsguru[.]com
*.dynuddns[.]com
*.dynuddns[.]net
*.free[.]nf
*.freeddns[.]org
*.frge[.]io
*.glize[.]com
*.great-site[.]net
*.infinityfreeapp[.]com
*.kesug[.]com
*.loseyourip[.]com
*.lovestoblog[.]com
*.mockbin[.]io
*.mockbin[.]org
*.mocky[.]io
*.mybiolink[.]io
*.mysynology[.]net
*.mywire[.]org
*.ngrok[.]io
*.ooguy[.]com
*.pipedream[.]net
*.rf[.]gd
*.urlbae[.]com
*.webhook[.]site
*.webhookapp[.]com
*.webredirect[.]org
*.wuaze[.]com
Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.
Identity and Access Management
Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques:
Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
Use account throttling or account lockout [D3-ANET]:
Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]
IP Camera Mitigations
The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:
Ensure IP cameras are currently supported. Replace devices that are out of support.
Apply security patches and firmware updates to all IP cameras [D3-SU].
Disable remote access to the IP camera, if unnecessary [D3-ITF].
Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
If supported, enable authenticated RTSP access only [D3-AA].
Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
Configure, tune, and monitor logging—if available—on the IP camera.
Indicators of Compromise (IOCs)
Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.
Utilities and scripts
Legitimate utilities
Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:
ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
wevtutil – A legitimate Windows executable used by threat actors to delete event logs
vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
OpenSSH – The Windows version of a legitimate open source SSH client
schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
whoami – A legitimate Windows executable used to retrieve the name of the current user
tasklist – A legitimate Windows executable used to retrieve the list of running processes
hostname – A legitimate Windows executable used to retrieve the device name
arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
net – A legitimate Windows executable used to retrieve detailed user information
wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
cacls – A legitimate Windows executable used to modify permissions on files
icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
ssh – A legitimate Windows executable used to establish network shell connections
reg – A legitimate Windows executable used to add to or modify the system registry
Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.
Malicious scripts
Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
Hikvision backdoor string: “YWRtaW46MTEK”
Suspicious command lines
While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:
edge.exe “-headless-new -disable-gpu”
ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.
June 2024
July 2024
August 2024
192[.]162[.]174[.]94
207[.]244[.]71[.]84
31[.]135[.]199[.]145
79[.]184[.]25[.]198
91[.]149[.]253[.]204
103[.]97[.]203[.]29
162[.]210[.]194[.]2
31[.]42[.]4[.]138
79[.]185[.]5[.]142
91[.]149[.]254[.]75
209[.]14[.]71[.]127
46[.]112[.]70[.]252
83[.]10[.]46[.]174
91[.]149[.]255[.]122
109[.]95[.]151[.]207
46[.]248[.]185[.]236
83[.]168[.]66[.]145
91[.]149[.]255[.]19
64[.]176[.]67[.]117
83[.]168[.]78[.]27
91[.]149[.]255[.]195
64[.]176[.]69[.]196
83[.]168[.]78[.]31
91[.]221[.]88[.]76
64[.]176[.]70[.]18
83[.]168[.]78[.]55
93[.]105[.]185[.]139
64[.]176[.]70[.]238
83[.]23[.]130[.]49
95[.]215[.]76[.]209
64[.]176[.]71[.]201
83[.]29[.]138[.]115
138[.]199[.]59[.]43
70[.]34[.]242[.]220
89[.]64[.]70[.]69
147[.]135[.]209[.]245
70[.]34[.]243[.]226
90[.]156[.]4[.]204
178[.]235[.]191[.]182
70[.]34[.]244[.]100
91[.]149[.]202[.]215
178[.]37[.]97[.]243
70[.]34[.]245[.]215
91[.]149[.]203[.]73
185[.]234[.]235[.]69
70[.]34[.]252[.]168
91[.]149[.]219[.]158
192[.]162[.]174[.]67
70[.]34[.]252[.]186
91[.]149[.]219[.]23
194[.]187[.]180[.]20
70[.]34[.]252[.]222
91[.]149[.]223[.]130
212[.]127[.]78[.]170
70[.]34[.]253[.]13
91[.]149[.]253[.]118
213[.]134[.]184[.]167
70[.]34[.]253[.]247
91[.]149[.]253[.]198
70[.]34[.]254[.]245
91[.]149[.]253[.]20
Detections
Customized NTLM listener
rule APT28_NTLM_LISTENER {
meta:
description = "Detects NTLM listeners including APT28's custom one"
( any of ($sysinternals_*) and any of ($psexec_*) )
or
( 2 of ($network_*) and 2 of ($psexec_*))
)
}
The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community:
Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.
Further Reference
To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc.
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
Purpose
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
Contact
United States organizations
National Security Agency (NSA)
Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
Department of Defense Cyber Crime Center (DC3)
United Kingdom organizations
Germany organizations
Czech Republic organizations
Poland organizations
Australian organizations
Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.
Canadian organizations
Estonia organizations
French organizations
French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18.
See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.
Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices.
Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target.
External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim.
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php.
Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php.
Appendix C: MITRE D3FEND Countermeasures
Table 16: MITRE D3FEND countermeasures
Countermeasure Title
ID
Details
Network Isolation
Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers.
Access Mediation
Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access.
Inbound Traffic Filtering
Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement.
Resource Access Pattern Analysis
Use automated tools to audit access logs for security concerns and identify anomalous access requests.
Outbound Traffic Filtering
Block NTLM/SMB requests to external infrastructure.
Platform Monitoring
Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers.
System File Analysis
Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly.
Application Hardening
Enable optional security features in Windows to harden endpoints and mitigate initial access techniques.
Application-based Process Isolation
Enable attack surface reduction rules to prevent executable content from email.
Executable Allowlisting
Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%.
Execution Isolation
Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts.
Application Configuration Hardening
Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.).
Process Spawn Analysis
Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters.
URL Reputation Analysis
Use services that provide enhanced browsing services and safe link checking.
Network Access Mediation
Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible.
Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors.
Domain Name Reputation Analysis
Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.
Multi-factor Authentication
Use MFA with strong factors and require regular re-authentication, especially for management accounts.
Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts.
User Account Permissions
Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected.
Token-based Authentication
Reduce reliance on passwords; instead, consider using services like single sign-on.
Credential Hardening
Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts.
Authentication Event Threshholding
Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout.
Strong Password Policy
Use a service to check for compromised passwords before using them.
Credential Rotation
Change all default credentials.
Encrypted Tunnels
Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices.
Software Update
Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life.
Agent Authentication
Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only.
User Behavior Analysis
Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity.
WASHINGTON, May 21, 2025 (GLOBE NEWSWIRE) — Rhizome, the leading climate resilience planning platform for the power grid, today announced the close of a $6.5 million oversubscribed Seed funding round led by Base10 Partners. The company will use the funding to scale their AI platform and team as they continue to help utilities protect their grid and customers from the impacts of extreme weather events. Rhizome will focus on building out its existing platform, new product research and development, and expanding its geographic footprint domestically and internationally.
Rhizome, launched in 2023, supports utilities by helping them model the impacts of increasingly severe extreme weather events against their systems. By leveraging AI against climate risk data and digital representations of the physical grid, Rhizome’s platform identifies vulnerabilities and prioritizes resilience investments and upgrades. This fundraise will further fuel Rhizome’s mission to integrate climate intelligence into utility planning workflows at a time when grid resilience has never been more crucial.
Extreme weather events are rapidly increasing in frequency, intensity, and cost. In 2024 alone, the U.S. faced 27 billion-dollar climate and weather disasters, totaling over $182 billion in damages. For electric utilities, the stakes are particularly high. A McKinsey analysis found that major storms have cost individual utilities an average of $1.4 billion over a 20-year period, underscoring the urgent need for smarter, more resilient infrastructure planning in the face of growing climate volatility.
At the same time, electric utility capital expenditures hit a record $179 billion, with projections rising to $194 billion in 2025. In an environment where every dollar counts, utilities need advanced planning tools that can simulate a range of climate scenarios — removing the guesswork from resilience planning and helping every dollar go further.
“We set out to partner with investors who deeply understand the power sector and share our commitment to solving pressing climate resilience challenges,” said Mishal Thadani, Co-founder and CEO of Rhizome. “This funding allows us to scale our work and continue refining a suite of products that help utilities prepare the grid for an increasingly uncertain future.”
“Resilience is unquestionably one of the most important factors in ensuring a safe, reliable power grid,” said Rexhi Dollaku, General Partner at Base10 Partners. “Mish, Rahul, and the team bring the right mix of vision, urgency, and technical depth to solve this challenge, and we’re proud to support them.”
In just under two years, Rhizome has developed and commercialized a suite of mission-specific products used by electric utilities in diverse geographical regions. Its flagship product, gridADAPT, supports long-term infrastructure planning by helping utilities prioritize investments that improve reliability and resilience. This was followed by the launch of gridFIRM, a first-of-its-kind platform for wildfire risk mitigation, and most recently, gridCAVA –– an affordable climate vulnerability assessment tool designed specifically for municipal and cooperative utilities. Built on Rhizome’s scalable, cloud-based Aspen platform, these tools round out a powerful portfolio of climate resilience planning tools designed to model current and future climate risk against utility infrastructure, available to utilities across Rhizome’s expanding geographical footprint.
Rhizome is expanding its platform, growing its team, and partnering with more utilities to strengthen resilience in the face of climate-driven threats. Contact Rhizome or visit here to learn more about the company’s expanding portfolio of climate risk solutions.
About Rhizome Rhizome is an AI-powered software platform that helps utilities identify vulnerabilities from climate threats, quantify risk at high resolutions, and measure the economic and social benefits of grid-enhancing investments. Rhizome provides the highest standard of equitable climate risk mitigation to ensure that communities and businesses are protected against intensifying extreme weather events.
About Base10 Partners Founded by Adeyemi Ajao and TJ Nahigian, Base10 is a San Francisco-based venture capital fund investing in founders who believe purpose is key to profits and companies that are automating sectors of the Real Economy, including transportation, retail, logistics, and construction. Through its program, The Advancement Initiative, Base10 aims to donate 50% of profits to underfunded colleges and universities to support financial aid and other key initiatives. Portfolio companies include Notion, Figma, Nubank, Stripe, Motive, Chili Piper, and Popmenu. Connect via base10.vc.
VICTORIA, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, today announced an industry-disrupting partnership with The Open Network (TON) that introduces a $1 million reward pool campaign and fundamentally challenges established exchange revenue models. Launching today and running through June 20, the “TON Triumph” campaign eliminates all trading fees on TON pairs while offering staking returns that dwarf typical yields by up to 100 times.
In an unprecedented move that signals a significant shift in exchange competition strategies, MEXC will offer new users access to staking opportunities with up to 400% APR on TON tokens—creating what analysts describe as the most aggressive user acquisition campaign in the cryptocurrency exchange sector this year.
“This partnership represents a strategic inflection point for both the TON ecosystem and the broader exchange landscape,” said Tracy Jin, COO of MEXC. “By eliminating all typical entry costs into TON trading for a full month while simultaneously offering returns that outpace all competitors, we’re not simply running a promotion—we’re fundamentally changing how users engage with emerging Layer-1 ecosystems.”
Campaign Transforms Market Access and Investment Returns
The 30-day campaign introduces multiple disruptive elements that directly challenge other exchanges’ TON market dominance:
Zero-Fee Trading Structure: Complete elimination of fees on TON/USDT, TON/USDC, and TON/EUR spot pairs, TONUSDT futures, and all TON/USDE network withdrawals—removing traditional revenue mechanisms that have defined exchange business models.
Industry-Leading APR: New users can stake TON tokens to earn up to 400% APR, positioning the offering at 100 times higher than typical cryptocurrency staking returns and several hundred times above traditional banking products.
Democratized Trading Access: Zero-fee structure gives retail traders access to the same economics previously available only to professional and institutional traders, significantly leveling the playing field.
Limited-Time, First-Come Allocation: High-yield staking pools operate on a first-come, first-served basis with participants limited to 250 TON tokens per user, creating immediate urgency for early participation.
The campaign also includes passive rewards of up to 8% daily APR for USDE holders, spot trading rewards from a pool of 32,500 TON, and a futures trading competition with 100,000 USDT in bonuses.
TON Ecosystem Expansion and Infrastructure Advancement
This partnership is pivotal for The Open Network, which continues to gain momentum through its connection to Telegram’s 900+ million users and growing developer ecosystem.
The collaboration represents a significant leap forward in TON’s accessibility and adoption curve. By drastically reducing barriers to entry while providing exceptional incentives, the campaign accelerates the integration of new participants into the TON ecosystem, coinciding precisely with the network’s rapidly expanding technical capabilities and use cases.
The campaign also showcases MEXC’s platform capabilities, demonstrating advanced infrastructure that can handle zero-fee trading across multiple markets simultaneously while managing high-volume staking operations with variable APR structures.
Time-Sensitive Opportunity with Global Access
The $1 million in rewards is available exclusively during the 30-day window, with certain high-value components like the 400% APR staking pool starting on May 21th and operating on a capped allocation basis. MEXC has created a streamlined onboarding process that allows new users to complete registration and KYC verification in minutes, with the campaign accessible to eligible participants globally through both web and mobile interfaces.
About MEXC Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto.” Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding. MEXC Official Website| X | Telegram |How to Sign Up on MEXC
About TON The Open Network (TON) is a fully decentralized layer-1 blockchain designed for mass adoption. Originally conceived by Telegram and now developed by the open TON Community, the network offers exceptional scalability, accessibility, and ease of use.
Risk Disclaimer: The information provided in this article regarding cryptocurrencies does not constitute investment advice. Given the highly volatile nature of the cryptocurrency market, investors are encouraged to carefully assess market fluctuations, the fundamentals of projects, and potential financial risks before making any trading decisions.
Disclaimer: This is a paid post and is provided by MEXC. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.
Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.
The UK’s most powerful hub for the creative industries united for two days of engaged networking, passionate debate and exceptional insights into AI, the creator economy, production craft and more – helping attendees stay ahead-of-the-curve for the year ahead.
London, United Kingdom, 21 May 2025 – After two exceptional days of conversation, collaboration and community, the biggest and buzziest MPTS yet welcomed a record 13,000 attendees from 50 countries, uniting the UK’s media and entertainment industry together in the heart of London, like never before. The exhibition is organized by Media Business Insight (MBI) Ltd, a GlobalData company.
Hosted at London’s Olympia on 14-15 May, the red-hot editorially driven program delivered 100+ free-to-attend sessions across eight theatres, showcasing the insight and passion of more than 350 expert speakers and guest keynotes. The bustling show floor was packed with more than 300 exhibitors and sponsors, showcasing imagination, determination and standout talent of the UK’s creative and technical communities – at a time of both global challenge and immense opportunity.
Setting the agenda for MPTS, a State of the Nation Production keynote outlined a media and entertainment landscape in which storytellers had to embrace screens, formats and creators of all kinds.
Kate Beal, CEO, Woodcut Media, asserted: “TV doesn’t exist anymore in the way we knew it.”
Derren Lawford, CEO, Dare Pictures, said: “We are in the middle of a decade of profound transition, and we are past the tipping point. TV is part of a wider, connected series of industries around the creation and distribution and funding of content.”
Headliners at MPTS include:
Producer and presenter Ross Kemp, who took us on an exhilarating tour of investigative documentaries on the front lines of conflict, drug cartels and organised crime gangs. “They will know in a second if you are not telling the truth,” he said. “I specialize in telling the truth, it is as simple as that.”
Georgie Holt, whose company Flight Story produces the world’s second biggest podcast ‘Diary of a CEO’, declared: “We are in the era of the Founder Creator — creators who are now in charge of media content and able to monetise spectacularly outside of traditional gatekeepers.”
NFL professional turned American Football broadcaster Jason Bell explained how sports coverage was evolving into the F1 Drive To Survive model, in which athlete personalities and back stories were the keys to growing audiences.
Blockbuster editor Eddie Hamilton gave a masterclass about the precision involved in making Top Gun: Maverick and five Mission: Impossible movies with Tom Cruise. He said: “Every nuance is refined hundreds of times. Sometimes we watch a 10-minute scene 40 times in a day, checking to see where your eye is moving in the frame.”
Diverse representation is a vital sign of the industry’s health and MPTS is proud to set the benchmark to secure equal representation and attendance from the next generation, not only across the program, but also something clearly witnessed across the show floor amongst exhibitors and attendees.
MPTS also prioritizes the crucial importance of sustainability and, in continuing association with BAFTA albert brought this conversation to the fore with experts including Peter Okell, Sky Studios Elstree; Luke Seraphin, Sky Studios and Claire O’Neill, A Greener Future speaking in the Sustainability Series.
Sam Street, Marketing Officer, BAFTA Albert commented: “MPTS is a really key moment in our calendar. It is always so great to connect with suppliers, companies, studios and creatives who share our common passion for sustainability within screen industries. It has also been really valuable to curate our sustainability series of panels across this year’s show, we’ve had some really insightful discussions and emphasised the importance of environmental focus throughout the screen industries.”
We did not need a machine to predict the high demand for news and information about AI. The brand-new ticketed AI Training program and the expanded AI Media Zone drew exceptional attendance, with exhibitors such as Dot Group, Moments Lab and Software. Conversations in these packed-out sessions revolved around the impact of AI from ideation to VFX, featuring real-world insights and discussions on bridging the gap between theory and practice from speakers including Pete Archer, BBC; Jon Roberts, ITN and Damien Viel, Banijay Entertainment.
With a record number of exhibitors already rebooking for 2026, MPTS continues to prove its value as the UK’s number one event for media and production professionals, where brands, creatives and decision-makers come together to connect, collaborate and grow.
Jane Shepard, Senior Channel Marketing Manager, Sandisk, said: “MPTS 2025 was a spectacular showcase of innovation, bringing together the brightest minds and cutting-edge technology in the industry. An unforgettable experience for all attendees.”
Tom Rundle, Application Engineer, Yamaha Music, said: “It has been very busy for us. We have seen a huge mix of customers from the broadcast sector here, but also customers from the other industries which we serve, whether that’s live or theatre who have deliberately come to the show to seek us out to speak to us. Will we be back next year? Yes, absolutely, this is the first year for us, so it was always a bit of a toe in the water, but it’s been vastly more successful than we thought it was going to be.”
Peter Alderson, Business Manager, Nikon, said: “This is our second year at MPTS, we’ve gone a little bit bigger on our stands, almost doubling it, and I think it’s definitely been worthwhile doing. We’ve partnered with RED, who we recently purchased, and MRMC so it’s making a lovely statement about where we are in the market, and I think we’re in the right place to make that statement here at MPTS.”
Jennifer Hudson, Marketing Executive, Videndum, said: “This show is really important in our calendar – we attend nearly every year and find so much value in it. We get to meet with so many different professionals within the industry, and this year has been really, really positive for us. We’ve walked away with quite a few leads and made new relationships. It’s a fantastic show, and we would thoroughly recommend anyone thinking about coming and having a stand here to definitely do it – you won’t regret it.”
Will Pitt, Head of Sales Solutions, Techex, said: “My impression of the show is that it’s been incredibly busy and very positive. Techex particularly specialise in solving some of the headaches that a lot of the broadcast industry is grappling with at the moment, namely, how they transition into an IP-led architecture from a legacy architecture and what that journey looks like. As such, our standards have been packed pretty much throughout the show to come and look at products, but also to come and talk about ideas and lean into what that journey looks like specifically for them. So not a generic journey, but specific to their drivers and their wants and needs in the short and medium term. We particularly like MPTS because it’s London based and many of the engineers that we speak to and collaborate with are based here and therefore it’s an easy journey for them to take half a day, a day out to come and investigate what we have to offer, but also to have those conversations. And so for organisations like WBD or Sky, the BBC, ITV, etc. They can come here quite easily and engage with us, spend some time talking in real life and not over teams or Zoom.”
Charlotte Wheeler, Event Director, MPTS said: “Without doubt, 2025 was the most stimulating, ahead-of-the-curve MPTS yet. At a time when we are seeing the industry under real pressure from budget cuts to talent shortages and perpetual change, the conversations and connections on the show floor were positive and demonstrated infectious community spirit. The level of attendance and the quality of attendees from across all sectors of the industry was incredible – not just stakeholders in technology but representatives from production and commissioning, the creator economy, those new to the industry and freelancers were all brought together by MPTS under one roof.
“A huge amount of work goes into making sure that there is equal representation across our extensive conference programme. I am proud that MPTS is one of – if not the – most diverse shows both in terms of attendees and panellists.
“Thank you to everyone for exhibiting, sponsoring, speaking, attending and engaging with the show to make MPTS such a thrilling success. We are already planning for 2026, which marks MPTS’ 10th edition, so look forward to a landmark celebration!”
Save the date for MPTS 2026 when we return to Olympia Grand Hall, London on 13 – 14 May 2026.
The conversation does not stop when the doors close. MPTS is more than just two days a year – it is a connected, year-round community for the broadcast and media industry. From on-demand content to exclusive events, there’s still so much to explore. Stay connected with us: https://www.mediaproductionshow.com/register-interest
WASHINGTON – U.S. Senator Joni Ernst (R-Iowa) joined her colleagues to introduce a bipartisan bill to improve federal coordination for essential medicine supply chains that could impact the healthcare system, helping our nation mitigate drug shortages and address future health emergencies.
“Depending on China for critical pharmaceutical ingredients poses a national security threat,” said Ernst. “Through this bipartisan effort, we can identify essential medicines to strengthen the supply chain and reduce our reliance on our adversary. By taking action now, we can protect the health of our citizens in the future.”
The Mapping America’s Pharmaceutical Supply (MAPS) Act would direct the Department of Health and Human Services to:
Map the U.S. pharmaceutical supply chain and find weaknesses,
Help create a database of essential medicines, and
Collect information about where these medicines and ingredients are made and their supply chain details, including reliance on China.
Fees for post-16 SEND travel were due to be introduced in 2020 following consultation but halted due to the outbreak of the Covid pandemic.
Fresh consultation is now being held on the introduction of a charging policy which will require a contribution towards the cost of post-16 SEND travel.
This would bring the council in line with the approach taken by neighbouring authorities.
The proposed charges would apply to students moving into post-16 SEND education from September 2025 and those already in post-16 SEND education.
Any payments would be spread over 3 terms with a reduction for low income families.
Councillor Qaiser Azeem, the City of Wolverhampton Council’s Cabinet Member for Transport, said: “We are one of the few remaining councils to offer free transport for this age group. Most authorities charge a contribution due to there being no legal requirement to provide post 16 transport.
“We remain committed to ensuring young people lead independent healthy lives, feel safe and secure and achieve their full potential.
“While in an ideal world we would not need to consider introducing charges, the proposals to introduce a contribution towards the cost of post-16 SEND travel, align with, or are less than, neighbouring authorities.
“We would of course work closely with families affected to support them should these changes be introduced.
“It is important we hear from parents, carers, students, schools and the wider community as part of this consultation, so please take this opportunity to have your say.”
In line with legislation there is no transport charge for pupils aged 5 to 16 or for adult learners aged 19 to 25.
Source: Organization for Security and Co-operation in Europe – OSCE
Headline: Model OSCE in Andorra: Empowering young professionals to engage in peace and security
From 19 to 21 May, the OSCE Secretariat in collaboration with the Government of Andorra, the US Mission to the OSCE, and University of Andorra co-organized the first-ever Model OSCE in Sant Julià de Lòria, Andorra.
The three-day event brought together 25 young people with diverse backgrounds from Andorra, Algeria, the United States of America, Japan and Morocco, offering them a unique opportunity to strengthen their soft skills and deepen their understanding of peace and security issues through peer-to-peer learning on multilateralism, international relations and diplomacy.
The programme featured sessions on the OSCE’s mandate, history, structure, and decision-making processes, as well as its co-operation with OSCE Partners. It also included discussions on Finland’s priorities on 2025 Chairpersonship, the Youth and Security Agenda, the role of women in diplomacy and multilateralism, and hands-on training in negotiation and mediation.
In her opening remarks, Andorra’s Minister of Foreign Affairs, H.E. Imma Tor Faus emphasized the country’s ongoing support of youth engagement in international affairs: “After hosting the OSCE activities in 2022 focused on Youth and Security, today’s event reaffirms Andorra’s strong and ongoing commitment to the OSCE’s Youth and Security Agenda. We are proud to support the efforts of the Office of the Secretary-General, both politically and financially, to advance this vital work. The Model OSCE reflects the values we stand for and aligns closely with our priority of promoting youth participation in international organizations.”
Omar Cardentey, Head of Public Affairs for the US. Mission to the OSCE also shared his personal experience in working in the multilateral settings and encouraged young participants to never give up or doubt their ability to make an impact.
The Model OSCE echoed the motto “nothing about youth without youth”, underscoring the crucial role of young people in building sustainable and peaceful societies.
One participant, Lisa Cruz Lackner from Andorra, captured the spirit of the event: “Capacity-building initiatives like this are more than trainings. They create a unique space for dialogue, understanding, and mutual learning. When we come together with different experiences, perspectives, and identities, we don’t just learn about the issues—we learn how to listen, negotiate, and collaborate beyond borders. These events empower us not only to understand global challenges, but to see ourselves as part of the solution. In a setting like the Model OSCE, you quickly realize that diversity is not a challenge to overcome—it is the key to building more inclusive, effective and lasting approaches to peace and security.”
Participants also engaged in exchanges with young diplomats and parliamentarians from Andorra and Malta, gaining firsthand insights into diplomatic careers. The event encouraged collaborative learning and dialogue throughout its session.
The Model OSCE was held as part of the Extra-budgetary Project “Accelerating the implementation of the Youth and Security Agenda in the OSCE region”, which aims to empower young people to shape a more secure and co-operative future across the OSCE region.
We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.
He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.
As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.
Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.
This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.
The economist who loved jazz
Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.
In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.
Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.
Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.
The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.
Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.
Morojele on drums for Andile Yenana.
Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.
His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:
The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.
Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.
Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.
I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.
In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.
Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.
There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”
In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.
The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.
The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.
For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.
He was working on his third fiction outing – a collection of short stories – at the time of his death.
The beauty of his work lives on
Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.
Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).
Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
After 18 months of punishing airstrikes, raids and an increasingly restrictive siege in Gaza, the United Nations on May 20, 2025, issued one of its most urgent warnings yet about the ongoing humanitarian crisis: an estimated 14,000 babies were at risk of death within the next 48 hours without an immediate influx of substantial aid, especially food.
The assessment came a day after Israel allowed the first trickle of aid back into Gaza following its nearly three-month total blockade imposed on March 2. But on the first day of that resumption, the U.N. Office for the Coordination of Humanitarian Affairs reported that only nine trucks were allowed into Gaza, when around 500 are required every day. The U.N. called it “a drop in the ocean of what is urgently needed.”
Israel’s control of food and aid into Gaza has been a consistent theme throughout the past 18 months. Indeed, just two weeks after Israel’s massive military campaign in the Gaza Strip began in late 2023, Oxfam International reported that only around 2% of the usual amount of food was being delivered to residents in the territory and warned against “using starvation as a weapon of war.”
Amid the broader destruction to lives and infrastructure, there is now barely a food system to speak of in Gaza.
Since October 2023, Israeli bombs have destroyed homes, bakeries, food production factories and grocery stores, making it harder for people in Gaza to offset the impact of the reduced imports of food.
A handful of trucks loaded with humanitarian aid for the Gaza Strip are seen at the Kerem Shalom crossing in southern Israel on May 20, 2025. AP Photo/Maya Alleruzzo
But as much as things have worsened in the past 18 months, food insecurity in Gaza and the mechanisms that enable it did not start with Israel’s response to the Oct. 7 attack by Hamas.
Multiple factors contributed to this preexisting food insecurity, not least the blockade of Gaza imposed by Israel and enabled by Egypt since 2007. All items entering the Gaza Strip, including food, became subject to Israeli inspection, delay or denial.
Basic foodstuff was allowed, but because of delays at the border, it could spoil before it entered Gaza.
By placing restrictions on food imports, Israel has claimed to be trying to put pressure on Hamas by making life difficult for the people in Gaza. “The idea is to put the Palestinians on a diet, but not to make them die of hunger,” said one Israeli government adviser in 2006.
To enable this, the Israeli government commissioned a 2008 study to work out exactly how many calories Palestinians would need to avoid malnutrition. The report was released to the public only following a 2012 legal battle. Echoes of this sentiment can be seen in the Israeli decision in May 2025 to allow only “the basic amount of food” to reach Gaza to purportedly ensure “no starvation crisis develops.”
The long-running blockade also increased food insecurity by preventing meaningful development of an economy in Gaza.
Displaced Palestinians fleeing amid ongoing Israeli military operations in the Gaza Strip arrive in Jabalia in northern Gaza on May 18, 2025. AP Photo/Jehad Alshrafi
The U.N. cites the “excessive production and transaction costs and barriers to trade with the rest of the world” imposed by Israel as the primary cause of severe underdevelopment in the occupied territories, including Gaza. As a result, in late 2022 the unemployment rate in Gaza stood at around 50%. This, coupled with a steady increase in the cost of food, made affording food difficult for many Gazan households, rendering them dependent on aid, which fluctuates frequently.
Hampering self-sufficency
More generally, the blockade and the multiple rounds of destruction of parts of the Gaza Strip have made food sovereignty in the territory nearly impossible.
Even prior to the latest war, Gaza’s fishermen were regularly shot at by Israeli gunboats if they ventured farther in the Mediterranean Sea than Israel permits. Because the fish closer to the shore are smaller and less plentiful, the average income of a fisherman in Gaza has more than halved since 2017.
Much of Gaza’s farmland has been rendered inaccessible to Palestinians as a result of post-October 2023 actions by Israel.
And the infrastructure needed for adequate food production – greenhouses, arable lands, orchards, livestock and food production facilities – has been destroyed or heavily damaged. International donors hesitate to rebuild facilities, knowing they cannot guarantee their investment will last more than a few years before being bombed again.
The latest ongoing siege has only further crippled the ability of Gaza to be food self-sufficient. By May 2025, nearly 75% of croplands had been destroyed, along with significant amounts of livestock. Less than one-third of agricultural wells used for irrigation remain functional.
Starvation as weapon of war
The use of starvation as a weapon is strictly forbidden under the Geneva Conventions, a set of statutes that govern the laws of warfare. Starvation has been condemned by U.N. Resolution 2417, which decried the use of deprivation of food and basic needs of the civilian population and compelled parties in conflict to ensure full humanitarian access.
Israeli Prime Minister Benjamin Netanyahu has said publicly that Israel was permitting aid now only because allies were pressuring him over “images of mass famine.” This stance suggests that Israel will not soon increase aid beyond what his government deems politically acceptable.
While there is more evidence than ever before that Israel is using food as a weapon of war, there is also, I believe, ample evidence that this was the reality long before Oct. 7, 2023.
In the meantime, the implications for Palestinians in Gaza have never been more dire.
More death is certain to follow. On May 12, the Integrated Food Security Phase Classification, a global system created to track food insecurity, released an alarming report on projections of food insecurity in Gaza.
It warned that by September 2025, half a million people in Gaza – 1 in 5 of the population – will be facing starvation and that the entire population will experience acute food insecurity at crisis level, or worse.
Editor’s note: Parts of this story were originally contained in an article published by The Conversation U.S. on Feb. 15, 2024.
Yara M. Asi does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: The Conversation – USA – By Sharon Tettegah, Professor of Creative Studies, University of California, Santa Barbara
Retention and recruitment efforts designed to boost diversity in engineering programs often fall short of their goals.gorodenkoff/Getty Images
For decades, colleges, government agencies and foundations have experimented with recruitment and retention efforts designed to increase diversity in engineering programs.
However, the efforts have not significantly boosted the number of women, students of color, individuals with disabilities and other underrepresented groups studying and earning degrees in STEM and engineering fields.
Latino, Black, Native American and Alaska Native students are underrepresented among science and engineering degree recipients at the bachelor’s degree level and above. The groups are also underrepresented among STEM workers with at least a bachelor’s degree.
I study equity and social justice in STEM learning. In my recent study, I found that more students from diverse backgrounds could excel in engineering programs if course content were tailored to a wider variety of learning preferences.
Why it matters
Focusing on learning preferences could boost diversity in engineering courses and careers. Morsa Images/Getty Images
During my time as a program officer at the National Science Foundation, an independent federal agency that supports science and engineering, I reviewed plenty of research focused on broadening participation and diversifying student enrollment in STEM fields.
Progress can stall on efforts to boost diversity because college instructors do not consider the synergistic relationship between the content and the learner.
Teachers are the mediators, and it is students’ experiences with the curriculum that matter.
It was long a common belief that students have different learning styles. These included kinesthetic, learning through hands-on experiences and physical activity; auditory, learning by listening to information; and visual, learning by seeing information.
More recent research does not support the idea that teaching students according to their learning style leads to improved learning.
That’s why I prefer the term “learning preferences” rather than learning styles. We all have preferences – whether for ice cream flavors, home decor or how we receive information, including how we learn.
Learning preferences are broader and more flexible, allowing multiple ways of engaging with content.
For example, let’s say a teacher always presented equations in a classroom and the student just could not get it. However, it was the only way the information was presented. To the individual learner, they have failed. Some people would say, “These kids can’t learn,” and subsequently counsel the student out of the class.
Then, years are spent repeating the same cycle.
Students should have opportunities to connect with engineering content in multiple ways. 10’000 hours/Getty Images
However, educators can broaden their viewpoints if they look at the students as customers. If a customer is shopping for a shirt, they look for one that catches their eye. Ultimately, they find one they like.
Instructors need to take the same approach when trying to help students understand what is happening in class. For instance, if I have trouble with equations, I should be provided with options to engage with the lesson in ways that align with my learning preferences.
What’s next?
Learning styles have been heavily researched. However, content preferences have not been well explored.
In a truly democratic education system, curriculum design should reflect the voices of all stakeholders and not just those in positions of power, namely instructors.
Using data mining and artificial intelligence, educators have a variety of options for creating content for the various preferences a learner may want or need. For example, if a student prefers other representational content, such as word problems, graphics or simulations, AI can create diverse representations so that the learner is exposed to a variety of representations.
I argue that future studies need to consider the use of technologies such as adaptive learning applications to understand students’ learning preferences.
Prioritizing diverse learning perspectives in STEM could help create a more inclusive and responsive learning environment.
The Research Brief is a short take on interesting academic work.
Sharon Tettegah received funding from the National Science Foundation for this work. Award Abstract # 1826632
Coordinating Curricula and User Preferences to Increase the Participation of Women and Students of Color in Engineering
For patients hospitalized with chest pain, the amount of time they spend sedentary afterward is linked to a greater risk for more heart problems and death within a year. That’s the key finding of a new peer-reviewed study my colleagues and I published in the journal Circulation: Cardiovascular Quality and Outcomes.
We asked 609 emergency room patients experiencing chest pain — average age of 62 — to wear a physical activity monitor for 30 days after leaving the hospital. The monitor measured movements, sitting time and sleep throughout the day. We then followed patients for one year to track whether they had additional heart problems or died.
We found that patients who averaged more than 15 hours of sedentary behavior daily — which does not include sleep — were more than twice as likely to experience more heart problems or die in the year after discharge than patients who accrued a daily average of 12 hours of sedentary time.
But our goal wasn’t just to document that sitting is harmful. It was also to figure out what patients should do instead to lower their risk.
We found that replacing 30 minutes of sedentary time with moderate or vigorous movement, like brisk walking or running, was most beneficial. It was associated with a 62% lower risk of experiencing more heart problems or dying in the year after discharge. But we also found that replacing 30 minutes of sedentary time with just light movement, such as slow walking or housework, lowered the risk of heart problems and death by 50%.
Sleep was also a healthier option. Replacing 30 minutes of sedentary time with sleep lowered the risk of heart problems and death by 14%.
Clogged arteries could lead to a heart attack. Veronica Zakharova/Science Photo Library via Getty Images
Why it matters
Over 8 million people in the U.S. are admitted to the hospital with chest pain suggestive of acute coronary syndrome. annually. This covers a range of conditions involving reduced blood flow to the heart, including angina and heart attack.
Patients with acute coronary syndrome remain at high risk of having another heart problem even with optimal medical treatment.
The risk also remains high for patients with chest pain who are discharged without a diagnosis of acute coronary syndrome, as their unexplained chest pain may be a precursor to more serious heart problems. Given this risk, there is a need to identify risk factors that can be modified to improve a patient’s prognosis after hospitalization for chest pain.
In previous research, we found that patients with acute coronary syndrome had a fear of exercise and were sedentary, spending over 13 hours a day sitting.
Given that sedentary behavior has been linked to poor heart health in the general population, we were concerned that patients were unknowingly increasing their risk of having another heart problem.
Our latest findings confirm that sedentary time is a harmful behavior for these patients. But beyond telling patients to stop sitting so much, our work provides important guidance: Any movement, regardless of how intense, can be beneficial after hospitalization. This is especially relevant for people recovering from heart problems who may find exercise difficult or scary.
While exercise provides the best “bang for your buck” in terms of health benefits, our findings are good news for patients who may not have the time, ability or desire to exercise. And for those unable to fit in more movement, just getting an extra half hour of sleep is a small, doable step that can make a meaningful difference for your health after hospitalization.
What still isn’t known
Researchers don’t fully understand why sedentary time is harmful. Muscles help regulate blood sugar and lipid levels. It is thought that when muscles aren’t used, such as when patients sit for hours, this can lead to harmful elevations in blood sugar and lipids.
In turn, this can cause inflammation, plaque buildup in the arteries and organ damage. More research is needed to understand the biological mechanisms so that we can determine just how much movement is needed in a day.
What’s next
While our study highlights the potential risks of sedentary behavior after being hospitalized for chest pain, it was an observational study. Clinical trials are needed to confirm that replacing sedentary time with activity or sleep can improve prognosis.
The Research Brief is a short take on interesting academic work.
Keith Diaz receives funding from the National Institutes of Health.
Source: The Conversation – USA – By Andrew Reeves, Professor of Political Science and Director of the Weidenbaum Center, Washington University in St. Louis
At his inauguration on Jan. 20, 2025, Donald Trump swore to ‘preserve, protect and defend the Constitution of the United States.’Morry Gash/POOL/AFP, Getty Images
Lately, the headlines have been clear: President Donald Trump is headed for a showdown with the courts. If he ignores their rulings, the courts have few tools and limited power to make him comply.
But the real contest is not legal. It is political.
But law alone has never been enough to prevent presidents from abusing their power. The law’s force depends on political will. Presidents often follow the law not simply because they must, but to avoid backlash from Congress, the media or the public.
What the United States is witnessing in 2025 is not just a president testing the system. It is a transformation of the presidency into a fully political institution. The president acts until political resistance becomes strong enough to stop him.
President Donald Trump criticizes judges whose decisions he doesn’t like.
Testing the limits
These political constraints are informal and fluid.
They arise from public opinion, media scrutiny, pressure from party leaders and other elected officials, and the threat of electoral consequences. While legal rules rely on institutions, political limits depend on reputation, norms and the willingness of others to resist.
Trump’s presidency operates within this second framework. Legal boundaries are still present, but they are often treated by his administration as optional and without deference.
These are not isolated incidents. Taken together, they reveal a broader pattern.
Trump appears to treat legal rules not as limits but as obstacles to be negotiated or ignored. One recent scholarly paper has described Trump’s approach as “legalistic noncompliance,” where the administration uses the language of law to give the appearance of compliance while defying the substance of court orders.
In a February 2025 national survey by the Weidenbaum Center, a research institute that I head at Washington University, just 21% of Americans said the president should be able to enact major policy without Congress. The public does not support unchecked presidential power: A further 25% of respondents, including more than one-third of Republicans, neither agreed nor disagreed that a president should have this type of unchecked power. Of those with an opinion, a solid 72% of Americans oppose unilateral presidential action, including 90% of Democrats, 76% of independents and 42% of Republicans.
These findings align with nine earlier national surveys conducted during the Obama and Trump administrations. Jon Rogowski and I report these results in our book, “No Blank Check.”
But one important shift stands out in the recent survey. Support for unilateral executive action among the two-thirds of Republicans who expressed an opinion has reached an all-time high, with 58% of them endorsing presidential action without Congress. That is more than 16 points higher than in any previous wave.
Despite that rise in partisan support, Trump’s broader political position remains weak.
Congressional Republicans continue to offer public support, but many are watching their own polling numbers closely as the midterms approach.
If the economy falters and public opinion turns more sharply against the president, political resistance could grow. I believe that’s when legal rules may begin to matter again – not because they carry new force, but because violating them would carry higher political costs.
Real test still ahead
So far, no judge has held the Trump administration in contempt of court. But the signs of erosion are unmistakable. Trump recently accused the Supreme Court of “not allowing me to do what I was elected to do” after it temporarily blocked his administration’s effort to deport migrants with alleged ties to Venezuelan gangs. Treating the judiciary as just another political adversary and ignoring its rulings risks an even deeper constitutional crisis.
The most meaningful check on presidential power will be political.
Courts rely on the broader political system for enforcement. That support can take many forms: elected officials speaking out in defense of the rule of law; Congress using its oversight and funding powers to uphold court rulings; bureaucrats refusing to implement unlawful directives; and a press and public that demand compliance. Without that support, even the clearest legal decisions may be ignored.
The legal fights unfolding today are serious and must be watched closely. But Trump is not focused on the courts. He is focused on politics – on how far he can go, and whether anyone will make him stop.
Andrew Reeves is affiliated with Washington University in St. Louis and the Hoover Institution.
How much do you engage with others when you’re out in public? Lots of people don’t actually engage with others much at all. Think of commuters on public transportation staring down at their phones with earbuds firmly in place.
As a professor of social psychology, I see similar trends on my university campus, where students often put on their headphones and start checking their phones before leaving the lecture hall on the way to their next class.
Curating daily experiences in these ways may appeal to your personal interests, but it also limits opportunities for social connection. Humans are social beings: We desire to feel connected to others, and even connecting with strangers can potentially boost our mood.
At the same time, our attention is increasingly being pulled in varied directions within a highly saturated information environment, now commonly known as the “attention economy.”
It is perhaps not surprising, then, that so many Americans are experiencing a crisis of social connection. Research in social psychology helps to explain how the small behaviors and choices we make as individuals affect our experiences with others in public settings.
Where you focus your attention
One factor shaping people’s experiences in public settings concerns where they focus their attention. Since there is more information out in the world than anyone could ever realistically take in, people are driven to conserve their limited mental resources for those things that seem most crucial to navigating the world successfully. What this means is that every person’s attention is finite and selective: By attending to certain bits of information, you necessarily tune out others, whether you’re aware of doing so or not.
More often than not, the information you deem worthy of attention also tends to be self-relevant. That is, people are more likely to engage with information that piques their interest or relates to them in some way, whereas they tend to ignore information that seems unrelated or irrelevant to their existence.
One unfortunate consequence is that a person may end up treating interactions with other people as transactions, with a primary focus on getting one’s own needs met, or one’s own questions answered. A very different approach would involve seeing interactions with others as opportunities for social connection; being willing to expend some additional mental energy to listen to others’ experiences and exchange views on topics of shared interest can serve as a foundation for building social relationships.
It can feel alienating to be surrounded by people who have basically hung out a ‘do not disturb’ sign. Drazen/E+ via Getty Images
How others interpret your actions
Also, by focusing so much attention on their own individual interests, people may inadvertently signal disinterest to others in their social environments.
As an example, imagine how it would feel to be on the receiving end of those daily commuting rituals. You find yourself surrounded by people whose ears are closed off, whose eyes are down and whose attention is elsewhere – and you might start to feel like no one really cares whether you exist or not.
As social creatures, it’s natural for human beings to want to be seen and acknowledged by other people. Small gestures such as eye contact or a smile, even from a stranger, can foster feelings of connection by signaling that our existence matters. Instead, when these signals are absent, a person may come to feel like they don’t matter, or that they’re not worthy of others’ attention.
How to foster connection in public spaces
For all these reasons, it may prove valuable to reflect on how you use your limited mental resources, as a way to be more mindful and purposeful about what and who garner your attention. As I encourage my students to do, people can choose to engage in what I refer to as psychological generosity: You can intentionally redirect some of your attention toward the other people around you and expend mental resources beyond what is absolutely necessary to navigate the social world.
Engaging in psychological generosity doesn’t need to be a heavy lift, nor does it call for any grand gestures. But it will probably take a little more effort beyond the bare minimum it typically takes to get by. In other words, it will likely involve moving from being merely transactional with other people to becoming more relational while navigating interactions with them.
A few simple examples of psychological generosity might include actions such as:
Tuning in by turning off devices. Rather than default to focusing attention on your phone, try turning off its volume or setting it to airplane mode. See if you notice any changes in how you engage with other people in your immediate environment.
Making eye contact and small talk. As historian Timothy Snyder writes, eye contact and small talk are “not just polite” but constitute “part of being a responsible member of society.”
Smiling and greeting someone you don’t know. Take the principle of “innocent until proven guilty” to the realm of social relations, by showing your willingness to welcome other people rather than displaying disinterest and avoidance. Such simple acts may help to foster feelings of belonging and build a sense of community with others.
Acknowledging another human with a smile, even when using an automated system, can help them feel seen and valued. izusek/E+ via Getty Images
Among the most cynical, examples like these may initially be written off as reflecting pleas to practice the random acts of kindness often trumpeted on bumper stickers. Yet acts like these are far from random – they require intention and redirection of your attention toward action, like any new habit you may wish to cultivate.
Practicing acts of psychological generosity, then, can provide you with opportunities to benefit from social connection, at the same time as these acts can pay dividends to other people and to the social fabric of your community.
Linda R. Tropp does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: United States of America – Department of State (video statements)
Secretary of State Marco A. Rubio testifies before the House Appropriations Committee’s Subcommittee on State, Foreign Operations, and Related Programs on the FY26 Department of State Budget Request on Capitol Hill, on May 21, 2025.
———-
Under the leadership of the President and Secretary of State, the U.S. Department of State leads America’s foreign policy through diplomacy, advocacy, and assistance by advancing the interests of the American people, their safety and economic prosperity. On behalf of the American people we promote and demonstrate democratic values and advance a free, peaceful, and prosperous world.
The Secretary of State, appointed by the President with the advice and consent of the Senate, is the President’s chief foreign affairs adviser. The Secretary carries out the President’s foreign policies through the State Department, which includes the Foreign Service, Civil Service and U.S. Agency for International Development.
Get updates from the U.S. Department of State at www.state.gov and on social media!
Facebook: https://www.facebook.com/statedept
X: https://x.com/StateDept
Instagram: https://www.instagram.com/statedept
Flickr: https://flickr.com/photos/statephotos/
Rumble: https://rumble.com/c/StateDept
Substack: https://statedept.substack.com
Watch on-demand State Department videos: https://video.state.gov/
Subscribe to The Week at State e-newsletter: https://public.govdelivery.com/accounts/USSTATEBPA/signup/32562
State Department website: https://www.state.gov/
Careers website: https://careers.state.gov/
White House website: https://www.whitehouse.gov/
Terms of Use: https://state.gov/tou
Source: United States Senator for New Hampshire Jeanne Shaheen
Published: 05.21.2025
(Washington, DC) – U.S. Senator Jeanne Shaheen (D-NH), Ranking Member of the U.S. Senate Foreign Relations Committee, joined CNN’s The Arena this evening to discuss her questioning of U.S. Secretary of State Marco Rubio earlier in the day and her belief that Russian President Vladimir Putin is playing President Trump. She also sharply criticized Congressional Republicans’ budget proposal that would gut Medicaid and food assistance benefits to finance tax breaks for billionaires and special interest groups. The interview followed Secretary Rubio’s first testimony to the Senate Foreign Relations Committee since his confirmation hearing in January. Click HERE to watch Senator Shaheen’s interview.
Key Quotes from Senator Shaheen:
When asked if she feels Secretary Rubio and President Trump are being played by Putin, Shaheen said: “I do, absolutely. And I said that to Secretary Rubio and we heard it again, what the outcome of this phone call between President Trump and Vladimir Putin yesterday was that now Putin is going to bring in a sheet that outlines what they want to see, to end the war in Ukraine, to get them to the table. Well, he’s just playing for time because he thinks the longer he can delay that, we’re going to get disinterested, that we’re going to not want to continue to support Ukraine in this fight. But what he doesn’t understand is that the President and this administration says the biggest threat to America is China, and China and President Xi are watching what the outcome of this war in Ukraine is. And if we are not tough in Ukraine, if we are not tough on Putin, that he knows that we’re not going to be tough on him when he goes after Taiwan. And so that’s a real problem.”
On Republicans’ budget proposal, Shaheen said: “Well, it’s clear that the Republicans in the House care more about what Donald Trump thinks than they care about what their constituents think. Because constituents in most of this country don’t want to see massive cuts to the Medicaid program, health care that so many Americans rely on, whether it’s for nursing home care or for people with disabilities, people who get their health insurance through the Medicaid program.”
On Republicans threatening cuts to program like Medicaid and SNAP, Shaheen said: “And what they’re actually trying to do with those worker requirements and other changes is to reduce the number of people on Medicaid so they can save money and what they want to do, what they want to do with the money that they’re saving by cutting Medicaid, by cutting food benefits from the Snap program, is to provide a huge tax cut to the wealthiest Americans. 70% of the benefits from the tax cuts are going to go to the wealthiest 1% in this country.”
Source: United Kingdom – Executive Government & Departments
Case study
Flies, crossbows and comics: novel counter terrorism innovation
Nine projects, ranging from whether flies can detect explosives to how comics can reduce radicalism and how much of a risk crossbows are, were showcased.
More than 100 people attended the third University Innovation Concept event exploring ways in which cutting-edge research, often in unexpected areas, can help fight terrorism.
Nine fascinating and thought-provoking projects, ranging from whether flies can detect explosives (yes!) to how comics can reduce radicalism, and how much of a terrorism risk crossbows are, were on display at a showcase at the Open University in Milton Keynes, in which the Accelerated Capability Environment (ACE) was a proud partner.
Researchers and delegates were welcomed by Inspector Liam Cahill, Innovation Domain Lead at the Counter Terrorism Research Lab (CTRL), and Open University professors Arosha K Bandara and Eleanor Crabb. Annette Southgate, Head of ACE, then took to the stage to stress the importance of work and innovative collaboration such as this to “getting ahead of some of the people that are trying to cause us harm”.
Iain Harrison, Director of Digital, Data, Analysis & Technology at Counter Terrorism Policing, explained the rigorous process, supported by ACE, that began with 62 proposals from 28 different universities, which were then reviewed and whittled down to the nine stimulating ideas on display at the showcase event.
Bringing academia and Counter Terrorism Policing together
The projects that had been explored over 12 weeks of intensive research were showcased across three themes:
THEME ONE: Radicalisation and Interventions
First to present were a team from Anglia Ruskin University, on the topic of Exploring the Impact of Critical World Events on Extremist Misinformation Network (2020-24). This involved analysing 240 posts from four major platforms to understand how extremist groups exploit global crises on popular social media platforms, using hashtags and multiple forms of misinformation to amplify uncertainty and try and recruit new audiences. It also looked to pinpoint potential novel ways to intervene in this process.
Next up were a team from Cranfield University, analysing how social media content algorithms respond to user interactions within specific topics, to answer the question of Can Social Media Algorithms Radicalise? This pilot was designed to quantify if user behaviours such as watching or liking videos influenced a popular platform’s algorithm, and to what extent. The conclusion was that the algorithm could be influenced to provide more content around a particular theme, but it is not yet clear how long this influence lasts.
The final presentation in this first session was from the University of Liverpool, exploring the topic of Graphic Novels to Enable Discussion and Promote Critical Thinking. This project involved creating a 46-page book containing four graphic novels on the topic of radicalisation, supported by front-line intervention practitioners, for use in educational strategies to encourage critical thinking. Comics were chosen because they are already popular worldwide, accessible and engaging as a format, and cheap to produce.
THEME TWO: Current Threats, Biosensors and Human Networks
After a break, another team from Cranfield University, that had been drawing big crowds in the breakout sessions for the four crossbows on display at their stand, spoke on their research into Crossbows: A Real and Current Threat. Against a background of increasing use of crossbows, which can legally be bought by anyone over the age of 18, in targeted incidents, this set out to examine the hit probability and wounding potential of four different systems, their reload times, and how these compared to current policing response times. The conclusions, from a variety of tests including depth of penetration and discharge rate, concluded that crossbows need to be considered a real and present threat for a marauding terrorist attack, because all of those tested have potential to cause significant injury, especially to unprotected organs.
Next up was another project that had the audience buzzing – research from a team at The Open University on Fruit Fly Biosensors: Leveraging Olfactory Responses for Detection of Explosives and Toxic Chemicals. This explored if fruit flies, which have exceptional sensitivity, could be used as biosensors to detect toxins, drug precursors and explosives. The answer was potentially yes – experiments with TNT found that exposure to the explosive led to a gradual but clear increase in fly attraction, indicating that fruit flies can detect it. Preliminary lab data also suggests starving the flies may enhance TNT detection speed.
The final project in this session was an explanation of a Dynamic Target Indicator Tool (D-TinT) developed by a team at the University of Exeter. This uses techniques from movement pattern analytics and social network analysis to identify the best indicators of links between nodes in a human network based on movement patterns over time. This enables a statistical and spatial mathematical model to be developed. The Tool also identifies what might be flagged as a vulnerable target – either person or place – which could allow counter terrorism stakeholders to test the impact of possible risk-reduction procedures.
THEME THREE: Emerging Technologies
The final session of a highly enjoyable day started with a team from Robert Gordon University in Aberdeen talking the audience through their research on Leveraging Artificial Intelligence (AI) to Identify and Prevent Terrorism in Prisons: Legislative Gaps and Technological Solutions. This analysed AI’s role in situational awareness and radicalisation prevention, explored how it could support existing counterterrorism efforts, evaluated legal and ethical readiness for AI to be deployed in this way, and proposed technical and legal reforms to enable the responsible use of AI technologies in prison settings. The conclusion of the research was that AI offers significant potential to enhance security and counter-radicalisation efforts in UK prisons.
Next, a scoping study of Augmented Reality and Terrorism was presented by Dr Richard Jones of Edinburgh Law School, part of the University of Edinburgh. Billing augmented reality as a “technology in search of a purpose”, his research explored both potential law enforcement applications, such as head-up real-time navigation and facial recognition of persons of interest, as well as how terrorists could use the same technology, for example to create video footage for propaganda purposes. It also looked at how this technology could evolve in the public domain. The research concluded that feasibility factors include device cost and availability as well as the level of required technological expertise, which is likely to fall, in addition to utility and whether it solves a problem.
The final presentation of the day was by a team from the University of Southampton on Exploiting Vulnerabilities in Autonomous Vehicle Systems for Terrorist Activity – Threats to UK Critical National Infrastructure. This focused on identifying vulnerabilities in autonomous vehicle systems amid increasing reliance on connected and automated vehicles, analysing how terrorists could exploit these to disrupt or control them. This could include by hijacking the vehicle controls or causing collisions via manipulating road signs. The conclusion was that proactive risk mitigation is paramount.
Following the event, Inspector Cahill said: “The University Innovation Concept (UIC) was conceived with the intention of bringing Counter Terrorism Policing and academia closer together to ensure operational decisions made by experienced and knowledgeable personnel are backed by science and academic rigour.
“The one-day showcase was also a fantastic opportunity for attendees to network, learn about ongoing research and potentially take learning back to their operational roles, and feedback has been extremely positive.”
Reflecting on the event, Professor Southgate said: “ACE is proud to support policing colleagues find new and creative ways of solving frontline mission problems through partnership with researchers from across a diversity of backgrounds and institutions.
“Accessing diversity of thought, approach and experience helps us step back and consider more impactful and enduring ways of tackling existing and sometimes long-standing problems.
“We are keen to help identify and shine a light on brilliant academic work that can already help solve today’s mission problems; highlighting the difference this makes, help build relationships and continue encouraging our talented academic community to support frontline policing work.”
overnor Kathy Hochul today announced over $10.4 million has been awarded to 30 animal care organizations across the state through the seventh round of the New York State Companion Animal Capital Fund, the first state program in the nation to fund capital projects for animal shelters. The funding will support construction, renovation, and expansion projects that will enhance animal care and health and help ensure adoptions for New York’s dogs and cats. This builds on Governor Hochul’s commitment to securing safe housing and care for sheltered dogs and cats as they await adoption.
“Any pet owner can tell you that companion animals like dogs and cats are more than just furry friends – they’re family,” Governor Hochul said. “Animal shelters and humane societies play an enormous role in keeping companion animals safe and well cared for while they await their new families and forever home. This funding is making a real difference, helping to better equip these vital facilities with the tools they need to improve the quality of care for animals.”
Since the 2017 launch of the Companion Animal Capital Fund program, which is administered by the Department of Agriculture and Markets, the State has dedicated over $38 million to the program. In total, 130 projects have been awarded across New York so far. This round of funding builds on previous rounds of this program that is helping to offset the costs associated with capital projects run by New York State animal shelters, such as renovating dog kennels, improving medical facilities, or building more efficient shelters to reduce overall operational costs. Projects funded this year include updated living spaces for dogs and cats, improved HVAC and heating systems, expansions to facilities to improve medical care, as well as additional infrastructure updates.
Competitive grants were awarded to shelters based on a need assessment, detailed project description, and reasonableness of cost. The following organizations are receiving an award in this round of the program:
City of Oswego – $500,000.00 to replace the kennels, update the HVAC system, seal floors and non-porous areas, create an exclusive outdoor “relief” area, and install new sinks.
Columbia Greene Humane Society – $500,000.00 for a new HVAC system and to expand the clinic to include isolation, treatment room, X-ray and lab, exam rooms and euthanasia space.
Humane Society of Rome – $500,000.00 to install new dog enclosures, two isolation rooms and new cat enclosures.
Jefferson County – $500,000.00 to renovate kennels, upgrade the HVAC system, repair the drainage system, and install resin flooring, concrete walls and sound proofing.
Massena Humane Society – $500,000 for enhanced record keeping equipment, upgrades to the kennels, drainage and HVAC system, radiant floor heat, soundproofing and a new intake area.
Middletown Humane – $500,000 for updates and repairs to interior and exterior, upgrading heating/cooling, updated lighting and electrical systems, replacing roof, insulation and painting, alarm system and perimeter fencing.
Oswego Co. Humane – $500,000.00 for increased cat housing, epoxy flooring, isolation rooms and maternity ward, increased dog housing, a new HVAC and new water piping.
Patricia LeDew Foundation – $500,000.00 to install a new X-ray room with new equipment, expand the surgical area, create a new dental site and design an adoption area specific to senior animals.
Paws Crossed Animal Rescue – $500,000.00 for a new HVAC system, new doors, epoxy flooring and painting in 3 kennels.
Saratoga County – $500,000 for a new heating and cooling system.
Town of Bangor – $500,000.00 to improve record keeping equipment, upgrade cat cages, upgrade drainage and HVAC and soundproofing.
Town of Cheektowaga – $500,000 for upgraded kennels, an upgraded HVAC system, a dedicated isolation area and soundproofing.
Town of Henrietta – $500,000.00 to construct a new municipal shelter.
Town of Olean – $500,000.00 for a new facility.
Ulster Co. SPCA – $500,000.00 to redesign the kennel, replace the floor, repair floors and walls, and renovate the kitchen, grooming room and exam room.
A complete list of the awarded organizations and a brief description of the funded projects is available here.
Governor Hochul’s Fiscal Year 2026 Executive Budget proposed continued funding for this critical program and the final adopted Budget includes $10 million in funding for the next round.
New York State Agriculture Commissioner Richard A. Ball said, “Animal shelters and humane societies are so much more than a port in the storm – they are a true lifeline to the animals who will one day become beloved members of New York families. From providing essential medical care to daily enrichment activities, the hardworking staff at humane societies, shelters, and SPCAs throughout the state work tirelessly to provide the best care for dogs and cats while they wait to be adopted. Through seven rounds of funding, we have seen the direct impact these projects have had on these essential facilities, and I’m proud to see the good work continue.”
New York State Animal Protection Federation Executive Director Libby Post said, “The Companion Animal Capital Fund has been a total game changer for shelters and rescues. This latest round of grants reflects how important the Companion Animal Care Standards Act for Shelters and Rescues is and what organizations are doing to make sure they meet these standards when they kick in on December 15th of this year. This round of grants brings the total investment to just shy of $50 million. Without the leadership of Governor Hochul, Senate and Assembly Agriculture Committee chairs Michelle Hinchey and Donna Lupardo, and our champions in each house, Assemblymember Deborah Glick and State Senator Joseph Addabbo, none of this would have happened. The Department of Agriculture and Markets understands how important this grant program is and the Federation thanks Commissioner Richard Ball for his on-going support.”
State Senator Michelle Hinchey said, “Our local animal shelters and humane societies give animals the care and compassion they deserve while they wait to be adopted by their forever families. The Companion Animal Capital Fund is a vital source of support for these organizations, most of which rely on donations, to improve and modernize their facilities. Securing funding for this program is always a priority, and I’m thrilled that three of our own, Columbia-Greene Humane Society, Dutchess SPCA and Ulster SPCA, have all been awarded grants in the latest funding round.”
Assemblymember Donna Lupardo said, “Since 2017, the Companion Animal Capital fund has helped 128 shelters make much-needed improvements to their facilities. I’m very glad that we are able to support an additional 30 shelters in this latest round of funding. We cannot thank them enough for the important work they do, caring for animals as they wait for their forever homes. I’d like to thank the Governor and my colleagues for continuing to support this important effort. I have seen first-hand how well these funds have been used and how needed these resources are.”
The Department of Agriculture and Markets’ Division of Animal Industry promotes sustainable animal production agriculture and the safety of the animal origin food supply. These goals are accomplished through regulatory and cooperative educational efforts with various agencies, both public and private. The Division has staff in Albany and veterinarians located across the state. In addition to many other responsibilities, the Division regulates dog licensing, sets standards for humane care of seized dogs and the inspection of municipal shelters, administers the contract for the New York State Animal Population Control Program and the Pet Dealer Inspection Program, and provides training and assistance to local enforcement officers in animal welfare cases.
CHICAGO, May 21, 2025 (GLOBE NEWSWIRE) — Chicago-based title insurance underwriter Advocus National Title Insurance Company (Advocus) recently welcomed attorney Nathan Smith to its Underwriting Department. In his new role, Nathan will be responsible for providing underwriting assistance by working with Advocus’ attorney agents. Day to day, his duties will consist of answering questions and providing approval for title matters concerning residential and commercial real estate transactions in the context of Advocus’ ongoing national expansion.
With over a decade of legal experience, Nathan brings a wealth of expertise in claims and underwriting. Most recently, he served as Claims Counsel at Stewart Title Guaranty Company where he managed a portfolio of complex title insurance claims and litigation. Nathan also served as Underwriting Counsel at Fidelity National Title, where he performed risk assessments and provided legal guidance on both residential and commercial transactions.
“Through our tried-and-true procedures and culture of collaboration and consensus-building, Advocus knows how to bring people together,” Smith said. “Advocus stands out for putting attorneys at the center of the process, and I am absolutely thrilled to contribute to a team that has reshaped, and continues to set, the standard for what the process can and should be.”
Smith’s career remains rooted in guiding litigation strategy, negotiating settlements, and overseeing cost control initiatives—all with a focus on delivering timely and effective resolutions for Advocus’ insureds. A certified Illinois State Bar Association arbitrator and mediator, Smith knows the value of discarding adversarial models in favor of getting to “yes.”
“Nathan’s experience at the intersection of claims management, underwriting, and legal operations makes him a perfect fit for Advocus as we continue to build a differentiated model grounded in legal integrity,” said Augie Butera, EVP and General Counsel at Advocus. “His track record of delivering results and educating peers exemplifies the values we bring to our agents and other customers every day.”
To learn more about Advocus and its attorney-centered approach to title insurance, visit advocus.com.
About Advocus Advocus is a national provider of title insurance and settlement services dedicated to preserving the role of lawyers in real estate transactions. Founded in 1964 on the belief that every consumer deserves legal representation and advocacy, Advocus is dedicated to preserving the attorney’s role in real estate transactions and offering attorney-led underwriting expertise. With a growing presence in markets across the United States, Advocus continues to set the standard for excellence in the title insurance industry. For more information, visit www.advocus.com.
SAN ANTONIO, May 21, 2025 (GLOBE NEWSWIRE) — Graphitic Energy (“Graphitic”), formerly known as C-Zero, has entered into a strategic collaboration with the Claremont office of Technip Energies USA to jointly develop and deploy Graphitic’s innovative methane pyrolysis technology. This innovative process utilizes natural gas to produce clean hydrogen and graphite, a crystalline form of carbon used in batteries, lubricants, refractories, and high-temperature industrial processes. The agreement between Technip Energies and Graphitic includes funding dedicated to testing campaigns to support technology advancement. Later this year, the two companies also plan to enter into a licensing collaboration agreement to accelerate the deployment of Graphitic’s technology around the world.
Graphitic Energy’s groundbreaking methane pyrolysis technology enables the production of clean hydrogen and solid carbon with no direct CO2 emissions. The process is low-electricity-intensive and can be scaled to produce 100,000 metric tons of hydrogen per year in a single process train. The collaboration will leverage Technip Energies’ leading positions in hydrogen generation and fluidized bed technology.
“Technip Energies is excited to enter into this cooperation with Graphitic Energy and bring forward our recognized hydrogen production experience and fluidized bed expertise to standardize plants globally for the production of hydrogen and synthetic graphite with minimal direct CO2 emissions. The standardized designs will allow for lower pre-investment costs, accelerated implementation time, high predictability on project economics, and reduced overall capital costs. This cooperation underscores Technip Energies’ commitment to delivering sustainable, innovative, cost-effective low-carbon solutions, strengthening our technology portfolio,” said Mario Tommaselli, Senior Vice President Gas & Low Carbon Energies at Technip Energies.
Unlike other low-carbon hydrogen production paths, Graphitic’s process economics do not require government subsidies to be cost-competitive, and the company can profitably deliver both hydrogen and graphite at current market prices. In addition, the company’s technology can be sited anywhere natural gas or LNG are available, without the need to source renewable electricity or perform geological CO2 sequestration.
“Graphitic’s technology enables the production of two critical products from natural gas. We’ve taken it from an idea, through the lab scale, and into a large pilot generating tonnes of graphitic material. Collaborating with Technip Energies will enable us to get to market faster and provide interested parties with high-quality engineering packages,” said Graphitic’s Co-Founder and CEO Zach Jones.
In March 2025, Graphitic commissioned its pilot plant in San Antonio, TX. This state-of-the-art facility is capable of producing several hundred kilograms of hydrogen and up to 1,000 kg of solid carbon per day, with continuous 24/7 operations. It is expected to operate through the end of 2025. The company’s pilot is supported by a recent $15 million extension of its series A funding, bringing its total investment to over $65 million.
About Technip Energies
Technip Energies is a global technology and engineering powerhouse. With leadership positions in LNG, hydrogen, ethylene, sustainable chemistry, and CO2 management, we are contributing to the development of critical markets such as energy, energy derivatives, decarbonization, and circularity. Our complementary business segments, Technology, Products and Services (TPS) and Project Delivery, turn innovation into scalable and industrial reality.
Through collaboration and excellence in execution, our 17,000+ employees across 34 countries are fully committed to bridging prosperity with sustainability for a world designed to last.
Technip Energies generated revenues of €6.9 billion in 2024 and is listed on Euronext Paris. The Company also has American Depositary Receipts trading over the counter.
For further information: www.ten.com
About Graphitic Energy
Headquartered in Santa Barbara, CA with plant operations in San Antonio, TX, Graphitic Energy has developed a novel methane pyrolysis process for sustainably using natural gas to produce hydrogen and graphite. This delivers low-cost, clean hydrogen alongside high-value, graphitic carbon. Unlike current hydrogen generation technologies, Graphitic’s process converts abundant natural gas into hydrogen and solid carbon with virtually no direct CO2 emissions. The company has raised over $65 million from investors including Breakthrough Energy Ventures, Energy Capital Ventures, Trafigura, SK Gas, Eni, Mitsubishi Heavy Industries, ENGIE, and AP Ventures.