Blog

  • There is no known cure for ALS, but medical tourism exploits desperation for profit

    Source: ForeignAffairs4

    Source: The Conversation – Canada – By Judy Illes, Professor, Neurology, University of British Columbia

    Amyotrophic lateral sclerosis (ALS) is a devastating neurological disorder of unknown cause, in which motor nerve cells of the brain and spinal cord that transmit signals to muscles progressively degenerate. This weakens limbs and affects speech, swallowing and ultimately the ability to breathe, resulting in death, typically within just a few years.

    Each year in Canada, approximately two people per 100,000 are diagnosed with ALS, amounting to about 1,000 cases based on the current population. In British Columbia, where we are located, the rate is estimated at just over three per 100,000 or roughly 190 new cases per year.

    This equates to approximately 4,000 Canadiansand 400 British Columbians — living with ALS at any given time.

    Rigorous ALS research is underway locally, nationally and internationally to slow — and ideally reverse — the relentless progression of this disease. Significant advances in understanding the genetic and environmental drivers of ALS are providing genuine hope that motor neuron diseases will one day be defeated.

    As experts in neurology and ethics, we are committed to delivering the best available health care and information throughout B.C. and across Canada. Trust in science and informed hope are essential to achieving the best possible outcomes and the longest possible trajectories in enjoying life when facing the overwhelming odds of ALS.

    A disturbing case

    In June, CBC’s The National reported on the case of Geoff Sando, a person living with ALS who pursued an unproven intervention for his condition. Sando travelled to Moose Jaw, Sask., to seek treatment at a clinic that claims to provide a cure for ALS.

    CBC’s The National reports on a Saskatchewan clinic claiming to offer ALS treatments.

    The ALS Society of Saskatchewan and the provincial New Democrat Party allege the clinic attended by Sando and several other patients is a form of medical tourism — travelling elsewhere to seek treatment — that can prey on the most vulnerable in society: those whose quality of life is deteriorating, and whose futures are tragically cut short.

    Medical tourism for a wide variety of other health-related conditions is not new. For example, treatments for cancer, strokes and orthopedic conditions have been available abroad for decades.

    In the United States and Mexico, unfounded stem cell interventions for ALS have been advertised for years. But until recently, it had been unusual to find such offerings in Canada. Their emergence speaks to the need for Health Canada to revisit its guidance on both regulated health and unregulated wellness products, including all forms of treatments, medications and device-based approaches.




    Read more:
    Giving patients the ‘right to try’ experimental drugs is a political maneuver, not a lifesaver


    We understand the urgency and desire to pursue any thread of hope in the face of desperation, but claims of dramatic improvement or cures from ALS by unregulated clinics that seem too good to be true are likely just that.

    Before investing in alternative treatments, we recommend that patients conduct their due diligence by consulting with their health-care team and their provincial ALS society for guidance. Ineffective interventions can jeopardize not only recipients, but also caregivers, especially when financial resources are drained.

    Trusted sources

    Developing approved therapies for ALS has been painfully slow, as evidenced by the failure of more than 95 per cent of ALS clinical trials in the past 28 years. Only three drugs — riluzole, edaravone and tofersen — have been approved by Health Canada and the U.S. Food and Drug Administration.

    Although riluzole and edaravone are only modestly effective, they remain the only widely approved pharmacological options for all forms of ALS. Tofersen is the first gene therapy recently approved to treat hereditary ALS caused by SOD1 gene abnormalities. Other treatments are being evaluated worldwide.

    This marks only the beginning of such treatment approaches to not only hereditary ALS but also non-hereditary ALS, which makes up about 90 per cent of all cases.




    Read more:
    A promising new study could lead to a reduction in symptoms of amyotrophic lateral sclerosis (ALS)


    For those affected by ALS and their families, ample resources are provided by various organizations, including ALS Canada and related provincial organizations, including the ALS Society of BC.

    Future hope

    Canadians generally trust science and scientists more than citizens of other countries and, on the whole, value science and believe in our government’s support for the work that scientists do.

    But in this time of geopolitical upheaval, vast incursions of disinformation and reversals of prior evidence-based human and health rights abroad means keeping up this level of trust — trust that leads to hope — will only become more challenging.

    The disproportionate suffering and impact on people who are marginalized by serious health conditions will only grow if dubious treatment offerings become normalized in Canada.

    The Conversation

    Erik P Pioro consults for MT Pharma, which manufactures edaravone (Radicava) and for Biogen, which manufactures tofersen (Qalsody). He has received funding support for ALS research from the ALS Association and the National Institutes of Health.

    Judy Illes does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. There is no known cure for ALS, but medical tourism exploits desperation for profit – https://theconversation.com/there-is-no-known-cure-for-als-but-medical-tourism-exploits-desperation-for-profit-261057

  • People with MS and other fluctuating health conditions are often forced to quit their jobs when they want to work

    Source: ForeignAffairs4

    Source: The Conversation – UK – By Alice Martin, Head of Research, Work Foundation, Lancaster University

    Andrey_Popov/Shutterstock

    Plans to cut health-related benefits in the UK continue to give the government political grief – as well as being a huge worry for claimants. Underpinning the controversy are government plans to move more people into work with a long-term ambition of 80% employment.

    But cutting welfare costs is a blunt and unhelpful way to face the challenge of increasing employment among people with long-term health conditions.

    For people with fluctuating and often invisible conditions such as multiple sclerosis (MS), welfare and work are not opposed. They are usually part of the same life journey – one that is rarely linear and requires systems and supports that are flexible, not punitive.

    This was the focus of a recent study led by my research colleague Aman Navani and the MS Society. It is a major UK survey of people with MS with more than 1,100 respondents, and highlights systemic failures in workplace support and welfare systems.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Because of its fluctuating nature, MS can act as an important case study to understand how work should accommodate people’s evolving health needs. It also offers lessons that are relevant to a wide array of other conditions.

    Cases of MS are rising globally. Around 150,000 people in the UK live with the condition, which affects the central nervous system and causes pain, mobility problems, cognitive issues and fatigue.

    Women are more likely to have MS, which is usually diagnosed in people in their 30s or 40s. These, of course, are peak working years.

    The vast majority of people with MS (96%) who participated in our study reported that their condition has affected their ability to work. This is because MS can make commuting and navigating workplace environments challenging, and physical and mental health impacts often overlap.

    Managing symptoms such as cognitive changes, pain and restricted mobility can contribute to anxiety and depression. All of these things put additional strain on the working lives of those affected.

    For a quarter of respondents (24%), MS had such a severe effect that they felt unable to work at all. Worryingly, one in two people said they have compromised their health by staying in a job.

    For many, leaving work is the only solution they can see. More than one-quarter (26%) cited unmanageable workloads, 19% could not afford to stay in work due to low pay, 20% lacked flexible hours, and for 22% the flexibility they were offered did not meet their needs.

    Just 8% said their employer helped them adapt their job to suit their health, and only 2% had progression opportunities tailored to their condition. But nearly half (45%) of those who left work said they could have stayed if their employer had understood their condition better.

    Almost half (46%) of respondents who were in work had used the personal independence payment (Pip) as a lifeline. This is an allowance that helps people with the extra living costs associated with having a disability. Under the government’s plans, conditions will be tightened for new claimants.

    Designing better jobs

    Living with a fluctuating condition requires constant adaptation, from coping with exhaustion to managing the extra time and cost of daily activities. As such, the way jobs are designed matters.

    A government report has said that one-quarter of those who are out of work and claiming health and disability benefits might be able to work if they could do so from home.

    The rise of remote and hybrid work has indeed been a lifeline for some disabled workers. A recent major study of people who are classified as disabled highlights just how vital this change has been for them: 85% said remote or hybrid work was essential or very important when job hunting, and 79% wouldn’t apply for roles without it.

    Among those working fully remotely, 64% said their physical health improved. Homeworking was valued by those with fluctuating conditions such as MS, and for disabled women and carers in particular, full-time homeworking was their preference.

    But these gains are precarious. Growth in hybrid roles has stalled and some employers are grabbing headlines with “return-to-office” mandates even at the risk of losing key members of their workforce.

    woman using a wheelchair commuting on public transport
    Return-to-office mandates can force some workers to navigate a challenging commute.
    AlvaroRT/Shutterstock

    Nearly one in four working-age people in the UK are disabled. Work and welfare must be designed from the perspective of this growing and diverse cohort – ensuring financial security for people with health conditions, both in work and out of work.

    Expanding and protecting access to secure and flexible jobs is key, including remote and hybrid roles, baking these models into more sectors of the economy. The government could lead by example with public sector workers, and protect jobs from knee-jerk employer mandates.

    In January this year, only 3.8% of vacancies on the Department for Work and Pensions jobs portal included an option for hybrid or remote work.

    Finally, it’s vital to improve job design and in-work support, with effective occupational health systems, consultation with workforces, normalising shorter working weeks and time off.

    This would enable people with fluctuating conditions to attend appointments, recuperate and even take career breaks without harming their careers. For this, the UK needs a benefits system that supports movement in and out of work, avoiding financial cliff edges.

    Too many people with MS and similar conditions who can and want to work are forced to leave jobs early due to inadequate support. They face a trade-off between progressing their working life and managing their health. The challenge for government and employers now is to remove this tension.

    The Conversation

    Alice Martin works for the Work Foundation think tank at Lancaster University, which received funding from MS Society to conduct the research.

    ref. People with MS and other fluctuating health conditions are often forced to quit their jobs when they want to work – https://theconversation.com/people-with-ms-and-other-fluctuating-health-conditions-are-often-forced-to-quit-their-jobs-when-they-want-to-work-259083

  • Dog thefts: what really happened during the COVID pandemic

    Source: ForeignAffairs4

    Source: The Conversation – UK – By Daniel Allen, Animal Geographer, Keele University

    smrm1977/Shutterstock

    Dog theft can be a devastating crime. During the COVID pandemic, newspapers suggested there was an epidemic of “dognapping” in the UK. If you have a dog, the reports may have alarmed you at a time when there were already many reasons to feel afraid.

    There are mixed views on whether or not lockdown triggered an increase in dog ownership. Animal welfare charity Battersea attributed a 53% increase in dog adoption to lockdown, and online pet adoption service Pets4Homes said in their 2022 report that demand for puppies rose 104% at the peak of lockdown in May 2020.

    But animal charity PDSA said its survey data pointed to a gradual increase in dog ownership since 2011 rather than a dramatic surge during lockdown. However, we do know lockdown saw inflated prices for dogs, with some fashionable breeds going for £9,000.

    In terms of criminal activity, social distancing restrictions seemed to lead to a decline in some forms of crime, including shoplifting and burglary. But many media outlets reported the number of dog thefts had increased up to 250% during the pandemic.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    We wanted to explore if the data supported claims of a dognapping epidemic and whether patterns in dog theft could suggest ways to help reduce it. Our recent study found new insights into dog theft patterns and showed the situation was more complicated than it seemed at first glance.

    Under the Theft Act 1968, dog theft is not a specific offence. It comes under other theft offences, such as burglary or theft from a person.

    This means police records on dog theft were not included in crime statistics. The only way to access such information is through Freedom of Information (FOI) requests to individual police forces. There are 45 territorial and three special police forces in the UK, and each has its own reporting and recording practices.

    Although police FOI data for dog theft must be approached with caution, it is useful. Previous studies exploring police FOI data found an upward trend in recorded dog thefts in England and Wales: rising nearly 20% from 2015 (1,545) to 2018 (1,849) for 41 police forces combined; and up 3.5% year on year from 2019 (1,452) to 2020 (1,504) for 33 police forces.

    DogLost, a UK online community for reuniting lost and stolen dogs with their owners, reported a 170% increase in stolen dogs (with Crime Reference Numbers) registered on their website in 2020 (465), compared to 2019 (172). This figure was widely quoted as a national increase “since lockdown started” by the media.

    The 250% increase figure first quoted in December 2020 was actually a comparison of two seven-month periods (January-July 2019 and 2020) for only one police force.

    Patterns and trends

    Our study found the data for the period covering the COVID pandemic is also incomplete. Data was provided by 32 forces (71%) for 2020, by 27 forces (60%) for 2021, and 23 forces (51%) for 2022.

    Patterns and trends do, however, emerge. Between 2020 and 2022, the available data shows a 3.7% rise in dog thefts in the UK, from 1,573 to 1,631. When making adjustments for the number of police forces providing data (which decreased over the period), the estimated national figures suggest there may have been more significant rise of up to 44.2%.

    While we cannot assume that the forces who supplied data are representative of all 45 regional forces, if this were the case, it would equate to 2,212 recorded dog thefts in 2020, 2,645 in 2021, and 3,191 in 2022.

    There was a lot of variation between different areas. For example, Cambridgeshire, Gwent and Northumbria police forces experienced increases of 36%, 49% and 80% respectively in the number of recorded dog thefts between 2020 and 2021.

    Monthly analysis of data from regional police forces and DogLost, show that the number of reports of stolen dogs started to go up when the UK entered its first national lockdown and again during part of the third lockdown. But the average number of police-recorded dog thefts was actually slightly higher outside of lockdown periods than during them between 2020 and 2022.

    However, in contrast with police trends, DogLost data shows a 65.2% drop in dogs reported stolen on DogLost’s website in 2022 compared to 2020. Lower DogLost numbers may reflect limited visibility or presence of their networks, the use of alternative lost and stolen dog services, or reluctance to share personal details online due to scams targeting dog theft victims.

    Close up of dog looking out of a window
    Dogs are often stolen from inside their own homes.
    GoodFocused/Shutterstock

    Our study found that, overall, there probably was an increase in dog theft from
    2020 to 2022, following already identified increases in the preceding years. This rise was probably driven by a combination of opportunity (more dogs, higher value) and situational factors (accessibility, dogs unattended in gardens while owners were inside).

    Our evidence does not support the notion of a widespread epidemic as portrayed by the media. However, increased media interest probably amplified awareness of the issue, and influenced the creation of the Pet Theft Taskforce, a UK government initiative set up in May 2021 to investigate and tackle dog thefts.

    New research appears to confirm the idea that dog abduction has significant welfare effects on both dogs and their owners. We also know that few dog thefts are successfully resolved, with under a quarter of stolen dogs likely to be returned and around 1%-5% of reported dog thefts result in someone being charged.

    However, there is potential good news. Our ongoing research suggests the number of police-recorded dog thefts decreased slightly in 2023, and again in 2024. This is supported by research from pet insurer Direct Line, which has estimated a 21% decrease in the number of stolen dogs from 2,290 in 2023 to 1,808 in 2024 in the UK.

    The Conversation

    Daniel Allen is founder of Pet Theft Reform and patron of the Stolen and Missing Pets Alliance (Sampa).

    Melanie Flynn is a member of the Research Advisory Committee of the Vegan Society (UK).

    John Walliss does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Dog thefts: what really happened during the COVID pandemic – https://theconversation.com/dog-thefts-what-really-happened-during-the-covid-pandemic-252061

  • What are education and health care plans and why are parents worried about them being scrapped?

    Source: ForeignAffairs4

    Source: The Conversation – UK – By Jonathan Glazzard, Rosalind Hollis Professor of Education for Social Justice, University of Hull

    Drazen Zigic/Shutterstock

    For children in England with special educational needs and disabilities, an education and health care plan (EHCP) is a central pillar of support. The government is due to set out its educational strategy for children with special educational needs and disabilities in the autumn, though, and has not ruled out scrapping ECHPs. Their removal would signal radical change in how the system works in England.

    ECHPs are individualised plans that set out the needs of a particular child and the support they should receive – from education, health services and social care – in order have the best opportunity to thrive. But demand for ECHPs is soaring and providing support is proving financially catastrophic for local authorities.

    One of the criticisms of EHCPs is that they prioritise providing children with individual models of support, rather than developing inclusive cultures within schools and within the broader education system. Education secretary Bridget Phillipson has outlined a vision of building a system where more children with special educational needs and disabilities can attend mainstream schools.

    But removing ECHPs leads to the possibility of children who need more specialist support missing out.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    To secure an ECHP, local authorities carry out a statutory assessment to determine whether a child’s needs warrant additional support. An assessment does not always lead to an EHCP, but if one is issued, it must outline how the child’s needs will be met and the additional resources needed to do so.

    These resources might include funding to provide a child with a teaching assistant, funding for equipment and transport to school, or funding to go to a specialist school. This system of support helps school leaders ensure that children and young people have the right support, at the right time.

    According to a report published earlier this year, the demand for EHCPs has risen by 140% since 2015. Recent data shows that there are 482,640 children and young people in England with an EHCP.

    Many more children have special educational needs, but do not have an ECHP. These pupils are classed as receiving special educational needs support. The percentage of pupils with an EHCP has increased to 5.3%, from 4.8% in 2024. The percentage of pupils with special educational needs support has increased to 14.2%, from 13.6% in 2024.

    Despite government investment of £10.7 billion to local authorities in 2024-25, a House of Commons committee report outlines that long waiting times for assessments, as well as to access support such as speech and language therapy, has led to parents losing confidence in the system.

    Boy in one to one class
    Support may include equipment or additional sessions.
    ABO PHOTOGRAPHY/Shutterstock

    Funding is allocated to each local authority from central government to fund provision in their areas. It is for local authorities, in consultation with their schools, to determine the individual allocation to schools. However, local authorities are struggling to meet the increased demand for EHCPs. Even when funding is allocated through EHCPs, it is not always sufficient to address the needs of those with complex needs.

    And funding is not sufficient to meet demand. Local authorities have accumulated huge deficits due to spending exceeding funding, placing some at risk of going bankrupt.

    Future plans

    Bridget Phillipson has refused to be drawn on whether EHCPs will be axed. “What I can say very clearly,” she has said, “is that we will strengthen and put in place better support for children.”

    Building more inclusive schools is obviously one way of achieving this vision. If scrapping EHCPs means less funding for children for special educational needs and disabilities, though, this cannot be the answer. Children need more support, not less, to enable them to thrive.

    The solution is for the government to work out what models of inclusion work well in mainstream schools and to decide how these can be resourced and evaluated. Clarity is also needed on inclusion in mainstream schools can be measured in order to assess whether it is working.

    Making more support in mainstream schools work also requires an adequate supply of knowledgeable, well-trained teachers. The government is prioritising this through revision to initial teacher education courses, with an emphasis on all teachers being teachers of special educational needs.

    If the government doesn’t get this right, the result may be poorer educational and long-term outcomes for pupils with special educational needs and disabilities. It may also lead to issues with teacher recruitment and retention in mainstream schools, particularly if teachers feel that they do not have the level of support in place that they need to meet the needs of their pupils.

    The Conversation

    Jonathan Glazzard does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. What are education and health care plans and why are parents worried about them being scrapped? – https://theconversation.com/what-are-education-and-health-care-plans-and-why-are-parents-worried-about-them-being-scrapped-260622

  • The A to K of vitamins: what you need and where to get it

    Source: ForeignAffairs4

    Source: The Conversation – UK – By Dan Baumgardt, Senior Lecturer, School of Physiology, Pharmacology and Neuroscience, University of Bristol

    SpeedKingz/Shutterstock

    The late, great comedian Barry Humphries (of Dame Edna fame) once spoke whimsically about the health benefits of kale. Just one fistful, he joked, contained enough essential vitamins, minerals and trace elements to keep you in a sedentary position in the bathroom for two whole days. Apparently, it wasn’t tasty enough to justify a second helping.

    In a world where “superfoods” are relentlessly marketed for their supposed ability to deliver all the nutrients we need, it’s worth asking: which vitamins really are essential? And aside from kale (which I actually rather like), what foods help us meet our daily needs?

    Vitamin A

    Let’s start at the top. Vitamin A – also known as retinol – is found in foods like eggs, oily fish and dairy products. It plays a crucial role in keeping your skin and immune system healthy.

    But it’s probably most famous for supporting vision. Vitamin A binds with light-sensitive pigments in the rod and cone cells of your retina, helping you to see, particularly in low light.

    A deficiency in vitamin A, though uncommon in wealthy countries, can lead to serious vision problems and even blindness. Another source of vitamin A is beta-carotene, found in colourful fruits and vegetables like carrots, peppers, spinach and pumpkin. Your body converts beta-carotene into vitamin A, which is why we associate carrots with seeing in the dark.

    Vitamin B

    The B vitamins are a family of eight different nutrients, each with its own number and role.

    B1 (thiamin) helps the nervous system and aids digestion. People with chronic alcoholism are especially at risk of deficiency, which can lead to Wernicke-Korsakoff syndrome, a serious neurological disorder that affects memory and movement.

    B2 (riboflavin) and B3 (niacin) support similar functions, while B9 (folate) and B12 (cobalamin) are essential for red blood cell production. A lack of either can lead to anaemia.

    Folate is especially important in early pregnancy, helping to prevent neural tube defects like spina bifida. That’s why it’s recommended for people who are pregnant or trying to conceive.

    You’ll find B vitamins in everything from beans and legumes to meat, fish and dairy; a wide-ranging family of nutrients in a wide-ranging variety of foods.

    Vitamin C

    The go-to vitamin when we’re under the weather, whether from a virus or a hangover, vitamin C (ascorbic acid) is known as the “healing” vitamin for good reason. It promotes wound healing, supports tissue repair and helps maintain blood vessels and bones.

    A deficiency in vitamin C causes scurvy – a condition once common among sailors – with symptoms like fatigue, bruising, depression and gum disease.

    Fortunately, vitamin C is found in many different fruits and vegetables, especially citrus fruits. That’s why 19th-century British sailors were given limes to prevent scurvy, earning them the nickname “limeys”.

    Vitamin D

    Vitamin D is essential for bones, teeth and muscles. It can be absorbed through diet, especially from oily fish, eggs and meat, but your body also makes it in the skin, thanks to sunlight.

    In the summer, most people get enough vitamin D from being outside. But in the winter months, diet and, if needed, supplementation become more important.

    Deficiency is more common, especially in areas with limited sun exposure. It can lead to soft, weakened bones and symptoms like bone pain, fractures and deformities – including the classic bow-legged appearance. In children, this condition is known as rickets; in adults, it’s called osteomalacia.

    Vitamin E

    Often overlooked, vitamin E helps protect cells, supports vision and bolsters the immune system. You’ll find it in nuts, seeds and plant oils and it’s usually easy to get enough through a varied diet.

    Vitamin F (Sort of)

    Not actually a vitamin, “vitamin F” is just a nickname for two omega fatty acids: alpha-linolenic acid (ALA) and linoleic acid (LA). These essential fats support brain function, reduce inflammation, and help maintain healthy skin and cell membranes. Since they’re technically not vitamins, we’ll let them quietly bow out.

    Vitamin K

    No, you didn’t miss vitamins G through J: they were renamed over the years. But vitamin K is real, and crucial for blood clotting.

    Deficiencies are more common in children, and can lead to bruising and bleeding that’s hard to stop. Supplements are effective and given after birth.

    Most adults get enough through foods like leafy greens and grains.

    And the winner is…

    All these vitamins are important – and all are found in a wide range of everyday foods. But which single food provides the widest variety?

    Kale, oily fish and eggs come in strong at second, third and fourth. But number one is: liver.

    Yes, liver. The stuff of childhood dread and overcooked school dinners. But it’s also rich in vitamins A, B, D and K. So rich in Vitamin A, in fact, that it’s advised to eat it only once a week to avoid vitamin A toxicity, and not at all if you’re pregnant. Sometimes, you just can’t win.

    The Conversation

    Dan Baumgardt does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. The A to K of vitamins: what you need and where to get it – https://theconversation.com/the-a-to-k-of-vitamins-what-you-need-and-where-to-get-it-261209

  • Sylvia Plath’s ‘fig tree analogy’ from The Bell Jar is being misappropriated

    Source: ForeignAffairs4

    Source: The Conversation – UK – By Elisha Wise, English, University of Sheffield

    In chapter seven of Sylvia Plath’s The Bell Jar (1963), protagonist Esther Greenwood imagines her life branching out before her like a green fig-tree. Each individual fig on the branches represents a different “wonderful future” – a family, a successful career, romance, travel, fame, etc.

    High-achieving Esther has innumerable figs she can choose from, yet she envisages herself “starving to death” in the crook of the tree because she can’t make up her mind on which of the figs she should choose.

    Her indecision stems from the knowledge that choosing one wonderful future means losing out on the other, equally appealing opportunities. She wants to experience all of them, but knows she cannot, and, in the end, spends so long deciding that every single fig rots and falls to the ground, dead.

    By wanting to do everything, Esther misses her chance to do anything at all. This is a metaphor about wasted potential, fears of choosing the wrong pathway, and feeling rushed into making decisions before you truly know what you want. There is little wonder that it appeals to teenagers.

    The “fig tree analogy”, as it is known online, is beloved by gen Z and has become a TikTok staple over the last three years. It was first discussed on the platform as part of the 2023 “Roman Empire” meme, with female users citing it as an example of something they constantly think about.

    It then reached a new peak in early 2024 thanks to the “my fig tree” trend, in which users (again, predominantly young women) wrote future hopes and dreams onto a stock image of a fig branch in videos featuring accompanying audio of the passage being read aloud.


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    This trend was, in essence, a way for people to share their dream jobs – with career pathways as varied as “surgeon” and “influencer” sometimes appearing on a single branch. But it also allowed young users to express their anxieties about planning for the future.

    In one video, “I can’t help but wonder if I’m going to be truly happy in [my chosen career] forever” is written beside a beautifully illustrated fig tree. I remember feeling this way myself when I read The Bell Jar for the first time in the middle of university applications and big life choices.

    When you are young, it can feel like you have only one choice and can never remake it, which is why Plath’s words spoke to me then and seem to be speaking to hundreds now.

    But why exactly is this metaphor resonating so strongly with gen Z?

    The girls who are participating in the “my fig tree” trend are not subject to the same binary choice of marriage or career that Esther faced. It is now possible to have loads of lovers and then a husband and family, and neither disqualifies you from also being a “brilliant professor” or “amazing editor” or anything else you wish to be.

    In The Bell Jar, Plath treats these things as distinct because they would truly have felt that way in Esther’s time of enforced purity and nuclear families. She was, after all, writing pre-second-wave feminism.

    So why, in our fourth-wave feminist world, do women still feel their options are so narrow? It could be because women workers are disproportionately at risk of being displaced by AI, or because other TikTok sensations like the “trad wife” are promoting to young women the very purity culture that Plath rallied against.

    Perhaps, for this generation, it really seems urgent to grasp hold of one fig before all are lost.

    However, as the “fig tree analogy” goes more and more viral, it is at risk of being removed from its original context. The signs of this are already visible on TikTok, as the passage has in the last month been used to soundtrack #romanticisinglife content and promote fig-themed homeware at a garden centre.

    It was also referenced in a recent episode of reality dating show Love Island, where it was incorrectly named the “fig theory” and not attributed to Plath.

    All of this suggests that the passage has now reached an audience of people who have not read The Bell Jar and see the analogy more as some generic life wisdom than a literary device. Indeed, TikTok videos by self-styled philosophers encouraging watchers to pick any or every fig off the tree instead of being paralysed by indecision like Esther are gaining traction.

    While these may prove helpful to Zoomers unsure about their future pathway, I feel that the conversation around this metaphor is increasingly overlooking the fact that Esther is unable to choose a fig because she is depressed.

    The real meaning of the fig tree analogy

    The Bell Jar may be a novel about coming of age as a woman, but it’s also, at its core, the story of a woman having a breakdown. In the pages preceding the “fig tree analogy”, Esther calls herself “dreadfully inadequate” and claims that “I was only purely happy until I was nine years old”.

    So, in the context of the novel, the metaphor can be read as a product of depressive thinking. It is not meant to be a universal truth.

    Instead, it represents the subjective thoughts of a narrator who feels herself a failure, despite her plentiful opportunities, because she is mentally ill. Turning Plath’s prose into a theory or philosophy or meme minimises its darker aspects, particularly as the popular TikTok audio that accompanies “fig tree analogy” videos often cuts off before the figs fall, due to the app’s preference for short content.

    Some users may well have participated in the “my fig tree” trend without even realising that the quotation ends with Esther losing everything.

    Perhaps it should be concerning so many young people relate to a narrator who becomes so overwhelmed by her conflicting ambitions that she attempts to kill herself. I certainly wonder how Plath would feel about her words now being treated as emblematic of a collective female experience. If nothing else, I am sure she would be disappointed at how little has changed in 60 years.


    This article features references to books that have been included for editorial reasons, and may contain links to bookshop.org. If you click on one of the links and go on to buy something from bookshop.org The Conversation UK may earn a commission.

    The Conversation

    Elisha Wise will receive funding from the White Rose College of Arts and Humanities (ARCH) from October 2025.

    ref. Sylvia Plath’s ‘fig tree analogy’ from The Bell Jar is being misappropriated – https://theconversation.com/sylvia-plaths-fig-tree-analogy-from-the-bell-jar-is-being-misappropriated-261597

  • MIL-OSI United Kingdom: New Forensic Science Regulator appointed for England and Wales

    Source: United Kingdom – Government Statements

    News story

    New Forensic Science Regulator appointed for England and Wales

    The regulator ensures that the highest standards in forensic science are met across the criminal justice system.

    Dr Marc Bailey has been appointed as the Forensic Science Regulator for England and Wales.

    Dr Bailey is a scientist who has significant regulatory experience. He has held multiple roles within the Medicines and Healthcare products Regulatory Agency (MHRA) and led international research in quality systems and standardisation, including whilst working at the National Physical Laboratory.

    The Forensic Science Regulator is responsible for ensuring that the provision of forensic science services across England and Wales meet the highest standards of quality and integrity. This includes assessing compliance, providing advice to ministers, setting quality standards and ensuring that all forensic science providers adhere to these standards.

    Dr Bailey will work closely with the police, forensic science providers and the legal profession to ensure that forensic science in England and Wales remains at the forefront of innovation and reliability.

    Dr Bailey will officially assume his duties after Gary Pugh’s term concludes on 25 July 2025.

    Crime and Policing Minister Dame Diana Johnson said:

    Dr Bailey is going to bring a wealth of experience and expertise as the new Forensic Science Regulator.

    This pivotal role is essential in ensuring the highest standards of forensic science are upheld.

    By setting rigorous standards and providing robust oversight, the Forensic Science Regulator will continue to ensure that forensic science supports the work of the police, allowing them to investigate crimes and bring justice for victims.

    I’d like to thank Gary Pugh for his previous work in this role.

    Dr Bailey said:

    I am delighted to be appointed to the post of Forensic Science Regulator.

    I look forward to enacting and developing the regulation of Forensic Science and working with the team that support my role to ensure that the criminal justice system has full confidence in forensic science evidence.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: Secretary-General’s remarks to the Security Council – on Multilateralism and Peaceful Settlement of Disputes [bilingual as delivered; scroll down for all-English and all-French versions]

    Source: United Nations secretary general

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation. 

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.  

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.

    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.
    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    [all-English]

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.    

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  
    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.
    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the  sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of states.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.

    The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its 80th anniversary next year.

    Mr. President,    

    As we mark the 80th anniversary of our organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.

    I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    Thank you.

    [all-French]

    Monsieur le Président, Excellences,

    Je tiens à remercier le Vice-Premier Ministre et Ministre des affaires étrangères Ishaq Dar et le Pakistan d’avoir organisé le débat public de ce jour.

    Le thème de ce débat met en lumière le lien évident qui existe entre la paix internationale et le multilatéralisme.

    Il y a 80 ans, l’Organisation des Nations Unies a été fondée dans le but premier de préserver l’humanité du fléau de la guerre.

    Les architectes de la Charte des Nations Unies ont considéré que le règlement pacifique des différends était la seule issue possible lorsque les tensions géopolitiques s’intensifiaient, lorsque des différends non résolus attisaient les conflits et lorsque les États perdaient confiance les uns dans les autres.

    La Charte renferme un certain nombre d’outils majeurs destinés à forger la paix.

    Son Article 2.3 est clair :

    « Les Membres de l’Organisation règlent leurs différends internationaux par des moyens pacifiques, de telle manière que la paix et la sécurité internationales ainsi que la justice ne soient pas mises en danger ».

    Son Chapitre VI est tout aussi clair en ce qui concerne les responsabilités confiées au Conseil de sécurité, qui doit contribuer à assurer le règlement pacifique des différends « par voie de négociation, d’enquête, de médiation, de conciliation, d’arbitrage, de règlement judiciaire, de recours aux organismes ou accords régionaux, ou par d’autres moyens pacifiques » du choix des parties.

    La mesure 16 du Pacte pour l’avenir appelle les États Membres à démontrer leur attachement à la diplomatie préventive et au règlement pacifique des différends en recourant davantage à tous les mécanismes existants en la matière.

    Je félicite le Pakistan d’avoir mis à profit sa présidence pour présenter une résolution exhortant tous les États Membres à utiliser pleinement les outils en question dans le cadre de notre quête collective de la paix dans le monde.

    Nous en avons besoin plus que jamais.

    Partout dans le monde, nous observons un mépris total pour le droit international – voire des violations pures et simples de ce droit, notamment du droit international des droits humains, du droit international des réfugiés, du droit international humanitaire et de la Charte des Nations Unies elle-même –, sans que la responsabilité de quiconque ne soit engagée.

    Ces manquements aux obligations internationales surviennent à un moment où les divisions et les conflits géopolitiques s’aggravent.

    Et le coût – en vies humaines, en communautés brisées et en avenirs perdus – est accablant.

    Il suffit de regarder l’horreur qui se déroule à Gaza, avec un niveau de mort et de destruction sans équivalent dans l’histoire récente.

    La malnutrition explose.  La famine frappe à toutes les portes. 

    Et maintenant, nous assistons à l’agonie d’un système humanitaire fondé sur des principes humanitaires.

    Ce système se voit refuser les conditions nécessaires à son fonctionnement.  On lui refuse l’espace nécessaire pour agir.  On lui refuse la sécurité nécessaire pour sauver des vies.

    Alors que les opérations militaires israéliennes s’intensifient et que de nouveaux ordres de déplacement sont émis à Deir al-Balah, la dévastation s’ajoute à la dévastation.

    Je suis consterné que des locaux de l’ONU aient été touchés, notamment ceux du Bureau des Nations Unies pour les services d’appui aux projets et de l’Organisation mondiale de la Santé, y compris son entrepôt principal.

    Ceci alors que toutes les parties ont été informées de l’emplacement de ces installations de l’ONU.

    Ces locaux sont inviolables et doivent être protégés par le droit international humanitaire, sans exception.

    De Gaza à l’Ukraine, du Sahel au Soudan, de Haïti au Myanmar, et dans bien d’autres régions du monde, les conflits font rage, le droit international est bafoué, et la faim et les déplacements atteignent des niveaux record.

    Et le terrorisme, l’extrémisme violent et la criminalité transnationale restent des fléaux tenaces qui rendent la sécurité encore plus inaccessible.

    La diplomatie ne permet pas toujours de prévenir les conflits, la violence et l’instabilité.

    Mais elle a toujours le pouvoir de les arrêter.

    Monsieur le Président,

    La paix est un choix.

    Et le monde attend du Conseil de sécurité de l’Organisation qu’il aide les pays à faire ce choix.

    Ce Conseil est au cœur de l’architecture mondiale pour la paix et la sécurité.

    Sa création reposait sur une vérité fondamentale.

    La rivalité entre les États est une réalité géopolitique.

    Mais la coopération – ancrée dans des intérêts partagés et le bien commun – représente la voie durable vers la paix.

    Nous observons trop fréquemment que les divisions, les positions tranchées et la surenchère verbale bloquent la mise en place de solutions et sape l’efficacité de ce Conseil.

    Mais nous avons également observé des exemples admirables de cas où il a été possible de trouver un terrain d’entente et des solutions aux problèmes mondiaux.

    Ainsi, nous marquons aujourd’hui le troisième anniversaire de la signature de l’Initiative de la mer Noire et du mémorandum d’accord avec la Fédération de Russie – des mesures qui montrent ce que nous pouvons accomplir grâce à la médiation et aux bons offices de l’ONU, y compris dans les moments les plus difficiles.

    Et plus récemment, nous avons été témoins de bien d’autres exemples.

    De la Conférence de Séville sur le financement du développement à la Conférence de Nice sur l’océan, en passant par l’Accord sur la diversité biologique marine des zones ne relevant pas de la juridiction nationale, la Convention sur la cybercriminalité et le Pacte pour l’avenir, adopté l’année dernière.

    Le Pacte, en particulier, témoigne d’une claire volonté du monde de s’engager de nouveau à renforcer le système de sécurité collective des Nations Unies.

    Inspiré du Nouvel Agenda pour la paix, il donne la priorité à la diplomatie préventive et à la médiation, autant de domaines dans lesquels le Conseil peut jouer un rôle essentiel.

    En ce qui concerne le thème du débat qui nous réunit aujourd’hui, il y a selon moi trois domaines dans lesquels nous pouvons nous montrer à la hauteur de l’appel, contenu dans le Pacte, à renouveler notre engagement – et la confiance du monde – envers l’architecture multilatérale dont nous disposons pour régler les problèmes.

    Premièrement, les membres de ce Conseil, en particulier les membres permanents, doivent continuer à s’efforcer de surmonter les dissensions.

    La majorité des situations inscrites à l’ordre du jour du Conseil de sécurité sont complexes et ne se prêtent pas à des solutions rapides.

    Mais même dans les jours les plus sombres de la guerre froide, le dialogue et la prise de décision collective au sein de ce Conseil ont permis de maintenir un système de la sécurité mondiale commun et efficace.

    Un système qui a déployé avec succès toute une série de missions de maintien de la paix.

    Un système qui a ouvert la voie à l’acheminement d’une aide humanitaire vitale aux personnes dans le besoin.

    Et un système qui a permis d’éviter une troisième guerre mondiale.

    Je vous exhorte à adopter le même état d’esprit en maintenant la communication, en continuant d’écouter de bonne foi, en vous employant à surmonter les divergences et à rechercher le consensus.

    Nous devons également veiller à ce que ce Conseil soit à l’image du monde d’aujourd’hui, et non de celui d’il y a 80 ans.

    Ce Conseil devrait être plus représentatif des réalités géopolitiques actuelles.

    Et nous devons continuer de perfectionner ses méthodes de travail afin de le rendre plus inclusif, plus transparent, plus efficace, et plus responsable.

    Je vous demande instamment de continuer d’œuvrer à la recherche du consensus pour faire avancer les négociations intergouvernementales.

    Deuxièmement, ce Conseil doit continuer de renforcer la coopération avec les partenaires régionaux et sous-régionaux.

    L’adoption historique de la résolution 2719 du Conseil de sécurité, visant à financer les opérations d’appui à la paix menées par l’Union africaine au moyen de contributions statutaires, est un bon exemple de la manière dont nous pouvons unir nos forces à celles des organisations régionales pour favoriser la mise en place de mesures plus efficaces.

    Je salue également les mesures prises par ce Conseil pour renforcer et rebâtir les cadres de sécurité régionaux afin d’encourager le dialogue et de favoriser le règlement pacifique des différends.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    MIL OSI United Nations News

  • MIL-OSI USA: Read More (Rep. Steube and Sen. Hawley Introduce Federal Tort for Pediatric Gender Clinics)

    Source: United States House of Representatives – Congressman Greg Steube (FL-17)

    July 22, 2025 | Press ReleasesWASHINGTON — U.S. Representative Greg Steube (R-Fla.) joined with Senator Josh Hawley (R-Ind.) today in introducing the Jamie Reed Protecting Our Kids from Child Abuse Act, legislation that establishes a federal tort for individuals harmed by gender-transition procedures as minors. This bill honors the Trump administration’s request for legislation providing a private right of action for damages caused by chemical and surgical mutilation on children.
    “Thousands of families have been defrauded by the Left’s gender ideology lie: that mutilation is somehow medicine,” said Rep. Steube. “Sex reassignment surgery and puberty blockers for minors are nothing more than child abuse in service to a depraved political agenda. Senator Hawley and I are committed to ensuring America’s children finally get justice for one of the worst crimes ever committed against our young people.”
    Representative Mary Miller (R-Ill.), Chair of the Congressional Family Caucus, is a cosponsor of the bill.
    “Irreversible gender-mutilation procedures have permanently harmed children across America under the false guise of health care,” said Rep. Mary Miller. “Every clinic, doctor, and institution involved in these abusive procedures must be held accountable. We will end the flow of taxpayer dollars to gender clinics, stop the medical exploitation of children, and give victims the legal power to seek justice.”
    The Jamie Reed Protecting Our Kids from Child Abuse Act is the House companion to legislation introduced by U.S. Senator Josh Hawley.
     “Our children should no longer suffer from irreversible and dangerous child mutilation procedures, which the Biden administration enabled and promoted,” said Senator Hawley. “I welcome President Trump’s strong action to reverse this child abuse and look forward to working with his administration to advance legislation that protects our kids.”
    Background: The bill establishes a private right of action against individuals and entities responsible for inflicting harm on minors via gender-transition procedures. It also bans federal funding to any hospital, university, gender clinic, or organization affiliated with a gender clinic that provides gender-transition procedures to minors. 
    Read the full bill text here.

    MIL OSI USA News

  • MIL-OSI Asia-Pac: Prisoner visits explained

    Source: Hong Kong Information Services

    The Correctional Services Department said that in accordance with the law, it declined a visitor who is not on the declared visitors list of a person in custody (PIC) for a visit this morning.

    According to the established mechanism, visitors must be declared on the PIC’s declared visitors list.

    The Prison (Amendment) Rules 2025 came into effect last Friday. The department has not invoked Rule 48 of the Prison Rules to prohibit any person from conducting visits, nor has it imposed restrictions or conditions on any visits.

    MIL OSI Asia Pacific News

  • MIL-OSI USA: General Guetlein to Lead the Office of Golden Dome for America

    Source: United States Department of Defense

    Golden Dome is President Donald J. Trump’s vision to build a layered defense of the homeland to provide for the common defense of the American people against ballistic, hypersonic, advanced cruise missiles and other next-generation aerial attacks from near-peer and rogue nations.  

    MIL OSI USA News

  • MIL-OSI USA: IAM Union: Stop the Privatization of the Tennessee Valley Authority (TVA)

    Source: US GOIAM Union

    The IAM Union is calling on all members, allies, and community supporters to mobilize now and push back against renewed efforts to privatize the Tennessee Valley Authority (TVA)—a public institution that for more than a century has provided reliable, affordable energy to millions and supported thousands of good union jobs for decades.

    This is no hypothetical threat. Citing sources, The Atlantic is reporting that some members of the Trump administration are advancing an agenda to sell off the TVA to the highest bidder. The TVA board – now with only three members instead of its usual nine – has been told by the Trump administration to fire its CEO or risk being replaced.

    So far, the board has declined to do so, noting it had no cause and that the TVA has followed the Trump administration’s instructions of “unleashing American energy and achieving American energy dominance.”

    Privatizing TVA would:

    1. Destroy good-paying IAM union jobs and harm working families
    2. Increase electricity rates for communities across the region
    3. Eliminate oversight and public accountability
    4. Open the door to more attacks on other public utilities nationwide

    “Privatizing TVA would be a disaster for our members and for working people across the South,” said IAM Union Southern Territory General Vice President Craig Martin. “It’s a direct attack on union jobs, on affordable power, and on the idea that public resources should serve the public—not billion-dollar corporations. We will not sit back while they try to sell out our future.”

    “TVA was built by working people, for working people,” said IAM Union International President Brian Bryant. “The IAM is ready to fight tooth and nail to make sure it stays that way.”

    HERE’S WHAT YOU CAN DO:

    Send an email message to your Senators and Representative, telling them to protect TVA and union jobs.

    Call your Senators and Representative at 202-224-3121: Tell them to oppose any attempt to privatize TVA or weaken public oversight.

    The IAM has stood strong for working people for generations—and we’re not backing down now. Help us protect what’s ours. Help us protect the future.

    The post IAM Union: Stop the Privatization of the Tennessee Valley Authority (TVA) appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: Finders/Seekers: Exemption Features

    Source: Securities and Exchange Commission

    Thank you to the Committee members for your continued service and to today’s speakers. In this morning’s follow-up discussion on Regulation A, please continue to provide your candid views about what changes could make Regulation A a more effective capital-raising tool. The discussion at the last meeting, as you thought through different aspects of Regulation A, already has helped to inform my thinking. I am looking forward to seeing your recommendations on the topic.

    Later this morning, the Committee will be thinking about a common marketplace question that frustrates founders and investors alike: “where is what I’m looking for?” A founder with a product is looking for an angel investor or venture capitalist with a compatible investment philosophy. Simultaneously, an investor with capital to allocate is looking for a company with a vision that resonates with her. Time spent looking for one another is a mutually incurred transaction cost that hampers the growth of individual businesses and the broader economy. One part of the Commission’s three-part mission is to ensure fair, orderly, and efficient markets. Ensuring efficient markets means creating a regulatory environment that facilitates, rather than impedes, the coming together of entrepreneurs and investors.

    Finders play a crucial role, particularly for small businesses, by connecting entrepreneurs and investors. Finders often are engaged just as much in social behavior as they are in economic behavior. As a result, well-intentioned friends, colleagues, and industry acquaintances may find themselves unwittingly acting as broker-dealers and therefore subject to an onerous regulatory framework ill-suited for the connections and introductions these individuals facilitate. Companies, on the other hand, also face uncertainty in knowing when they can engage a finder that is not registered as a broker-dealer to help locate investors. Despite these consequences, the Commission has failed to provide clarity in this area, which has forced finders and companies to rely on highly fact-specific no-action letters from Commission staff. This lack of clarity has persisted for so long it transcends committees; this Committee’s predecessor, the Advisory Committee on Small and Emerging Companies, lamented that, “[t]here is significant uncertainty in the marketplace about what activities require broker-dealer registration.”[1] And this Committee too has asked for years for the Commission to adopt a framework to permit finders to engage in limited capital raising activities involving accredited investors.[2]

    Finally, in October 2020 the Commission proposed an exemptive order which would have permitted natural persons to engage in certain limited activities on behalf of issuers without registering as brokers (the “2020 Proposal”).[3] A month later, this Committee provided helpful feedback.[4] Commenters caused me to question the proposed approach, which involved two tiers of finders. As one commenter explained with respect to proposed Tier 1 finders, “limiting them to one transaction annually and prohibiting them from having any contact with an investor makes the category virtually useless.”[5] Though the 2020 Proposal was never adopted, as you consider the staff’s overview of the 2020 Proposal and discuss issues surrounding finders more generally, please consider the following questions:

    1. Is the 2020 Proposal a good starting point for exemptive relief, or would a different approach be more effective? Have market practices changed since 2020 in a way that would warrant changes to the 2020 Proposal?
    2. Would the 2020 Proposal, or any action related to providing clarity for finders, benefit from a full rulemaking process, as some commenters suggested in 2020?[6]
    3. Is the Committee still supportive of a blanket exemption for finders for offerings under a certain size?[7]
    4. Should any exemption for finders cover activities related to secondary offerings?
    5. In 2020 commenters were divided on whether an exemption should be provided only to natural persons.[8] Does this committee favor one approach over the other?

    I look forward to hearing how today’s discussion builds on the previous work of the Committee.


    [2] See, Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Jay Clayton, Chairman, U.S. Sec, & Exch. Comm’n (May 28, 2020), https://www.sec.gov/spotlight/sbcfac/capital-formation-proposal-recommendation-2020-05-08.pdf; Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Jay Clayton, Chairman, U.S. Sec, & Exch. Comm’n (Nov. 13, 2020), https://www.sec.gov/spotlight/sbcfac/finders-recommendation.pdf; Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Gary Gensler, Chair, U.S. Sec, & Exch. Comm’n (Nov. 16, 2022), https://www.sec.gov/spotlight/sbcfac/entrepreneurial-ecosystems-recommendation-101322.pdf; Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Gary Gensler, Chair, U.S. Sec, & Exch. Comm’n (Feb. 28, 2023), https://www.sec.gov/files/committee-perspectives-letter-022823.pdf.

    [3] U.S. Securities and Exchange Commission, Notice of Proposed Exemptive Order Granting Conditional Exemption from the Broker Registration Requirements of Section 15(a) of the Securities Exchange Act of 1934 for Certain Activities of Finders, Exchange Act Release No. 34-90112, File No. S7-13-20 (Oct. 7, 2020), https://www.sec.gov/files/rules/exorders/2020/34-90112.pdf.

    [4] Letter from the Small Bus. Cap. Formation Advisory Comm., (Nov. 13, 2020), supra note 2.

    [6] Securities Industry and Financial Markets Association, Letter to Vanessa A. Countryman, Re: S7-13-20 (Nov. 12, 2020), at 6-7, https://www.sec.gov/comments/s7-13-20/s71320-8011715-225372.pdf; CompliGlobe Ltd., Letter to Vanessa A. Countryman, Re: S7-13-20 (Nov. 13, 2020), at 3, 6, https://www.sec.gov/comments/s7-13-20/s71320-8048443-225747.pdf.

    [7] Letter from the Small Bus. Cap. Formation Advisory Comm., (Nov. 13, 2020), supra note 2.

    [8] Compare, e.g., CrowdCheck, Inc., Letter to Vanessa A. Countryman, Re: S7-13-20 (Nov. 30, 2020), at 2, s71320-8065248-225954.pdf; with CompliGlobe Ltd., Letter, supra note 6, at 4.

    MIL OSI USA News

  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI

  • MIL-OSI: PureSky Energy Launches 100% LMI-Focused Clover Meadow Community Solar Project Under New York’s ESFA Program

    Source: GlobeNewswire (MIL-OSI)

    CLAVERACK, N.Y., July 22, 2025 (GLOBE NEWSWIRE) — PureSky Energy (“PureSky”) is proud to announce that its newest community solar farm, Clover Meadow Solar, located near Claverack, NY, is now fully operational and delivering clean, affordable energy exclusively to Low- to Moderate-Income (LMI) households. The 7.3 MWdc project is enrolled in New York State’s Expanded Solar for All (ESFA) program, which ensures that the benefits of renewable energy reach the communities that need them most.

    This milestone underscores PureSky’s deep commitment to energy equity, bringing the benefits of solar to income-qualified residents who often face the greatest barriers to accessing clean energy savings. Clover Meadow was developed by Eden Renewables (“Eden”), based in Troy NY, and is the seventh such project that PureSky and Eden have worked on together.

    Clover Meadow Solar Key Facts:

    • Location: Claverack, NY
    • Capacity: 7,269 kWDC
    • Solar Panels: 13,338 high-efficiency modules
    • Annual Generation: 10.3 million kWh
    • Equivalent Homes Powered: ~1,417 annually
    • Estimated Annual CO₂ Reduction: 14.9 million lbs
    • Estimated 30-Year Customer Savings: $3.4 million

    “Clover Meadow represents what community solar should be—a tool to make the clean energy transition equitable and inclusive,” said Nicholas Topping, Vice President of Community Solar at PureSky. “By enrolling the solar farm entirely under the ESFA program, we’re able to deliver immediate savings to thousands of income-eligible households while strengthening New York’s energy independence and supporting the state’s clean energy goals.”

    “Clover Meadow is another exciting milestone in our ongoing collaboration with PureSky Energy,” said Giovanni Maruca, Chief Development Officer at Eden Renewables. “At Eden, we’re committed to putting communities at the center of our projects That’s why we’re especially excited that this project will deliver clean, affordable energy to low-income households through the ESFA program.”

    This 100%-all LMI project exemplifies the growing capability of community solar to lower energy costs for households, particularly in rural and underserved areas. Households enrolled in the program will see guaranteed savings on their electricity bills—without needing to install rooftop panels or pay any upfront costs.

    Beyond household savings, the Clover Meadow Solar project brings broader benefits to the Claverack community by generating new local tax revenue and supporting clean energy jobs. The solar farm is designed to be pollinator-friendly, helping to tackle the global climate crisis, and includes Eden’s industry-leading education program as a community benefit. Projects like this help build more resilient, distributed energy systems while investing directly in local economies.

    About Expanded Solar for All (ESFA)
    New York’s ESFA program is designed to ensure that LMI households across the state can participate in and benefit from the growth of renewable energy. By connecting utility customers directly to solar projects like Clover Meadow, ESFA delivers monthly bill credits and long-term economic relief to income-qualified participants.

    PureSky Energy remains committed to developing and operating inclusive solar projects throughout New York. The company has additional anchor capacity available for future community solar projects and invites municipalities, housing authorities, and local organizations to explore partnership opportunities.

    For more information about the Clover Meadow project or PureSky Energy’s community solar offerings, please visit www.pureskyenergy.com or contact customercare@pureskyenergy.com.

    About PureSky Energy:
    PureSky Energy is a leading developer, owner, and operator of US community solar, C&I and storage projects with headquarters in Denver, Colorado. Since entering the US market in 2016, the company has rapidly expanded its scale and currently operates a portfolio with generation capacity of approximately 233MW across forty-four sites or under-construction projects expected to be completed in the short term. The company has a large pipeline of solar and battery storage projects across existing and new US markets, placing the platform in a primary position within the distributed generation market. The company’s mission is to make clean energy accessible and affordable to local communities across the United States, while shaping a brighter, more sustainable future for generations to come.

    Website: www.pureskyenergy.com

    Host A Solar Farm: https://www.pureskyenergy.com/community-host

    LinkedIn: https://www.linkedin.com/company/puresky-energy

    Media inquiries: Janet Janzen: marketing@pureskyenergy.com

    About Eden Renewables:

    Eden Renewables is an international developer of solar and energy storage projects in the US, UK, and sub-Saharan Africa. 

    Eden’s US office is based in Troy, NY, and currently has 21 pollinator-friendly community solar projects approved in the Capital Region and neighboring counties. All of Eden’s solar projects promote biodiversity and agricultural usage with excellent community and educational benefits. Subscribers to its community solar farms can benefit from savings of around 10% on their electricity bills.

    Website: https://edenrenewables.com/

    Media inquiries: sophy.fearnley-whittingstall@edenrenewables.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/ed3553da-f15c-4be8-a6a2-9f498be260fa

    The MIL Network

  • MIL-OSI: Buckeye Energy Holdings Spins Out Its Ownership Interest in Swift Current Energy to Funds Managed by IFM Investors

    Source: GlobeNewswire (MIL-OSI)

    HOUSTON, July 22, 2025 (GLOBE NEWSWIRE) — Buckeye Energy Holdings LLC (“Buckeye”), a premier energy infrastructure and logistics provider wholly owned by funds managed by IFM Investors (“IFM”), of which Buckeye Partners, L.P. is a wholly owned subsidiary, has completed the in-specie distribution of its majority ownership stake in Swift Current Energy, a leading renewable energy platform, to IFM. Swift Current Energy will operate as a standalone company going forward.

    Todd Russo, Chief Executive Officer of Buckeye, said “The distribution of Swift Current Energy to IFM will strengthen Buckeye’s ability to focus on leveraging our network of critical energy infrastructure to deliver targeted solutions that address the evolving energy needs of our customers. Looking ahead, we intend to continue driving new commercial opportunities to catalyze growth in our core business.”

    David Sparrow, Executive Director, Infrastructure at IFM Investors, said “This strategic distribution is an important milestone in the successful incubation of Swift Current Energy, leveraging the development, construction and operational expertise of the Buckeye platform to grow Swift Current Energy into a leading standalone renewable energy company held directly within the IFM portfolio. Looking ahead, Buckeye is ideally positioned with an attractive pipeline of proprietary growth opportunities, backing to pursue strategic synergies, and targeted solutions to enable less carbon-intensive offerings to its customer base.”

    About Buckeye Energy Holdings

    Buckeye is a premier infrastructure and logistics provider for the world’s energy needs, both today and tomorrow.

    Buckeye, a wholly-owned investment of IFM, owns and operates a diversified global network of integrated assets providing midstream infrastructure and logistics solutions. Across every aspect of the business – including its over 5,000 miles of domestic pipeline, more than 130 liquid petroleum products terminals and approximately 125 million barrels of tank capacity – Buckeye is committed to safely and responsibly providing world-class service to meet the continually evolving energy needs of its customers and the communities it serves. As part of this commitment to its customers, Buckeye is focused on providing for its customers’ increasingly diverse energy needs by continuing to diversify its platform and offerings to enable less carbon intensive energy solutions and undertaking decarbonization efforts on its operations. For more information, please visit buckeye.com.

    Media Contact
    buckeye@fticonsulting.com

    The MIL Network

  • MIL-OSI Africa: Food lifeline fading for millions in South Sudan hit by conflict and climate shocks

    Source: APO

    South Sudan’s dramatic hunger crisis is worsening and millions of people there could miss out on food aid because of the worsening global humanitarian funding crisis, the UN World Food Programme (WFP) said on Tuesday.

    Earlier this month, the UN agency began airdropping emergency food assistance in Upper Nile State after surging conflict forced families from their homes and pushed communities to the brink of famine.

    Nationwide, the picture is just as alarming, with half the country’s population – more than 7.7 million people – officially classified as food insecure by UN partner the IPC platform. This includes more than 83,000 face “catastrophic” levels of food insecurity.

    “The scale of suffering here does not make headlines but millions of mothers, fathers, and children are spending each day fighting hunger to survive,” said WFP Deputy Executive Director Carl Skau, following a visit to South Sudan last week. 

    The worst-hit areas include Upper Nile State, where fighting has displaced thousands and relief access is restricted. Two counties are at risk of tipping into famine: Nasir and Ulang.

    South Sudan, the world’s youngest country, gained independence in 2011. This gave way to a brutal and devastating civil war which ended in 2018 thanks to a peace agreement between political rivals which has largely held.

    However, recent political tensions and increased violent attacks – especially in the Upper Nile State – threaten to unravel the peace agreement and return the nation to conflict.

    The humanitarian emergency crisis has been exacerbated by the war in neighbouring Sudan. 

    Since April 2023, nearly 1.2 million people have crossed the border into South Sudan, many of them hungry, traumatised, and without support. WFP says that 2.3 million children across the country are now at risk of malnutrition.

    Crucial, yet fragile gains

    Despite these challenges, the UN agency has delivered emergency food aid to more than two million people this year. In Uror County, Jonglei State, where access has been consistent, all known pockets of catastrophic hunger have been eliminated. Additionally, 10 counties where conflict has eased have seen improved harvests and better food security, as people were able to return to their land.

    To reach those in the hardest-hit and most remote areas, WFP has carried out airdrops delivering 430 metric tons of food to 40,000 people in Greater Upper Nile. River convoys have resumed as the most efficient way to transport aid in a country with limited infrastructure. These included a 16 July shipment of 1,380 metric tons of food and relief supplies. WFP’s humanitarian air service also continues flights to seven Upper Nile destinations.

    At the same time, a cholera outbreak in Upper Nile has placed additional pressure on the humanitarian response. Since March, WFP’s logistics cluster has airlifted 109 metric tons of cholera-related supplies to affected areas in Upper Nile and Unity states.

    However, the UN agency says it can currently support only 2.5 million people – and often with just half-rations. Without an urgent injection of $274 million, deeper cuts to aid will begin as soon as September.

    “WFP has the tools and capacity to deliver,” said Mr. Skau. “But without funding – and without peace – our hands are tied.” 

    Distributed by APO Group on behalf of UN News.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: The International Islamic Trade Finance Corporation (ITFC) Reports Strong Results and Sustainability Progress in 2024 Annual Development Effectiveness Report

    Source: APO

    The International Islamic Trade Finance Corporation (ITFC) (www.ITFC-IDB.org), a member of the Islamic Development Bank (IsDB) Group, announced the release of its 2024 Annual Development Effectiveness Report (ADER).

    The ADER serves as an essential reporting and transparency tool, enabling ITFC to measure, communicate, and continually refine its strategies and interventions for achieving sustainable development outcomes. The 2024 report highlights ITFC’s expanding role as a driver of sustainable trade, economic resilience, and inclusive growth across its member countries.

    “The ADER showcases ITFC’s ability to provide innovative, impactful solutions that address the complex needs of our member countries,” said Eng. Adeeb Y. Al Aama, Chief Executive Officer of ITFC. “While we celebrate key milestones, we are also assessing our interventions to ensure we continue advancing toward a more inclusive, resilient, and sustainable future.”

    Key Highlights of 2024 ADER

    In 2024, ITFC delivered tangible results, demonstrating its focus on resilience and economic inclusion. The key highlights include:

    • Filling Trade Finance Gaps. ITFC allocated US$2.66 billion, 38% of its total portfolio, to LDMCs, supporting inclusive growth. Additionally, US$268 million directly benefited over 380,000 smallholder farmers, enabling the procurement of 840,000 metric tons of local agricultural products.
    • Securing Critical Supply Chains. Disbursements to the energy sector amounted to US$4 billion, bringing reliable electricity to approximately 13.8 million households. Food security interventions provided over 5.6 million metric tons of essential commodities worth US$1.45 billion, benefiting more than 30 million households.
    • Strengthening Private Sector Participation. ITFC financed 312 small and medium enterprises (SMEs) and corporates through partnerships with 23 financial institutions, promoting financial inclusion and economic diversification.
    • Fostering Regional Integration. Intra-OIC trade financing reached US$4.8 billion. Through strategic programs such as the Arab Africa Trade Bridges (AATB) and the Aid for Trade Initiative for Arab States (AfTIAS), ITFC strengthened regional value chains and institutional capacities.
    • Investing in Capacity Development. Technical assistance and training initiatives reached over 3,100 individuals, a 32% increase from the previous year, with nearly 40% women participants.

    Embedding Sustainability into Core Operations

    The Corporation adopted its first Environmental and Social (E&S) Policy and launched a Ten-Year E&S Action Plan. A new governance structure was also introduced to guide implementation, laying the foundation for more responsible trade finance operations.

    Empowering Growth through the SDGs

    ITFC made significant strides in advancing multiple Sustainable Development Goals through its trade finance and development initiatives. Its efforts have helped reduce poverty (SDG 1), strengthen food security (SDG 2), and expand access to clean and affordable energy (SDG 7). By supporting smallholder farmers, empowering local economies, and promoting intra-OIC trade, ITFC has also played a key role in fostering strong global partnerships to accelerate sustainable development across member countries (SDG 17).

    The 2024 ADER affirms ITFC’s deepening commitment to transparency, sustainability, and measurable impact. As the Corporation looks ahead, it remains focused on bold innovation, collaborative partnerships, and leveraging Islamic finance to build a more inclusive and sustainable global trade ecosystem.

    Access the full English version here – https://ADER.ITFC-IDB.org

    Distributed by APO Group on behalf of International Islamic Trade Finance Corporation (ITFC).

    Contact us:
    Tel: +966 12 646 8337  
    Fax: +966 12 637 1064   
    E-mail: ITFC@itfc-idb.org      

    Social media:
    Twitter: http://apo-opa.co/3GYB6PJ  
    Facebook: http://apo-opa.co/4f7UruK  
    LinkedIn: International Islamic Trade Finance Corporation (ITFC) (http://apo-opa.co/44Go3M4)  

    About the International Trade Finance Corporation (ITFC):
    The International Islamic Trade Finance Corporation (ITFC) is the trade finance arm of the Islamic Development Bank (IsDB) Group. It was established with the primary objective of advancing trade among OIC member countries, which would ultimately contribute to the overarching goal of improving the socio-economic conditions of the people across the world. Commencing operations in January 2008, ITFC has provided more than US$83 billion of financing to OIC member countries, making it the leading provider of trade solutions for these member countries’ needs. With a mission to become a catalyst for trade development for OIC member countries and beyond, the Corporation helps entities in member countries gain better access to trade finance and provides them with the necessary trade-related capacity-building tools, which would enable them to successfully compete in the global market.  

    Media files

    .

    MIL OSI Africa

  • India’s global outreach continues: PM Modi to visit UK, Maldives

    Source: Government of India

    Source: Government of India (4)

    Prime Minister Narendra Modi will embark on a two-nation tour on Wednesday, visiting the United Kingdom and the Maldives from July 23 to 26, aiming to strengthen India’s global diplomatic engagements.

    At the invitation of UK Prime Minister Keir Starmer, Prime Minister Modi will undertake an official visit to the United Kingdom from July 23 to 24. This will be his fourth visit to the UK, reflecting the growing warmth and depth of the bilateral relationship.

    India and the United Kingdom share historical ties that have evolved into a robust and mutually beneficial partnership. A major milestone in the relationship was achieved during the India-UK virtual summit on 4 May 2021, when Prime Minister Modi and then UK Prime Minister Boris Johnson established a Comprehensive Strategic Partnership and adopted an ambitious India-UK Roadmap 2030. This roadmap continues to steer cooperation across various sectors including trade, security, education, technology, and climate change.

    The visit also comes in the wake of the recent general elections in the UK held on 4 July 2024, where the Labour Party returned to power after 14 years, winning 412 out of 650 seats. Keir Starmer assumed office as Prime Minister, and PM Modi extended his congratulations during a telephonic conversation on 6 July, also inviting him for an early visit to India.

    In its election manifesto, the Labour Party pledged to pursue a new strategic partnership with India, focusing on the conclusion of a Free Trade Agreement (FTA) and deepening cooperation in critical sectors. The two leaders had earlier met on the sidelines of the G20 Leaders’ Summit in Brazil in November 2024 and briefly interacted again during the G7 Summit in Canada in June 2025.

    Following the terrorist attack in Pahalgam in April 2025, Prime Minister Starmer had spoken to PM Modi to convey his condolences and support. On 6 May 2025, both leaders held a telephonic conversation and announced the successful conclusion of the India-UK FTA and the Double Taxation Avoidance Convention, marking a historic development in bilateral ties.

    High-level exchanges have been a consistent feature of India-UK relations. President Droupadi Murmu visited London in September 2022 to attend the State Funeral of Her Majesty Queen Elizabeth II and met King Charles III during her visit. Vice President Jagdeep Dhankhar represented India at the Coronation of King Charles III in May 2023 and engaged with global leaders during his visit. He also addressed members of the Indian community and interacted with Indian-origin UK MPs and students.

    Prime Minister Modi had earlier met former UK Prime Minister Rishi Sunak on multiple occasions, including during the G20 Summit in India in September 2023 and at the G7 Summit in Italy in June 2024. Their discussions covered progress on the India-UK FTA and other key areas under the Roadmap 2030. Sunak’s official visit to India in 2023 and bilateral engagements in Japan and Bali further contributed to the growing momentum in the relationship. Notably, the Young Professionals Scheme was launched following their meeting in Bali in 2022, enhancing mobility for youth between the two countries.

    In April 2022, then UK Prime Minister Boris Johnson visited India and held wide-ranging discussions with PM Modi. The visit saw the announcement of an ‘Open General Export Licence’ for Indian companies and the signing of MoUs in nuclear energy and global innovation, along with a joint statement on cyber cooperation.

    Earlier, in November 2021, Prime Minister Modi had visited the UK to attend the COP26 World Leaders’ Summit in Glasgow, where he and Prime Minister Boris Johnson jointly launched the One Sun, One World, One Grid (OSOWOG) initiative under the International Solar Alliance and the Infrastructure for Resilient Island States (IRIS) initiative under the Coalition for Disaster Resilient Infrastructure.

    Lok Sabha Speaker Om Birla visited the UK in January 2025 and held bilateral talks with the Speaker of the House of Commons, Lindsay Hoyle, underscoring the strong parliamentary ties between the two democracies.

  • MIL-OSI United Kingdom: Strategic Escort Group officers complete fire safety refresher

    Source: United Kingdom – Government Statements

    News story

    Strategic Escort Group officers complete fire safety refresher

    Strategic Escort Group completed fire safety refresher training, reinforcing vital emergency skills for secure nuclear transport in high-risk environments.

    Officers from the Civil Nuclear Constabulary’s (CNC) Strategic Escort Group (SEG) have successfully completed a rigorous fire safety refresher course as part of their ongoing professional standards and safety preparedness programme.

    SEG is a specialist unit responsible for the armed escort and secure transport of nuclear assets by road, rail, and sea. Operating in complex environments, SEG officers are trained to the highest standards in tactical firearms, maritime operations, and emergency response.

    As part of their ongoing certification, SEG officers undertook refresher training in accordance with the Standards of Training, Certification and Watchkeeping (STCW) framework – a globally recognised benchmark for maritime safety and emergency response.

    The training covered proficiency in fire prevention and firefighting, and updated proficiency in personal survival techniques.

    While these courses are refresher versions of their initial qualifications, they are designed to rigorously assess and reinforce critical safety skills in high-pressure scenarios.

    The final assessment featured a real-fire simulation, in which officers tackled an intense blaze aboard a mock vessel while wearing full breathing apparatus. Though the ship environment was a controlled training setup, the fire, heat, and physical demands were entirely real, replicating the kind of challenges SEG officers may face during maritime deployments.

    This training underscores the SEG’s commitment to operational readiness and ensures that officers remain equipped to respond swiftly and effectively in life-threatening environments.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI Russia: There are no advantages – 40% of Russians do not see the advantages of the digital ruble

    Translation. Region: Russian Federal

    Source: Mainfin Bank –

    An important disclaimer is at the bottom of this article.

    What pros and cons do Russians see in the new digital currency?

    The citizens surveyed believe that the new currency, which is to be launched in the foreseeable future, has its advantages. 10% of respondents named security, reliability, protection from fraudsters as advantages, another 3% each – ease of payments and the possibility of state control. There were significantly more disadvantages:

    12% of Russians noted a low level of personal data protection; excessive control by the state – 8%; linking of electronic wallets to the Internet – 6%; difficulty of use – 4% of citizens.

    Only 6% of survey participants did not see any disadvantages to the new form of payment – the same result was recorded a year earlier. The majority of citizens are wary of digital assets, and consider state control over the personal finances of the population to be excessive.

    How do citizens rate their readiness to use digital rubles?

    Russians also assessed their own awareness of the electronic ruble – 7% of citizens know well how the new currency works, 45% have a general idea, 43% have only heard the term. At the same time, few Russians want to personally use digital rubles:

    24% would definitely not like to use a new form of payment; 27% said that they are rather not ready for experiments; another 14% of respondents found it difficult to answer; 26% of Russians are generally not against using the digital ruble; only 9% of people definitely want to try electronic currency.

    According to the survey results, only 35% of respondents agree to use digital rubles. It is interesting that over the past two years, this figure has increased – previously, only 30% of Russians expressed such readiness.

    Why are Russians wary of the digital ruble?

    Experts assured that the skepticism of the population is the result of low awareness of digital assets: people are afraid of everything unknown, especially in the area of personal finance. The possibility of total state control also raises concerns, although the authorities promise that the level of supervision will be the same as in the banking system.

    “It is necessary to conduct explanatory work and build up the information campaign as the digital ruble is prepared for a large-scale launch,” the Central Bank of the Russian Federation stated.

    Let us recall that the project was supposed to start on July 1, but the regulator was forced to postpone the deadline due to the banks’ unpreparedness to work with the platform. Now the Central Bank of the Russian Federation proposes to introduce the digital ruble no later than September 1, 2026. There is still more than a year left until the new deadline, but experts doubt that even then the new form of payment will be available to every citizen – commercial banks are actively opposing the project’s implementation due to the risk of a significant reduction in commission income.

    12:00 07/22/2025

    Source:

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI USA: Next Phase of Star Tax Relief Rolls Out

    Source: US State of New York

    overnor Kathy Hochul today announced the start of phase two of the School Tax Relief (STAR) program benefit season. Eligible homeowners in communities with school tax due dates in August or September will start receiving their STAR benefit in the coming weeks. Most homeowners eligible for a STAR credit will receive a check between $350 and $600. Most seniors eligible for an Enhanced STAR credit will receive a check between $700 and $1,500. STAR recipients can visit ny.gov/STAR to track their check delivery or enroll in direct deposit.

    “The STAR program provides needed school tax relief to millions of New York homeowners — and the program is now in full swing,” Governor Hochul said. “During a time of financial uncertainty due to funding cuts by Republicans in Washington, my administration is putting money back in the pockets of families with check and credit deliveries continuing to go out to hundreds of thousands of homeowners statewide.”

    New York State Department of Taxation and Finance Acting Commissioner Amanda Hiller said, “Visit our STAR resource page to sign up for STAR if you are a new homeowner and, if you’re an existing homeowner, to check on when your STAR credit or direct deposit will arrive.”

    Senate Majority Leader Andrea Stewart-Cousins said, “At a time when Republicans in Washington are slashing funding and leaving working families with uncertainty, the STAR program remains a lifeline for millions of homeowners, helping ease the burden of rising property taxes and helping working families stay afloat. With phase two of STAR benefits now underway, checks and credits of up to $1,500 are reaching hundreds of thousands of households. The Senate Democratic Majority worked closely with Governor Hochul and our colleagues in the Assembly to ensure that, in addition to STAR, we also delivered Inflation Rebate Checks, expanded child care assistance, and boosted child tax credits. These initiatives reflect our dedication to putting more money back in the pockets of hardworking New Yorkers.”

    Assembly Speaker Carl Heastie said, “While the administration in Washington is creating financial uncertainty for families across the country, here in New York, we’re working to put money back in the pockets of New York families. Because of the STAR program, more than three million homeowners across the state will receive $2.2 billion in tax relief, easing the financial burden on families and putting money back into our communities.”

    Phase one saw STAR credits and checks delivered to parts of the state with school tax due dates in June and July – including New York City, Yonkers, Buffalo, Rochester, and Syracuse. STAR deliveries to these regions were completed last week.

    The STAR program provides property tax relief to eligible New York State homeowners. During STAR benefit season, which runs from June to November, nearly three million homeowners will receive more than $2.2 billion in property tax relief through the program.

    Homeowners who are eligible and enrolled in the STAR program receive their benefit each year in one of two ways: as an exemption that reduces their school tax bill, or as a credit issued as a check or direct deposit.

    Those who receive the STAR credit as a check or direct deposit can visit the STAR Credit Delivery Schedule to learn when credits will be issued in their area. Property owners who are looking for details about STAR credits that have already been issued should visit the Property Tax Credit Lookup.

    Enroll in STAR Direct Deposit

    Homeowners can enroll in the STAR Credit Direct Deposit program through the Homeowner Benefit Portal within the Tax Department’s secure Online Services system. Homeowners can also use the Homeowner Benefit Portal to manage their STAR benefits easily and efficiently.

    The direct deposit option enables eligible STAR credit recipients to get their STAR credits without having to wait for and cash a check. To ensure they receive their STAR credit by direct deposit this year, homeowners should enroll as soon as possible. Homeowners who enroll fewer than 15 days before their STAR credit is issued will receive a check this year and direct deposit will begin next year. To find out when STAR credits will be issued in your area, use the STAR Credit Delivery Schedule lookup.

    Regional breakdown of this year’s $2.2 billion in STAR tax relief for nearly three million New Yorkers:

    REGION STAR TAX RELIEF RECIPIENTS
    Capital District $144.5 million 242,000
    Central New York $131.1 million 176,000
    Finger Lakes $205.2 million 279,000
    Long Island $698.4 million 582,000
    Mid-Hudson $488.5 million 404,000
    Mohawk Valley $66.3 million 101,000
    New York City $158.6 million 483,000
    North Country $47.2 million 88,000
    Southern Tier $109.6 million 156,000
    Western New York $178.5 million 320,000
    TOTAL $2.2 BILLION 2.83 MILLION

    State Senator Leroy Comrie said, “This next phase of the STAR program is welcome news for homeowners across Southeast Queens. Putting money back in people’s pockets helps ease the burden of rising costs and lets families stay rooted in the communities they’ve built their lives in. I thank Governor Hochul for keeping this commitment to New Yorkers.”

    State Senator Roxanne J. Persaud said, “This vital tax relief means eligible homeowners, especially seniors, can expect to receive their STAR or Enhanced STAR payments in the coming weeks. Nearly three million New Yorkers will receive over $2.2 billion this season, which is real support that eases financial strain and puts money back into our communities.”

    State Senator Luis R. Sepúlveda said, “I am pleased by Governor Kathy Hochul’s announcement of the next phase of the STAR tax relief program, which will directly benefit nearly three million New Yorkers. This program is putting money directly into the pockets of the working families and seniors who need it most. In communities like ours, in the Bronx, where the rising cost of living continues to affect so many people, this assistance means much more than just a check — it is essential financial relief that can make the difference between stability and hardship.”

    State Senator Shelley B. Mayer said, “I am pleased that millions of New Yorkers, including over 400,000 residents in the Hudson Valley, receive tax relief this summer and fall through the New York School Tax Relief (STAR) program. Many families in Westchester struggle with the high cost of living, and the STAR program will offer much-needed assistance. I encourage those eligible for STAR to enroll in direct deposit to simplify the process of receiving your STAR checks. I would also like to thank Governor Kathy Hochul for her commitment towards a hassle-free program that helps alleviate the burden of property taxes.”

    State Senator Rachel May said, “The STAR program helps make homeownership more affordable for seniors and families across New York. In Central New York, this kind of targeted tax relief makes a real difference. I’m grateful to Governor Hochul for continuing to support a program that helps so many of our neighbors stay in their homes.”

    State Senator Robert Jackson said, “In a state where working families shoulder some of the highest property taxes in the nation, this next phase of STAR is more than a benefit—it’s real relief. This is government at its best: directly returning hard-earned dollars to those who sustain our communities. From the Bronx to Buffalo, from seniors relying on fixed incomes to young families striving for stability, these checks aren’t just policy—they embody the principle that public dollars must serve the public good. I commend Governor Hochul and the Legislature for coming together and demonstrating precisely what good governance looks like—putting meaningful resources directly into the hands of the people we represent.”

    State Senator Jeremy Cooney said, “The STAR program is one of many ways we are tackling affordability in New York and making our state a place where everyone is able to live and thrive. With billions in relief being sent out, including over $205 million for the Finger Lakes region, I want to thank Governor Hochul for putting money back in the pockets of New Yorkers and for her commitment to increasing the quality of life across our state.”

    State Senator Michelle Hinchey said, “Over $630 million in property tax relief is headed straight to homeowners in the Mid-Hudson Valley and Capital Region, and I’m proud to have fought for it. For seniors on fixed incomes and working families trying to keep up, putting money back into people’s pockets through the STAR program is critical to making life more affordable. We’ll keep pushing to deliver the tax relief New Yorkers deserve through this program and beyond.”

    State Senator Lea Webb said, “The STAR program continues to be a vital lifeline for hardworking families and seniors across the Southern Tier, and I’m proud to see the second phase of disbursements reaching residents in my district. This additional round of tax relief helps ease the financial burden for millions of New Yorkers. It means more breathing room in family budgets and peace of mind for seniors. Whether it’s paying for essentials, catching up on bills, or planning for the future, this support strengthens our communities and helps people remain in the homes they’ve worked so hard to maintain.”

    State Senator April N.M. Baskin said, “Thanks to Governor Hochul, a substantial number of New York residents, including 320,000 in Western New York, will have more money in their pockets over the next few months because of the STAR tax relief program. In these uncertain economic times, this program is particularly helpful to working families and older residents who benefit from such meaningful financial relief.”

    State Senator Christopher Ryan said, “This is real, meaningful tax relief for Central New York homeowners. More than 176,000 families in our region will see a total of $131 million coming back to them through the STAR program. Whether you’re a senior on a fixed income or a working family trying to stay ahead, this puts money back in your pocket when it’s needed most. I’ll keep fighting to make sure programs like this continue to deliver for our communities.”

    Assemblymember Charles D. Lavine said, “This is welcome news for tens of thousands of hard-working families and seniors right here in Nassau County. Thanks to Governor Hochul’s continued commitment to this program and the economic needs of residents, real money will soon be back in their pockets which they can use however they would like.”

    Assemblymember Harry B. Bronson said, “Making New York more affordable for our seniors and middle-class families is one of my highest priorities. Phase 2 of the STAR Tax Relief Program, funded through the New York State budget, will deliver relief to thousands of residents in Monroe County and the City of Rochester, putting much-needed money back in people’s pockets as we head into the cooler days of fall. I am proud to have worked alongside my State Legislative colleagues and Governor Hochul to continue this critical tax cut.”

    Assemblymember Steve Otis said, “This announcement shares the next phase of STAR tax relief payments funded in this year’s budget by Governor Hochul, the Assembly and Senate. The focus of our adopted state budget was to address affordability issues for New York families through a range of state programs. I continue to focus on delivering state dollars directly to Westchester families and through state assistance to local governments and school districts to help lower the burden of property taxes. Established decades ago, Basic STAR and Enhanced STAR help reduce the burden of school property taxes across the state.”

    Assemblymember Rodneyse Bichotte Hermelyn said, “Governor Hochul’s rollout of Phase 2 of the STAR Tax Relief Program, represents a critical investment in the well-being of New York homeowners – particularly our seniors living on fixed incomes and hardworking families striving every day to make ends meet. At a time when the cost of living continues to rise, this property tax relief helps ensure residents can remain in their homes and maintain long-term financial stability. The STAR program does more than deliver a check—it delivers tranquility and strengthens the very foundation of our neighborhoods. I applaud Governor Hochul for prioritizing this vital support and for ensuring that these benefits are delivered efficiently and equitably to millions of New Yorkers.”

    Assemblymember Al Taylor said, “At a time when working families and seniors are feeling the weight of inflation, the STAR tax relief program is delivering real, tangible help. Phase 2 will bring hundreds of dollars in direct relief to millions of New Yorkers, including nearly half a million right here in New York City. I commend Governor Hochul for advancing this vital program and ensuring that homeowners, especially our seniors on fixed incomes, get the support they deserve. This is what government should do: make life more affordable and help people stay in their homes.”

    Assemblymember Clyde Vanel said, “Queens families continue to face rising costs. This next round of STAR tax relief comes at a critical time for all of them. I applaud Governor Hochul’s commitment to easing the burden on homeowners across New York State. Nearly three million New Yorkers, including thousands right here in Queens, will feel real financial relief this summer and fall.”

    Assemblymember Harvey Epstein said, “As the cost of living continues to increase in our state, it is important to put money back in the pockets of New Yorkers. The STAR tax credit will offer property tax relief to many homeowners who need it.”

    Assemblymember Jenifer Rajkumar said, “Governor Hochul is delivering real, meaningful relief to millions of New Yorkers. At a time when families are feeling the pinch, the Governor’s leadership is putting money back in people’s pockets, making life more affordable, and opening up opportunities for working families. By easing the burden of school property taxes, she is helping New Yorkers build a stronger future — with more financial security and more resources to invest in their families and communities. This is what people-first government looks like.”

    Assemblymember Jessica González-Rojas said, “As the second phase of the STAR Tax Credit rebate check distribution commences, I commend Governor Hochul, Speaker Heastie and my colleagues for ensuring New York homeowners get the support, especially in the midst of economic turmoil. The STAR rebate check disbursement is an opportunity to support homeowners throughout New York State. A $350 check can make a big difference for many families today. Thank you to all who helped make this happen so we can provide more relief to all New Yorkers.”

    Assemblymember Yudelka Tapia said, “Putting money back in the pockets of New Yorkers is one of the most important things we can do to help families put food on the table and keep our state affordable. Here in New York City, nearly half a million homeowners are receiving over $158 million in property tax relief. I applaud Governor Hochul for moving this effort forward and delivering for working families across every corner of our state.”

    Assemblymember Dana Levenberg said, “My constituents are extremely concerned about affordability, especially in light of the devastating cuts to the federal assistance programs on which many households rely to make ends meet. I am proud that in New York, we are looking out for your bottom line providing STAR program tax relief totaling $2.2 billion across the state, with payments coming via direct deposit, credit on your school tax bill, or a check in your mailbox in the coming weeks.”

    Assemblymember Gabriella A. Romero said, “I’m proud to see the successful implementation of phase two of the School Tax Relief (STAR) program across New York State begin this month. This important investment focuses on those most affected by rising school taxes, providing real, lasting relief. I’m honored to stand with Governor Hochul and my colleagues in the State Legislature for securing its place in this year’s budget.”

    Assemblymember MaryJane Shimsky said, “Some recipients have already received the STAR benefit in the form of a tax exemption this year, but many others will receive it by check in the coming weeks and months. With major funding cuts coming from Washington, this benefit will be even more crucial as our households struggle harder to make ends meet. I urge our homeowners to check their eligibility for both Basic STAR and Enhanced STAR, and to consult the delivery schedule for their area.”

    MIL OSI USA News

  • MIL-OSI USA: Wyoming Air National Guard Color Guard honors new citizens at naturalization ceremony

    Source: US State of Wyoming

    Wyoming National Guard

    By Joseph Coslett

    CHEYENNE, Wyo. — The Wyoming Air National Guard Color Guard played a central role in a naturalization ceremony held on July 16, 2025, at the U.S. District Court in Cheyenne, Wyoming, presenting the colors as dozens of new citizens took the Oath of Allegiance.

    Presided over by Chief U.S. District Judge Kelly Rankin and U.S. Judge Alan Johnson, the ceremony marked the final step in the naturalization process for applicants from around the world.

    The participation of the Wyoming Air National Guard underscored the Guard’s commitment to community engagement and national values, according to Abby Logan, U.S. District Court-Wyoming. Their presence added a solemn and patriotic tone to the event, highlighting the significance of military support in civic milestones.

    Naturalization ceremonies in Wyoming are conducted by federal judges and serve as a moving tribute to the strength of the nation.

    Photo Caption:

    Members of the Wyoming Air National Guard Color Guard present the colors during a Naturalization Ceremony at the U.S. District Court in Cheyenne, Wyoming, July 16, 2025. The ceremony, officiated by Chief Judge Kelly Rankin and Judge Alan Johnson, welcomed new U.S. citizens in a celebration of freedom and unity. (U.S. District Court photos)

    Members of the Wyoming Air National Guard Color Guard present the colors during a Naturalization Ceremony at the U.S. District Court in Cheyenne, Wyoming, July 16, 2025. The ceremony, officiated by Chief Judge Kelly Rankin and Judge Alan Johnson, welcomed new U.S. citizens in a celebration of freedom and unity. (U.S. District Court photos)
    Members of the Wyoming Air National Guard Color Guard present the colors during a Naturalization Ceremony at the U.S. District Court in Cheyenne, Wyoming, July 16, 2025. The ceremony, officiated by Chief Judge Kelly Rankin and Judge Alan Johnson, welcomed new U.S. citizens in a celebration of freedom and unity. (U.S. District Court photos)

    MIL OSI USA News

  • MIL-OSI Europe: ASIA/CAMBODIA – New St. Joseph Church inaugurated for the Bunong Montagnards

    Source: Agenzia Fides – MIL OSI

    Prefettura Aoostolica Kompong Cham

    Kompong Cham (Agenzia Fides) – The Keo Seima area, in the province of Mondulkiri, in eastern Cambodia, is known as a “wildlife sanctuary,” as it is a natural forest reserve that extends over 290,000 hectares. An ideal destination for ecological turism, this province is home to the so-called “mountain tribes” (the “montagnards”), mostly indigenous Bunong people, who make up 80% of the local population of Mondulkiri.Now, these communities have another kind of “sanctuary,” a “house of God”: a new brick church dedicated to St. Joseph, inaugurated a few days ago by Monsignor Pierre Hangly Suon, former Apostolic Prefect of Kompong Cham and current Apostolic Coadjutor Vicar of Phnom Penh. The church, built thanks to donations collected in Cambodia and abroad, has a capacity for more than 100 people and was built in the village of Sre Khtum in about a year, with the laying of the foundation stone in 2024 (see Fides, 30/6/2024).Evangelization in Mondulkiri province has developed over the past ten years, with the first Bunong natives opting for baptism in 2009. “Currently, there are about 40 Catholic families in Ko Seima, all belonging to the Bunong minority,” reports Father Jean Marie Vianney Borei Phan, priest responsible for the Mondulkiri communities. “Priests, religious, and lay people have all participated in proclaiming the Gospel in this province; now we are reaping the first fruits: let us give thanks to God,” he said.During the Eucharist of consecration and inauguration of the church, before more than 400 faithful from throughout the Apostolic Prefecture, Monsignor Pierre Hangly Suon recalled: “God makes justice and praise grow in the ‘land of Israel,’ which today is the land of Ko Seima.” He added: “In this holy place, our Christian brothers and sisters and the inhabitants of the surrounding villages will be able to gather to pray, hear the word of God, receive the sacraments, and help the Kingdom of God to grow.” He concluded by saying: “This church will be a place of continuing education in the faith, a sanctuary of hope, where people can know and love Jesus.”The ceremony also included the blessing of the bell, whose ringing will remind the surrounding inhabitants that the liturgy is being celebrated in the church: its sound will become a constant proclamation of faith, hope, and charity in the sanctuary of Keo Seima. (PA) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: ASIA/CAMBODIA – New St. Joseph Church inaugurated for the Bunong Montagnards

    Source: Agenzia Fides – MIL OSI

    Prefettura Aoostolica Kompong Cham

    Kompong Cham (Agenzia Fides) – The Keo Seima area, in the province of Mondulkiri, in eastern Cambodia, is known as a “wildlife sanctuary,” as it is a natural forest reserve that extends over 290,000 hectares. An ideal destination for ecological turism, this province is home to the so-called “mountain tribes” (the “montagnards”), mostly indigenous Bunong people, who make up 80% of the local population of Mondulkiri.Now, these communities have another kind of “sanctuary,” a “house of God”: a new brick church dedicated to St. Joseph, inaugurated a few days ago by Monsignor Pierre Hangly Suon, former Apostolic Prefect of Kompong Cham and current Apostolic Coadjutor Vicar of Phnom Penh. The church, built thanks to donations collected in Cambodia and abroad, has a capacity for more than 100 people and was built in the village of Sre Khtum in about a year, with the laying of the foundation stone in 2024 (see Fides, 30/6/2024).Evangelization in Mondulkiri province has developed over the past ten years, with the first Bunong natives opting for baptism in 2009. “Currently, there are about 40 Catholic families in Ko Seima, all belonging to the Bunong minority,” reports Father Jean Marie Vianney Borei Phan, priest responsible for the Mondulkiri communities. “Priests, religious, and lay people have all participated in proclaiming the Gospel in this province; now we are reaping the first fruits: let us give thanks to God,” he said.During the Eucharist of consecration and inauguration of the church, before more than 400 faithful from throughout the Apostolic Prefecture, Monsignor Pierre Hangly Suon recalled: “God makes justice and praise grow in the ‘land of Israel,’ which today is the land of Ko Seima.” He added: “In this holy place, our Christian brothers and sisters and the inhabitants of the surrounding villages will be able to gather to pray, hear the word of God, receive the sacraments, and help the Kingdom of God to grow.” He concluded by saying: “This church will be a place of continuing education in the faith, a sanctuary of hope, where people can know and love Jesus.”The ceremony also included the blessing of the bell, whose ringing will remind the surrounding inhabitants that the liturgy is being celebrated in the church: its sound will become a constant proclamation of faith, hope, and charity in the sanctuary of Keo Seima. (PA) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: AMERICA/ARGENTINA – Dialogue as a means of conflict resolution: solidarity of the Aboriginal Pastoral Care with the Mapuche communities

    Source: Agenzia Fides – MIL OSI

    Tuesday, 22 July 2025

    Internet

    Neuquén (Agenzia Fides) – “Let all forms of violence and, above all, the criminalization of the ongoing protest cease immediately. Social peace is only possible through dialogue as a tool to address different social situations.” This is the appeal of the Diocesan Team for Aboriginal Pastoral Care (EDIPA) of the Diocese of Neuquén, which has expressed its solidarity with the members of some Mapuche communities and deplored the acts of violence that occurred during the eviction ordered by a court following a complaint from the Executive.In a statement released by EDIPA, it reiterates the importance of “dialogue as a means of conflict resolution, convinced that it is the only way to address issues while respecting the rights of citizens.”Likewise, the diocesan organization urges the State to “effectively and immediately respect the indigenous rights recognized by the National Constitution (Article 75, paragraph 17), by the Constitution of the Province of Neuquén (Article 53), and by international instruments, including the right to legal personality, a request that the communities have been making for some time and to date, has not received a clear and concrete response.” (AP) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: AFRICA/NIGERIA – Father Afina, kidnapped on June 1, has been released

    Source: Agenzia Fides – MIL OSI

    Abuja (Agenzia Fides) – Father Alphonsus Afina, who was kidnapped on June 1 (see Fides, 5/6/2025), has been released thanks to an operation by security forces.The priest was rescued yesterday, July 21, along with ten women who were also held hostage, during a joint operation by the Department of State Services (DSS, the internal intelligence service under the Federal Presidency) and the Nigerian army, carried out in Borno State, in northeastern Nigeria.“We are deeply grateful for the professionalism and courage demonstrated by the DSS and the Nigerian army,” said Msgr. John Bogna Bakeni, Auxiliary Bishop of Maiduguri (capital of Borno State). “The safe return of Father Afina after nearly two months of captivity is a testament to the commitment of our security agencies.”Father Afina was kidnapped on the evening of Sunday, June 1, near Gwoza while returning to Maiduguri after celebrating Mass. Bishop Bakeni recalled that the priest was traveling from Mubi, in Adamawa State, to Maiduguri when an armed group ambushed his convoy near a military checkpoint. The attackers fired shots and threw a grenade at one of the vehicles, killing one passenger and taking the others hostage.The Gwoza area is unsafe due to the presence of Boko Haram’s two main factions: Jama’tu Ahlis Sunna Lidda’awati wal-Jihad (JAS) and the Islamic State West Africa Province (ISWAP), which has joined the Islamic State as its “West Africa Province” (see Fides, 2/7/2024).The news of Father Afina’s kidnapping caused great shock in the US diocese of Fairbanks, where the priest had served for six and a half years in the villages of the Seward Peninsula, from 2017 to 2024. (L.M.) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: ASIA/PAKISTAN – A Catholic arrested on false blasphemy charges

    Source: Agenzia Fides – MIL OSI

    The Voice society

    Lahore (Agenzia Fides) – Amir Joseph Paul, a 60-year-old Pakistani Catholic, is the latest innocent victim of blasphemy accusations. “His case once again demonstrates the manipulation of the law, used for private vendettas,” lawyer Aneeqa Maria Anthony, who works with the NGO “The Voice Society,” which is following the case, told Fides. The lawyer explained to Fides: the complaint was filed on July 19 by Munawar Ali, a shop owner in the Nishat neighborhood in Lahore. The complainant claimed that Amir had made offensive comments about the Prophet Muhammad during a conversation in his shop. Amir was immediately arrested and the investigations are still ongoing.Amir, the brother of Father Henry Paul, of the Catholic Church of St. Francis, had gone to the shop for some shopping. During a conversation about political and social issues, eyewitnesses reported, there were no religious references or blasphemous content. But the shopkeeper, the lawyer notes, mobilized local religious leaders within minutes to claim that Amir had made blasphemous statements, which were denied by the accused and the other witnesses present.Local residents claim the accusation is being misused due to a personal grudge related to a sewage dispute between Amir’s home and the complainant’s shop. “It is deeply concerning that such a minor personal dispute can escalate into a blasphemy charge that puts the life of an innocent person at risk,” notes lawyer Aneeqa Maria Anthony. The lawyer is monitoring the investigation, calling for the preservation of all available evidence, such as closed-circuit cameras and eyewitness statements. “This case highlights the ongoing abuse of blasphemy laws in Pakistan and the urgent need for reforms to prevent false accusations,” she adds.Meanwhile, “The Voice Society” team is providing full support to Amir’s family, including legal, social, and moral assistance.Now, Amir’s family and the Christian residents of the Nishat neighborhood are fearful and are at risk of facing mass violence that could break out at any moment. (PA) (Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: ASIA/TURKEY – Ecumenical Patriarch Bartholomew: In the attack on the Church in Gaza, those seeking refuge in this time of trial and tribulation were hit

    Source: Agenzia Fides – MIL OSI

    Tuesday, 22 July 2025

    Patriarchate of Constantinople

    by Nikos TzoitisIstanbul (Agenzia Fides) – Christian unity is based on shared baptism. It is not uniformity, and it draws from the source of the one truth to be shared, that of the Gospel. With these words, the Ecumenical Patriarch of Constantinople, Bartholomew I, welcomed on Sunday, July 20, a group of Catholic and Orthodox pilgrims heading to Nicaea (modern-day Iznik), led by Orthodox Archbishop Elpidophoros of America and Cardinal Joseph Tobin, Archbishop of Newark, at the Church of St. George in Fanar, the seat of the Ecumenical Patriarchate. In his address to the participants of the ecumenical pilgrimage, the “Primus inter pares” among the Primates of the Orthodox Churches also expressed strong words regarding the recent attack by the Israeli army on the Catholic parish of the Holy Family in Gaza City.The pilgrimage also stopped in Rome and Castel Gandolfo, where the group was received in audience by Pope Leo XIV on July 17. In that audience, Pope Leo had given an intense speech on the loving discipleship of Christ as the sole source of Church unity.”It is very significant,” Patriarch Bartholomew told the group of pilgrims, “that you are walking on the same land where the bishops of the early Church gathered to contemplate the Mystery of Christ and to preserve communion among the Churches. Nicaea remains a symbol of the harmony and apostolic unity that we are called to renew today.””From ‘Ancient Rome’ to ‘New Rome’,” the Ecumenical Patriarch continued, “with this joy, we welcome you today in the holy and historic city of Constantinople – New Rome – as you continue your blessed pilgrimage. Your journey has led you from the tombs of Apostles Peter and Paul in Rome to the See of Saint Andrew in Constantinople, and then to the ancient city of Nicaea. This pilgrimage “is a visible testament to the Spirit working among us, guiding us towards reconciliation, understanding, and unity.”Bartholomew I, referring to the words addressed by the group of pilgrims by Leo XIV, stated that he shares with the Bishop of Rome “this holy desire for unity – a unity not based on uniformity, but on the common truth of the Gospel, mutual love, and our shared baptism into the death and resurrection of our Lord Jesus Christ.”The pilgrimage of the group from the United States coincides with the 1700th anniversary of the First Ecumenical Council of Nicaea, which affirmed Christ’s divinity and the unity of the Church around the confession of the true faith.”We rejoice in particular,” the Ecumenical Patriarch continued, “for the shared Easter celebration by Eastern and Western Christians this year. This shared proclamation of the Resurrection allows us to bear witness with one voice to the redeeming hope that overcomes sin, death, and division. It is a foretaste of the full communion that awaits us, not only for our Churches but for a world longing for peace, justice, and spiritual renewal.”The pilgrimage of the group from the United States, Bartholomew I emphasized, “also reminds us that the ecumenical path is not merely the end of a theological commitment, but a spiritual call. We must return to Jerusalem, to that upper room where the Holy Spirit descended and where fear was transformed into the courage of proclamation. In this pilgrimage of hope, may each of you be strengthened by the fire of Pentecost, bringing Christ to a world wounded by war, injustice, and despair.”Referring to the conflicts and wars that are bleeding the world, the Ecumenical Patriarch spoke eloquently about the recent attack by the Israeli army on the Catholic church in Gaza. “We deplore,” said Bartholomew I, “this terrible act which was not only against a place of worship but against a sacred space cherished deeply by the late Pope Francis, who maintained daily contact with the church’s priest even during his illness since the outbreak of the war. This,” continued the Ecumenical Patriarch, “was an attack not only on a place of worship but on a sanctuary where hundreds of people, regardless of their religion, found a home and refuge during this time of trial and tribulation.”For this reason, the Ecumenical Patriarch stressed, “I have asked Cardinal Tobin to convey our heartfelt condolences to our brother Pope Leo. Your Eminence, we ask you to assure His Holiness that we raise our voice with him for an immediate ceasefire and the end of this war, and together we pray to the Lord of Peace, for the repose of the innocent victims, the speedy recovery of the wounded, and comfort for their families.”Concluding his address, Bartholomew I wished the members of the group, “may your pilgrimage here to the Queen of Cities strengthen your faith, renew your hope, and foster your love for the Church and for others. We assure you of our prayers, blessings, and ongoing commitment to walk together, Orthodox and Catholic alike, as disciples of the Risen Lord. In this spirit,” added the Ecumenical Patriarch of Constantinople, “we are looking forward to our upcoming meeting with Pope Leo during the feast of Saint Andrew, founder and patron of the Church of Constantinople, continuing to implore the Holy Spirit to guide us to the day when we will gather again around the same altar, sharing the one Body and chalice of our Lord, the only Head of His Church, for whom He sacrificed Himself.”(Agenzia Fides, 22/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Economics: President Trump Recognizes Fannie Mae’s Chairman for Leadership in Housing Market

    Source: Fannie Mae

    WASHINGTON, DC – On Sunday, President Trump congratulated Bill Pulte, Fannie Mae’s chairman and director of U.S. Federal Housing, acknowledging the work he’s doing for the housing market and people across the country.

    The message recognized the “outstanding” work Director Pulte has done since the president appointed him earlier this year to lead U.S. Federal Housing and encouraged him to keep moving forward. Since he was confirmed, Director Pulte has led Fannie Mae’s efforts to be a more efficient company focused on its core mission.

    With $4.4 trillion in total assets, Fannie Mae provides a reliable source of affordable mortgage credit that supports homebuyers and renters across the country. The company is foundational to the housing market in the United States. The housing market generally makes up 15-18% of the United States’ GDP, so a strong housing market means a stronger American economy.

    MIL OSI Economics