Category: Transport

  • MIL-OSI United Kingdom: Urgent aid must be allowed to enter Palestinian territory

    Source: Scottish Greens

    Patrick Harvie MSP calls on the UK Government to fix broken energy market

    High energy bills are punishing households and families and baking in high rates of inflation for years to come, say the Scottish Greens.

    The Scottish Greens have called for UK Labour to listen to climate experts, take urgent action to fix the broken energy market, and end the artificial high price for clean green electricity, which is cheap to generate but expensive to consume.

    This comes following the publication of new monthly figures from the Office for National Statistics showing that inflation has jumped to 3.5% in April, the highest level since February last year.

    The ONS has revealed that big increases in utility bills – including electricity and gas bills – have impacted inflation, after changes to the Ofgem energy price cap earlier this year sent April rates soaring.

    Independent climate advisors have advised that the UK Government must act urgently to make electricity cheaper, through rebalancing prices to remove policy levies from electricity bills.

    The Scottish Greens’ climate spokesperson, Patrick Harvie, said:

    “At a time when so many are already struggling to make ends meet, households and families across our country are now facing the highest rates of inflation since February last year.

    “Labour promised to make energy bills cheaper, but they have only gone up. Keir Starmer and his colleagues must urgently step in to make sure that households get the benefit of the low price of renewable energy, to help get inflation under control.

    “This isn’t just about the price cap. Climate experts are clear – out-of-date policy levies on electricity bills are stopping costs from coming down for consumers, and that’s a barrier to people switching away from fossil fuels for heat and transport. So even though home-grown renewable energy is very cheap to generate, that’s not being reflected in the bills people are paying. 

    “We desperately need to fix the broken energy market that is plunging people into poverty all while keeping our reliance on climate-wrecking fossil fuels.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Reeves must resign over second wave of austerity

    Source: Scottish Greens

    Patrick Harvie calls for UK to take action on Israeli aid blockade

    Israeli forces must urgently allow aid to reach extremely vulnerable children, says Scottish Greens Co-Leader Patrick Harvie MSP, ahead of a Parliamentary committee hearing from aid agencies working in Gaza and the West Bank.

    It comes after warnings yesterday from the United Nations that 14,000 babies could die in Gaza unless extra aid arrived. Israel claims to have ended their 11-week aid blockade of Gaza, but the UN has warned that the aid trucks allowed in so far are just a “drop in the ocean” compared to what Gaza needs.

    Scottish Greens have continually called for the UK & Scottish Governments to end complicity in the war crimes being committed by Israel.

    The Labour UK Government has provided more arms to Israel in three months than the previous three years under Conservative governments, and the SNP Scottish Government have continued to fund arms manufacturers who produce parts for the F-35 fighter jets which have been used by Israel.

    Scottish Greens Co-Leader Patrick Harvie MSP said:

    “The situation in Gaza is unprecedented in modern times, with the world allowing Israel to inflict  collective punishment on a grotesque scale. Aid blockades and genocide are never acceptable yet governments across the West have overlooked Israel’s war crimes.

    “Israeli forces have withheld urgent aid from civilians for over 11 weeks, and despite their claims to be allowing aid into Palestinian territory, we have heard from the front lines that what is being allowed to enter is nowhere near enough.

    “Senior Ministers in the Israeli Government are quite explicit about their intention to destroy Palestinian life in Gaza, and their utter contempt for international law.

    “The UK Labour Government have blood on their hands, they have continued to enable and support Israel’s war crimes throughout this disgraceful campaign. They must now surely end all trade with Israel, and join with other countries to ensure that urgent aid is provided to meet the immediate needs of the people of Gaza.”

    MIL OSI United Kingdom

  • MIL-OSI Canada: Commission releases the final set of decommissioned Beaverlodge properties from licensing and revokes Cameco Corporation’s Beaverlodge waste facility operating licence

    Source: Government of Canada News (2)

    May 21, 2025 – Ottawa

    Today, the Canadian Nuclear Safety Commission (CNSC) announced the Commission’s decision to release the final set of 27 decommissioned Beaverlodge properties from licensing under the Nuclear Safety and Control Act (NSCA), and to revoke the waste facility operating licence held by Cameco Corporation (Cameco) for the decommissioned Beaverlodge mine and mill site. The Beaverlodge mine and mill site is located near Uranium City in northern Saskatchewan, situated within historic Treaty 8 (1899) and the Homeland of the Métis, and within the traditional territories of the Dene, Cree, and Métis peoples. 

    The Commission concluded that the properties meet appropriate performance objectives and performance indicators to enable them to be transferred to Saskatchewan’s Institutional Control Program. As part of its decision in this matter, the Commission exempted the Province of Saskatchewan from CNSC licensing for the properties.

    The Commission further concluded that it had fulfilled its constitutional responsibility to consult and, where appropriate, accommodate Indigenous rights in respect of its decision on this matter. 

    In making its decision, the Commission carefully considered all submissions and perspectives received during a public hearing held in person in Saskatoon, Saskatchewan on January 30, 2025.

    The record of decision, which contains the Commission’s rationale for its decision, is available upon request from the Commission Registry by contacting interventions@cnsc-ccsn.gc.ca. Once available in both official languages, the record of decision will be published on the CNSC website. The submissions considered by the Commission during the hearing are available on the CNSC website.

    As a lifecycle regulator, the CNSC focuses on continuous engagement and consultation with Indigenous Nations and communities, as well as other interested groups before, during and after Commission proceedings in respect of licensed activities. 

    Related links

    Contact

    Media Relations 
    Canadian Nuclear Safety Commission 
    Tel: 613-996-6860

    Email: media@cnsc-ccsn.gc.ca

    MIL OSI Canada News

  • MIL-OSI Security: Shiprock Man Charged with Assault in Shooting

    Source: Federal Bureau of Investigation FBI Crime News (b)

    ALBUQUERQUE – A Shiprock man has been charged with assault with a dangerous weapon following a shooting incident outside a restaurant.

    According to court documents, Navajo Nation Police responded to a 911 call reporting that an individual was shot in the hand in front of the Little Caesars Restaurant in Shiprock. Officers located the suspect, identified as Terrold Tyler, 35, an enrolled member of the Navajo Nation, near the scene carrying a black backpack that contained a homemade firearm and five live shotgun shells. Tyler was detained without incident.

    Investigators determined that Tyler and the victim were involved in an argument behind the restaurant prior to the shooting. Tyler allegedly produced the homemade shotgun and shot the victim in the left hand. Paramedics responded to the scene, but the victim declined medical treatment.  A social media video depicting Tyler with the firearm was also recovered as evidence.

    Tyler is charged with assault with a dangerous weapon and will remain in custody pending trial, which has not yet been scheduled. If convicted of the current charges, Tyler faces up to 10 years in prison.

    U.S. Attorney Ryan Ellison and Philip Russell, Acting Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office made the announcement today.

    The Farmington Resident Agency of the Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Navajo Nation Police Department and Navajo Department of Criminal Investigations. Assistant U.S. Attorney Amy Mondragon is prosecuting the case.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Africa: Government proposes fuel levy increase

    Source: South Africa News Agency

    For the first time in three years, government has proposed an inflation-linked increase to the general fuel levy.

    “For the 2025/26 fiscal year, this is the only new tax proposal that I am announcing. It means from 4 June this year, the general fuel levy will increase by 16 cents per litre for petrol, and by 15 cents per litre for diesel,” Minister of Finance Enoch Godongwana said on Wednesday, in Parliament.

    The general fuel levy has remained unchanged for the past three years to provide consumers with relief from high fuel price inflation. 

    Re-tabling the 2025 Budget Review, Godongwana said unfortunately, this tax measure alone will not close the fiscal gap over the medium term.

    “The 2026 Budget will therefore need to propose new tax measures, aimed at raising R20 billion. We have allocated an additional R7.5 billion over the medium-term expenditure framework (MTEF), to increase the effectiveness of the South African Revenue Service (SARS) in collecting more revenue.

    “Part of this allocation will be used to increase collections from debts owed to the fiscus. SARS has indicated that this could raise between R20 billion to R50 billion in additional revenue per year,” the Minister said.

    Another part of the additional allocation to SARS will be used to improve modernisation.

    This will include targeting illicit trade in tobacco and other areas, which should boost revenue over the medium term.

    “As SARS utilises this investment to raise additional revenue, which I believe can be at least R35 billion, the R20 billion to close the current revenue gap will not have to be raised through taxes.

    “Madam Speaker, let me call on every South African, be they individuals, small business operators or large corporates, to honour their tax obligations and contribute to building a better and more equitable nation,” the Minister said.

    He thanked all the taxpayers that continue to pay their taxes while emphasising that government does not take taxpayers for granted.

    “As a government, we know that we must earn the taxpayer’s trust every day, by spending public money with care and ensuring that every rand collected is spent on its intended purpose.

    “We recognise the urgent need to do more to achieve this goal. We are not deaf to the public’s concern about wasteful and inefficient expenditure.

    “Our commitment to collect taxes must be matched by better efficiency in how that money is spent. It must be matched by much stricter oversight that quickly identifies problems and provides timely solutions when things go wrong,”  the Minister explained.

    Expansion of the zero-rated basket withdrawn

    Meanwhile, as a result of the withdrawal of the proposed increases in the VAT rate, the expansion of the zero-rated basket, which was included to cushion poorer households from the VAT rate increase, falls away.

    Last month, the Minister requested the Speaker of the National Assembly to maintain the Value-Added Tax (VAT) rate at its current level of 15% , reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.

    “Madam Speaker, compared to the March estimates, tax revenue projections have been revised down by R61.9 billion over the three years. This reflects the reversal of the VAT increase and the much weaker economic outlook.

    “In this difficult environment, it remains vital that we still take actions to increase revenue to protect and bolster frontline services, while expanding infrastructure investments to drive economic activity,” the Minister said. –SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Operation Vulindlela key to economic growth

    Source: South Africa News Agency

    In an ongoing effort to grow the economy, government will continue to implement growth enhancing structural reforms as part of Operation Vulindlela.

    “Madam Speaker, a bigger, faster-growing economy, and the larger fiscal resources that come with it, are the key to building up the fiscal room we need to meet more of our developmental goals,” Minister of Finance, Enoch Godongwana, said on Wednesday during the re-tabling of the 2025 Budget Review, in Parliament.

    Through the first phase of Operation Vulindlela, bold and far-reaching reforms were implemented in the network sectors and the visa regime.

    “As a result, numerous economic bottlenecks have eased, new investments unlocked, and the growth potential of the economy enabled. Yet the economy still faces constraints,” the Minister said.

    Operation Vulindlela is a joint initiative of the Presidency and the National Treasury to accelerate the implementation of structural reforms and support economic recovery. 

    The unit monitors progress and actively supports implementation. Its aim is to fast-track the implementation of high impact reforms, addressing obstacles or delays to ensure execution on policy commitments.

    The first phase of Operation Vulindlela aimed to reduce power cuts, fix the transport system, lower data costs, increase water supply, attract skills and support tourism.

    The second phase of Operation Vulindlela, launched by President Cyril Ramaphosa earlier this month, will not only prioritise new areas for implementation but will also deepen the implementation of current reforms.

    Upcoming reforms will focus on making it easier to find work and hire people – particularly by addressing spatial inequalities, using cities to drive economic activity and improve municipal service delivery.

    The second phase will therefore focus on the following areas:

    • Seeing-through existing reforms in energy, water, logistics and in the visa regime.
    • Improving the performance of local government. This includes professionalising utilities, appointing suitably qualified people to senior positions, and reviewing the local government fiscal framework.
    • Harnessing digital transformation, in order to drive the adoption of digital technologies in government and build digital public infrastructure for use by all South Africans.
    • Addressing the apartheid legacy of spatial inequality. Reforms will include changes to housing policy and accelerating the release of publicly owned land and buildings. This will also entail clearing the backlog of title deeds for affordable housing, and a comprehensive regulatory review aimed at removing barriers to the development of low-cost housing.

    READ I Phase two of Operation Vulindlela to further drive reforms, economic growth

    “Tackling these structural constraints will ensure that impediments to faster growth are removed,” the Minister said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Government programmes do empower inmates – Minister Groenewald

    Source: South Africa News Agency

    Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.

    “Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said. 

    The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.

    The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes. 

    These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society.
    The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria. 

    This as the international community also celebrated the 10th anniversary of the rules. 

    The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected. 

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.

    In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration. 

    “In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.

    He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025. 

    The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”

    The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.

    “Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained. 

    He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.

    “We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.” 

    He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Social grant increases remain in place in Budget 3.0

    Source: South Africa News Agency

    Wednesday, May 21, 2025

    Increases to all social grants, barring the Social Relief of Distress (SRD) grant, will not be affected by the re-tabled budget.

    This according to National Treasury’s 2025 Budget Overview released on Wednesday.

    The number of social grant beneficiaries – excluding those receiving the SRD grant – is expected to rise to 19.3 million people by March 2028.

    The grant increases for 2025/26 are as follows:

    • Old age grant will increase from R2185 to R2315
    • War veterans grant will increase from R2205 to R2335
    • Disability grant will go up from R2185 to R2315
    • Foster care grant rises from R1180 to R1250
    • Care dependency grant will increase from R2185 to R2315
    • Child support grant will go up from R530 to R560
    • The grant-in-aid will increase from R530 to R560 

    “The increase in the social grants budget of R1.6 billion in 2025/26 remains. The temporary COVID-19 Social Relief of Distress grant will be extended until 31 March 2026, with R35.2 billion allocated to maintain the current R370 per month per beneficiary, including administration costs,” National Treasury said.

    While delivering the Budget Speech in Parliament on Wednesday, Finance Minister Enoch Godongwana said government is “actively exploring various options to better integrate” the SRD grant with employment opportunities.

    “This includes considering a job-seeker allowance and other measures, as part of the review of Active Labour Market Programmes. 

    “Our goal is to not only provide immediate relief. It is also to create pathways to employment, empowering our citizens to build better futures for themselves and their families,” Godongwana said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Infrastructure investment aimed at propelling SA’s future

    Source: South Africa News Agency

    Infrastructure investment remains a key component in driving economic growth and government has maintained its R1 trillion allocation for infrastructure investment over the medium term to support this growth.

    This according to Finance Minister Enoch Godongwana, who delivered the Budget Speech in Parliament on Wednesday.

    “[Quality] infrastructure investment expands the productive capacity of the economy and responds to the diverse needs of the citizens. Infrastructure is also a rich source of jobs in construction, engineering, and related industries across a range of skill levels.

    “It is for these reasons that infrastructure is the fourth pillar of the growth strategy, and this budget demonstrates our resolve to change the composition of spending from consumption to investment. Allocations towards capital payments remain the fastest-growing area of spending by economic classification. Public infrastructure spending over three years will exceed the R1 trillion mark,” Godongwana said.

    Spending will focus on “maintaining and repairing existing infrastructure, building new infrastructure, and acquiring equipment and machinery” primarily in transport and logistics, energy and water and sanitation.

    “Of the R402 billion for transport and logistics, R93.1 billion is for the South African National Roads Agency to keep the 24 000-kilometer national road network in active maintenance and rehabilitation. R53.1 billion is for the maintenance and refurbishment of provincial roads.

    “R66.3 billion is allocated to PRASA, out of which R18.2 billion is for the rolling stock fleet renewal programme and R12.3 billion is provisionally allocated for the renewal of the signalling system. The spending will sustain progress in rebuilding the infrastructure to provide affordable commuter rail services. This will enable PRASA to increase passenger trips from 60 million in 2024/25 to 186 million by the end of the MTEF [Medium Term Expenditure Framework] period.

    “The energy sector will invest R219.2 billion on strengthening the electricity supply network, from generation to transmission and distribution. The water and sanitation sector will spend R156.3 billion on expanding our water resource and service infrastructure, including dams, bulk infrastructure to service mines, factories and farms,” Godongwana explained.

    Reforms for private sector participation

    The Minister announced that new regulations for public-private partnerships (PPPs), which were gazetted earlier this year, are expected to take effect next month.

    “These will reduce the procedural complexity of undertaking PPPs, increasing the deal flow and allowing government to leverage its limited resources to fast-track infrastructure provision. The National Treasury has developed enabling guidelines and frameworks to support the new regulations.

    “Specifically, the unsolicited proposals framework will create clear rules for managing proposals from the private sector. And the framework for fiscal commitments and contingent liabilities will strengthen fiscal risk governance. These guidelines and frameworks will be published in the next few weeks,” he said.

    Furthermore, the process of issuing the first infrastructure bonds in 2025/26 remains in place.

    “We are also exploring alternative financing instruments to allow pension funds, commercial banks, development banks and international financial institutions to participate in financing our infrastructure plans.

    “These reforms are how we plan to leverage infrastructure investment to ease supply side constraints to the economy and improve access to social services the people get,” Godongwana said.

    Employment boost

    Meanwhile, in the 2025 Budget Overview, National Treasury said additional funding of some R8.8 billion has been allocated to public employment programmes (PEPs).

    “Although the number of people employed was 16.8 million in the first quarter of 2025, South Africa’s unemployment rate remained very high at 32.9%.

    “Public employment programmes are crucial to address persistently high unemployment,” National Treasury noted.

    Key beneficiaries for the additional funding include:

    • The Department of Basic Education: R5.8 billion for the basic education schools employment initiative.
    • The Department of Sport, Arts and Culture: R350 000 000 for the creative industry stimulus.
    • The Department of Trade, Industry and Competition: R1.3 billion for the Social Employment Fund.

    “In addition, National Treasury and the Presidency, working with other state institutions, have begun a comprehensive review of active labour market programmes, PEPs and the social support system to improve efficiency and effectiveness.

    “With these efforts, government hopes to make significant strides in reducing unemployment,” the overview read. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Ramaphosa, Trump meeting all set for early evening, SA time

    Source: South Africa News Agency

    President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office. 

    The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.

    The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.

    According to The Presidency of SA,  President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.

    At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.

    President Ramaphosa is expected to depart from the White House at 6:30pm.

    Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.

    The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.

    Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.

    President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.

    In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.

    The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi. 

    They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.

    Meanwhile, President Trump will be flanked by several key officials during his event. 

    These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.

    SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals. 

    President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.  

    A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.

    Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.

    Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.

    Speaking to the media on Tuesday, the President appeared cheerful and optimistic. 

    He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.

    For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI United Kingdom: Waste packaging company director pays high price in data fraud

    Source: United Kingdom – Executive Government & Departments

    News story

    Waste packaging company director pays high price in data fraud

    A Birmingham-based director and his company has been ordered to pay a Proceeds of Crime confiscation order, fines and costs totalling £476,995. 

    An officer on inspection duty. Please note the photo is an example of EA’s work not directly from this case.

    This follows an Environment Agency investigation into fraudulent entry of waste packaging data.

    At Birmingham Crown Court on Friday 16 May 2025, Shaobo Qin, a director of EDU Case Ltd, pleaded guilty to fraud by false representation. He was given a 2 year prison sentence suspended for 18 months.

    Qin, age 42, of Sutton Coldfield, West Midlands, was also ordered to pay a Proceeds of Crime confiscation order of £255,057. He must pay within 2 months or face 3 years in prison.

    He was also disqualified as a director for 4 years and ordered to do 200 hours of unpaid work.

    His company, EDU Case Ltd of Portway Road, Rowley Regis, was fined £200,000. The Environment Agency were also awarded £21,995 in investigation costs.

    The court was told Qin’s company was a plastics and recycling exports enterprise.  The offences were discovered by the Environment Agency towards the end of 2022.

    The company, orchestrated by Qin, was deliberately and systematically entering false data on to the Environment Agency’s National Packaging Waste Database (NPWD) for non-existent waste exports.

    This resulted in Qin receiving a benefit for himself and his company in the sum of approx. £255,000. He was arrested on Wednesday 10 January 2024 where he was interviewed by Environment Agency officers.

    EDU Case were accredited to carry out plastic packaging exports and able to issue “evidence” of that activity in the form of tonnage figures on the database.

    This evidence could be bought by businesses who are obliged to account for their plastic packaging waste under the Producer Responsibility Obligations (Packaging Waste) Regulations 2007.

    An audit conducted by Environment Agency officers in 2023 and information following that work identified discrepancies between the amount of waste exported and the amount of evidence issued. 

    The false entries represented nearly two-thirds of the business’ entire trade in 2022 towards the end of that year.

    As part of that audit, a legal notice was served on Qin and the company in September 2023.

    This notice required the production of their evidence of plastic waste exports.  In response, Qin sent a computer memory stick containing his business’ waste export evidence and a letter explaining a large discrepancy, described as an “overclaim.”

    The letter stated that the company had carried out 1,239 metric tonnes of plastic waste exports in 2022, only 453.60 metric was genuine and that the majority of his trading, 785.40 metric tonnes  was ‘a mistake.’

    In sentencing the judge said this was without doubt deliberate offending and pre-planned. There had been a significant undermining of the regulatory regime. 

    He accepted that there had been a guilty plea entered at first opportunity and that money had been put aside to repay the financial benefit made. The company was also fined to mark the seriousness of the offending.

    Sham Singh, Senior Environmental Crime Officer for the Environment Agency, said:

    “This case shows that the Environment Agency will pursue individuals and their enterprises who profit illegally.

    “This was a fraud on a large scale and undermines legitimate business and the investment and economic growth that go with it.

    “We support legitimate businesses and are proactively supporting them by disrupting and stopping the criminal element backed up by the threat of tough enforcement as in this case.

    “If anyone suspects that a company is doing something wrong, please contact the Environment Agency on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”

    The Charges

    Shaobo Qin

    Between 1st January 2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that he claimed EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    EDU Case UK Limited (Company No. 08888722)

    Between 1st January  2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    Background Information

    The Packaging Producer Responsibility Regulations were introduced to oblige the producers of waste packaging such as plastic, glass and cardboard (e.g. supermarkets) to contribute towards the financial cost of recycling and the disposal of waste. Any large organisation that meets the criteria for this obligation is required to prove they have made such financial contributions by the purchasing of credits known as Packaging Recovery Notes (PRNs) or Packaging Export Recovery Notes (PERNs) from UK waste reprocessors and waste exporters.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI: Rhizome Secures $6.5M in Seed Funding to Meet Surging Demand for Resilience Planning

    Source: GlobeNewswire (MIL-OSI)

    WASHINGTON, May 21, 2025 (GLOBE NEWSWIRE) — Rhizome, the leading climate resilience planning platform for the power grid, today announced the close of a $6.5 million oversubscribed Seed funding round led by Base10 Partners. The company will use the funding to scale their AI platform and team as they continue to help utilities protect their grid and customers from the impacts of extreme weather events. Rhizome will focus on building out its existing platform, new product research and development, and expanding its geographic footprint domestically and internationally.

    Rhizome, launched in 2023, supports utilities by helping them model the impacts of increasingly severe extreme weather events against their systems. By leveraging AI against climate risk data and digital representations of the physical grid, Rhizome’s platform identifies vulnerabilities and prioritizes resilience investments and upgrades. This fundraise will further fuel Rhizome’s mission to integrate climate intelligence into utility planning workflows at a time when grid resilience has never been more crucial.

    Extreme weather events are rapidly increasing in frequency, intensity, and cost. In 2024 alone, the U.S. faced 27 billion-dollar climate and weather disasters, totaling over $182 billion in damages. For electric utilities, the stakes are particularly high. A McKinsey analysis found that major storms have cost individual utilities an average of $1.4 billion over a 20-year period, underscoring the urgent need for smarter, more resilient infrastructure planning in the face of growing climate volatility.

    At the same time, electric utility capital expenditures hit a record $179 billion, with projections rising to $194 billion in 2025. In an environment where every dollar counts, utilities need advanced planning tools that can simulate a range of climate scenarios — removing the guesswork from resilience planning and helping every dollar go further.

    “We set out to partner with investors who deeply understand the power sector and share our commitment to solving pressing climate resilience challenges,” said Mishal Thadani, Co-founder and CEO of Rhizome. “This funding allows us to scale our work and continue refining a suite of products that help utilities prepare the grid for an increasingly uncertain future.”

    Base10 is joined in the Seed round by first-time Rhizome investors in MCJ and CLAI. They join Convective Capital, El Cap, Streetlife Ventures, Stepchange, and Everywhere in closing out the oversubscribed round, all of whom also participated in prior Rhizome fundraises.

    “Resilience is unquestionably one of the most important factors in ensuring a safe, reliable power grid,” said Rexhi Dollaku, General Partner at Base10 Partners. “Mish, Rahul, and the team bring the right mix of vision, urgency, and technical depth to solve this challenge, and we’re proud to support them.”

    In just under two years, Rhizome has developed and commercialized a suite of mission-specific products used by electric utilities in diverse geographical regions. Its flagship product, gridADAPT, supports long-term infrastructure planning by helping utilities prioritize investments that improve reliability and resilience. This was followed by the launch of gridFIRM, a first-of-its-kind platform for wildfire risk mitigation, and most recently, gridCAVA –– an affordable climate vulnerability assessment tool designed specifically for municipal and cooperative utilities. Built on Rhizome’s scalable, cloud-based Aspen platform, these tools round out a powerful portfolio of climate resilience planning tools designed to model current and future climate risk against utility infrastructure, available to utilities across Rhizome’s expanding geographical footprint.

    Rhizome is actively engaged in utility partnerships across the U.S. and Canada, supporting organizations facing a range of region-specific climate risks. Current customers include AvangridSeattle City LightVermont Electric Power Company (VELCO), Vermont Electric Cooperative (VEC). Rhizome also has a range of strategic collaborations that include EPRI’s Climate READi, KPMG, Black and Veatch, and the University of Connecticut.

    Rhizome is expanding its platform, growing its team, and partnering with more utilities to strengthen resilience in the face of climate-driven threats. Contact Rhizome or visit here to learn more about the company’s expanding portfolio of climate risk solutions.

    About Rhizome
    Rhizome is an AI-powered software platform that helps utilities identify vulnerabilities from climate threats, quantify risk at high resolutions, and measure the economic and social benefits of grid-enhancing investments. Rhizome provides the highest standard of equitable climate risk mitigation to ensure that communities and businesses are protected against intensifying extreme weather events.

    About Base10 Partners
    Founded by Adeyemi Ajao and TJ Nahigian, Base10 is a San Francisco-based venture capital fund investing in founders who believe purpose is key to profits and companies that are automating sectors of the Real Economy, including transportation, retail, logistics, and construction. Through its program, The Advancement Initiative, Base10 aims to donate 50% of profits to underfunded colleges and universities to support financial aid and other key initiatives. Portfolio companies include Notion, Figma, Nubank, Stripe, Motive, Chili Piper, and Popmenu. Connect via base10.vc.

    Media Contact
    FischTank PR
    rhizome@fischtankpr.com

    Additional Inquiries ** or ** Business Development Inquiries
    Dea Pratt, Head of Marketing
    dea@rhizomedata.com

    The MIL Network

  • MIL-OSI: MEXC Partners with TON for Groundbreaking $1 Million Crypto Event

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, today announced an industry-disrupting partnership with The Open Network (TON) that introduces a $1 million reward pool campaign and fundamentally challenges established exchange revenue models. Launching today and running through June 20, the “TON Triumph” campaign eliminates all trading fees on TON pairs while offering staking returns that dwarf typical yields by up to 100 times.

    In an unprecedented move that signals a significant shift in exchange competition strategies, MEXC will offer new users access to staking opportunities with up to 400% APR on TON tokens—creating what analysts describe as the most aggressive user acquisition campaign in the cryptocurrency exchange sector this year.

    “This partnership represents a strategic inflection point for both the TON ecosystem and the broader exchange landscape,” said Tracy Jin, COO of MEXC. “By eliminating all typical entry costs into TON trading for a full month while simultaneously offering returns that outpace all competitors, we’re not simply running a promotion—we’re fundamentally changing how users engage with emerging Layer-1 ecosystems.”

    Campaign Transforms Market Access and Investment Returns

    The 30-day campaign introduces multiple disruptive elements that directly challenge other exchanges’ TON market dominance:

    • Zero-Fee Trading Structure: Complete elimination of fees on TON/USDT, TON/USDC, and TON/EUR spot pairs, TONUSDT futures, and all TON/USDE network withdrawals—removing traditional revenue mechanisms that have defined exchange business models.
    • Industry-Leading APR: New users can stake TON tokens to earn up to 400% APR, positioning the offering at 100 times higher than typical cryptocurrency staking returns and several hundred times above traditional banking products.
    • Democratized Trading Access: Zero-fee structure gives retail traders access to the same economics previously available only to professional and institutional traders, significantly leveling the playing field.
    • Limited-Time, First-Come Allocation: High-yield staking pools operate on a first-come, first-served basis with participants limited to 250 TON tokens per user, creating immediate urgency for early participation.

    The campaign also includes passive rewards of up to 8% daily APR for USDE holders, spot trading rewards from a pool of 32,500 TON, and a futures trading competition with 100,000 USDT in bonuses.

    TON Ecosystem Expansion and Infrastructure Advancement

    This partnership is pivotal for The Open Network, which continues to gain momentum through its connection to Telegram’s 900+ million users and growing developer ecosystem.

    The collaboration represents a significant leap forward in TON’s accessibility and adoption curve. By drastically reducing barriers to entry while providing exceptional incentives, the campaign accelerates the integration of new participants into the TON ecosystem, coinciding precisely with the network’s rapidly expanding technical capabilities and use cases.

    The campaign also showcases MEXC’s platform capabilities, demonstrating advanced infrastructure that can handle zero-fee trading across multiple markets simultaneously while managing high-volume staking operations with variable APR structures.

    Time-Sensitive Opportunity with Global Access

    The $1 million in rewards is available exclusively during the 30-day window, with certain high-value components like the 400% APR staking pool starting on May 21th and operating on a capped allocation basis.
    MEXC has created a streamlined onboarding process that allows new users to complete registration and KYC verification in minutes, with the campaign accessible to eligible participants globally through both web and mobile interfaces.

    About MEXC
    Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto.” Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding.
    MEXC Official WebsiteXTelegramHow to Sign Up on MEXC

    About TON
    The Open Network (TON) is a fully decentralized layer-1 blockchain designed for mass adoption. Originally conceived by Telegram and now developed by the open TON Community, the network offers exceptional scalability, accessibility, and ease of use.

    Risk Disclaimer:
    The information provided in this article regarding cryptocurrencies does not constitute investment advice. Given the highly volatile nature of the cryptocurrency market, investors are encouraged to carefully assess market fluctuations, the fundamentals of projects, and potential financial risks before making any trading decisions.

    Source

    Contact:
    Lucia Hu
    lucia.hu@mexc.com

    Disclaimer: This is a paid post and is provided by MEXC. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/81cfe77f-6144-467b-8410-8e577b84fbb9

    The MIL Network

  • MIL-OSI Economics: MPTS 2025 celebrates largest edition ever with record visitor numbers, reveals MBI, a GlobalData company

    Source: GlobalData

    The UK’s most powerful hub for the creative industries united for two days of engaged networking, passionate debate and exceptional insights into AI, the creator economy, production craft and more – helping attendees stay ahead-of-the-curve for the year ahead.

    London, United Kingdom, 21 May 2025 – After two exceptional days of conversation, collaboration and community, the biggest and buzziest MPTS yet welcomed a record 13,000 attendees from 50 countries, uniting the UK’s media and entertainment industry together in the heart of London, like never before. The exhibition is organized by Media Business Insight (MBI) Ltd, a GlobalData company.

    Hosted at London’s Olympia on 14-15 May, the red-hot editorially driven program delivered 100+ free-to-attend sessions across eight theatres, showcasing the insight and passion of more than 350 expert speakers and guest keynotes. The bustling show floor was packed with more than 300 exhibitors and sponsors, showcasing imagination, determination and standout talent of the UK’s creative and technical communities – at a time of both global challenge and immense opportunity.

    Setting the agenda for MPTS, a State of the Nation Production keynote outlined a media and entertainment landscape in which storytellers had to embrace screens, formats and creators of all kinds.

    Kate Beal, CEO, Woodcut Media, asserted: “TV doesn’t exist anymore in the way we knew it.”

    Derren Lawford, CEO, Dare Pictures, said: “We are in the middle of a decade of profound transition, and we are past the tipping point. TV is part of a wider, connected series of industries around the creation and distribution and funding of content.”

    Headliners at MPTS include:

    • Producer and presenter Ross Kemp, who took us on an exhilarating tour of investigative documentaries on the front lines of conflict, drug cartels and organised crime gangs. “They will know in a second if you are not telling the truth,” he said. “I specialize in telling the truth, it is as simple as that.”
    • Georgie Holt, whose company Flight Story produces the world’s second biggest podcast ‘Diary of a CEO’, declared: “We are in the era of the Founder Creator — creators who are now in charge of media content and able to monetise spectacularly outside of traditional gatekeepers.”
    • NFL professional turned American Football broadcaster Jason Bell explained how sports coverage was evolving into the F1 Drive To Survive model, in which athlete personalities and back stories were the keys to growing audiences.
    • Blockbuster editor Eddie Hamilton gave a masterclass about the precision involved in making Top Gun: Maverick and five Mission: Impossible movies with Tom Cruise. He said: “Every nuance is refined hundreds of times. Sometimes we watch a 10-minute scene 40 times in a day, checking to see where your eye is moving in the frame.”

    Diverse representation is a vital sign of the industry’s health and MPTS is proud to set the benchmark to secure equal representation and attendance from the next generation, not only across the program, but also something clearly witnessed across the show floor amongst exhibitors and attendees.

    MPTS also prioritizes the crucial importance of sustainability and, in continuing association with BAFTA albert brought this conversation to the fore with experts including Peter Okell, Sky Studios Elstree; Luke Seraphin, Sky Studios and Claire O’Neill, A Greener Future speaking in the Sustainability Series.

    Sam Street, Marketing Officer, BAFTA Albert commented: “MPTS is a really key moment in our calendar. It is always so great to connect with suppliers, companies, studios and creatives who share our common passion for sustainability within screen industries. It has also been really valuable to curate our sustainability series of panels across this year’s show, we’ve had some really insightful discussions and emphasised the importance of environmental focus throughout the screen industries.”

    We did not need a machine to predict the high demand for news and information about AI. The brand-new ticketed AI Training program and the expanded AI Media Zone drew exceptional attendance, with exhibitors such as Dot Group, Moments Lab and Software. Conversations in these packed-out sessions revolved around the impact of AI from ideation to VFX, featuring real-world insights and discussions on bridging the gap between theory and practice from speakers including Pete Archer, BBC; Jon Roberts, ITN and Damien Viel, Banijay Entertainment.

    With a record number of exhibitors already rebooking for 2026, MPTS continues to prove its value as the UK’s number one event for media and production professionals, where brands, creatives and decision-makers come together to connect, collaborate and grow.

    Jane Shepard, Senior Channel Marketing Manager, Sandisk, said: “MPTS 2025 was a spectacular showcase of innovation, bringing together the brightest minds and cutting-edge technology in the industry. An unforgettable experience for all attendees.”

    Tom Rundle, Application Engineer, Yamaha Music, said: “It has been very busy for us. We have seen a huge mix of customers from the broadcast sector here, but also customers from the other industries which we serve, whether that’s live or theatre who have deliberately come to the show to seek us out to speak to us. Will we be back next year? Yes, absolutely, this is the first year for us, so it was always a bit of a toe in the water, but it’s been vastly more successful than we thought it was going to be.”

    Peter Alderson, Business Manager, Nikon, said: “This is our second year at MPTS, we’ve gone a little bit bigger on our stands, almost doubling it, and I think it’s definitely been worthwhile doing. We’ve partnered with RED, who we recently purchased, and MRMC so it’s making a lovely statement about where we are in the market, and I think we’re in the right place to make that statement here at MPTS.”

    Jennifer Hudson, Marketing Executive, Videndum, said: “This show is really important in our calendar – we attend nearly every year and find so much value in it. We get to meet with so many different professionals within the industry, and this year has been really, really positive for us. We’ve walked away with quite a few leads and made new relationships. It’s a fantastic show, and we would thoroughly recommend anyone thinking about coming and having a stand here to definitely do it – you won’t regret it.”

    Will Pitt, Head of Sales Solutions, Techex, said: “My impression of the show is that it’s been incredibly busy and very positive. Techex particularly specialise in solving some of the headaches that a lot of the broadcast industry is grappling with at the moment, namely, how they transition into an IP-led architecture from a legacy architecture and what that journey looks like. As such, our standards have been packed pretty much throughout the show to come and look at products, but also to come and talk about ideas and lean into what that journey looks like specifically for them. So not a generic journey, but specific to their drivers and their wants and needs in the short and medium term. We particularly like MPTS because it’s London based and many of the engineers that we speak to and collaborate with are based here and therefore it’s an easy journey for them to take half a day, a day out to come and investigate what we have to offer, but also to have those conversations. And so for organisations like WBD or Sky, the BBC, ITV, etc. They can come here quite easily and engage with us, spend some time talking in real life and not over teams or Zoom.”

    Charlotte Wheeler, Event Director, MPTS said: “Without doubt, 2025 was the most stimulating, ahead-of-the-curve MPTS yet. At a time when we are seeing the industry under real pressure from budget cuts to talent shortages and perpetual change, the conversations and connections on the show floor were positive and demonstrated infectious community spirit. The level of attendance and the quality of attendees from across all sectors of the industry was incredible – not just stakeholders in technology but representatives from production and commissioning, the creator economy, those new to the industry and freelancers were all brought together by MPTS under one roof.

    “A huge amount of work goes into making sure that there is equal representation across our extensive conference programme. I am proud that MPTS is one of – if not the – most diverse shows both in terms of attendees and panellists.

    “Thank you to everyone for exhibiting, sponsoring, speaking, attending and engaging with the show to make MPTS such a thrilling success. We are already planning for 2026, which marks MPTS’ 10th edition, so look forward to a landmark celebration!”

    Save the date for MPTS 2026 when we return to Olympia Grand Hall, London on 13 – 14 May 2026.

    The conversation does not stop when the doors close. MPTS is more than just two days a year – it is a connected, year-round community for the broadcast and media industry. From on-demand content to exclusive events, there’s still so much to explore. Stay connected with us: https://www.mediaproductionshow.com/register-interest

    To enquire about exhibiting at our landmark 10th edition, please go to: https://www.mediaproductionshow.com/stand-enquiry

    MBI is the publisher of market-leading titles including Broadcast, Broadcast Sport, Broadcast Tech, KFTV, The Knowledge and Screen International.

     

    MIL OSI Economics

  • MIL-OSI USA: Ernst Works to Secure Medicine Supply Chain from China

    US Senate News:

    Source: United States Senator Joni Ernst (R-IA)

    WASHINGTON – U.S. Senator Joni Ernst (R-Iowa) joined her colleagues to introduce a bipartisan bill to improve federal coordination for essential medicine supply chains that could impact the healthcare system, helping our nation mitigate drug shortages and address future health emergencies.
    “Depending on China for critical pharmaceutical ingredients poses a national security threat,” said Ernst. “Through this bipartisan effort, we can identify essential medicines to strengthen the supply chain and reduce our reliance on our adversary. By taking action now, we can protect the health of our citizens in the future.”  
    The Mapping America’s Pharmaceutical Supply (MAPS) Act would direct the Department of Health and Human Services to:

    Map the U.S. pharmaceutical supply chain and find weaknesses,
    Help create a database of essential medicines, and
    Collect information about where these medicines and ingredients are made and their supply chain details, including reliance on China.

    MIL OSI USA News

  • MIL-OSI United Kingdom: Consultation launched on proposed changes to transport for post-16 SEND students

    Source: City of Wolverhampton

    Fees for post-16 SEND travel were due to be introduced in 2020 following consultation but halted due to the outbreak of the Covid pandemic.

    Fresh consultation is now being held on the introduction of a charging policy which will require a contribution towards the cost of post-16 SEND travel.

    This would bring the council in line with the approach taken by neighbouring authorities.

    The proposed charges would apply to students moving into post-16 SEND education from September 2025 and those already in post-16 SEND education.

    Any payments would be spread over 3 terms with a reduction for low income families.

    Councillor Qaiser Azeem, the City of Wolverhampton Council’s Cabinet Member for Transport, said: “We are one of the few remaining councils to offer free transport for this age group. Most authorities charge a contribution due to there being no legal requirement to provide post 16 transport.

    “We remain committed to ensuring young people lead independent healthy lives, feel safe and secure and achieve their full potential.

    “While in an ideal world we would not need to consider introducing charges, the proposals to introduce a contribution towards the cost of post-16 SEND travel, align with, or are less than, neighbouring authorities.

    “We would of course work closely with families affected to support them should these changes be introduced.

    “It is important we hear from parents, carers, students, schools and the wider community as part of this consultation, so please take this opportunity to have your say.”

    In line with legislation there is no transport charge for pupils aged 5 to 16 or for adult learners aged 19 to 25.

    The consultation is now live and runs until 13 June. Take part at Consultation on Post 16 SEND Transport Charges – City of Wolverhampton Council – Citizen Space.
     

    MIL OSI United Kingdom

  • MIL-OSI Europe: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    From 19 to 21 May, the OSCE Secretariat in collaboration with the Government of Andorra, the US Mission to the OSCE, and University of Andorra co-organized the first-ever Model OSCE in Sant Julià de Lòria, Andorra.
    The three-day event brought together 25 young people with diverse backgrounds from Andorra, Algeria, the United States of America, Japan and Morocco, offering them a unique opportunity to strengthen their soft skills and deepen their understanding of peace and security issues through peer-to-peer learning on multilateralism, international relations and diplomacy.
    The programme featured sessions on the OSCE’s mandate, history, structure, and decision-making processes, as well as its co-operation with OSCE Partners. It also included discussions on Finland’s priorities on 2025 Chairpersonship, the Youth and Security Agenda, the role of women in diplomacy and multilateralism, and hands-on training in negotiation and mediation.
    In her opening remarks, Andorra’s Minister of Foreign Affairs, H.E. Imma Tor Faus emphasized the country’s ongoing support of youth engagement in international affairs: “After hosting the OSCE activities in 2022 focused on Youth and Security, today’s event reaffirms Andorra’s strong and ongoing commitment to the OSCE’s Youth and Security Agenda. We are proud to support the efforts of the Office of the Secretary-General, both politically and financially, to advance this vital work. The Model OSCE reflects the values we stand for and aligns closely with our priority of promoting youth participation in international organizations.”
    Omar Cardentey, Head of Public Affairs for the US. Mission to the OSCE also shared his personal experience in working in the multilateral settings and encouraged young participants to never give up or doubt their ability to make an impact.
    The Model OSCE echoed the motto “nothing about youth without youth”, underscoring the crucial role of young people in building sustainable and peaceful societies.
    One participant, Lisa Cruz Lackner from Andorra, captured the spirit of the event: “Capacity-building initiatives like this are more than trainings. They create a unique space for dialogue, understanding, and mutual learning. When we come together with different experiences, perspectives, and identities, we don’t just learn about the issues—we learn how to listen, negotiate, and collaborate beyond borders. These events empower us not only to understand global challenges, but to see ourselves as part of the solution. In a setting like the Model OSCE, you quickly realize that diversity is not a challenge to overcome—it is the key to building more inclusive, effective and lasting approaches to peace and security.”
    Participants also engaged in exchanges with young diplomats and parliamentarians from Andorra and Malta, gaining firsthand insights into diplomatic careers. The event encouraged collaborative learning and dialogue throughout its session.
    The Model OSCE was held as part of the Extra-budgetary Project “Accelerating the implementation of the Youth and Security Agenda in the OSCE region”, which aims to empower young people to shape a more secure and co-operative future across the OSCE region.

    MIL OSI Europe News

  • MIL-OSI Global: Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star

    Source: The Conversation – Global Perspectives – By Gwen Ansell, Associate of the Gordon Institute for Business Science, University of Pretoria

    We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.

    He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.

    As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.

    Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.

    This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.

    The economist who loved jazz

    Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.

    In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.

    Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.

    Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.




    Read more:
    Zakes Mda on his latest novel, set in Lesotho’s musical gang wars


    The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.

    Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.

    Morojele on drums for Andile Yenana.

    Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.

    His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:

    The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.

    Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.

    Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.

    The accidental writer

    He said in an interview:

    I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.

    In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.

    Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.

    There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”

    In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.

    The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.

    The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.

    For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.

    He was working on his third fiction outing – a collection of short stories – at the time of his death.

    The beauty of his work lives on

    Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.

    Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).

    Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star – https://theconversation.com/morabo-morojele-lesothos-swinging-jazz-drummer-who-became-a-literary-star-257256

    MIL OSI – Global Reports

  • MIL-OSI Global: Israel has promised ‘basic amount’ of food into Gaza − but its policies have already created catastrophic starvation risk for millions

    Source: The Conversation – Global Perspectives – By Yara M. Asi, Assistant Professor of Global Health Management and Informatics, University of Central Florida

    Palestinians wait in line to receive meals in the Jabalia refugee camp in Gaza City, Gaza, on May 17, 2025. Mahmoud ssa/Anadolu via Getty Images

    After 18 months of punishing airstrikes, raids and an increasingly restrictive siege in Gaza, the United Nations on May 20, 2025, issued one of its most urgent warnings yet about the ongoing humanitarian crisis: an estimated 14,000 babies were at risk of death within the next 48 hours without an immediate influx of substantial aid, especially food.

    The assessment came a day after Israel allowed the first trickle of aid back into Gaza following its nearly three-month total blockade imposed on March 2. But on the first day of that resumption, the U.N. Office for the Coordination of Humanitarian Affairs reported that only nine trucks were allowed into Gaza, when around 500 are required every day. The U.N. called it “a drop in the ocean of what is urgently needed.”

    As an expert in Palestinian public health, I and others have long warned about the potentially devastating humanitarian consequences of Israel’s military response to the Hamas attacks of Oct. 7, 2023, given the preexisting fragility of the Gaza Strip and Israel’s history of controlling humanitarian aid into the territory. Many of those worst-case humanitarian predictions have now become reality.

    Israel’s control of food and aid into Gaza has been a consistent theme throughout the past 18 months. Indeed, just two weeks after Israel’s massive military campaign in the Gaza Strip began in late 2023, Oxfam International reported that only around 2% of the usual amount of food was being delivered to residents in the territory and warned against “using starvation as a weapon of war.”

    Yet aid delivery continues to be inconsistent and well below what was necessary for the population, culminating in a dire warning by U.N. experts in early May that “the annihilation of the Palestinian population in Gaza” was possible without an immediate end to the violence.

    Putting Palestinians ‘on a diet’

    Already, an estimated near 53,000 Palestinians have died and some 120,000 have been injured in the conflict. Starvation could claim many more.

    Amid the broader destruction to lives and infrastructure, there is now barely a food system to speak of in Gaza.

    Since October 2023, Israeli bombs have destroyed homes, bakeries, food production factories and grocery stores, making it harder for people in Gaza to offset the impact of the reduced imports of food.

    A handful of trucks loaded with humanitarian aid for the Gaza Strip are seen at the Kerem Shalom crossing in southern Israel on May 20, 2025.
    AP Photo/Maya Alleruzzo

    But as much as things have worsened in the past 18 months, food insecurity in Gaza and the mechanisms that enable it did not start with Israel’s response to the Oct. 7 attack by Hamas.

    A U.N. report from 2022 found that 65% of people in Gaza were food insecure, defined as lacking regular access to enough safe and nutritious food.

    Multiple factors contributed to this preexisting food insecurity, not least the blockade of Gaza imposed by Israel and enabled by Egypt since 2007. All items entering the Gaza Strip, including food, became subject to Israeli inspection, delay or denial.

    Basic foodstuff was allowed, but because of delays at the border, it could spoil before it entered Gaza.

    A 2009 investigation by Israeli newspaper Ha’aretz found that foods as varied as cherries, kiwi, almonds, pomegranates and chocolate were prohibited entirely.

    At certain points, the blockade, which Israel claimed was an unavoidable security measure, has been loosened to allow import of more foods. In 2010, for example, Israel started to permit potato chips, fruit juices, Coca-Cola and cookies.

    By placing restrictions on food imports, Israel has claimed to be trying to put pressure on Hamas by making life difficult for the people in Gaza. “The idea is to put the Palestinians on a diet, but not to make them die of hunger,” said one Israeli government adviser in 2006.

    To enable this, the Israeli government commissioned a 2008 study to work out exactly how many calories Palestinians would need to avoid malnutrition. The report was released to the public only following a 2012 legal battle. Echoes of this sentiment can be seen in the Israeli decision in May 2025 to allow only “the basic amount of food” to reach Gaza to purportedly ensure “no starvation crisis develops.”

    The long-running blockade also increased food insecurity by preventing meaningful development of an economy in Gaza.

    Displaced Palestinians fleeing amid ongoing Israeli military operations in the Gaza Strip arrive in Jabalia in northern Gaza on May 18, 2025.
    AP Photo/Jehad Alshrafi

    The U.N. cites the “excessive production and transaction costs and barriers to trade with the rest of the world” imposed by Israel as the primary cause of severe underdevelopment in the occupied territories, including Gaza. As a result, in late 2022 the unemployment rate in Gaza stood at around 50%. This, coupled with a steady increase in the cost of food, made affording food difficult for many Gazan households, rendering them dependent on aid, which fluctuates frequently.

    Hampering self-sufficency

    More generally, the blockade and the multiple rounds of destruction of parts of the Gaza Strip have made food sovereignty in the territory nearly impossible.

    Even prior to the latest war, Gaza’s fishermen were regularly shot at by Israeli gunboats if they ventured farther in the Mediterranean Sea than Israel permits. Because the fish closer to the shore are smaller and less plentiful, the average income of a fisherman in Gaza has more than halved since 2017.

    Much of Gaza’s farmland has been rendered inaccessible to Palestinians as a result of post-October 2023 actions by Israel.

    And the infrastructure needed for adequate food production – greenhouses, arable lands, orchards, livestock and food production facilities – has been destroyed or heavily damaged. International donors hesitate to rebuild facilities, knowing they cannot guarantee their investment will last more than a few years before being bombed again.

    The latest ongoing siege has only further crippled the ability of Gaza to be food self-sufficient. By May 2025, nearly 75% of croplands had been destroyed, along with significant amounts of livestock. Less than one-third of agricultural wells used for irrigation remain functional.

    Starvation as weapon of war

    The use of starvation as a weapon is strictly forbidden under the Geneva Conventions, a set of statutes that govern the laws of warfare. Starvation has been condemned by U.N. Resolution 2417, which decried the use of deprivation of food and basic needs of the civilian population and compelled parties in conflict to ensure full humanitarian access.

    Human Rights Watch has already accused Israel of using starvation as a weapon of war, and Amnesty International called the most recent siege evidence of genocidal intent.

    The Israeli government in turn continues to blame Hamas for any loss of life in Gaza and has increasingly made clear its aim for Palestinians to leave Gaza entirely.

    Israeli Prime Minister Benjamin Netanyahu has said publicly that Israel was permitting aid now only because allies were pressuring him over “images of mass famine.” This stance suggests that Israel will not soon increase aid beyond what his government deems politically acceptable.

    While there is more evidence than ever before that Israel is using food as a weapon of war, there is also, I believe, ample evidence that this was the reality long before Oct. 7, 2023.

    In the meantime, the implications for Palestinians in Gaza have never been more dire.

    Already, the World Health Organization estimates that 57 children have died from malnutrition just since the beginning of the March 2, 2025, blockade.

    More death is certain to follow. On May 12, the Integrated Food Security Phase Classification, a global system created to track food insecurity, released an alarming report on projections of food insecurity in Gaza.

    It warned that by September 2025, half a million people in Gaza – 1 in 5 of the population – will be facing starvation and that the entire population will experience acute food insecurity at crisis level, or worse.

    Editor’s note: Parts of this story were originally contained in an article published by The Conversation U.S. on Feb. 15, 2024.

    Yara M. Asi does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Israel has promised ‘basic amount’ of food into Gaza − but its policies have already created catastrophic starvation risk for millions – https://theconversation.com/israel-has-promised-basic-amount-of-food-into-gaza-but-its-policies-have-already-created-catastrophic-starvation-risk-for-millions-257181

    MIL OSI – Global Reports

  • MIL-OSI Global: Rethinking engineering education: Why focusing on learning preferences matters for diversity

    Source: The Conversation – USA – By Sharon Tettegah, Professor of Creative Studies, University of California, Santa Barbara

    Retention and recruitment efforts designed to boost diversity in engineering programs often fall short of their goals. gorodenkoff/Getty Images

    For decades, colleges, government agencies and foundations have experimented with recruitment and retention efforts designed to increase diversity in engineering programs.

    However, the efforts have not significantly boosted the number of women, students of color, individuals with disabilities and other underrepresented groups studying and earning degrees in STEM and engineering fields.

    Latino, Black, Native American and Alaska Native students are underrepresented among science and engineering degree recipients at the bachelor’s degree level and above. The groups are also underrepresented among STEM workers with at least a bachelor’s degree.

    Women are also underrepresented in the STEM workforce and among degree recipients in engineering and computer and information sciences.

    I study equity and social justice in STEM learning. In my recent study, I found that more students from diverse backgrounds could excel in engineering programs if course content were tailored to a wider variety of learning preferences.

    Why it matters

    Focusing on learning preferences could boost diversity in engineering courses and careers.
    Morsa Images/Getty Images

    During my time as a program officer at the National Science Foundation, an independent federal agency that supports science and engineering, I reviewed plenty of research focused on broadening participation and diversifying student enrollment in STEM fields.

    Progress can stall on efforts to boost diversity because college instructors do not consider the synergistic relationship between the content and the learner.

    Teachers are the mediators, and it is students’ experiences with the curriculum that matter.

    It was long a common belief that students have different learning styles. These included kinesthetic, learning through hands-on experiences and physical activity; auditory, learning by listening to information; and visual, learning by seeing information.

    More recent research does not support the idea that teaching students according to their learning style leads to improved learning.

    That’s why I prefer the term “learning preferences” rather than learning styles. We all have preferences – whether for ice cream flavors, home decor or how we receive information, including how we learn.

    Learning preferences are broader and more flexible, allowing multiple ways of engaging with content.

    For example, let’s say a teacher always presented equations in a classroom and the student just could not get it. However, it was the only way the information was presented. To the individual learner, they have failed. Some people would say, “These kids can’t learn,” and subsequently counsel the student out of the class.

    Then, years are spent repeating the same cycle.

    Students should have opportunities to connect with engineering content in multiple ways.
    10’000 hours/Getty Images

    However, educators can broaden their viewpoints if they look at the students as customers. If a customer is shopping for a shirt, they look for one that catches their eye. Ultimately, they find one they like.

    Instructors need to take the same approach when trying to help students understand what is happening in class. For instance, if I have trouble with equations, I should be provided with options to engage with the lesson in ways that align with my learning preferences.

    What’s next?

    Learning styles have been heavily researched. However, content preferences have not been well explored.

    In a truly democratic education system, curriculum design should reflect the voices of all stakeholders and not just those in positions of power, namely instructors.

    Using data mining and artificial intelligence, educators have a variety of options for creating content for the various preferences a learner may want or need. For example, if a student prefers other representational content, such as word problems, graphics or simulations, AI can create diverse representations so that the learner is exposed to a variety of representations.

    I argue that future studies need to consider the use of technologies such as adaptive learning applications to understand students’ learning preferences.

    Prioritizing diverse learning perspectives in STEM could help create a more inclusive and responsive learning environment.

    The Research Brief is a short take on interesting academic work.

    Sharon Tettegah received funding from the National Science Foundation for this work. Award Abstract # 1826632
    Coordinating Curricula and User Preferences to Increase the Participation of Women and Students of Color in Engineering

    ref. Rethinking engineering education: Why focusing on learning preferences matters for diversity – https://theconversation.com/rethinking-engineering-education-why-focusing-on-learning-preferences-matters-for-diversity-251095

    MIL OSI – Global Reports

  • MIL-OSI Global: Too much sitting increases risk of future health problems in chest pain patients – new research

    Source: The Conversation – USA – By Keith Diaz, Associate Professor of Behavioral Medicine, Columbia University

    Chest pain could be a symptom of angina or a heart attack. Moyo Studio/E+ via Getty Images

    For patients hospitalized with chest pain, the amount of time they spend sedentary afterward is linked to a greater risk for more heart problems and death within a year. That’s the key finding of a new peer-reviewed study my colleagues and I published in the journal Circulation: Cardiovascular Quality and Outcomes.

    We asked 609 emergency room patients experiencing chest pain — average age of 62 — to wear a physical activity monitor for 30 days after leaving the hospital. The monitor measured movements, sitting time and sleep throughout the day. We then followed patients for one year to track whether they had additional heart problems or died.

    We found that patients who averaged more than 15 hours of sedentary behavior daily — which does not include sleep — were more than twice as likely to experience more heart problems or die in the year after discharge than patients who accrued a daily average of 12 hours of sedentary time.

    But our goal wasn’t just to document that sitting is harmful. It was also to figure out what patients should do instead to lower their risk.

    We found that replacing 30 minutes of sedentary time with moderate or vigorous movement, like brisk walking or running, was most beneficial. It was associated with a 62% lower risk of experiencing more heart problems or dying in the year after discharge. But we also found that replacing 30 minutes of sedentary time with just light movement, such as slow walking or housework, lowered the risk of heart problems and death by 50%.

    Sleep was also a healthier option. Replacing 30 minutes of sedentary time with sleep lowered the risk of heart problems and death by 14%.

    Clogged arteries could lead to a heart attack.
    Veronica Zakharova/Science Photo Library via Getty Images

    Why it matters

    Over 8 million people in the U.S. are admitted to the hospital with chest pain suggestive of acute coronary syndrome. annually. This covers a range of conditions involving reduced blood flow to the heart, including angina and heart attack.

    Patients with acute coronary syndrome remain at high risk of having another heart problem even with optimal medical treatment.

    The risk also remains high for patients with chest pain who are discharged without a diagnosis of acute coronary syndrome, as their unexplained chest pain may be a precursor to more serious heart problems. Given this risk, there is a need to identify risk factors that can be modified to improve a patient’s prognosis after hospitalization for chest pain.

    In previous research, we found that patients with acute coronary syndrome had a fear of exercise and were sedentary, spending over 13 hours a day sitting.

    Given that sedentary behavior has been linked to poor heart health in the general population, we were concerned that patients were unknowingly increasing their risk of having another heart problem.

    Our latest findings confirm that sedentary time is a harmful behavior for these patients. But beyond telling patients to stop sitting so much, our work provides important guidance: Any movement, regardless of how intense, can be beneficial after hospitalization. This is especially relevant for people recovering from heart problems who may find exercise difficult or scary.

    While exercise provides the best “bang for your buck” in terms of health benefits, our findings are good news for patients who may not have the time, ability or desire to exercise. And for those unable to fit in more movement, just getting an extra half hour of sleep is a small, doable step that can make a meaningful difference for your health after hospitalization.

    What still isn’t known

    Researchers don’t fully understand why sedentary time is harmful. Muscles help regulate blood sugar and lipid levels. It is thought that when muscles aren’t used, such as when patients sit for hours, this can lead to harmful elevations in blood sugar and lipids.

    In turn, this can cause inflammation, plaque buildup in the arteries and organ damage. More research is needed to understand the biological mechanisms so that we can determine just how much movement is needed in a day.

    What’s next

    While our study highlights the potential risks of sedentary behavior after being hospitalized for chest pain, it was an observational study. Clinical trials are needed to confirm that replacing sedentary time with activity or sleep can improve prognosis.

    The Research Brief is a short take on interesting academic work.

    Keith Diaz receives funding from the National Institutes of Health.

    ref. Too much sitting increases risk of future health problems in chest pain patients – new research – https://theconversation.com/too-much-sitting-increases-risk-of-future-health-problems-in-chest-pain-patients-new-research-257089

    MIL OSI – Global Reports

  • MIL-OSI Global: Trump treats laws as obstacles, not limits − and the only real check on his rule-breaking can come from political pressure

    Source: The Conversation – USA – By Andrew Reeves, Professor of Political Science and Director of the Weidenbaum Center, Washington University in St. Louis

    At his inauguration on Jan. 20, 2025, Donald Trump swore to ‘preserve, protect and defend the Constitution of the United States.’ Morry Gash/POOL/AFP, Getty Images

    Lately, the headlines have been clear: President Donald Trump is headed for a showdown with the courts. If he ignores their rulings, the courts have few tools and limited power to make him comply.

    But the real contest is not legal. It is political.

    As a political scientist who studies presidential behavior and public responses to unilateral action, I have spent my career examining the boundaries of executive power.

    Those limits, aimed at constraining the president, are set in law.

    The Constitution outlines the powers of Congress and the president in articles 1 and 2. It formally gives Congress the power of the purse and requires the president to “take Care that the Laws be faithfully executed.”

    Statutes dictate how agencies operate, how appointments are made and how funds must be spent. Courts interpret and enforce these rules.

    These legal constraints reflect the founders’ concern with unchecked executive power. That concern is embedded in the country’s political origins – the Declaration of Independence was a direct rebuke to royal overreach.

    But law alone has never been enough to prevent presidents from abusing their power. The law’s force depends on political will. Presidents often follow the law not simply because they must, but to avoid backlash from Congress, the media or the public.

    What the United States is witnessing in 2025 is not just a president testing the system. It is a transformation of the presidency into a fully political institution. The president acts until political resistance becomes strong enough to stop him.

    President Donald Trump criticizes judges whose decisions he doesn’t like.

    Testing the limits

    These political constraints are informal and fluid.

    They arise from public opinion, media scrutiny, pressure from party leaders and other elected officials, and the threat of electoral consequences. While legal rules rely on institutions, political limits depend on reputation, norms and the willingness of others to resist.

    Trump’s presidency operates within this second framework. Legal boundaries are still present, but they are often treated by his administration as optional and without deference.

    Trump, for example, has sidelined the Office of Legal Counsel, the executive branch’s source of legal guidance. His focus appears to be not on legality, process or constraint, but on headlines, polling and control of the narrative.

    Courts still issue rulings, but their power depends on a broader political culture of compliance, and that culture is weakening.

    Trump is not the first president to test the limits of authority. But the pace and scale of his defiance are without precedent. He appears to be betting that pushing boundaries will continue to pay off.

    Lag between law and action

    The legal challenges facing Trump are real.

    In his first 100 days back in office, he took aggressive steps on federal spending, appointments to key executive branch positions, tariffs and deportations. Trump has announced he will not enforce legislation that the Supreme Court confirmed was constitutional. Many of these actions have already triggered legal challenges.

    These are not isolated incidents. Taken together, they reveal a broader pattern.

    Trump appears to treat legal rules not as limits but as obstacles to be negotiated or ignored. One recent scholarly paper has described Trump’s approach as “legalistic noncompliance,” where the administration uses the language of law to give the appearance of compliance while defying the substance of court orders.

    The executive branch can move quickly. Courts cannot. This structural mismatch gives Trump a significant advantage. By the time a ruling is issued, the political context may have changed or public attention may have moved on.

    Judges have begun to notice. In recent weeks, courts have flagged not only legal violations but also clear signs of intentional defiance.

    Still, enforcement is slow, and Trump continues to behave as though court rulings are little more than political talking points.

    Politics the only real check

    Trump is not guided by precedent or legal tradition. If there is a limit on presidential power, it is political. And even that constraint is fragile.

    In a February 2025 national survey by the Weidenbaum Center, a research institute that I head at Washington University, just 21% of Americans said the president should be able to enact major policy without Congress. The public does not support unchecked presidential power: A further 25% of respondents, including more than one-third of Republicans, neither agreed nor disagreed that a president should have this type of unchecked power. Of those with an opinion, a solid 72% of Americans oppose unilateral presidential action, including 90% of Democrats, 76% of independents and 42% of Republicans.

    These findings align with nine earlier national surveys conducted during the Obama and Trump administrations. Jon Rogowski and I report these results in our book, “No Blank Check.”

    But one important shift stands out in the recent survey. Support for unilateral executive action among the two-thirds of Republicans who expressed an opinion has reached an all-time high, with 58% of them endorsing presidential action without Congress. That is more than 16 points higher than in any previous wave.

    Despite that rise in partisan support, Trump’s broader political position remains weak.

    His approval ratings remain underwater. His policies on tariffs and federal spending cuts are unpopular. Consumer confidence is falling.

    Congressional Republicans continue to offer public support, but many are watching their own polling numbers closely as the midterms approach.

    If the economy falters and public opinion turns more sharply against the president, political resistance could grow. I believe that’s when legal rules may begin to matter again – not because they carry new force, but because violating them would carry higher political costs.

    Real test still ahead

    So far, no judge has held the Trump administration in contempt of court. But the signs of erosion are unmistakable. Trump recently accused the Supreme Court of “not allowing me to do what I was elected to do” after it temporarily blocked his administration’s effort to deport migrants with alleged ties to Venezuelan gangs. Treating the judiciary as just another political adversary and ignoring its rulings risks an even deeper constitutional crisis.

    The most meaningful check on presidential power will be political.

    Courts rely on the broader political system for enforcement. That support can take many forms: elected officials speaking out in defense of the rule of law; Congress using its oversight and funding powers to uphold court rulings; bureaucrats refusing to implement unlawful directives; and a press and public that demand compliance. Without that support, even the clearest legal decisions may be ignored.

    The legal fights unfolding today are serious and must be watched closely. But Trump is not focused on the courts. He is focused on politics – on how far he can go, and whether anyone will make him stop.

    Andrew Reeves is affiliated with Washington University in St. Louis and the Hoover Institution.

    ref. Trump treats laws as obstacles, not limits − and the only real check on his rule-breaking can come from political pressure – https://theconversation.com/trump-treats-laws-as-obstacles-not-limits-and-the-only-real-check-on-his-rule-breaking-can-come-from-political-pressure-255834

    MIL OSI – Global Reports

  • MIL-OSI Global: Making eye contact and small talk with strangers is more than just being polite − the social benefits of psychological generosity

    Source: The Conversation – USA – By Linda R. Tropp, Professor of Social Psychology, UMass Amherst

    Eyes down, headphones on – what message are you sending? vm/E+ via Getty Images

    How much do you engage with others when you’re out in public? Lots of people don’t actually engage with others much at all. Think of commuters on public transportation staring down at their phones with earbuds firmly in place.

    As a professor of social psychology, I see similar trends on my university campus, where students often put on their headphones and start checking their phones before leaving the lecture hall on the way to their next class.

    Curating daily experiences in these ways may appeal to your personal interests, but it also limits opportunities for social connection. Humans are social beings: We desire to feel connected to others, and even connecting with strangers can potentially boost our mood.

    Though recent technological advances afford greater means for connection than at any other moment in human history, many people still feel isolated and disconnected. Indeed, loneliness in the American population has reached epidemic levels, and Americans’ trust in each other has reached a historic low.

    At the same time, our attention is increasingly being pulled in varied directions within a highly saturated information environment, now commonly known as the “attention economy.”

    It is perhaps not surprising, then, that so many Americans are experiencing a crisis of social connection. Research in social psychology helps to explain how the small behaviors and choices we make as individuals affect our experiences with others in public settings.

    Where you focus your attention

    One factor shaping people’s experiences in public settings concerns where they focus their attention. Since there is more information out in the world than anyone could ever realistically take in, people are driven to conserve their limited mental resources for those things that seem most crucial to navigating the world successfully. What this means is that every person’s attention is finite and selective: By attending to certain bits of information, you necessarily tune out others, whether you’re aware of doing so or not.

    More often than not, the information you deem worthy of attention also tends to be self-relevant. That is, people are more likely to engage with information that piques their interest or relates to them in some way, whereas they tend to ignore information that seems unrelated or irrelevant to their existence.

    These ingrained tendencies might make logical sense from an evolutionary perspective, but when applied to everyday social interaction, they suggest that people will limit their attention to and regard for other people unless they see others as somehow connected to them or relevant to their lives.

    One unfortunate consequence is that a person may end up treating interactions with other people as transactions, with a primary focus on getting one’s own needs met, or one’s own questions answered. A very different approach would involve seeing interactions with others as opportunities for social connection; being willing to expend some additional mental energy to listen to others’ experiences and exchange views on topics of shared interest can serve as a foundation for building social relationships.

    It can feel alienating to be surrounded by people who have basically hung out a ‘do not disturb’ sign.
    Drazen/E+ via Getty Images

    How others interpret your actions

    Also, by focusing so much attention on their own individual interests, people may inadvertently signal disinterest to others in their social environments.

    As an example, imagine how it would feel to be on the receiving end of those daily commuting rituals. You find yourself surrounded by people whose ears are closed off, whose eyes are down and whose attention is elsewhere – and you might start to feel like no one really cares whether you exist or not.

    As social creatures, it’s natural for human beings to want to be seen and acknowledged by other people. Small gestures such as eye contact or a smile, even from a stranger, can foster feelings of connection by signaling that our existence matters. Instead, when these signals are absent, a person may come to feel like they don’t matter, or that they’re not worthy of others’ attention.

    How to foster connection in public spaces

    For all these reasons, it may prove valuable to reflect on how you use your limited mental resources, as a way to be more mindful and purposeful about what and who garner your attention. As I encourage my students to do, people can choose to engage in what I refer to as psychological generosity: You can intentionally redirect some of your attention toward the other people around you and expend mental resources beyond what is absolutely necessary to navigate the social world.

    Engaging in psychological generosity doesn’t need to be a heavy lift, nor does it call for any grand gestures. But it will probably take a little more effort beyond the bare minimum it typically takes to get by. In other words, it will likely involve moving from being merely transactional with other people to becoming more relational while navigating interactions with them.

    A few simple examples of psychological generosity might include actions such as:

    • Tuning in by turning off devices. Rather than default to focusing attention on your phone, try turning off its volume or setting it to airplane mode. See if you notice any changes in how you engage with other people in your immediate environment.

    • Making eye contact and small talk. As historian Timothy Snyder writes, eye contact and small talk are “not just polite” but constitute “part of being a responsible member of society.”

    • Smiling and greeting someone you don’t know. Take the principle of “innocent until proven guilty” to the realm of social relations, by showing your willingness to welcome other people rather than displaying disinterest and avoidance. Such simple acts may help to foster feelings of belonging and build a sense of community with others.

    Acknowledging another human with a smile, even when using an automated system, can help them feel seen and valued.
    izusek/E+ via Getty Images

    Among the most cynical, examples like these may initially be written off as reflecting pleas to practice the random acts of kindness often trumpeted on bumper stickers. Yet acts like these are far from random – they require intention and redirection of your attention toward action, like any new habit you may wish to cultivate.

    Others might wonder whether potential benefits to society are worth the individual cost, given that attention and effort are limited resources. But, ultimately, our well-being as individuals and the health of our communities grow from social connection.

    Practicing acts of psychological generosity, then, can provide you with opportunities to benefit from social connection, at the same time as these acts can pay dividends to other people and to the social fabric of your community.

    Linda R. Tropp does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Making eye contact and small talk with strangers is more than just being polite − the social benefits of psychological generosity – https://theconversation.com/making-eye-contact-and-small-talk-with-strangers-is-more-than-just-being-polite-the-social-benefits-of-psychological-generosity-252477

    MIL OSI – Global Reports

  • MIL-OSI Video: Secretary Rubio testifies before the House Appropriations Committee’s Subcommittee – 2:00 PM

    Source: United States of America – Department of State (video statements)

    Secretary of State Marco A. Rubio testifies before the House Appropriations Committee’s Subcommittee on State, Foreign Operations, and Related Programs on the FY26 Department of State Budget Request on Capitol Hill, on May 21, 2025.

    ———-
    Under the leadership of the President and Secretary of State, the U.S. Department of State leads America’s foreign policy through diplomacy, advocacy, and assistance by advancing the interests of the American people, their safety and economic prosperity. On behalf of the American people we promote and demonstrate democratic values and advance a free, peaceful, and prosperous world.

    The Secretary of State, appointed by the President with the advice and consent of the Senate, is the President’s chief foreign affairs adviser. The Secretary carries out the President’s foreign policies through the State Department, which includes the Foreign Service, Civil Service and U.S. Agency for International Development.

    Get updates from the U.S. Department of State at www.state.gov and on social media!
    Facebook: https://www.facebook.com/statedept
    X: https://x.com/StateDept
    Instagram: https://www.instagram.com/statedept
    Flickr: https://flickr.com/photos/statephotos/
    Rumble: https://rumble.com/c/StateDept
    Substack: https://statedept.substack.com

    Watch on-demand State Department videos: https://video.state.gov/
    Subscribe to The Week at State e-newsletter: https://public.govdelivery.com/accounts/USSTATEBPA/signup/32562

    State Department website: https://www.state.gov/
    Careers website: https://careers.state.gov/
    White House website: https://www.whitehouse.gov/
    Terms of Use: https://state.gov/tou

    #StateDepartment #DepartmentofState #Diplomacy

    https://www.youtube.com/watch?v=B-r0jBKdVjk

    MIL OSI Video

  • MIL-OSI USA: ICYMI: On CNN’s The Arena this Evening, Shaheen Reiterates that Putin is Playing Trump in Ukraine Negotiations, Slams Congressional Republicans’ Proposal to Slash Medicaid to Give Billionaires a Tax Break

    US Senate News:

    Source: United States Senator for New Hampshire Jeanne Shaheen

    Published: 05.21.2025

    (Washington, DC) – U.S. Senator Jeanne Shaheen (D-NH), Ranking Member of the U.S. Senate Foreign Relations Committee, joined CNN’s The Arena this evening to discuss her questioning of U.S. Secretary of State Marco Rubio earlier in the day and her belief that Russian President Vladimir Putin is playing President Trump. She also sharply criticized Congressional Republicans’ budget proposal that would gut Medicaid and food assistance benefits to finance tax breaks for billionaires and special interest groups. The interview followed Secretary Rubio’s first testimony to the Senate Foreign Relations Committee since his confirmation hearing in January. Click HERE to watch Senator Shaheen’s interview. 
    Key Quotes from Senator Shaheen: 
    When asked if she feels Secretary Rubio and President Trump are being played by Putin, Shaheen said: “I do, absolutely. And I said that to Secretary Rubio and we heard it again, what the outcome of this phone call between President Trump and Vladimir Putin yesterday was that now Putin is going to bring in a sheet that outlines what they want to see, to end the war in Ukraine, to get them to the table. Well, he’s just playing for time because he thinks the longer he can delay that, we’re going to get disinterested, that we’re going to not want to continue to support Ukraine in this fight. But what he doesn’t understand is that the President and this administration says the biggest threat to America is China, and China and President Xi are watching what the outcome of this war in Ukraine is. And if we are not tough in Ukraine, if we are not tough on Putin, that he knows that we’re not going to be tough on him when he goes after Taiwan. And so that’s a real problem.” 
    On Republicans’ budget proposal, Shaheen said: “Well, it’s clear that the Republicans in the House care more about what Donald Trump thinks than they care about what their constituents think. Because constituents in most of this country don’t want to see massive cuts to the Medicaid program, health care that so many Americans rely on, whether it’s for nursing home care or for people with disabilities, people who get their health insurance through the Medicaid program.” 
    On Republicans threatening cuts to program like Medicaid and SNAP, Shaheen said: “And what they’re actually trying to do with those worker requirements and other changes is to reduce the number of people on Medicaid so they can save money and what they want to do, what they want to do with the money that they’re saving by cutting Medicaid, by cutting food benefits from the Snap program, is to provide a huge tax cut to the wealthiest Americans. 70% of the benefits from the tax cuts are going to go to the wealthiest 1% in this country.” 

    MIL OSI USA News

  • MIL-OSI United Kingdom: Flies, crossbows and comics: novel counter terrorism innovation

    Source: United Kingdom – Executive Government & Departments

    Case study

    Flies, crossbows and comics: novel counter terrorism innovation

    Nine projects, ranging from whether flies can detect explosives to how comics can reduce radicalism and how much of a risk crossbows are, were showcased.

    More than 100 people attended the third University Innovation Concept event exploring ways in which cutting-edge research, often in unexpected areas, can help fight terrorism. 

    Nine fascinating and thought-provoking projects, ranging from whether flies can detect explosives (yes!) to how comics can reduce radicalism, and how much of a terrorism risk crossbows are, were on display at a showcase at the Open University in Milton Keynes, in which the Accelerated Capability Environment (ACE) was a proud partner. 

    Researchers and delegates were welcomed by Inspector Liam Cahill, Innovation Domain Lead at the Counter Terrorism Research Lab (CTRL), and Open University professors Arosha K Bandara and Eleanor Crabb. Annette Southgate, Head of ACE, then took to the stage to stress the importance of work and innovative collaboration such as this to “getting ahead of some of the people that are trying to cause us harm”. 

    Iain Harrison, Director of Digital, Data, Analysis & Technology at Counter Terrorism Policing, explained the rigorous process, supported by ACE, that began with 62 proposals from 28 different universities, which were then reviewed and whittled down to the nine stimulating ideas on display at the showcase event. 

    Bringing academia and Counter Terrorism Policing together 

    The projects that had been explored over 12 weeks of intensive research were showcased across three themes: 

    THEME ONE: Radicalisation and Interventions 

    First to present were a team from Anglia Ruskin University, on the topic of Exploring the Impact of Critical World Events on Extremist Misinformation Network (2020-24). This involved analysing 240 posts from four major platforms to understand how extremist groups exploit global crises on popular social media platforms, using hashtags and multiple forms of misinformation to amplify uncertainty and try and recruit new audiences. It also looked to pinpoint potential novel ways to intervene in this process. 

    Next up were a team from Cranfield University, analysing how social media content algorithms respond to user interactions within specific topics, to answer the question of Can Social Media Algorithms Radicalise? This pilot was designed to quantify if user behaviours such as watching or liking videos influenced a popular platform’s algorithm, and to what extent. The conclusion was that the algorithm could be influenced to provide more content around a particular theme, but it is not yet clear how long this influence lasts. 

    The final presentation in this first session was from the University of Liverpool, exploring the topic of Graphic Novels to Enable Discussion and Promote Critical Thinking. This project involved creating a 46-page book containing four graphic novels on the topic of radicalisation, supported by front-line intervention practitioners, for use in educational strategies to encourage critical thinking. Comics were chosen because they are already popular worldwide, accessible and engaging as a format, and cheap to produce. 

    THEME TWO: Current Threats, Biosensors and Human Networks 

    After a break, another team from Cranfield University, that had been drawing big crowds in the breakout sessions for the four crossbows on display at their stand, spoke on their research into Crossbows: A Real and Current Threat. Against a background of increasing use of crossbows, which can legally be bought by anyone over the age of 18, in targeted incidents, this set out to examine the hit probability and wounding potential of four different systems, their reload times, and how these compared to current policing response times. The conclusions, from a variety of tests including depth of penetration and discharge rate, concluded that crossbows need to be considered a real and present threat for a marauding terrorist attack, because all of those tested have potential to cause significant injury, especially to unprotected organs. 

    Next up was another project that had the audience buzzing – research from a team at The Open University on Fruit Fly Biosensors: Leveraging Olfactory Responses for Detection of Explosives and Toxic Chemicals. This explored if fruit flies, which have exceptional sensitivity, could be used as biosensors to detect toxins, drug precursors and explosives. The answer was potentially yes – experiments with TNT found that exposure to the explosive led to a gradual but clear increase in fly attraction, indicating that fruit flies can detect it. Preliminary lab data also suggests starving the flies may enhance TNT detection speed. 

    The final project in this session was an explanation of a Dynamic Target Indicator Tool (D-TinT) developed by a team at the University of Exeter. This uses techniques from movement pattern analytics and social network analysis to identify the best indicators of links between nodes in a human network based on movement patterns over time. This enables a statistical and spatial mathematical model to be developed. The Tool also identifies what might be flagged as a vulnerable target – either person or place – which could allow counter terrorism stakeholders to test the impact of possible risk-reduction procedures. 

    THEME THREE: Emerging Technologies 

    The final session of a highly enjoyable day started with a team from Robert Gordon University in Aberdeen talking the audience through their research on Leveraging Artificial Intelligence (AI) to Identify and Prevent Terrorism in Prisons: Legislative Gaps and Technological Solutions. This analysed AI’s role in situational awareness and radicalisation prevention, explored how it could support existing counterterrorism efforts, evaluated legal and ethical readiness for AI to be deployed in this way, and proposed technical and legal reforms to enable the responsible use of AI technologies in prison settings. The conclusion of the research was that AI offers significant potential to enhance security and counter-radicalisation efforts in UK prisons. 

    Next, a scoping study of Augmented Reality and Terrorism was presented by Dr Richard Jones of Edinburgh Law School, part of the University of Edinburgh. Billing augmented reality as a “technology in search of a purpose”, his research explored both potential law enforcement applications, such as head-up real-time navigation and facial recognition of persons of interest, as well as how terrorists could use the same technology, for example to create video footage for propaganda purposes. It also looked at how this technology could evolve in the public domain. The research concluded that feasibility factors include device cost and availability as well as the level of required technological expertise, which is likely to fall, in addition to utility and whether it solves a problem. 

    The final presentation of the day was by a team from the University of Southampton on Exploiting Vulnerabilities in Autonomous Vehicle Systems for Terrorist Activity – Threats to UK Critical National Infrastructure. This focused on identifying vulnerabilities in autonomous vehicle systems amid increasing reliance on connected and automated vehicles, analysing how terrorists could exploit these to disrupt or control them. This could include by hijacking the vehicle controls or causing collisions via manipulating road signs. The conclusion was that proactive risk mitigation is paramount. 

    Following the event, Inspector Cahill said: “The University Innovation Concept (UIC) was conceived with the intention of bringing Counter Terrorism Policing and academia closer together to ensure operational decisions made by experienced and knowledgeable personnel are backed by science and academic rigour. 

    “The one-day showcase was also a fantastic opportunity for attendees to network, learn about ongoing research and potentially take learning back to their operational roles, and feedback has been extremely positive.”  

    Reflecting on the event, Professor Southgate said: “ACE is proud to support policing colleagues find new and creative ways of solving frontline mission problems through partnership with researchers from across a diversity of backgrounds and institutions.

    “Accessing diversity of thought, approach and experience helps us step back and consider more impactful and enduring ways of tackling existing and sometimes long-standing problems. 

    “We are keen to help identify and shine a light on brilliant academic work that can already help solve today’s mission problems; highlighting the difference this makes, help build relationships and continue encouraging our talented academic community to support frontline policing work.”

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: Funding to Improve Animal Shelters

    Source: US State of New York

    overnor Kathy Hochul today announced over $10.4 million has been awarded to 30 animal care organizations across the state through the seventh round of the New York State Companion Animal Capital Fund, the first state program in the nation to fund capital projects for animal shelters. The funding will support construction, renovation, and expansion projects that will enhance animal care and health and help ensure adoptions for New York’s dogs and cats. This builds on Governor Hochul’s commitment to securing safe housing and care for sheltered dogs and cats as they await adoption.

    “Any pet owner can tell you that companion animals like dogs and cats are more than just furry friends – they’re family,” Governor Hochul said. “Animal shelters and humane societies play an enormous role in keeping companion animals safe and well cared for while they await their new families and forever home. This funding is making a real difference, helping to better equip these vital facilities with the tools they need to improve the quality of care for animals.”

    Since the 2017 launch of the Companion Animal Capital Fund program, which is administered by the Department of Agriculture and Markets, the State has dedicated over $38 million to the program. In total, 130 projects have been awarded across New York so far. This round of funding builds on previous rounds of this program that is helping to offset the costs associated with capital projects run by New York State animal shelters, such as renovating dog kennels, improving medical facilities, or building more efficient shelters to reduce overall operational costs. Projects funded this year include updated living spaces for dogs and cats, improved HVAC and heating systems, expansions to facilities to improve medical care, as well as additional infrastructure updates.

    Competitive grants were awarded to shelters based on a need assessment, detailed project description, and reasonableness of cost. The following organizations are receiving an award in this round of the program:

    • City of Oswego – $500,000.00 to replace the kennels, update the HVAC system, seal floors and non-porous areas, create an exclusive outdoor “relief” area, and install new sinks.
    • Columbia Greene Humane Society – $500,000.00 for a new HVAC system and to expand the clinic to include isolation, treatment room, X-ray and lab, exam rooms and euthanasia space.
    • Humane Society of Rome – $500,000.00 to install new dog enclosures, two isolation rooms and new cat enclosures.
    • Jefferson County – $500,000.00 to renovate kennels, upgrade the HVAC system, repair the drainage system, and install resin flooring, concrete walls and sound proofing.
    • Massena Humane Society – $500,000 for enhanced record keeping equipment, upgrades to the kennels, drainage and HVAC system, radiant floor heat, soundproofing and a new intake area.
    • Middletown Humane – $500,000 for updates and repairs to interior and exterior, upgrading heating/cooling, updated lighting and electrical systems, replacing roof, insulation and painting, alarm system and perimeter fencing.
    • Oswego Co. Humane – $500,000.00 for increased cat housing, epoxy flooring, isolation rooms and maternity ward, increased dog housing, a new HVAC and new water piping.
    • Patricia LeDew Foundation – $500,000.00 to install a new X-ray room with new equipment, expand the surgical area, create a new dental site and design an adoption area specific to senior animals.
    • Paws Crossed Animal Rescue – $500,000.00 for a new HVAC system, new doors, epoxy flooring and painting in 3 kennels.
    • Saratoga County – $500,000 for a new heating and cooling system.
    • Town of Bangor – $500,000.00 to improve record keeping equipment, upgrade cat cages, upgrade drainage and HVAC and soundproofing.
    • Town of Cheektowaga – $500,000 for upgraded kennels, an upgraded HVAC system, a dedicated isolation area and soundproofing.
    • Town of Henrietta – $500,000.00 to construct a new municipal shelter.
    • Town of Olean – $500,000.00 for a new facility.
    • Ulster Co. SPCA – $500,000.00 to redesign the kennel, replace the floor, repair floors and walls, and renovate the kitchen, grooming room and exam room.

    A complete list of the awarded organizations and a brief description of the funded projects is available here.

    Governor Hochul’s Fiscal Year 2026 Executive Budget proposed continued funding for this critical program and the final adopted Budget includes $10 million in funding for the next round.

    New York State Agriculture Commissioner Richard A. Ball said, “Animal shelters and humane societies are so much more than a port in the storm – they are a true lifeline to the animals who will one day become beloved members of New York families. From providing essential medical care to daily enrichment activities, the hardworking staff at humane societies, shelters, and SPCAs throughout the state work tirelessly to provide the best care for dogs and cats while they wait to be adopted. Through seven rounds of funding, we have seen the direct impact these projects have had on these essential facilities, and I’m proud to see the good work continue.”

    New York State Animal Protection Federation Executive Director Libby Post said, “The Companion Animal Capital Fund has been a total game changer for shelters and rescues. This latest round of grants reflects how important the Companion Animal Care Standards Act for Shelters and Rescues is and what organizations are doing to make sure they meet these standards when they kick in on December 15th of this year. This round of grants brings the total investment to just shy of $50 million. Without the leadership of Governor Hochul, Senate and Assembly Agriculture Committee chairs Michelle Hinchey and Donna Lupardo, and our champions in each house, Assemblymember Deborah Glick and State Senator Joseph Addabbo, none of this would have happened. The Department of Agriculture and Markets understands how important this grant program is and the Federation thanks Commissioner Richard Ball for his on-going support.”

    State Senator Michelle Hinchey said, “Our local animal shelters and humane societies give animals the care and compassion they deserve while they wait to be adopted by their forever families. The Companion Animal Capital Fund is a vital source of support for these organizations, most of which rely on donations, to improve and modernize their facilities. Securing funding for this program is always a priority, and I’m thrilled that three of our own, Columbia-Greene Humane Society, Dutchess SPCA and Ulster SPCA, have all been awarded grants in the latest funding round.”

    Assemblymember Donna Lupardo said, “Since 2017, the Companion Animal Capital fund has helped 128 shelters make much-needed improvements to their facilities. I’m very glad that we are able to support an additional 30 shelters in this latest round of funding. We cannot thank them enough for the important work they do, caring for animals as they wait for their forever homes. I’d like to thank the Governor and my colleagues for continuing to support this important effort. I have seen first-hand how well these funds have been used and how needed these resources are.”

    The Department of Agriculture and Markets’ Division of Animal Industry promotes sustainable animal production agriculture and the safety of the animal origin food supply. These goals are accomplished through regulatory and cooperative educational efforts with various agencies, both public and private. The Division has staff in Albany and veterinarians located across the state. In addition to many other responsibilities, the Division regulates dog licensing, sets standards for humane care of seized dogs and the inspection of municipal shelters, administers the contract for the New York State Animal Population Control Program and the Pet Dealer Inspection Program, and provides training and assistance to local enforcement officers in animal welfare cases.

    MIL OSI USA News

  • MIL-OSI: Advocus Adds Nathan Smith as Underwriting Attorney

    Source: GlobeNewswire (MIL-OSI)

    CHICAGO, May 21, 2025 (GLOBE NEWSWIRE) — Chicago-based title insurance underwriter Advocus National Title Insurance Company (Advocus) recently welcomed attorney Nathan Smith to its Underwriting Department. In his new role, Nathan will be responsible for providing underwriting assistance by working with Advocus’ attorney agents. Day to day, his duties will consist of answering questions and providing approval for title matters concerning residential and commercial real estate transactions in the context of Advocus’ ongoing national expansion.

    With over a decade of legal experience, Nathan brings a wealth of expertise in claims and underwriting. Most recently, he served as Claims Counsel at Stewart Title Guaranty Company where he managed a portfolio of complex title insurance claims and litigation. Nathan also served as Underwriting Counsel at Fidelity National Title, where he performed risk assessments and provided legal guidance on both residential and commercial transactions.

    “Through our tried-and-true procedures and culture of collaboration and consensus-building, Advocus knows how to bring people together,” Smith said. “Advocus stands out for putting attorneys at the center of the process, and I am absolutely thrilled to contribute to a team that has reshaped, and continues to set, the standard for what the process can and should be.”

    Smith’s career remains rooted in guiding litigation strategy, negotiating settlements, and overseeing cost control initiatives—all with a focus on delivering timely and effective resolutions for Advocus’ insureds. A certified Illinois State Bar Association arbitrator and mediator, Smith knows the value of discarding adversarial models in favor of getting to “yes.”

    “Nathan’s experience at the intersection of claims management, underwriting, and legal operations makes him a perfect fit for Advocus as we continue to build a differentiated model grounded in legal integrity,” said Augie Butera, EVP and General Counsel at Advocus. “His track record of delivering results and educating peers exemplifies the values we bring to our agents and other customers every day.”

    To learn more about Advocus and its attorney-centered approach to title insurance, visit advocus.com.

    About Advocus
    Advocus is a national provider of title insurance and settlement services dedicated to preserving the role of lawyers in real estate transactions. Founded in 1964 on the belief that every consumer deserves legal representation and advocacy, Advocus is dedicated to preserving the attorney’s role in real estate transactions and offering attorney-led underwriting expertise. With a growing presence in markets across the United States, Advocus continues to set the standard for excellence in the title insurance industry. For more information, visit www.advocus.com.

    Media Contact:
    Aimee Miller
    aimee@broadsheetcomms.com

    The MIL Network

  • MIL-OSI: Graphitic Energy and Technip Energies Form Collaboration to Scale Clean Hydrogen Technology

    Source: GlobeNewswire (MIL-OSI)

    SAN ANTONIO, May 21, 2025 (GLOBE NEWSWIRE) — Graphitic Energy (“Graphitic”), formerly known as C-Zero, has entered into a strategic collaboration with the Claremont office of Technip Energies USA to jointly develop and deploy Graphitic’s innovative methane pyrolysis technology. This innovative process utilizes natural gas to produce clean hydrogen and graphite, a crystalline form of carbon used in batteries, lubricants, refractories, and high-temperature industrial processes. The agreement between Technip Energies and Graphitic includes funding dedicated to testing campaigns to support technology advancement. Later this year, the two companies also plan to enter into a licensing collaboration agreement to accelerate the deployment of Graphitic’s technology around the world.

    Graphitic Energy’s groundbreaking methane pyrolysis technology enables the production of clean hydrogen and solid carbon with no direct CO2 emissions. The process is low-electricity-intensive and can be scaled to produce 100,000 metric tons of hydrogen per year in a single process train. The collaboration will leverage Technip Energies’ leading positions in hydrogen generation and fluidized bed technology.

    “Technip Energies is excited to enter into this cooperation with Graphitic Energy and bring forward our recognized hydrogen production experience and fluidized bed expertise to standardize plants globally for the production of hydrogen and synthetic graphite with minimal direct CO2 emissions. The standardized designs will allow for lower pre-investment costs, accelerated implementation time, high predictability on project economics, and reduced overall capital costs. This cooperation underscores Technip Energies’ commitment to delivering sustainable, innovative, cost-effective low-carbon solutions, strengthening our technology portfolio,” said Mario Tommaselli, Senior Vice President Gas & Low Carbon Energies at Technip Energies.

    Unlike other low-carbon hydrogen production paths, Graphitic’s process economics do not require government subsidies to be cost-competitive, and the company can profitably deliver both hydrogen and graphite at current market prices. In addition, the company’s technology can be sited anywhere natural gas or LNG are available, without the need to source renewable electricity or perform geological CO2 sequestration.

    “Graphitic’s technology enables the production of two critical products from natural gas.  We’ve taken it from an idea, through the lab scale, and into a large pilot generating tonnes of graphitic material.  Collaborating with Technip Energies will enable us to get to market faster and provide interested parties with high-quality engineering packages,” said Graphitic’s Co-Founder and CEO Zach Jones.

    In March 2025, Graphitic commissioned its pilot plant in San Antonio, TX. This state-of-the-art facility is capable of producing several hundred kilograms of hydrogen and up to 1,000 kg of solid carbon per day, with continuous 24/7 operations. It is expected to operate through the end of 2025. The company’s pilot is supported by a recent $15 million extension of its series A funding, bringing its total investment to over $65 million.

    About Technip Energies

    Technip Energies is a global technology and engineering powerhouse. With leadership positions in LNG, hydrogen, ethylene, sustainable chemistry, and CO2 management, we are contributing to the development of critical markets such as energy, energy derivatives, decarbonization, and circularity. Our complementary business segments, Technology, Products and Services (TPS) and Project Delivery, turn innovation into scalable and industrial reality.

    Through collaboration and excellence in execution, our 17,000+ employees across 34 countries are fully committed to bridging prosperity with sustainability for a world designed to last.

    Technip Energies generated revenues of €6.9 billion in 2024 and is listed on Euronext Paris. The Company also has American Depositary Receipts trading over the counter.

    For further information: www.ten.com

    About Graphitic Energy

    Headquartered in Santa Barbara, CA with plant operations in San Antonio, TX, Graphitic Energy has developed a novel methane pyrolysis process for sustainably using natural gas to produce hydrogen and graphite. This delivers low-cost, clean hydrogen alongside high-value, graphitic carbon. Unlike current hydrogen generation technologies, Graphitic’s process converts abundant natural gas into hydrogen and solid carbon with virtually no direct CO2 emissions. The company has raised over $65 million from investors including Breakthrough Energy Ventures, Energy Capital Ventures, Trafigura, SK Gas, Eni, Mitsubishi Heavy Industries, ENGIE, and AP Ventures.

    For more information, visit www.graphitic.com

    Contact Information:
    Sydney Bartone, Business Development Manager
    Sydney.bartone@graphitic.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/92634266-17b9-442c-a832-6dc1f35868e6

    The MIL Network