Category: Africa

  • MIL-OSI Russia: Chairmen of NPC Standing Committee, CPPCC National Committee Meet with Madagascar Senate President

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 22 (Xinhua) — Zhao Leji, chairman of the Standing Committee of the National People’s Congress (NPC), and Wang Huning, chairman of the National Committee of the Chinese People’s Political Consultative Conference (CPPCC), held separate meetings with Richard Ravalomanana, president of the Senate (upper house) of Madagascar, in Beijing on Tuesday.

    As Zhao Leji pointed out, China hopes to work with Madagascar to implement the important consensus reached by the heads of state of the two countries and the results of the Beijing Summit of the Forum on China-Africa Cooperation, strive for new achievements in friendly cooperation between the two countries, and contribute to building an all-weather China-Africa community with a shared future in the new era.

    The NPC Standing Committee chairman called on the legislative bodies of the two countries to strengthen exchanges and cooperation and promote the continuous development of the China-Madagascar comprehensive strategic cooperative partnership.

    R. Ravalomanana, for his part, noted that relations between the two countries are based on mutual benefit and common gain, the heads of the two states maintain close exchanges, setting the vector for the development of Madagascar-Chinese relations.

    The Senate of Madagascar, he said, is willing to work with the Chinese side to strengthen exchanges between legislative bodies and play an active role in promoting cooperation in areas such as economics, trade, investment and interregional relations.

    Wang Huning stated that China and Madagascar are companions and true friends on the path of modernization. According to him, China hopes to work with Madagascar to implement the important consensus reached by the heads of state of the two countries, achieving new results of practical cooperation for the benefit of the peoples of the two countries.

    Wang Huning assured that the CPPCC National Committee is willing to strengthen friendly exchanges with the Senate of Madagascar and promote the development of China-Madagascar comprehensive strategic cooperative partnership.

    R. Ravalomanana, in turn, stated that Madagascar pays special attention to the development of relations with China, admires China’s achievements in the field of development, intends to learn from China’s experience and promote bilateral cooperation in various fields for the benefit of the peoples of both countries.

    The Senate of Madagascar is ready to intensify the exchange of experience in public administration with the CPPCC National Committee to promote the in-depth development of interstate relations, R. Ravalomanana added. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Canada: Pharmacist Led Strep Throat and Ear Infection Pilot Seeing Success

    Source: Government of Canada regional news

    Released on July 22, 2025

    Results from a pilot project launched in January 2025 allowing participating pharmacists to conduct point-of-care testing for strep throat and assess for ear infections has delivered over 3,000 services across Saskatchewan, demonstrating the value of expanding pharmacists’ roles in providing accessible frontline care.

    This is part of a broader effort to improve primary care access, especially in rural and remote areas. Pharmacists at select locations across the province have been trained to assess symptoms, perform rapid testing for strep throat, and determine appropriate treatment options, including prescribing medication when appropriate.

    As of July 13, the total number of patients assessed at participating pharmacies was 3,135, with 745 for sore throat and 2,390 for suspected ear infections. Nearly 53 percent, or 1,640 of the cases did not require a prescription, highlighting the benefit of clinical evaluation.

    “This pilot is one of the first in Canada and shows that pharmacists play a vital role in enhancing access to timely care for common conditions,” Rural and Remote Health Minister Lori Carr said. “The fast access to assessment and treatment is reassuring to patients and strengthens team-based primary health care in the province.”

    More than 140 pharmacists taking part in this program have been trained to meet competency requirements as established by the Saskatchewan College of Pharmacy Professionals (SCPP) to provide these services. 11 pharmacies have been conducting strep throat testing and assessing for ear infections, while another 35 sites have been offering assessment for ear infection only. 

    “Saskatchewan College of Pharmacy Professionals is proud of the profession’s leadership in this pilot, which reflects not only pharmacists’ strong clinical competence but also the robust training and standards guiding their care,” SCPP President Scott Livingstone said. “This initiative has been built on collaboration with experts in the field and regulators and is a testament to the profession’s commitment to safe, patient-centred care.”

    Saskatchewan pharmacists were first granted the authority to prescribe for three minor ailments in 2012. Since then, the list of minor ailments has grown to 31. A list of participating pharmacies and communities, and the full list of conditions is available at the Saskatchewan College of Pharmacy Professionals website.  

    This initiative builds on the pharmacist expansion of scope and training announced in September 2024 and is guided by the province’s Health Human Resources Action Plan to recruit, train, incentivize and retain more health care workers in Saskatchewan.    

    “I am confident that this pilot has demonstrated a meaningful impact and that full implementation could be a sustainable, long-term solution for Saskatchewan’s healthcare system” Rexall Moose Jaw Pharmacy Services Manager Chad Miskiman said. “Moreover, this has significantly enhanced trust and credibility among pharmacy patients, as reflected in the substantial positive feedback we have received from the community.”

    There are almost 1,300 practising pharmacists in more than 430 licensed community pharmacies in Saskatchewan. In many communities, pharmacies are the first point of contact for health care services. Based on these early results and further evaluation, the program may be expanded to additional pharmacies in the future. 

    -30-

    For more information, contact:

    MIL OSI Canada News

  • MIL-OSI Security: Defense News in Brief: CMSAF Flosi highlights Airmen’s agility, readiness during East Africa tour

    Source: United States Airforce

    CMSAF Flosi met with Airmen during a recent multi-base visit, where he observed how small, agile teams are delivering results in one of the most strategically significant and operationally complex regions in the world.

    From low-resource expeditionary hubs to forward operating locations facing real threats, Airmen are staying mission-focused, supporting one another and delivering results in demanding conditions.The visit began at Camp Lemonnier, where Flosi received mission briefings from 449th Air Expeditionary Group leadership and visited squadron work centers. Operating in a constrained environment, Airmen there continue to deliver essential capabilities with flexibility and focus. They are leveraging available technologies to counter a growing small unmanned aerial system threat in the region, an evolving operational concern requiring agile solutions at the tactical edge.

    “The AFRICOM AOR is a challenging environment,” Flosi said. “You continue to operate in a low-resource setting, executing the mission with focus and flexibility to counter threats in the region.”

    The senior leader then traveled to Camp Simba, Manda Bay, Kenya, where the deployed team is embodying the “Mission Ready” mindset. Airmen are stepping outside their core Air Force Specialty Codes to fill mission gaps, support each other and sustain forward operations, often in joint and host-nation integrated environments.

    Chief Master Sgt. Ben Weavers, senior enlisted leader of the 475th Expeditionary Air Base Squadron, said the visit highlighted the growing strategic relevance of Manda Bay.

    “It was great to highlight the strong partnership we share at Manda Bay with our host nation Kenyans, sister services and tenant units,” Weavers said. “They were impressed with what our Airmen are doing in support of our nation.”

    Weavers said the visit helped reframe the narrative of Manda Bay from a site that was formerly attacked by enemy combatants to a vital node of partner engagement and operational readiness.

    “We’ve moved beyond the legacy of the 2020 attack to a stronger security posture that allows us to focus on partnership building,” he explained. “We’ve conducted weekly knowledge exchanges with our Kenyan partners across disciplines like medical, maintenance, air transportation, civil engineering, and more.”

    Chief Master Sgt. of the Air Force David Flosi assists munitions Airmen assigned to the 776th Expeditionary Air Base Squadron with assembling a precision-guided munition at Chabelley Airfield, July 13, 2025. Flosi visited deployed Airmen across East Africa to engage with them directly, gain insight into their mission capabilities, and recognize their contributions to regional security. (U.S. Air Force photo by Tech. Sgt. Timothy Hayden)
    Chief Master Sgt. of the Air Force David Flosi, third from right, poses for a photo with 475th Expeditionary Air Base Squadron Airmen following the conclusion of his Q&A panel as part of a visit to Manda Bay, Kenya, July 12, 2025. The visit allowed the senior leader to engage directly with Airmen across East Africa, addressing their concerns and recognizing their contributions to regional security. (U.S. Air National Guard photo by Staff Sgt. Kevin Ray J. Salvador)
    Chief Master Sgt. of the Air Force David Flosi assists U.S. Air Force Staff Sgt. Logan Terrell, a Small Unmanned Aircraft System program manager assigned to the 475th Expeditionary Air Base Squadron, with launching a Puma drone during a visit to Manda Bay, Kenya, July 12, 2025. The visit allowed Flosi to connect with Airmen across East Africa, hear their concerns, and recognize their contributions to regional security. (U.S. Air Force photo by Tech. Sgt. Timothy Hayden)

    Lt. Col. Michael S. Ryan, commander of the 475th EABS, described the visit as a success, noting the valuable engagement between deployed personnel and senior leadership.

    “CMSAF was able to interact with our deployed Airmen. The question-and-answer session allowed for two-way communication between Department of the Air Force leadership and our Airmen accomplishing the mission,” Ryan said. “We provided CMSAF the importance of Manda Bay and the mission here,” he added.

    “We showcased our Airmen and the uniqueness of this deployment. Everything we do here is by, through and with the Kenyans.”

    He also noted the positive response from his team.

    “Multiple Airmen thanked local leadership for the opportunity to interact with CMSAF,” Ryan said. “This allowed them the opportunity to speak what is on their minds to our highest level of leadership.”

    On the final day of the tour, Flosi visited Chabelley Airfield, where Airmen support critical intelligence, surveillance and reconnaissance operations. Here, he helped build a laser-guided bomb and observed how Airmen and Soldiers are detecting and deterring UAS threats with advanced counter-sUAS systems.

    These missions play out just miles from the People’s Liberation Army Support Base in Djibouti, a visible reminder of the region’s strategic weight and the importance of maintaining a consistent, capable U.S. presence.

    A consistent theme across locations was the deployment of small Unit Type Codes rather than fully aligned teams. Leaders noted that aligning future rotations with the Air Force’s Unit of Action concept, sending cohesive, trained teams that arrive and operate together from day one, may help improve readiness and continuity in the region.

    “The missions you support are vital to regional security,” Flosi said. “You’re holding the line, and your work underscores the strategic significance of this region and the importance of a consistent and capable U.S. presence.”

    MIL Security OSI

  • MIL-OSI United Nations: Deputy Secretary-General’s remarks at the Joint ECOSOC and UN-Habitat High-Level Dialogue on Adequate Housing for all [as prepared for delivery]

    Source: United Nations secretary general

    Honourable Patty Hadju, Minister of Jobs and Families of Canada. 
    His Excellency, Bob Rae, President of ECOSOC
    Her Excellency Beatrice Karago, Deputy Permanent Representative of The Republic of Kenya to UN-Habitat
    Excellencies,
    Ladies and gentlemen,
    It is a privilege to join you today for this important dialogue.
    I thank the President of ECOSOC and UN-Habitat for convening us at such a critical moment.
    Let me begin with a simple question: What did it take for us to be here today?
    We woke up somewhere safe.
    We had an address where documents could reach us, where our families knew to find us.
    We had a place to eat a meal, charge our phones, and prepare for this day.
    For almost three billion people on our planet, none of that is guaranteed.
    This is why today’s dialogue – at this critical moment during the High-Level Political Forum – matters so urgently.
    Housing is not simply about a roof over one’s head.
    It is a fundamental human right and the foundation upon which peace itself rests.
    Sustainable development and sustainable peace are inseparable.
    Today, in an increasingly urbanized world, almost three billion people still live in inadequate conditions, in informal settlements, overcrowded housing, or with no shelter at all.
    Among them are more than 120 million refugees and internally displaced persons – families torn from their homes by conflict, persecution, and violence.
    When homes are destroyed, when families are forced to flee, when communities are uprooted, we witness how housing becomes both a casualty and weapon of war.
    In Gaza, in Ukraine, in Sudan, in Yemen, in Myanmar, and beyond, we have seen this time and again.
    There is no safe housing in rubble, and without shelter, we lose the very basis of social cohesion and stability that makes peace possible.
    This crisis touches every Sustainable Development Goal we’ve committed to achieving by 2030.
    We often say that home is where the heart is.
    Our work on housing sits at the very heart of the Sustainable Development Goals, and when we secure adequate housing for all, we nurture the conditions where every other goal can flourish.
    We know that when people have access to safe, adequate, and affordable housing, children perform better in school.
    Workers are more productive.
    Health outcomes improve dramatically.
    Decent work becomes accessible.
    Communities become more resilient to the forces that fuel conflict and division.
    And while adequate housing cannot eliminate gender-based violence within the home, it reduces women and girls’ exposure to violence in public spaces.
    So, the reality is that the ambition of the 2030 Agenda to leave no one behind begins with something as fundamental as a safe place to call home.
    By 2030, 60% of the world’s population will live in cities, rising to nearly 70% by 2050.
    We have the tools and the commitment to grow cities, not slums—guided by the New Urban Agenda’ call for planned, inclusive urbanization that ensures housing, services, and dignity for all.
    Success or failure to deliver on our commitments will depend on our ability to act urgently and work together.
    At the Financing for Development Forum, Member States rightly called for bold reforms and investments to strengthen the social contract. That must include housing, not as a standalone project, but as a driver of inclusive development.
    The Pact for the Future reaffirmed the 2030 Agenda and gave us a mandate to make multilateralism deliver in the lives of people, in the neighbourhoods where they live.
    It also gave us a mandate to prevent conflict and sustain peace – and housing sits at the intersection of both.
    Later this year, the Second World Social Summit offers us an opportunity to reaffirm that housing is critical for social protection, decent work, access to services, and essential to building a just and cohesive society.
    It is also an opportunity to recognize housing as a pillar of conflict prevention and peacebuilding.
    As Chair of the UN Sustainable Development Group, I see how country teams are working every day with governments, civil society and local and regional governments to advance these goals.
    But we need to do more.
    Concretely, that means aligning political commitment and financing with the urgency and scale of the challenge.
    It means investing in adequate housing, not just as development infrastructure, but peace infrastructure.  
    We also need to bring to the centre those who are too often pushed to the margins: women, young people, older persons, persons with disabilities, Indigenous Peoples, displaced populations, and people living in homelessness.
    Their voices and experiences must inform the policies and solutions because they know what works, what’s missing, and they can inform the solutions we need to scale.
    They also know intimately the connections between displacement, insecurity, and conflict.
    Their involvement is the best measure of our commitment to equity, dignity, and human rights.

    Ladies and gentlemen,
    The first place where opportunity begins or where it is denied is not an office building or a school – it’s a home.
    Together, let’s deliver not only shelter, but lasting solutions that offer security and a path to prosperity.
    Not only four walls and a roof, but the opportunity to live in dignity.
    Thank you.

    MIL OSI United Nations News

  • MIL-OSI NGOs: EU/China: Joint NGO letter ahead of EU-China Summit

    Source: Amnesty International –

    Dear President Costa,

    Dear President von der Leyen,

    We write to urge you to prioritize human rights in the forthcoming European Union (EU)-China Summit to be held in China on July 24-25. At the recent G7 meeting, European Commission President Ursula von der Leyen spoke of a “new China shock,” and urged that G7 members respond with greater cooperation, resilience and alternative approaches. We believe similar ambition should apply to the approach of the EU and its member states regarding the deepening human rights crisis in China, and that new initiatives be publicly articulated at the forthcoming Summit to build on and go beyond existing commitments set out in the March 2019 EU-China Strategic Outlook.

    We appreciate the EU’s longtime support to independent civil society and human rights defenders across China, and welcome public remarks, such as strong statements at the United Nations (UN) Human Rights Council, identifying particular cases of concern. We thank the EU for condemning the arbitrary detention of human rights legal activists Xu Yan and Yu Wensheng, who were detained en route to meeting with EU officials. In September 2022, then-High Representative and Vice President Josep Borrell helpfully echoed the UN Office of the High Commissioner for Human Rights’ (OHCHR) concern that Chinese government policies in the Uyghur region “may constitute international crimes, in particular crimes against humanity.” We acknowledge the recent – the fortieth – round of the EU-China human rights dialogue.

    Yet these EU and member states’ initiatives have not deterred Chinese authorities’ wholesale assault on human rights since President Xi Jinping assumed power in 2012. He and other officials are confident in their impunity for widespread arbitrary detention, forced assimilation, forced labour and torture in China; and transnational repression, including in Europe. Chinese authorities not only refuse to comply with the vast majority of their international human rights obligations, they also seek to rewrite global human rights norms and weaken key international institutions.

    We urge the EU and its member states to confront this human rights crisis—which increasingly affects not only people across China but also people worldwide—with the same determination to identify and commit to alternative approaches as it is now setting out on security and trade issues.

    In that spirit, our organizations urge you to use the Summit to ensure justice for victims and survivors of Beijing’s violations and abuses by publicly:

    1. Condemning the Chinese government’s crimes against humanity, and the impunity that sustains them, echoing the findings and recommendations of UN bodies, including the August 2022 OHCHR report on Xinjiang, the 2023 reviews of China by the Committee for the Elimination of All Forms of Discrimination Against Women (CEDAW) and the Committee on Economic, Social and Cultural Rights, the 2024 Universal Periodic Review (UPR), and UN Special Procedures. The EU should reiterate that crimes against humanity are subject to universal jurisdiction, and that those responsible can and should be held criminally responsible and face justice, including in EU member states. The 18 June 2025 announcement by Argentina’s highest criminal court to hear a case brought by Uyghurs alleging Chinese authorities have committed genocide and crimes against humanity should lend confidence and momentum to similar initiatives across EU member states, and to a push for accountability through UN mechanisms. Doing so is consistent with High Representative Kaja Kallas’ March 2025 remarks broadly supporting international law and the need for perpetrators to be “brought to justice.”
    2. Calling for the immediate and unconditional releases of human rights defenders who have been detained for their work, naming individuals explicitly, including EU citizen Gui Minhai, Sakharov Prize laureate Ilham Tohti and others identified in the most recent EU statement at the UN Human Rights Council: Gulshan Abbas, Anya Sengdra, Ekpar Asat, Chadrel Rinpoche, Rahile Dawut, Ding Jiaxi, Ding Yuande, Dong Yuyu, Drugdra, Gao Zhen, Gao Zhisheng, Go Sherab Gyatso, Golog Palden, He Fangmei, Huang Qi, Huang Xueqin, Hushtar Isa, Yalkun Isa, Ji Xiaolong, Li Yanhe, Lobsang Gephel, Lobsang, Khedrub, Lu Siwei, Peng Lifa, Qin Yongmin, Ruan Xiaohuan, Semkyi Dolma, Tashi Dorje, Tashpolat Tiyip, Wang Bingzhang, Pastor Wang Yi, Kamile Wayit, Xie Yang, Xu Na, Xu Zhiyong, Yang Hengjun, Yang Maodong, Yu Wensheng, Pastor Zhang Chunlei and Zhang Zhan.
    3. Emphasizing the commitments made at the G7 to ending transnational repression (TNR), including abuses undertaken by the Chinese government, both across EU member states and elsewhere. Those commitments can be demonstrated through investigations and prosecutions, while also supporting and protecting individuals and communities who may be or have already been targeted by TNR. These human rights abuses include intimidation, surveillance, threats or acts of physical violence, threats against family members and digital repression, in particular sexual harassment or degrading language targeting women.
    4. Reiterating that the EU and its member states are ready to use all tools at their disposal to hold Chinese government officials accountable for human rights violations, including the right to freedom of religion or belief, such as in the context of the selection of the next Dalai Lama.
    5. Stressing that the EU expects the Chinese government to comply with its freely-undertaken human rights obligations under international law, and calling for the urgent repeal of laws and criminal provisions incompatible with those obligations, including but not limited to the Hong Kong National Security Law, the Hong Kong Safeguarding National Security Ordinance, “picking quarrels and provoking trouble,” “subversion” and “inciting subversion of state power,” and the criminal procedure of “residential surveillance at a designated location,” in line with recommendations by UN human rights bodies.

    After 50 years of EU-China relations, the EU should take stock of deepening Chinese government repression inside and outside the country, and express solidarity with people across China who seek to exercise, uphold and defend human rights. The EU’s recent decision to cancel an economic and trade dialogue with the Chinese government over serious differences suggests a willingness to pressure Beijing in new and different ways. Grave and worsening human rights violations by Chinese authorities should motivate new strategies. Without those, people across China—and in Europe—are increasingly at risk.

    Amnesty International

    Asian Forum for Human Rights and Development (FORUM-ASIA) Chinese Human Rights Defenders

    Christian Solidarity Worldwide

    CIVICUS: World Alliance for Citizen Participation Front Line Defenders

    Hong Kong Watch Human Rights in China Human Rights Watch

    Human Rights Without Frontiers International Campaign for Tibet

    International Federation for Human Rights (FIDH), in the framework of the Observatory for the Protection of Human Rights Defenders

    International Partnership for Human Rights (IPHR) International Service for Human Rights

    The Rights Practice

    World Organisation Against Torture (OMCT), in the framework of the Observatory for the Protection of Human Rights Defenders

    World Uyghur Congress

    MIL OSI NGO

  • MIL-OSI Africa: Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) ministerial committee endorses membership of Sahel countries as non-Economic Community of West African States (ECOWAS) members

    Source: APO

    The 2nd Extraordinary Meeting of the GIABA Ministerial Committee (GMC) concluded in Accra, Ghana on the 19th of July, 2025, with a decision to allow the three Sahel countries that have withdrawn from the Economic Community of West African States (ECOWAS) to join the Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) as Non-ECOWAS Members.

    The Ministers present at the high-level meeting unanimously considered the importance of dealing with insecurity in the region in a collaborative manner. The decision will be transmitted to the ECOWAS Council of Ministers and the Authority of Heads of State and Government for consideration.

    During the session,Nigeria’s Minister of Justice handed over the chairmanship of the GMC to the Minister of Finance of Sierra Leone, who assumes the role as the new Chair of the Committee.

    The meeting was officially declared open by the Vice President of the Republic of Ghana, Professor Jane Naana Opoku-Agyemang.

    Distributed by APO Group on behalf of Economic Community of West African States (ECOWAS).

    Media files

    .

    MIL OSI Africa

  • MIL-OSI United Nations: Economic and Social Council Continues High-Level Segment

    Source: United Nations General Assembly and Security Council

    2025 Session,

    25th Meeting (PM)

    ECOSOC/7215

    The Economic and Social Council continues the general debate of its annual high-level segment, including the three-day ministerial segment of the High-level Political Forum under the theme “Advancing sustainable, inclusive, science- and evidence-based solutions for the 2030 Agenda and its SDGs for leaving no one behind”.

    The segment, which began 21 July, will run through 24 July.

    Member States will make statements this afternoon under the theme “UN@80:  Catalyzing Change for Sustainable Development”. 

    Also in the afternoon, the Council will continue its voluntary national reviews with Germany, Kazakhstan, Seychelles, Japan, Gambia, Indonesia and Suriname.  Council President Bob Rae and Vice President Lok Bahadur Thapa will chair the reviews.

    For information media. Not an official record.

    MIL OSI United Nations News

  • MIL-OSI United Nations: Amid ‘Horror Show in Gaza’, Humanitarian System Denied Space to Deliver, Multilateral Problem-Solving Needed More than Ever, Secretary-General Tells Security Council

    Source: United Nations General Assembly and Security Council

    Following are UN Secretary-General António Guterres’ remarks to the Security Council on multilateralism and peaceful settlement of disputes, in New York today:

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.  The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.  The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate, when unresolved disputes fuel the flames of conflict and when States lose trust in each other.

    The Charter lays out a number of important tools to forge peace.  Article 2.3 of the UN Charter is clear:  “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice”.  Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.  This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts.  And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.  Malnourishment is soaring.  Starvation is knocking on every door.

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.  That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.  With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck — among them facilities of the UN Office for Project Services and the World Health Organization (WHO), including WHO’s main warehouse.  This is despite all parties having been informed of the locations of these UN facilities.  These premises are inviolable and must be protected under international humanitarian law — without exception.

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.  And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.  But it still holds the power to stop them.  Peace is a choice.  And the world expects the UN Security Council to help countries make this choice.  This Council is at the centre of the global architecture for peace and security.  Its creation reflected a central truth.

    Competition between States is a geopolitical reality.  But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.  Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year.

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.  Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.  The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the cold war, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.  One that successfully deployed a range of peacekeeping missions.  One that opened the door for vital humanitarian aid to flow to people in need.  And one that helped prevent a third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.  This Council should be made more representative of today’s geopolitical realities.  And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.  I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.  The landmark adoption of Security Council resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and rebuild regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of States.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.  The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its eightieth anniversary next year.

    As we mark the eightieth anniversary of our Organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.  I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    MIL OSI United Nations News

  • MIL-OSI USA: NASA Invites Media to Senegal Artemis Accords Signing Ceremony

    Source: NASA

    Senegal will sign the Artemis Accords during a ceremony at 2 p.m. EDT on Thursday, July 24, at NASA Headquarters in Washington.
    Brian Hughes, NASA chief of staff, will host Maram Kairé, director general of the Senegalese space agency (ASES), and Abdoul Wahab Haidara, ambassador of Senegal to the United States, along with other officials from Senegal and the U.S. Department of State.
    This event is in-person only. Media interested in attending must RSVP no later than 10 a.m. on Thursday, July 24, to: hq-media@mail.nasa.gov. NASA’s media accreditation policy is online.
    The signing ceremony will take place at the James E. Webb Memorial Auditorium at NASA Headquarters in the Mary W. Jackson building, 300 E. Street SW in Washington.
    In 2020, during the first Trump Administration, the United States, led by NASA and the State Department, joined with seven other founding nations to establish the Artemis Accords, responding to the growing interest in lunar activities by both governments and private companies. The accords introduced the first set of practical principles aimed at enhancing the safety, transparency, and coordination of civil space exploration on the Moon, Mars, and beyond. Senegal is the 56th country to sign the Artemis Accords since their inception.
    The Artemis Accords are grounded in international law and represent the best practices and norms of responsible behavior that NASA and its partners have supported, including the public release of scientific data.
    Learn more about the Artemis Accords at:
    https://www.nasa.gov/artemis-accords
    -end-
    Bethany Stevens / Elizabeth ShawHeadquarters, Washington202-358-1600bethany.c.stevens@nasa.gov / elizabeth.a.shaw@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI Security: U.S. commences civil action to forfeit $7.1 million in cryptocurrency tied to oil and gas storage fraud scheme

    Source: Office of United States Attorneys

    Seattle – The U.S. Attorney’s Office, Western District of Washington today filed a civil action seeking the forfeiture of cryptocurrency valued at approximately $7.1 million seized in the investigation of an oil and gas related investment fraud scheme, announced Acting U.S. Attorney Teal Luthy Miller. The funds, part of some $97 million taken in by the coconspirators between June 2022 and July 2024, was seized by Homeland Security Investigations in December 2024.

    “The co-schemers in this fraud moved their ill-gotten gain through various cryptocurrency accounts to try to launder the money stolen from victims,” said Acting U.S. Attorney Miller. “Federal investigators and prosecutors in our office moved as quickly as possible to trace and seize the cryptocurrency so that some of the losses can be returned to victims.”

    According to the forfeiture filing and other records in the case, from at least August 2022 through August 2024, the co-schemers convinced victims to send money to what was represented as escrow accounts to purchase oil tank storage in either Rotterdam, Netherlands, or Houston. The schemers indicated that the investors could make significant profits by renting the oil tank storage they obtained to others. The victims sent money to accounts linked to these entities: Sea Forest International LLC; Apex Oil and Gas Trading LLC; Navigator Energy Logistics LLC; Terminal Energy International Escrow Service LLC; Energo Horizons Logistics (EA) LLC; Legacy Energy Logistics Transport Group LLC; Green Tree Gateway LLC. However once victims sent their money, they were not sent any further information on their investment and co-schemers simply stopped responding.

    Newcastle, Washington resident Geoffrey K. Auyeung, 47, was indicted in August 2024 as the coconspirator in the U.S. who is charged with receiving much of the fraud proceeds generated by the fraud scheme. The money was quickly moved to one or more of at least 81 different accounts at financial institutions, moved offshore, or moved to one or more of at least 19 different cryptocurrency accounts, where it was used for the purchase of cryptocurrencies, including Bitcoin, Tether, USD Coin, and Ethereum. Much of the cryptocurrency was further transferred to accounts at the cryptocurrency exchange Binance.

    According to the forfeiture filing, the cryptocurrency accounts that were seized were linked to individuals in Russia and Nigeria. Some of the cryptocurrency purchased with victims’ funds was also sent to cryptocurrency exchanges in Russia and Nigeria, at least one of which is alleged to have facilitated money laundering for transnational criminal organizations – including terrorist organizations and organizations that violate international trade sanctions.

    At the time of Auyeung’s arrest and indictment, some $2.3 million was seized from his bank accounts. The $7.1 million in cryptocurrency the government is seeking to forfeit is in addition to the $2.3 million.

    Should the court approve the forfeiture the money will be distributed to victims in the case. Currently. Investigators have identified dozens of victims who were defrauded out of approximately $17.9 million. Investigators believe those numbers will continue to grow as more victims are identified and verified.

    The case is being investigated by HSI.

    The case is being prosecuted by Assistant United States Attorneys Jehiel Baer and Yunah Chung.

    MIL Security OSI

  • MIL-OSI USA: Hagerty Introduces Thomas Rose, Trump’s Nominee to be U.S. Ambassador to Poland

    US Senate News:

    Source: United States Senator for Tennessee Bill Hagerty

    WASHINGTON—Today, United States Senator Bill Hagerty (R-TN), a member of the Senate Foreign Relations Committee and former U.S. Ambassador to Japan, introduced Thomas Rose, President Donald Trump’s nominee to be U.S. Ambassador to Poland, at a nomination hearing.

    *Click the photo above or here to watch*

    Remarks as prepared for delivery:

    I’m honored to introduce a friend, a principled conservative, and a steadfast supporter of America First and U.S. national interests abroad—Mr. Thomas Rose, President Trump’s nominee to be U.S. Ambassador to Poland.

    Tom is an exceptional pick to represent the United States to one of our strongest European allies.

    Tom’s qualifications are reflected in his lifetime of experience and success in public service and in journalism.

    As a young journalist, he covered the apartheid crisis in South Africa, political changes in the Philippines, and the fall of the Berlin Wall—and his documentary about the plight of Soviet Jews was nominated for an Emmy award.

    He was then trusted to hold a number of significant management roles in media, including as publisher and CEO of The Jerusalem Post, one of the most influential English-language newspapers in the Middle East.

    Tom later served as Chief Strategist and Senior Advisor in the Office of the Vice President during President Trump’s first term, when I had the opportunity to see firsthand his strategic insight, deep patriotism, and clear-eyed understanding of America’s role in the world.

    Most recently, Tom has co-hosted a talk show where he has demonstrated a deep understanding of global affairs, a consistent commitment to conservative principles, and an ability to clearly articulate America’s interests and values to a broad audience—qualities essential for advancing U.S. interests and strengthening the U.S.-Poland relationship at this critical time.

    Throughout his life and career, Tom has shown he can navigate complex issues with clarity, courage, and decisiveness.

    Poland is one of our most vital partners in Europe—Poland is the biggest spender on defense as a portion of GDP in NATO and Poland serves as a critical bulwark on the alliance’s eastern flank.

    We need someone with Tom’s talents to advance America’s foreign policy in Poland, to serve as a bridge between our two governments, to advocate for our national interests, and to champion the principles that have made the U.S.-Poland partnership so robust.

    Tom is exactly the right person to serve as our nation’s next ambassador in Warsaw, and I urge my colleagues on this Committee to support his nomination.

    MIL OSI USA News

  • MIL-OSI Security: United States Reaches $501,556 Civil Settlement Resolving Allegations of False Claims to Federal Health Care Programs

    Source: Office of United States Attorneys

    ST. LOUIS – Acting U.S. Attorney Matthew T. Drake on Tuesday announced that the U.S. Attorney’s Office for the Eastern District of Missouri and a Missouri psychiatrist have reached a $501,556 civil settlement that will resolve False Claims Act (FCA) allegations.

    The settlement resolves allegations that from Jan. 1, 2019, through May 31, 2024, Dr. Mohd Azfar Malik falsely indicated to both Medicare and Missouri Medicaid that he provided face-to-face psychotherapy to patients, including by submitting false claims for payment when he was out of town and for services that were provided by other practitioners.  Dr. Malik was part-owner of Behavioral Health Services, LLC which owned and operated Psych Care Consultants in St. Louis, Missouri.

    The settlement consists of $250,778 in restitution, which is doubled under the FCA. 

    The civil settlement contains no admission of liability. In April of 2025, Dr. Malik pleaded guilty to making false statement in federal health care related matters and admitted submitting claims for payment to Medicare, Medicaid and private health insurers in which he falsely claimed to have performed in-person services when he was out of Missouri or out of the country. He is scheduled to be sentenced on August 11.

    “Holding health care professionals accountable for submitting false claims for financial gain is crucial for maintaining public trust and ensuring that critical resources are appropriately utilized,” said Linda T. Hanley, Special Agent in Charge with the United States Department of Health and Human Services Office of Inspector General (HHS-OIG).  “HHS-OIG, the U.S. Attorney’s Office, and our law enforcement partners will continue to collaborate our efforts to protect the integrity of the Medicare and Medicaid programs.”

    This civil settlement was a result of the combined work of the U.S. Attorney’s Office for the Eastern District of Missouri, HHS/OIG Office of Investigations, the Missouri Attorney General’s Medicaid Fraud Control Unit, and the Federal Bureau of Investigation.  

    MIL Security OSI

  • MIL-OSI USA: King to Africa Command Nominee: “We’re Taking Our Eye off the Terrorism Ball”

    US Senate News:

    Source: United States Senator for Maine Angus King

    WASHINGTON, D.C. – Today, in a hearing of the Senate Armed Services Committee (SASC), U.S. Senator Angus King (I-ME) questioned a Trump Administration nominee about his thoughts on the current role of ISIS, Al-Qaeda and other terrorist groups within the African region. In his exchange with Air Force Lieutenant General Dagvin R.M. Anderson, nominee to be general and Commander of United States Africa Command (AFRICOM), King asked if America’s focus on Asian nations in the Pacific is undercutting its ability to root out and counter terrorism in Africa and the Middle East.

    “General Anderson, one of the things that concerns me, and it relates somewhat to the aid question, but more generally is the rise of terrorism. And you mentioned September 11th. That was 19 people, and my concern is with our so-called pivot to the Indo-Pacific we’re taking our eye off the terrorism ball. Could you share with us the thoughts about the status of Al Qaeda and ISIS in Africa, and what we should be watching out for and being concerned of?” Senator King asked.

    “Yes, Senator, I appreciate that concern, and if confirmed, I will definitely make this a priority to assess as it’s been four years since I was at SOCAFRICA [Special Operations Command Africa],” General Anderson responded. “With that said though, we have seen the terrorist groups move much of their operations into the ungoverned spaces of Africa, both ISIS and Al-Qaeda. We’re seeing ISIS active in Somalia as well as in West Africa – ISIS West Africa. AQIM [Al-Qaeda in the Islamic Maghreb] and their affiliate, JNIM [Jama’at Nasr al-Islam wal-Muslimin], are also very active in the Sahel, both with intent to attack US interests.”

    General Anderson continued, “Whether or not they have that capability is not clear. And so, to your point, one of the greatest concerns we have is having enough resources and enough relationships to be able to understand how these threats are progressing. So, we have an adequate amount of indicators and warnings and we know what the threat to the United States could be so we could take action. The access is also critical with our partners to understand what’s happening with these threats, and I would also say what is happening with some of the other powers there, and how they may be working with them or maybe not acting in our interests, so that we can understand what the threat landscape is on the continent.”

    As a member of the Senate Armed Services Committee and the Senate Select Committee on Intelligence, Senator King is recognized as an authoritative voice on national security, foreign policy issues, and an active, vocal supporter of the importance of democratic values and defeating terrorism. Senator King traveled to the Middle East last month, to get a closer look at the threats to stability in the region, calling for continued American engagement in the region.

    MIL OSI USA News

  • MIL-OSI: OZ Studio, a Global Firm with Texas Roots, Showcases Ethical AI Governance Model at the United Nations

    Source: GlobeNewswire (MIL-OSI)

    VIENNA, AUSTRIA , July 22, 2025 (GLOBE NEWSWIRE) — OZ Studio, a global technology firm with offices in Austin, Texas; Geneva, Switzerland; and Monterrey, Mexico, presented a groundbreaking model for municipal governance and ethical artificial intelligence at the United Nations headquarters in Vienna. The presentation marks a significant milestone for the company, which, after 22 years of serving multinational corporations, has pivoted its focus since 2020 toward empowering governments, entrepreneurs, and small businesses with integrated digital platforms.

    Osuna attends sessions at the UN Office on Drugs and Crime that focus on data security and sovereignty.

    The firm, represented by its CEO Daniel Osuna, who also serves on the UN’s AI Council ethics committee, detailed its successful public-private partnerships in the municipalities of Escobedo and Santiago, Mexico. These collaborations showcase a new standard for applying AI ethically at the local government level, a core mission of OZ Studio’s government services division.

    For over two decades, OZ Studio built a reputation for providing high-level services to large multinational companies. However, recognizing a critical gap in the market, the company strategically shifted its focus in 2020. The new mission: to channel its extensive expertise into creating comprehensive digital ecosystems for those who form the backbone of local economies—small and medium-sized enterprises (SMEs) and the public institutions that serve them.

    This new direction is embodied by two of its flagship platforms: LINK360 and the OZZY AI system. LINK360 is a digital empowerment platform that provides local businesses with e-commerce tools and AI-powered marketing, ensuring economic value and data sovereignty remain within the community. OZZY AI is an open-source framework trained for municipal processes, designed with ethical principles like transparency, algorithmic fairness, and cultural adaptation at its core.

    The results of this approach are transformative. Under the leadership of Mayor Andrés Mijes, the city of Escobedo has become a 100% digitized municipality, a remarkable achievement that has streamlined public services and eliminated bureaucratic red tape. In Santiago, Mayor David de la Peña is leveraging the LINK360 program to foster a vibrant local entrepreneurial scene.

    The international community has taken notice. Following the conclusion of the UN activities on Monday, July 22, OZ Studio (https://www.oz.studio) has entered into strategic alliances to explore pilot programs with several nations, including: Spain, Egypt, Georgia, Austria, and Australia. This global interest validates OZ Studio’s model as a scalable solution for governments worldwide seeking to innovate responsibly.

    From its strategic locations in Austin, Geneva, and Monterrey, OZ Studio is now positioned to lead the charge in ethical AI for public service. The company’s evolution from a corporate service provider to a champion for local development demonstrates a powerful vision: leveraging top-tier technology to build self-sustaining, equitable, and prosperous communities from the ground up.

    Presenting the OZZI AI framework and the Public Private Partnership for ethical AI

    About OZ Studio

    At OZ Studio, we are your premier destination for transformative digital solutions, anchored in over two decades of innovation and expertise. We are proud to say that we’ve evolved from pioneering basic email marketing to mastering complex digital strategies and immersive creative experiences. Our comprehensive suite of services spans from state-of-the-art website development to advanced SEO strategies, engaging interactive videos, and cutting-edge AI tools. As true digital architects, we empower our clients by merging top-tier technology with unmatched creative prowess, ensuring every digital interaction is compelling and results-oriented. We revolutionized the traditional digital service model through our productized Creative-as-a-Service (CaaS), which guarantees transparency, efficiency, and scalability. Our subscription-based approach simplifies access to a holistic digital strategy, incorporating a full spectrum of expertly managed creative and technical services. Partner with us at OZ Studio, and let us help elevate your brand to new heights, optimizing every touchpoint in your digital journey for growth and transformation. 

    Press inquiries

    OZ Studio
    https://oz.studio
    Daniel Osuna
    oz@oz.studio
    +12123811969
    5900 Balcones Drive
    Austin, TX 78731

    The MIL Network

  • MIL-OSI Africa: Ambassador Yin Chengwu attended Liberia Technology Summit 2025

    Source: APO


    .

    On July 21, Ambassador Yin Chengwu attended the Liberia Technology Summit 2025 and delivered a speech. The event was also attended by Hon. Haja Mamaka Bility, Acting Minister of States, Hon. Augustine K. Ngafuan, Minister of Finance and Development Planning, Hon. Sekou M. Kromah, Minister of Post and Telecommunications. Representatives from relevant UN agencies and diplomatic missions in Liberia.

    Yin highlighted the outcomes of the Ministerial Meeting of Coordinators on the Implementation of the Follow-up Actions of the Forum on China-Africa Cooperation and China’s achievements in science and technology. He pointed out that China will establish a global scientific research fund and increase science and technology assistance to developing countries, making technological progress benefits all humanity. He expressed China is willing to strengthen scientific and technological innovation cooperation with Liberia, so as to make it a new engine of China-Liberia strategic partnership.

    Distributed by APO Group on behalf of Embassy of the People’s Republic of China in the Republic of Liberia.

    MIL OSI Africa

  • MIL-OSI Africa: Egypt: Hassan Allam Chief Executive Officer (CEO) pays a courtesy call on Ambassador

    Source: APO


    .

    On 20 July 2025, Mr. Ahmed Mustafa, CEO of Hassan Allam, together with Mr. Mahmoud Seliman, Marketing Advisor, paid a courtesy call on H.E. Mr. Thanawat Sirikul, Ambassador of Thailand to Egypt, at the Royal Thai Embassy. Both parties discussed cooperation in promoting trade and investment between the two countries in the residential construction, infrastructure and construction materials businesses. The company is interested in working with Thai partners to assemble products for export to Europe and Africa, where Egypt enjoys special tax privileges and is located near both major markets. The company also believes that Thailand has potential to invest in Egypt in the hospitality and tourism sectors, and is ready to enhance awareness of the potential and economic opportunities in Egypt, as well as provide advice on investment loans to Thai entrepreneurs. Hassan Allam, which is over 89 years old, is one of the largest companies in Egypt and has signed a Memorandum of Understanding with SCG International, a Thai conglomerate, to enter the Middle East and Africa markets in 2023.

    Distributed by APO Group on behalf of Royal Thai Embassy, Cairo, Egypt.

    MIL OSI Africa

  • MIL-OSI Africa: Egypt: Executives of Japan Food Solutions S.A.E. paid a courtesy call on the Ambassador

    Source: APO


    .

    On 16 July 2025, Mr. Emad Said, Senior Managing Director of Japan Food Solutions (J.F.S.) S.A.E., paid a courtesy call on H.E. Mr. Thanawat Sirikul, Ambassador of Thailand to Egypt, at the Royal Thai Embassy. Mr. Emad reported on his visit to Thailand to attend the annual Thaifex 2025 to meet with Thai entrepreneurs with whom the Embassy had matched the company. In addition, both parties discussed opportunities and potential for business cooperation between Thai and Egyptian entrepreneurs in the future, especially in the areas of food security and supply chain. Both sides agreed that products that Thailand has the potential to increase exports to Egypt include seasoned poultry and halal products, as well as investment in the hospitality, wellness and spa businesses. Meanwhile, products that Egypt is increasingly interested in exporting to Thailand include strawberries, broccoli, dried fruits and concentrate fruit juices. In addition, J.F.S. is interested in exchanging knowledge on Thai edamame cultivation techniques.

    Distributed by APO Group on behalf of Royal Thai Embassy, Cairo, Egypt.

    MIL OSI Africa

  • MIL-OSI Africa: African Development Bank’s Sustainable Energy Fund for Africa (SEFA) supports electric cooking expansion across three African nations

    Source: APO

    The Sustainable Energy Fund for Africa (SEFA), managed by the African Development Bank (AfDB) (www.AfDB.org), is tackling charcoal dependence in Kenya, Uganda, and Zambia with a $4 million reimbursable grant. This grant will fund the Burn Electric Cooking Expansion Program (BEEP), deploying 115,000 Burn ECOA Electric Induction Cookers to provide clean cooking solutions for low-income, grid-connected households currently relying on charcoal.

    Burn, a Kenya-based clean cookstove company and carbon developer with operations in over 10 African countries, will implement BEEP. This program makes clean cooking appliances more affordable and accessible by prefinancing induction cookers and recovering costs through carbon credit sales in the voluntary market. This innovative model combines carbon-backed subsidies with pay-as-you-go payment plans, significantly lowering upfront costs for end-users.

    Capitalised through a Special Purpose Vehicle (SPV), the Program is funded by a $5 million senior loan from the Spark+ Africa Fund, a $4 million reimbursable grant from SEFA, and $1 million in equity from Burn Manufacturing Company. This SPV will partner with Burn to manage sales, distribution, and servicing of the cookers. The appliances will generate carbon credits, owned by the SPV, with revenues shared among investors.

    Dr. Daniel Schroth, Director for Renewable Energy and Energy Efficiency at the African Development Bank Group, stated, “This marks the Bank’s first carbon finance transaction of its kind, with SEFA playing a critical role in mitigating carbon market risks and enhancing the Program’s financial sustainability.”

    The program aligns with SEFA’s thematic area on Energy Efficiency, catalysing private sector investments in efficient appliances and promoting scale-up of clean cooking technologies. It also supports the Mission 300 Initiative and the Bank’s New Deal on Energy for Africa, which aim to deliver universal energy access through low-carbon solutions.

    “We are honoured to receive this catalytic investment from the African Development Bank’s Sustainable Energy Fund for Africa—their first-ever investment in carbon projects focused on electric cooking. This milestone enables BURN to rapidly scale our IoT-enabled induction stove across Kenya, Uganda, and Zambia, providing low-income households with a zero-emission, digitally monitored alternative to charcoal and wood,” said Peter Scott, Founder and CEO, BURN. “By integrating cutting-edge technology, carbon financing, and mobile-enabled Pay-As-You-Cook models, we are demonstrating that electric cooking can be clean, affordable, and scalable across the continent.” 

    In addition to environmental and health benefits, the program will stimulate job creation and fortify local supply chains within the three target countries, paving the way for a cleaner, more prosperous future for communities across Kenya, Uganda, and Zambia.

    Distributed by APO Group on behalf of African Development Bank Group (AfDB).

    Media contact: 
    Alexis Adélé
    Communications and External Relations Department
    media@afdb.org

    ABOUT SEFA:
    SEFA is a multi-donor Special Fund that provides catalytic finance to unlock private sector investments in renewable energy and energy efficiency. SEFA offers technical assistance and concessional finance instruments to remove market barriers, build a more robust pipeline of projects and improve the risk-return profile of individual investments. The Fund’s overarching goal is to contribute to universal access to affordable, reliable, sustainable, and modern energy services for all in Africa, in line with the New Deal on Energy for Africa and the M300.

    About the African Development Bank Group:
    The African Development Bank Group is Africa’s leading development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). Represented in 41 African countries, with an external office in Japan, the Bank contributes to the economic development and social progress of its 54 regional member countries. For more information: www.AfDB.org

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: Tanzania: Ambassador Chen Mingjian Meets with the International Federation of Red Cross and Red Crescent Societies (IFRC) Juba Cluster Head Mohamed Babiker

    Source: APO


    .

    On July 17, Chinese Ambassador to Tanzania H.E. Chen Mingjian met Mohamed Babiker, Head of International Federation of Red Cross and Red Crescent Societies (IFRC) Juba Cluster with Lucia Pande, Secretary General of Tanzania Red Cross Society at the Embassy. They exchanged views on expanding humanitarian cooperation and improving Tanzanian people’s well-being.

    Distributed by APO Group on behalf of Embassy of the People’s Republic of China in the United Republic of Tanzania.

    MIL OSI Africa

  • MIL-OSI Africa: Irish Ambassador Bids Farewell to Sierra Leone’s President Julius Maada Bio

    Source: APO

    The Ambassador of Ireland to Sierra Leone, Aidan Fitzpatrick, paid a farewell courtesy call on His Excellency President Dr Julius Maada Bio, marking the end of his two-year diplomatic mission in the country.

    In his remarks, Ambassador Fitzpatrick expressed his sincere gratitude to President Bio for receiving him and used the opportunity to congratulate the President on his recent election as Chairman of the Economic Community of West African States (ECOWAS).

    Reflecting on his time in Sierra Leone, Ambassador Fitzpatrick commended the significant progress made under President Bio’s leadership, particularly in advancing women’s rights. He also praised the warmth and hospitality of the Sierra Leonean people and acknowledged the increasing international recognition the country has gained under President Bio’s tenure.

    He further revealed that Ireland is exploring opportunities to expand investment in Sierra Leone, underscoring the deepening of bilateral relations between the two nations.

    In response, President Bio thanked Ambassador Fitzpatrick on behalf of the Government and people of Sierra Leone for his service, dedication, and unwavering support throughout his mission.

    He noted that Sierra Leone recently established an embassy in Ireland, reflecting the long-standing and cordial relations between the two countries.

    “Your leadership and diplomatic style will be missed. You were always present and supportive at diplomatic meetings,” the President recalled. “I wish you success in your future endeavors.”

    Distributed by APO Group on behalf of State House Sierra Leone.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI USA: Zinke, Sheehy, Moore, Banks Introduce Legislation to Implement Fees on Foreign Tourists to Rebuild National Parks

    Source:

    Washington, D.C. — Today, Western Montana Congressman and former Secretary of the Interior Ryan Zinke (MT-01), with Senator Tim Sheehy (R-MT), Representative Riley Moore (WV-02), and Senator Jim Banks (R-IN) introduced the bicameral Protecting America’s Treasures by Raising Inflow from Overseas Tourists in Parks Act (PATRIOT Parks Act), which would authorize a surcharge for most foreign tourists visiting national parks. If implemented, the bill would ensure foreign visitors contribute their fair share to the upkeep and preservation of America’s most treasured places. 

    “National Parks are Americas best idea and maintaining that legacy for future generations means making smart investments in the management of the parks,” said Zinke. “Americans already pay for parks in our tax dollars as well as at the gates. It’s unfair to American taxpayers to foot the bill for millions of foreign visitors. Almost every other country charges foreign visitors more, it’s common sense. President Trump and Secretary Burgum did the right thing directing the National Park Service implement a foreign visitor fee. This legislation will codify the policy and ensure Americans are put First in our own parks.”

    “From the New River Gorge in my home state to Shenandoah, the Great Smoky Mountains, the Everglades, and the Grand Canyon – God blessed our nation with a tremendous natural heritage. We owe it to future generations to ensure these natural marvels are protected, said Moore. “Unfortunately, the National Park System currently faces a backlog of more than $23 billion in deferred maintenance, including more than $200 million on properties across the Mountain State. Our commonsense legislation keeps entry fees static for Americans while charging more for foreigners visiting our National Parks. This will allow us to finally start tackling this extensive maintenance backlog.”

    “Our national parks drive Montana’s tourism economy by bringing in visitors from all over the world and define our way life by offering an experience you can only find in America,” said Sheehy. “Implementing a foreign visitor fee is an America First, commonsense way to secure affordable access for American families, improve our national parks for all visitors, and better manage our treasured public lands. It’s not too much for Americans to ask that their government puts them first, and that’s why I’m proud to support the PATRIOT Parks Act so more American families can enjoy our national parks for generations to come.”

    The National Park Service has $23 billion deferred maintenance infrastructure backlog. NPS relies on appropriated funds from tax dollars, Great American Outdoors Act funds from energy leasing, and entrance fees to address infrastructure needs. Every park will benefit from this program regardless of if they collect fees or not. By law, under the current formula for entrance fees, 80% of the fees collected at a park stay in the park where they are collected. The remaining 20% of entrance fees collected is distributed to non-fee collecting parks to improve infrastructure and visitor experience. The foreign visitors surcharge will use the same formula ensuring all parks benefit from this funding. 

    According to a report by Property and Environment Research Center (PERC), a surcharge of just $40 per foreign visitor would raise $528 million for our park system.

    “People travel from around the world to experience America’s national parks, and now they can help conserve them too,” said PERC CEO Brian Yablonski. “A surcharge on international visitors is a common practice globally and offers a smart, reliable way to fund better trails, cleaner campgrounds, modernized water systems, and desperately needed restoration work in our parks. We appreciate Rep. Zinke’s support for strengthening America’s national parks.” 

    Virtually all other countries do this already. Foreign tourists visiting the Galapagos National Park in Ecuador pay a $200 surcharge, South Africa charges as much as 500% more for foreign visitors, many European Union nations charge non-EU citizens surcharges at museums and cultural sites. 

    The foreign visitor would only apply to National Parks units that already collect entrance fees. If a park does not currently collect an entrance fee, the surcharge will not apply. Canadian citizens visiting Glacier National Park would be exempt from the surcharge in recognition of our joint stewardship of Waterton-Glacier International Peace Park. Fee-collecting monuments in Washington, D.C., are also exempted.

    The bill codifies an executive order signed by President Trump directing the Department of the Interior and Department of Agriculture to implement a foreign visitor surcharge to support public lands and rural communities.

    Read the full bill text here.

     

    ###

    MIL OSI USA News

  • MIL-OSI Analysis: Popular Tunisian island’s cultural heritage at risk due to tourism, neglect and climate change

    Source: The Conversation – UK – By Majdi Faleh, Academic Fellow & Lecturer in Architecture and Cultural Heritage, Nottingham Trent University

    The Sidi Yati mosque in Djerba, which dates back to the 10th century, has been damaged by coastal erosion. Mehdi Elouati, CC BY-NC-ND

    Nestled in the southern Mediterranean, off the south-east coast of Tunisia, lies the island of Djerba. With a rich cultural and religious history, it has been a crossroad of many civilisations, including the Phoenicians, Romans, Byzantines and Arabs, and is home to many unique architectural sites. These include the Sedouikech underground mosque, St Joseph’s Church and the El Ghriba Synagogue.

    But, for many years, Djerba’s cultural heritage has been in danger. This is due to a combination of over-tourism, environmental change and human neglect.

    An underground mosque on the island of Djerba.
    Mariana Delca / Shutterstock

    By the 1990s to early 2000s, when Djerba was at the height of its popularity, the island was attracting between 1 million and 1.5 million visitors each year. It is one of Tunisia’s most popular tourist areas, with more hotels than any other destination in the country.

    Tourism has resulted in excessive tourist traffic in Djerba, particularly during the summer. It has also contributed to other problems such as water stress and waste generation. According to figures from 2020, hotels alone generate between 35% and 40% of all the waste on the island.

    But the development of tourism has, above all, altered Djerba’s cultural landscape. In some areas of the island, Djerba’s traditional housing – houmas, menzels and houchs – have given way to more modern tourist infrastructure.

    This has accelerated since Tunisia’s 2011 revolution, when long-time dictator Zine El Abidine Ben Ali was ousted. Weak institutional oversight has led to vandalism, illegal construction on archaeological sites and unauthorised demolitions.

    The development of tourism on Djerba has also eroded traditional ways of life. The island has experienced significant changes due to tourism, with the development of roads, ferries, an airport and the internet leading to a decline in traditional activity. Livelihoods like agriculture, fishing and artisanal crafts have declined and are often now showcased only in tourist areas.

    Life on Djerba has changed since it was opened up for tourism.
    BTWImages / Shutterstock

    Climate change has worsened Djerba’s problems. Rainfall patterns have changed across the island over recent decades, with models suggesting that annual precipitation rates could drop 20% by the end of the century. More frequent and prolonged droughts are expected.

    At the same time, rising sea levels and increasingly common storm surges are affecting the island. Research from 2022 found that 14% of Djerba’s beaches are now highly vulnerable to submersion and coastal erosion.

    Several historical monuments on Djerba have already experienced periodic flooding and saltwater intrusion. The ruins of Sidi Garous and the shrine of Sidi Bakour are now entirely underwater and have been replaced by memorials.

    Other archaeological sites located near the coast like Haribus, Meninx, Ghizene and Edzira, some of which date back to the Roman era (eighth century BC to fifth century AD), are now partially or fully submerged. Studies by Tunisia’s National Institute of Heritage suggest that many of these sites have been lost permanently to the encroaching sea.

    World heritage site

    Significant portions of Djerba’s cultural heritage have already been erased by sea-level rise and coastal erosion. Future losses could be even more severe. The island’s cultural heritage will only grow more precarious without meaningful preservation and climate adaptation efforts.

    However, many of Djerba’s monuments, historical buildings and traditional dwellings have suffered from years of neglect. A chronic lack of local and international funding, as well as weak institutional frameworks for heritage management, mean some of the island’s historic structures have been abandoned. Many other buildings have deteriorated due to a lack of protective measures and maintenance.

    Community organisations such as the Association for the Safeguarding of the Island of Djerba have tried to step in to fill the void left by weak institutional frameworks. Their work ranges from delivering public awareness campaigns to local young people to efforts like re-purposing ancient rainwater tanks to manage periods of drought.

    But these grassroots efforts alone are not enough to stop Djerba’s cultural heritage from deteriorating at its current pace.

    The ruins of a Housh, a traditional dwelling, on the island of Djerba.
    Ahmed Bedoui, CC BY-NC-ND

    In September 2023, the UN Educational, Scientific and Cultural Organization (Unesco) announced that it was adding Djerba to its list of world heritage sites. Tunisia’s culture ministry welcomed the decision. It followed years of efforts by local groups and government officials to add Djerba to the list.

    Djerba’s inclusion offers hope for the long-term preservation of the island’s heritage. A world heritage site designation increases global recognition and enables improved access to sources of funding.

    And since Djerba’s classification, there has been some progress. The culture ministry has established a task force to monitor the construction of buildings and other infrastructure, collect data on designated protected areas, and prepare projects to preserve heritage sites.

    But Djerba’s cultural heritage remains in danger. Improved preservation of these sites will require continuous funding and stringent regulation of tourism and construction activities.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Popular Tunisian island’s cultural heritage at risk due to tourism, neglect and climate change – https://theconversation.com/popular-tunisian-islands-cultural-heritage-at-risk-due-to-tourism-neglect-and-climate-change-223612

    MIL OSI Analysis

  • MIL-OSI: BitMart Launches Crypto Loans: Unlock Liquidity and Earn While You Borrow

    Source: GlobeNewswire (MIL-OSI)

    Mahe, Seychelles, July 22, 2025 (GLOBE NEWSWIRE) —

    BitMart, a leading global cryptocurrency exchange, announced the launch of BitMart Crypto Loans service, the lending product that allows users to stake their digital assets as collateral, borrow instantly, and continue earning interest — all without selling their holdings.

    As the digital asset market evolves rapidly, users are increasingly seeking flexible and efficient ways to manage their assets. In the current market environment, liquidity has become a major challenge for crypto asset holders. Traditional solutions often require selling assets to unlock funds — but this also means giving up the potential for future appreciation, particularly for long-term holders of major assets like BTC, ETH, or the platform token BMX. For these users, selling their holdings could mean missing out on future opportunities. Therefore, the market urgently needs a solution that provides liquidity without liquidating assets.

    Key Highlights of BitMart Crypto Loans

    • Flexible Loans Without Selling Assets — Users can pledge their digital assets as collateral to borrow loans without having to sell. This is especially attractive to long-term holders.
    • Earn Interest on Collateralized Assets — Users can continue earning yields on your pledged assets via BitMart Earn.
    • Flexible Repayment — No fixed terms or late fees; repay anytime at your convenience.
    • Multi-Asset Support — Borrow and pledge in USDT, USDC, BTC, ETH, BMX, and more.
    • Transparent, Low Costs — Competitive hourly interest rates that adjust with the market.

    BMX, BitMart’s native token, plays a pivotal role in this ecosystem. It can be used both as collateral and as a borrowed asset, further enhancing liquidity and utility. BMX holders also enjoy additional perks, including trading fee discounts, VIP benefits, and participation in BitMart’s growth through airdrops and rewards — creating a vibrant, user-driven ecosystem.

    Launch Benefits: Interest Rebates and USDC Rewards

    To celebrate the launch, BitMart is offering exclusive promotions:

    • Interest Subsidy — New users receive a 50% rebate on interest paid; VIP users enjoy a full 100% rebate, achieving “zero-interest” borrowing.
    • Leaderboard Rewards — The top 50 borrowers by total loan amount will share in generous USDC prizes, with first place taking home 1,000 USDC.

    Details: https://www.bitmart.com/activity/cryptoloans/en-US 

    As the digital asset market matures and evolves, traditional asset management models can no longer meet modern users’ demands for flexibility, efficiency, and diversification. The launch of BitMart Crypto Loans not only brings a fresh liquidity solution to the market but also opens up new possibilities for the application of crypto assets. Without sacrificing the long-term appreciation potential of their holdings, users can easily allocate funds while earning transparent and sustainable yields through financial tools. This innovative model undoubtedly represents the future of the industry: smarter, more flexible, and more efficient asset management is set to become the new norm in the crypto market.

    About BitMart

    BitMart is the premier global digital asset trading platform. With millions of users worldwide and ranked among the top crypto exchanges on CoinGecko, it currently offers 1,700+ trading pairs with competitive trading fees. Constantly evolving and growing, BitMart is interested in crypto’s potential to drive innovation and promote financial inclusion. To learn more about BitMart, visit their Website, follow their X (Twitter), or join their Telegram for updates, news, and promotions. Download BitMart App to trade anytime, anywhere.

    Disclaimer:

    Use of BitMart services is entirely at your own risk. All crypto investments, including earnings, are highly speculative in nature and involve substantial risk of loss. Past, hypothetical, or simulated performance is not necessarily indicative of future results. The value of digital currencies can go up or down and there can be a substantial risk in buying, selling, holding, or trading digital currencies. You should carefully consider whether trading or holding digital currencies is suitable for you based on your personal investment objectives, financial circumstances, and risk tolerance. BitMart does not provide any investment, legal, or tax advice.

    The MIL Network

  • MIL-OSI: BoldSign® by Syncfusion® Earns 2025 SaaS Awards Finalist Honors and Five G2 Summer Badges

    Source: GlobeNewswire (MIL-OSI)

    RESEARCH TRIANGLE PARK, N.C., July 22, 2025 (GLOBE NEWSWIRE) — Syncfusion®, Inc., the enterprise technology provider of choice, today announced that its e-signature solution, BoldSign®, has been named a finalist in the 2025 SaaS Awards in multiple categories. Additionally, BoldSign has secured five Leader badges in G2’s Summer 2025 Grid® Reports.

    BoldSign is a SaaS Awards Finalist in the Highest Customer Satisfaction with a SaaS Product and Best SaaS for Sustainability and Ethical Impact categories.

    In the latest reports from leading review platform G2, BoldSign earned the following recognitions:

    Additional information can be found on the BoldSign blog.

    “BoldSign removes friction from everyday agreements while giving developers full control,” said Daniel Jebaraj, CEO of Syncfusion®. “Recognition from the SaaS Awards judges and hundreds of verified G2 reviewers affirms that BoldSign delivers real, measurable value through its thoughtful feature set, robust security, and developer-friendly approach.”

    The SaaS Awards, operated by global cloud computing awards body The Cloud Awards, spotlight the most innovative and impactful cloud software worldwide. BoldSign is backed by enterprise-grade SOC 2®-certified security, industry-recognized customer support, qualified electronic signature support, and extensive integration capabilities. These enable development teams to embed modern, paper-free signing in any application while helping organizations reduce paper waste and meet sustainability goals.

    BoldSign offers simple, flexible pricing (as well as a free plan), straightforward APIs, and a growing feature set, giving teams a faster, more affordable path to legally binding e-signatures. For more information or to start a free trial, visit boldsign.com.

    About Syncfusion®, Inc.
    Headquartered in the technology hub of Research Triangle Park, N.C., Syncfusion, Inc. delivers an award-winning ecosystem of developer control suites, embeddable BI platforms, and business software. Syncfusion was founded in 2001 with a single software component and a mission to support businesses of all sizes—from individual developers and start-ups to Fortune 500 enterprises. Though its pilot product, the Essential Studio® suite, has grown to over 1,900 developer controls, its mission remains the same. With offices in the U.S., India, and Kenya, Syncfusion prioritizes the customer experience by providing feature-rich solutions to help developers and enterprises solve complex problems, save money, and build high-performance, robust applications.

    Contact: Brittany Kearns
    Phone: 571-271-7211
    Email: brittany@crossroadsb2b.com

    The MIL Network

  • MIL-OSI United Nations: ‘Peace is a choice’: UN chief urges diplomacy as wars spread from Gaza to Ukraine

    Source: United Nations 2

    This is the only sustainable path to global security, he told ministers at a high-level open debate of the Security Council on Tuesday.

    The Secretary-General emphasised that the UN Charter’s tools – negotiation, mediation, conciliation, arbitration and more – remain a lifeline when tensions escalate, grievances fester and states lose trust in each other.

    These tools are needed now more than ever, he stressed, as conflicts rage and international law is violated with impunity.

    The cost is staggering – measured in human lives, shattered communities and lost futures. We need look no further than the horror show in Gaza – with a level of death and destruction without parallel in recent times.”

    The risk of starvation looms and aid operations are being denied the space and safety to function. UN premises, such as the UN Office for Project Services (UNOPS) and the World Health Organization (WHO)’s main warehouse, have been hit despite parties being notified of their locations.

    “These premises are inviolable and must be protected under international humanitarian law – without exception,” Mr. Guterres reiterated.

    Peace is a choice – make it

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, “conflict is raging, international law is being trampled, and hunger and displacement are at record levels,” he continued, adding that terrorism, violent extremism and transnational crime also remain “persistent scourges” pushing security further out of reach.

    Peace is a choice. And the world expects the Security Council to help countries make this choice.

    Mr. Guterres pointed to the UN Charter’s bedrock obligation in Article 2.3 that “all Members shall settle their international disputes by peaceful means”, and to Chapter VI, which empowers the Security Council to support “negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of last year’s Pact for the Future urges states to recommit to preventive diplomacy, he said, commending Pakistan – the Council President for July – for tabling a resolution encouraging fuller use of those tools, which was adopted unanimously at the meeting.

    UN Photo/Manuel Elías

    Secretary-General António Guterres addresses the Security Council high-level open debate.

    P5 must overcome divisions

    Security Council members – “in particular its permanent members” – must overcome divisions, the Secretary-General said, reminding them that even during the Cold War, Council dialogue underpinned peacekeeping missions and humanitarian access, and helped prevent a third world war.

    He urged members to keep channels open, build consensus and make the body “more representative” of today’s geopolitical realities with more inclusive, transparent and accountable working methods.

    Mr. Guterres also urged deeper cooperation with regional and subregional organizations.

    Mediation can work even amid war, he said, noting the third anniversary of the Black Sea Initiative and a related memorandum with Russia that enabled grain movements during the conflict in Ukraine.

    Renew commitment to multilateralism

    States must honour their obligations under the Charter; international human rights, refugee and humanitarian law, and the principles of sovereignty, territorial integrity and political independence, Mr. Guterres said.

    As we mark the 80th anniversary of our Organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy,” he said.

    I look forward to working with you to achieve the international peace and security the people of the world need and deserve.

    Security Council open debate

    A signature event of the Pakistani presidency, Tuesday’s open debate was chaired by Deputy Prime Minister and Foreign Minister Mohammad Ishaq Dar.

    The session aimed to assess the effectiveness of existing mechanisms for pacific dispute settlement, examine best practices and explore new strategies for tackling protracted conflicts.

    It also sought to enhance cooperation with regional organizations, boost capacity-building and resource mobilisation, and align future efforts with the conflict-prevention vision outlined in the Pact for the Future.

    MIL OSI United Nations News

  • MIL-OSI Africa: The Legacy of Martyr Ömer Halisdemir Lives on Through Turkish Cooperation and Coordination Agency’s (TİKA) Turkish Language Class in Somalia

    Source: APO


    .

    Turkish Cooperation and Coordination Agency (TİKA) established the “Martyr Ömer Halisdemir Turkish Language Class” at an orphanage in Somalia that houses the children of martyred police officers.

    TİKA launched this meaningful educational project in honor of the children of Somalia’s fallen police officers. Named after July 15 Martyr Ömer Halisdemir, the Turkish language class was inaugurated during a ceremony at an orphanage in the capital, Mogadishu.

    The opening was held as part of the July 15 Democracy and National Unity Day commemoration program, organized by the Embassy of the Republic of Türkiye in Mogadishu.

    The ceremony was attended by Somali Minister of Internal Security, Abdullahi Sheikh Ismael (Fartaag); Minister of Defense, Ahmed Moalim Fiqi; Army Commander Brigadier General Sahal Abdullahi Omar; Somali Police Force Commander, Major General Asad Osman Abdullahi; and Türkiye’s Ambassador to Mogadishu, Alper Aktaş. Also in attendance were the ambassadors of Qatar, Sudan, and Kenya, along with the Permanent Representative of the Organization of Islamic Cooperation to Somalia, Ambassador Mohamed Bamba.

    The “Martyr Ömer Halisdemir Turkish Language Class” aims to honor the national spirit of July 15, preserve the memory of a heroic martyr through education, and provide Somali students with the opportunity to learn Turkish. Turkish language instruction in the classroom will be provided by Yunus Emre Institute, enabling students to become more familiar with the Turkish language and culture and gain an advantage when pursuing educational opportunities in Türkiye.

    Distributed by APO Group on behalf of Turkish Cooperation and Coordination Agency (TIKA).

    MIL OSI Africa

  • MIL-OSI Africa: African Union, in partnership with the United Nations Children’s Fund (UNICEF), convene a Validation Workshop to Scale Proven Solutions for Foundational Learning in Africa

    Source: APO


    .

    The Validation Workshop on Scalable Foundational Literacy and Numeracy (FLN) Practices to End Learning Poverty in Africa was officially opened today. The two-day gathering, held at the African Union Commission (AUC) Headquarters in Addis Ababa from July 22 to 23, 2025, marks a significant step forward in the collective effort to address the continent’s learning crisis and ensure that every child acquires the essential foundational skills they deserve by age 10.

    The workshop brings together technical experts from 25 Member States, along with representatives from the African Union Commission, UNICEF, the Gates Foundation, and other development partners. The goal is to validate the research findings constituting the mapping of scalable good practices for foundational literacy and numeracy across the continent.

    “The continental Foundational Literacy and Numeracy mapping resource we are validating today is an essential step toward reversing this trend. It seeks to gather, synthesise, and spotlight what works—real, evidence-based, scalable practices that have shown success across diverse African contexts. Whether it’s structured pedagogy in Uganda, mother-tongue based instruction in Ethiopia, or targeted instruction by learning level in Zambia, these are not only just case studies, but blueprints with promise for large-scale systemic change”, Prof. Saidou Madougou, Director of the Department of Education, Science, Technology and Innovation (ESTI).

    Across West, Central, East, and Southern Africa, an alarming 9 out of 10 children are unable to read and understand a simple sentence by the age of 10. While enrollment in primary and lower secondary education has increased significantly over the last two decades, millions of children attend school without acquiring the foundational skills they need. This persistent learning crisis is more than an educational challenge; it poses a threat to future economic prosperity.

    “This workshop is a significant step in creating a broader pathway of engagement for foundational learning and numeracy between educators, policy makers and practitioners to improve learning outcomes: learning from one another through the cross-fertilisation of successes, and more importantly, taking the lead in adapting scalable solutions and embedding them into national education sector plans, policies, and programmes”, emphasized Dr Laila Gad, UNICEF Representative to the African Union and UNECA

    The outcomes of this workshop will also contribute to the End Learning Poverty for All in Africa Campaign (ELPAf)—a four-year African Union–UNICEF initiative launched in September 2024 during the AU Year of Education. ELPAf aims to end learning poverty in Africa by strengthening foundational literacy and numeracy, which are the cornerstones of all further learning and skill acquisition. Foundational learning holds the most significant promise for overcoming Africa’s education challenges, laying the groundwork for lifelong learning, and empowering African children to thrive as engaged citizens and contributors to their communities and economies.

    Distributed by APO Group on behalf of African Union (AU).

    MIL OSI Africa

  • MIL-OSI Africa: Eastern youth: “We need representation to trust government institutions”

    Source: APO


    .

    As part of the United Nations Support Mission in Libya’s public consultations with youth on the political process, 21 youth from across the eastern region joined an online consultation on Sunday about the Advisory Committee’s proposals to take Libya to elections. Highlighting their recommendations, they said youth must have representation in government institutions in order to rebuild trust with the executive which has been eroded. 

    “We do not trust any of the current entities. There is a large trust gap among young people and government entities because we do not have any representation,” said one participant from Benghazi.  

    “None of the existing bodies give space for new players,” said another participant from Benghazi. “They do not give space to youth. We need new bodies that represent us.” 

    Others agreed saying that the current institutions have lost the confidence of the people, with many believing they have obstructed elections because those running them wish to stay in power. 

    Many participants suggested that Option 4, which stipulates a Constituent Assembly be selected through a dialogue forum to select an interim government and pave the way for elections, was the most reasonable way forward as it gives citizens a voice. But others advocated for options 1, 2 and 3. Option 1 suggests near simultaneous presidential and legislative elections. Option 2 suggests electing a legislature first to adopt a constitution before conducting presidential elections. Option 3 suggests adopting a constitution prior to any elections.  

    “We have tried options 1 and 2 before and they were unsuccessful,” said a participant from Derna. “It is like the Advisory Committee put forward four options, the first three of which have already been done.” 

    A participant from Benghazi argued: “Option 4 is the best option because there is a constituent assembly, and we can be local observers.” 

    “Simultaneous elections will not work,” said another participant who favoured Option 2.  

    The current political environment is not conducive to linking presidential and legislative elections, as is suggested in the Advisory Committee’s first option, they said.  

    “It is very difficult to have a full electoral track,” said a participant from Benghazi. “We saw what the government did to prevent elections last time. Any new government must be under a constitutional track that elections follow.” 

    The need for political stability was stressed, with participants saying the impact of the ongoing economic and security situation was taking a significant toll.  

    “I don’t accept a unified government in Tripoli when I need development in my area and they are 1,000 kilometres away,” said one participant from Benghazi.  

    Another from Al Marj, said that all the options were ideal, if Libya was a stable country. They suggested that a national dialogue that included everyone—not just 40 to 50 people— and which represented each region would be hard to ignore if it was established. 

    “The country requires political and institutional stability for there to be a future. We must let the people choose, not have us subjected to under-the-table agreements,” said another participant. “There must be real opportunities for women and youth to participate. But there also has to be regional representation. Federalism is a realistic solution to these issues and would save the country from regional separation and ensure a fair distribution of wealth.” 

    Distributed by APO Group on behalf of United Nations Support Mission in Libya (UNSMIL).

    MIL OSI Africa

  • MIL-OSI Africa: Portugal Reaffirms Commitment to Strengthening Strategic Partnership with Morocco

    Source: APO


    .

    The Portuguese Minister of State and Foreign Affairs, Paulo Rangel, praised, on Tuesday in Lisbon, the excellent bilateral ties with the Kingdom of Morocco, reaffirming the mutual will to strengthen the strategic partnership between the two countries, which represents a stellar cooperation model.

    This position was set out in the Joint Statement signed at the end of his meeting with the Minister of Foreign Affairs, African Cooperation and Moroccan Expatriates, Mr. Nasser Bourita.

    On this occasion, MFA Bourita and his Portuguese peer welcomed the excellent bilateral ties which continue to gain new momentum, strengthened in 2024 by the celebrations of the 250th anniversary of the historic Peace and Friendship Agreement signed between the two countries in 1774, and the 30th anniversary of the Friendship, Neighbourhood and Cooperation Treaty, signed in Rabat on May 30, 1994.

    The two ministers stressed the need to work towards implementing the commitments contained in the strategic partnership linking the two countries, endorsed at the 14th session of the High-Level Meeting held in Lisbon in May 2023.

    In this respect, MFA Bourita and Rangel seized the opportunity to underline the economic potential and the means to be deployed to further strengthen cooperation in priority areas, notably green hydrogen, calling for continued joint efforts to install the electricity interconnection project and ensure connectivity, including maritime connectivity, between the two countries.

    The two ministers also welcomed the joint organization by Morocco and Portugal, alongside Spain, of the 2030 Football World Cup, underscoring the momentum that could be unleashed by such a large-scale event in terms of shared prosperity and growth, as well as cultural rapprochement between the two countries.

    Regrading shared objectives and responsibilities, the two leaders undertook to pursue consultations and coordination within international bodies.

    Distributed by APO Group on behalf of Kingdom of Morocco – Ministry of Foreign Affairs, African Cooperation and Moroccan Expatriates.

    MIL OSI Africa