Category: Africa

  • MIL-OSI Africa: Kinshasa Sets the Stage: “The Rumba Route for Peace” Connects Tourism and Culture

    Source: APO


    .

    Held under the High Patronage of His Excellency President Félix Antoine Tshisekedi Tshilombo, the “Rumba Route for Peace” Festival (16-18 July) brought together representatives from across the globe to celebrate the power of music to heal, connect, and inspire across borders—an approach deeply echoed in UN Tourism’s advocacy for using culture as a bridge between people and nations. The event was also in full alignment with UN Tourism’s “Agenda for Africa: Tourism for Inclusive Growth”.

    Where Rhythm Meets Global Leadership

    At the Opening Ceremony, the Festival was inaugurated by President Tshisekedi, following keynote remarks by the Honorable Didier M’Pambia Musanga, Minister of Tourism; the Honorable Yolande Elebe Ma Ndembo, Minister of Culture, Arts, and Heritage; and UN Tourism Secretary-General Zurab Pololikashvili.

    With the participation of government leaders, private sector giants like Sony Music Entertainment and Spotify (virtually), and institutions such as the African Regional Intellectual Property Organization (ARIPO), UNESCO, Sound Diplomacy, ConcertsSA, and the University of La Plata in Argentina, panel sessions explored bold ideas and practical solutions.

    UN Tourism Secretary-General Zurab Pololikashvili said: “Tourism can be a channel for establishing peace and understanding. In Kinshasa, we showcased the power of music to bring people together, as well as the power of tourism to create opportunities, protect and celebrate unique cultures and embrace positive transformation through innovation.”
    His Excellency Félix Antoine Tshisekedi Tshilombo, President of the Democratic Republic of the Congo said: “By uniting the rhythms of the world and the treasures of our territories, this gathering reflects the ambition to build bridges between peoples through art, exchange, and discovery.”

    Panels Centre Youth, Innovation and Culture

    The four high-level panels delved into music tourism’s power to drive peace, protect artists’ rights, boost economic development, and harness the digital revolution to amplify cultural heritage. From “Transatlantic Rhythms for Peace” to “From Vinyl to Viral,” each session reinforced the critical role of youth, innovation, and fair ecosystems in shaping the future of creative industries.

    A standout moment of the Congress was the “Fair Play” Masterclass, led by ARIPO, which underscored the critical importance of copyright and related rights protection. The session empowered 100 artists and creative entrepreneurs with practical tools to build fairer, more sustainable music economies across Africa and beyond.

    The Festival also featured performances by artists from across Africa, including Angola, Kenya, South Africa, and Zimbabwe and offered hands-on experiences such as an immersive rumba initiation, inviting participants to connect with heritage through movement, flavor, and sound.

    Hon. Didier M’Pambia Musanga, Minister of Tourism, Democratic Republic of the Congo said: ““This festival is a platform for exchange, sharing and discovery that crosses races and generations, embodying the spirit of a modern DRC open to the world.”

    Presidential Audience as UN Tourism Supports Education

    In Kinshasa, UN Tourism reaffirmed its strong commitment to a creative, youth-led, and sustainable future, notably through the awarding of 100 scholarships in Destination Marketing via its UN Tourism Academy. This initiative reflects a long-term investment in empowering the next generation of African tourism professionals and innovators.

    An audience with President Tshisekedi further reflected the high-level national support for leveraging culture and tourism as strategic pillars of development. 

    Distributed by APO Group on behalf of World Tourism Organization (UN Tourism).

    MIL OSI Africa

  • MIL-OSI Africa: 2025 Country Focus Report: Burkina Faso urged to make better use of national resources to finance its development

    Source: APO

    The African Development Bank’s 2025 Country Focus Report for Burkina Faso (www.AfDB.org), the national version of the African Economic Outlook, was officially launched on 18 July 2025 in Ouagadougou.

    The ceremony was chaired by Souleymane Nabolé, Technical Advisor, representing the Minister of Economy and Finance, in the presence of Daniel Ndoye, the Bank Group’s Country Manager for Burkina Faso. Run virtually, the session brought together more than 80 participants from the public administration, technical and financial partners, the research community and the private sector, as well as Bank executives.

    In a video message, Professor Kevin Urama, Chief Economist and Vice President for Economic Governance and Knowledge Management at the African Development Bank, reiterated that Country Focus Reports are designed to inform national policies and foster dialogue between states and their partners.

    The 2025 edition of the report focuses on the theme: “Making Burkina Faso’s Capital Work Better for its Development.” It analyses the country’s recent macroeconomic performance amid a complex security and humanitarian crisis, while presenting medium-term prospects and strategic directions to accelerate economic transformation.

    According to the Bank, the Burkinabe economy continued to expand in 2024, despite persistent security, humanitarian, and climate-related challenges. Burkina Faso is blessed in terms of natural, human, entrepreneurial, and financial capital, which if fully taken advantage of could bridge the country’s financing gap.

    The Burkinabe government concurs with this analysis. According to Nabolé: “Macroeconomic indicators are improving, with growth estimated at five per cent in 2024. To have a significant impact on the social front, we need to think about how the transformation of the Burkinabe economy can be achieved by drawing on human, natural, and financial resources, socio-economic infrastructure, and governance.”

    To bridge the financing gap, the report proposes several courses of action, including:

    • Improving agricultural productivity and promoting agro-industrial development
    • Strengthening mining revenue collection mechanisms and combating illicit financial flows
    • Enhancing access to education, health care, and vocational training
    • Building the capacities of the tax and customs administrations and the Ministry of Mines
    • Enhancing state oversight bodies, modernising the judicial system, and improving forest management.

    Abdoulaye Diop, President of the West African Economic and Monetary Union Commission, praised the Bank’s holistic approach stating that it “maximises the conditions for success and improved performance of national economies.”

    He also highlighted the resilience of the Burkinabe economy, which has remained robust despite a difficult security environment. “In terms of domestic resource mobilisation, Burkina Faso is currently the best performer in our Union with a tax ratio of nearly 19 per cent. In addition, for several years now, it has been one of the countries most committed to implementing Union legislation. That deserves the attention of partners.”

    Specific presentations focused on the need to strengthen the harnessing of domestic resources to offset the decline in external aid and financing, to make better use of human capital, to develop mineral resources to fund development, and to improve governance in the way in which various forms of capital are managed.

    At the end of the session, Ndoye expressed his delight at the elevated level of participation and the quality of the discussions. “We commend the country’s performance, particularly in terms of harnessing resources,” he said, concluding, “We noted a convergence between the report’s conclusions and recommendations and the strategies currently being implemented in Burkina Faso, particularly those with a focus on human capital.

    In parallel, Nabolé reiterated the Burkinabe government’s satisfaction with the quality of its cooperation with the African Development Bank.

    Distributed by APO Group on behalf of African Development Bank Group (AfDB).

    Media contact:
    Communication and External Relations Department
    media@afdb.org

    About the African Development Bank Group:
    The African Development Bank Group is Africa’s premier development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). On the ground in 41 African countries with an external office in Japan, the Bank contributes to the economic development and the social progress of its 54 regional member states. For more information: www.AfDB.org

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: Holding on through multiple displacement: A journey of strength and survival amid conflict in Sudan

    Source: APO


    .

    In the crowded gathering site at Al-Zaeem Al-Azhari School in Port Sudan, 41-year-old Marwa Hassan Saeed holds her daughter close—both weary from a long, painful journey of displacement. Once a teacher at an international school in Khartoum, Marwa’s life was upended by conflict and crisis. A divorced mother of four, she has faced each challenge alone, including the daily struggles of caring for her youngest daughter, who lives with cerebral atrophy. 

    Life was already difficult, but the outbreak of violence in mid-April 2023 turned it into a series of desperate moves. From Khartoum to Northern State, then to Madani, and finally to Port Sudan, Marwa and her children fled time and again to seek safety. Each step of the way, resources grew scarcer, hope harder to hold onto. Since the start of the current conflict, which has persisted for two years now, large numbers of civilians have been forced to flee, including people who were already internally displaced. As of 5 June 2025, over 7.7 million people have been internally displaced across Sudan, many of them uprooted multiple times as the conflict continues to escalate (Sudan situation). In Madani, Marwa’s family had found a fragile sense of stability—until fighting erupted again. Displaced for the third time, Marwa arrived in Port Sudan with little more than her determination to keep her children safe. Her daughter, who typically gained only one kilogram per year due to her condition, lost half her body weight during the journey—her small body weakened by stress, malnutrition, and the complete absence of medical care. 

    In Port Sudan, the family finally found a moment of relief, a much-needed support with kitchen ware. In February and March, right before the holy month of Ramadan, Marwa received essential kitchen supplies through a distribution led by UN Women in a partnership with SCEFA and with funding from the Government of Japan. This support enabled her to cook meals for her family and participate in communal food-sharing traditions—an especially important practice during Ramadan, when families and neighbors gather around large, shared plates to break their fast together. For Marwa, the distribution restored not just her ability to feed her children, but also her sense of dignity and connection to her community. Before the intervention, Marwa struggled to prepare proper meals for her children due to a complete lack of basic cooking utensils. With only limited items available in the overcrowded gathering site, preparing and sharing food, especially in a culturally appropriate way, was nearly impossible 

    “The cooking utensils I received made such a difference,” Marwa shared. “When you are a mother trying to care for children in a place that is not your home, even the smallest support helps you stand again. I’m not the only one. There are so many women here who have lost everything and still wake up every morning to provide for their families. We just need a little more help to keep going.” 

    Despite all she has endured, Marwa continues to show remarkable resilience. Her story is a testament to the courage of displaced women across Sudan who, even in the face of unimaginable hardship, continue to care for their children and rebuild their lives.

    Distributed by APO Group on behalf of UN Women – Africa.

    MIL OSI Africa

  • MIL-OSI Africa: Zimbabwe sets strategic course for capacity development on sustainable soil management

    Source: APO


    .

    Zimbabwe has made significant strides towards strengthening its agricultural resilience and soil management capacity through the launch of a new project titled “Capacity Development on Sustainable Soil Management in the Global South.”

    Following the successful high-level launch of the project this week, Zimbabwe has taken a decisive step forward with a two-day inception meeting that built momentum by defining the strategic direction and technical roadmap for project implementation.

    This initiative, supported by the People’s Republic of China under the South-South Cooperation framework is implemented by the Food and Agriculture Organization of the United Nations (FAO) and the Government of Zimbabwe.   

    “This meeting provided a critical platform to align our shared vision and technical priorities. It allowed us to present the strategic foundations of the project, define synergies among national institutions and key stakeholders, while collectively endorsing a clear roadmap for implementation,” said Patrice Talla, FAO Subregional Coordinator for Southern Africa and Representative to Zimbabwe.

    “This process marks a strategic, co-created and coordinated start to delivering sustainable soil management solutions for Zimbabwe,” added Talla.

    The meeting brought together key directorates and departments from the Ministry of Lands, Agriculture, Fisheries, Water and Rural Development (MLAFWRD). The Agricultural Research, Innovation and Specialist Services (ARISS) was represented by the Chemistry and Soil Research Institute (CSRI) whilst the Agricultural and Rural Development Advisory Services (ARDAS) was represented by the department of Agricultural, Technical and Extension Services (AGRITEX), Marondera University of Agricultural Sciences and Technology (MUAST) and international partners including the Chinese Academy of Agricultural Sciences (CAAS).

    Defining technical priorities and implementation framework

    The inception meeting was strategically structured to align technical dialogue with policy priorities. The meeting featured expert presentations on the distribution and management of red soils in Zimbabwe, the current state of soil laboratories and information systems, and comparative insights from China’s red soil management practices.

    These sessions laid the technical foundation for the project, ensuring that all stakeholders had a shared understanding of the scientific context and implementation framework. The meeting transitioned into a participatory planning phase, where stakeholders engaged in group discussions to define workplans for site identification, soil mapping, laboratory analysis, field trials, and farmer trainings through the Global Soil Doctor Programme.

    “This collaborative approach ensured that the project’s implementation plan was not only technically sound but also nationally owned and contextually relevant. The structure of the meeting strategically contributed to the project’s overall objectives, clarifying roles, and setting a clear, actionable roadmap for effective implementation of the project,” said Emmanuel Chikwari, Head of the CSRI.

    As the project moves into its implementation phase, the focus now shifts to delivering on three strategic priority areas: upgrading soil laboratories and developing digital soil maps; demonstrating sustainable soil and fertilizer management practices through field trials and extension training; and facilitating international knowledge exchange through workshops and technical cooperation. These actions will operationalize the project’s vision and deliver tangible outcomes for Zimbabwe’s soil health and agricultural resilience.

    Harnessing the power of South-South Cooperation and learning

    “This project is a powerful demonstration of how South-South Cooperation can drive innovation and capacity development in sustainable agriculture. As an implementing partner, Marondera University is proud to contribute to the rollout of this initiative by applying research, training, and field-evidence-based learning to improve soil management,” said Esther Masvaya, from MUAST.

    “The inception meeting has set a clear, co-owned and co-created direction for implementation, ensuring that Zimbabwe’s soil economy benefits from inclusive planning, shared expertise, and a strong culture of learning that will drive lasting impact,” said Sibongile Mangena-Chikore, Chief Agronomist, AGRITEX.

    FAO and its implementing partners will continue to refine the project’s strategic direction, monitoring progress and learning through regular workshops and field implementation activities.

    “Sustainable soil management is a pivotal activity towards enhanced agricultural production and productivity in the context of climate change. This project is a game changer, especially in the management of red soils in Zimbabwe, which have not received much attention in the past,” said Obert Maminimini, FAO Project Coordinator.

    Through its strong foundation in South-South Cooperation, the project also creates a platform for Zimbabwe to share its experiences, innovations, and lessons learned with other project countries in the Global South, fostering mutual learning and advancing sustainable soil management across regions.

    Distributed by APO Group on behalf of Food and Agriculture Organization of the United Nations (FAO): Regional Office for Africa.

    MIL OSI Africa

  • MIL-OSI United Kingdom: TRA proposes keeping anti-dumping measure on bikes from China

    Source: United Kingdom – Executive Government & Departments

    Press release

    TRA proposes keeping anti-dumping measure on bikes from China

    The TRA proposes that an anti-dumping measure on bicycles and bicycle parts from China be maintained, benefitting UK producers by up to £9 million per year.

    The Trade Remedies Authority (TRA) has today (31 July 2025) published its initial findings proposing that an anti-dumping measure on bicycles and certain bicycle parts imported from China be maintained until 30 August 2029.  

    Maintaining these measures will help to protect the UK’s bicycle industry, which includes many small and medium sized businesses employing thousands of people, from unfair international trade practices.

    In its Statement of Essential Facts, the TRA found that the dumping initially identified at the time the measures were first established would (as a result of China’s increased production capacity) likely resume if the measure was removed and that injury to UK industry would be likely as a result. The TRA determined that extending the current measure could help prevent dumping of low-priced bicycles and benefit UK producers by £1-£9 million per year.

    Current anti-dumping duties on Chinese bicycle and bicycle parts imports range from 19.2% to 48.5%, depending on the exporter.

    As part of its investigation, the TRA considered whether the anti-dumping measure should be maintained only on bicycles but removed on bicycle parts. However, the TRA has not presented this as an option due to the lack of clear evidence from industry participants and the continued risk of circumvention if the duties on parts were removed.

    A period of consultation is now open, during which interested parties can comment on the findings and provide any additional evidence, before a final recommendation is made to the Secretary of State. Businesses that may be affected by these findings can submit comments to the TRA by 25 August 2025 and can do so through the TRA’s public file.

    Background Information

    • The initial findings published today follow a transition review that was initiated on 23 August 2024. 
    • The reviewed products include bicycles and certain essential bicycle parts such as frames, wheels, handlebars, and brake components from China, including bicycles consigned from Cambodia, Indonesia, Malaysia, Pakistan, the Philippines, Sri Lanka and Tunisia.
    • In its investigation, the TRA found that China produces the greatest volume of bicycles in the world, estimated to account for 60% of global production. This equated to over 48 million bicycles in 2023 and the TRA found evidence to suggest this production capacity is growing.

    • Around 1.6 million bicycles are sold in the UK each year, with China accounting for around 24% of bicycle imports by volume during the period of investigation.

    • The Trade Remedies Authority is the independent UK body that investigates whether new trade remedy measures are needed to counter unfair import practices and unforeseen surges of imports.   
    • The TRA is an arm’s length body of the Department for Business and Trade.   
    • Anti-dumping duties allow a country or union to act against goods which are being sold at less than their normal value – this is defined as the price for ‘like goods’ sold in the exporter’s home market.  
    • The period of investigation (POI) for the review was 01 July 2023 to 30 June 2024. To assess injury, the TRA chose the period from 01 July 2020 to 30 June 2024 as the injury period (IP).

    Updates to this page

    Published 31 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: Economic and Social Council Holds Organizational Meeting to Launch 2026 Session

    Source: United Nations MIL OSI b

    2026 Session,

    1st Meeting (AM)

    ECOSOC/7219

    The Economic and Social Council opens its 2026 session today, electing its Bureau and hearing from Li Junhua, Under-Secretary-General for Economic and Social Affairs. 

    Lok Bahadur Thapa of Nepal has been endorsed to serve as the President for the session.  Amar Bendjamaa of Algeria; Paruyr Hovhannisyan of Armenia; Darío Bencosme Castaños of the Dominican Republic; and Héctor Gómez Hernández of Spain have been nominated to serve as the session’s Vice-Presidents.

    The 54-member Council will also adopt its provisional agenda (document E/2026/1) as well as take action on the draft resolution “Working arrangements for the 2026 session of the Economic and Social Council”, (document E/2026/L.1) and decide its seating arrangement for the session.

    For information media. Not an official record.

    MIL OSI United Nations News

  • MIL-OSI United Kingdom: This current state of war remains a choice that President Putin is making: UK statement at the UN Security Council

    Source: United Kingdom – Executive Government & Departments

    Speech

    This current state of war remains a choice that President Putin is making: UK statement at the UN Security Council

    Statement by Fergus Eckersley, Minister Counsellor, at the Security Council meeting on Ukraine.

    How is it that Russia can sit here and claim any sort of commitment to diplomacy, while at the same time ramping up missile and drone strikes on Kyiv?

    A six-year-old boy was amongst those killed last night by Russian missiles in Kyiv.

    The problem is that for all its words, the Russian state has geared itself for war.

    A war of aggression, a war of Russia’s own making.

    The government bolsters its legitimacy and suppresses opposition by stoking fears about external enemies.

    Russia’s economy is now highly dependent on military industrial production, with almost 40% of government spending on defence, more than 8% of GDP.

    And the President has defined himself politically as the man who can conquer so-called neo-Nazism in Ukraine, and the threat that he claims NATO poses to Russia.

    In reality, these are challenges of his own creation. 

    Ukraine is not ruled by neo-Nazis, and NATO does not pose a threat to Russia.

    NATO merely stands with Ukraine in the face of Russia’s unprovoked and illegal invasion.

    The consequences of a militarised Russian state are not limited to the appalling tragedies felt every day by Ukraine’s brave people.

    Russia itself has suffered over a million casualties as a result of its own war.

    The wider region is also directly dealing with the effects of Russia’s aggression. 

    And ultimately, we all are. Russia’s actions are an affront to the UN Charter principles and international law. 

    The very foundations of all of our peace and security. 

    The consequences for the wider international system are also clear. 

    While members of this Council discuss how to bring peace to Sudan, Russia tries to leverage access to a naval base. 

    While we discuss peace in Mali, Russia has pushed out the UN to secure advantage for its private military contractors. 

    While we discuss sanctions to prevent nuclear proliferation on the Korean peninsula, Russia tries to undermine those sanctions to access military supplies for its war machine.

    There is another pathway. 

    President Putin could accept the truth that there is no threat to Russia, not from Neo-Nazis and not from NATO. 

    He could choose to engage in good faith in a ceasefire and in peace talks based on the UN Charter.

    Until then, this state of war remains a choice that President Putin is making.

    We need to continue to show that there is no good outcome for Russia from its aggression, that we will remain staunch in our support for the defence of Ukraine, including through the provision of weapons systems in the face of relentless Russian attacks on critical national infrastructure and civilians.

    We must be vigilant in clamping down on any military industrial support for Russia, including by preventing the export of dual-use items.

    And we need to continue to demonstrate to Russia the economic costs of the choice it is making, and not give its militarised state a lifeline that it can feed on. 

    Ultimately, we must not let up in affirming the principles of the UN Charter.

    Every Member State at the UN has a responsibility in this, to support a peace process that only Russia, only Russia is currently rejecting.

    As President Trump has made clear, there is no reason for delay.

    Russia must make progress towards a meaningful peace immediately.

    But the world has seen Russia’s response. 

    That is why, as President Zelenskyy said, peace without strength is impossible.

    So it is now that we need to meet our responsibility to stand together and to demand that Russia immediately ceases its aggression and adheres to the call for a just and a lasting peace.

    Updates to this page

    Published 31 July 2025

    MIL OSI United Kingdom

  • MIL-OSI Europe: “We support the efforts currently being led by the United States in the region to get an immediate ceasefire”

    Source: France-Diplomatie – Ministry of Foreign Affairs and International Development

    Published on July 31, 2025

    Excerpts from the interview given by M. Jean-Noël Barrot, Minister for Europe and Foreign Affairs, to France 24 (New York, July 29, 2025)

    You consider the two-state solution to be the only way of achieving peace. So you’re confirming Emmanuel Macron’s desire to recognize a Palestinian State. Why do so only now? What’s changed?

    THE MINISTER – Because the two-state solution, which is the only one likely to bring peace and stability to the region, is in mortal danger, and the conditions had to be created for it to become credible again. That’s why around nine months ago we decided, with Saudi Arabia, to undertake an initiative to create momentum leading those involved – the Palestinian Authority and the region’s Arab countries, but also the whole international community – to make commitments. These commitments are crystallizing in New York today with a statement by the participating countries, which is historic and unprecedented in that the Arab countries – the countries of the region, of the Middle East – are, for the first time, condemning Hamas, condemning 7 October [attacks], calling for the disarmament of Hamas, calling for it to be excluded from participating in any way in Palestine’s governance and clearly voicing their intention to have normalized relations with Israel in the future and be part of a regional organization on the lines of ASEAN in Asia or the OSCE in Europe, alongside Israel and the future State of Palestine. This is a decisive step being taken, made possible by President Macron’s decision, among other things.

    And a moment ago, the United Kingdom announced that it’s going to recognize Palestine as well, if Israel doesn’t make certain commitments. Do you welcome this decision by Prime Minister Keir Starmer? Has momentum been created?

    THE MINISTER – I welcome it. Indeed, the United Kingdom has become part of the movement created by France to recognize the State of Palestine. With these crucial decisions announced by France and the UK, with the combined efforts of the whole international community gathered here in New York, we want to counter the cycle of violence and war and reopen the prospect of peace in the Middle East.

    The United States isn’t participating in the conference taking place in New York at the moment. Regarding your initiative to advocate for a two-state solution, it’s denouncing an unproductive, ill-timed initiative resembling a publicity stunt. Donald Trump also reckoned that the statement by President Macron a little earlier, last Thursday, doesn’t carry any weight. What’s your reply to him?

    THE MINISTER – Firstly, we support the efforts currently being led by the United States in the region to get an immediate ceasefire, the release of all Hamas’ hostages and unhindered access to humanitarian assistance. But to secure a ceasefire, we still have to sketch out what happens after the war and the political horizon that goes with it. That’s the goal of this UN conference that France is chairing with Saudi Arabia. And in the document we’ve just adopted, with the countries that were part of it, we’re mapping out a credible prospect that’s going to make a positive contribution to a ceasefire being reached in Gaza. Moreover, these efforts we’ve led, these concessions the various parties have made will, at some point, enable the United States to resume the Abraham Accords process that it began during President Trump’s first term. We hope this time will come. But in the meantime, it was obviously unthinkable to stand by and do nothing. (…)

    You said in New York that the two-state solution is the only possibility, that there’s no alternative. Given the situation on the ground for the moment, the two-state solution, as you’ve said yourself, is virtually dead. Isn’t there an alternative, though: for this Israeli Government gradually to bring the idea of any Palestinian State to a definitive end, annex the West Bank – in short, make “Greater Israel” a reality?

    THE MINISTER – You’re right, the alternative to the two-state solution is a state of permanent war. And what we’re seeing today is the two-state solution being threatened, on the one hand, by supporters of “Greater Israel”, who want to deny Palestinians the right to self-determination, and attacked, on the other, by supporters of Hamas or others, who believe Palestine extends from the River Jordan to the sea. Through the historic decision President Macron took, which the British Prime Minister has just taken and others will take, through the commitments being made in New York by the Arab countries today, we’re agreeing with everyone else, the side of peace against the side of war. We’re reopening the possibility of a peace that will involve the two States living side by side in peace and security, with security for Israel and the right of the Palestinians to have their own State.

    Yesterday, for the first time, two Israeli NGOs used the term genocide to refer to what’s happening in Gaza. Several countries have described what’s happening in the Palestinian enclave in that way. That’s the case with Spain and South Africa in particular. What’s France’s position today?

    THE MINISTER – The French Government has no position to take on the legal description of the facts. That’s up to the international courts. What I can say is that the situation in Gaza is disastrous. Gaza is now a death trap where, as I said yesterday from the United Nations General Assembly rostrum, bodies bear the scars of famine and minds are ravaged by terror. It’s unacceptable that in humanitarian distribution queues, women and children are targeted and shot down in cold blood. It’s outrageous and it must stop. That’s why the meeting which was held in Brussels today – or will be held in a few minutes’ time – is so important. It will lead the European Union to speak out so that the Israeli Government finally hears our expectations: access for humanitarian aid and an end to the militarized aid-distribution system, payment by the Israeli Government of the €2 billion due to the Palestinian Authority, an end to, and the abandonment of, the pernicious settlement plans in the West Bank, and in particular the E1 plan for 3,400 housing units, which would cut the West Bank in two and strike a fatal blow to the prospect of two States and to the emergence of a State of Palestine./.

    MIL OSI Europe News

  • MIL-OSI Africa: Committee on Health Welcomes Findings of Health Ombud

    Source: APO


    .

    The Chairperson of the Portfolio Committee on Health, Dr Sibongiseni Dhlomo, notes and welcomes the report issued by the Health Ombudsman into the treatment and deaths of psychiatric patients at two Northern Cape hospitals.

    Dr Dhlomo said, the report tabled on Wednesday by the Health Ombud, Dr Taole Mokoena is concerning and disturbing as it reveals a deep lack of care at Northern Cape Mental Health Hospital, and Robert Sobukwe Hospital. “The findings of the report are unacceptable, they exposed patients did not receive the quality care that they duly deserve,” said Dr Dhlomo.

    Mental healthcare is of paramount importance and must always remain under public scrutiny, especially in the light of the tragic event at Life Esidimeni, stated Dr Dhlomo. The report highlights the necessity of ensuring that mental health should always be placed under the microscope as it affects vulnerable people.

    The committee commends the proactive steps initiated by the Minister of Health, Dr Aaron Motsoaledi who lodged a complaint to the Health Ombud. “This demonstrates a commitment of accountability by the Minister and the department to uncover challenges within psychiatric hospitals and the healthcare system,” added Dr Dhlomo.

    In ensuring that the committee provides adequate oversight, the committee will schedule a meeting and invite the Department of Health so that Members of the committee receive a comprehensive briefing. “The transformation of mental health needs to be safeguarded so that patients are treated with dignity,” emphasised Dr Dhlomo

    Distributed by APO Group on behalf of Republic of South Africa: The Parliament.

    MIL OSI Africa

  • MIL-OSI Africa: President Museveni’s Leadership Praised in the House

    Source: APO


    .

    Members of Parliament have backed a motion thanking President Yoweri Museveni for the State of the Nation Address, delivered to the House and country on June 5, 2025.

    Hon. Faith Nakut (NRM, Napak district) who moved the motion during the House sitting on Thursday, 31 July 2025, highlighted the President’s achievements, including support for small businesses and increased national revenue. Legislators including Hon. Dicksons Kateshumbwa (NRM, Sheema Municipality) and Hon. Jane Avur (NRM, Pakwach district), seconded the motion, citing economic growth, job creation, and macroeconomic stability.

    Annually, Parliament debates and passes a motion appreciating the President for the clear and precise exposition of government policy as contained in the address.

    The members praised the government’s initiatives, such as the Parish Development Model and Emyooga, for transforming lives and boosting the economy. The MPs also commended the President’s efforts in promoting women’s leadership and stabilizing fuel prices.

    “These interventions increased Ugandan participation in production and trade. More Ugandans are into business now,” Nakut said.

    She added that national revenue has grown from Shs5 billion in 1986 to Shs31.9 trillion, while electricity generation has increased from 156 to 2,052 megawatts. She also praised the stabilisation of fuel prices and investment in mineral processing, which she said had created jobs and boosted the economy.

    Hon. Dicksons Kateshumbwa (NRM, Sheema Municipality), highlighted the country’s economic growth.

    “In 1986, our economy was US$3.92 million. It is now projected to hit US$ 60.4 billion,” he said, noting that Uganda is expected to grow at 7 percent in the coming financial year.

    He credited the government’s wealth creation programmes such as the Parish Development Model, Emyooga, and the Youth Livelihood Project for transforming lives.

    “Some people have touched a million shillings for the first time in their lives,” he said. On tourism, he cited growth in receipts from US$ 562 million in 2020 to US$ 1.4 billion in 2024, attributing the improvement to peace, infrastructure, and Uganda Airlines’ new international routes.

    Hon. Jane Avur (NRM, Pakwach District Woman Representative) also seconded the motion, commending the President for maintaining macroeconomic stability.

    “The Ugandan shilling has appreciated by 6.1 percent over the past year, and inflation is under control. Uganda has Africa’s second-lowest inflation rate over the past decade,” she said.

    Avur emphasised the importance of price stability, calling it a “crucial enabler of investment and economic predictability.”

    She also applauded export growth, noting a 26 percent increase to US$ 9.3 billion, and highlighted the impact on sectors like cosmetics, which employ over two million Ugandans, mostly women and youth.

    Speaker Anita Among welcomed the contributions, saying, “We have a stable economy. We have peace. And when you look at the development that is coming up, it is out of the exports and services that are creating jobs.”

    Hon. Hope Grania Nakazibwe (NRM, Mubende District) thanked the President for his role in promoting women’s leadership, noting that many women now hold key positions in government. “That came as a result of affirmative action,” she said, prompting applause from female MPs.

    Speaker Anita Among welcomed the contributions, emphasizing the importance of a stable economy and peace in driving development.

    The debate on the motion was deferred pending a statement in response to the President’s address from the Leader of Opposition, Hon. Joel Ssenyonyi.

    Distributed by APO Group on behalf of Parliament of the Republic of Uganda.

    MIL OSI Africa

  • MIL-OSI Africa: Fifth Annual Regional Economic Communities (RECs) Dialogue Advances Fisheries Governance in Africa

    Source: APO


    .

    Recognizing the critical role of Regional Economic Communities (RECs) in driving the implementation of continental fisheries policies and addressing region-specific priorities, AU-IBAR is hosting the Fifth Annual Dialogue with Regional Economic Communities (RECs) from 30th July to 1st August 2025 in Naivasha, Kenya. This critical gathering has brought together fisheries experts, policymakers and development partners to review progress on the Fisheries Governance Project Phase 2 (FishGov2) and chart the way forward for sustainable fisheries management across the continent.

    In her opening address, the Director of AU-IBAR, Dr Huyam Salih (represented by Mrs Hellen Guebama, AU-IBAR Fisheries Officer), emphasized the pivotal role of RECs in implementing continental fisheries policies while addressing regional priorities. She acknowledged the European Union’s continued support through FishGov2, which is currently in its final extension phase running until October 2026. The Director highlighted the project’s achievements in policy harmonization, capacity building, and the development of regional Blue Economy strategies, while stressing the need to modernize outdated legal frameworks that still govern fisheries in some member states.

    Participants at the dialogue are focusing on key recommendations to strengthen fisheries governance, including deeper involvement of RECs in decision-making processes, adaptation of continental policies to local contexts, and sustained financial and technical support for regional initiatives. The discussions are laying the groundwork for a potential third phase of the FishGov project, with RECs advocating for continued investment in Africa’s fisheries sector.

    The meeting is reinforcing the African Union’s commitment to collaborative governance, recognizing RECs as essential platforms for coordinating fisheries management across the continent. As the Director notes, this annual dialogue serves not only as a procedural requirement but also as a vital space for joint reflection and planning to ensure Africa’s fisheries are governed sustainably and equitably.

    Looking ahead, stakeholders focus on finalizing the FishGov2 extension phase, developing proposals for a potential third phase and scaling up regional Blue Economy initiatives to enhance food security and coastal livelihoods. The dialogue will conclude with a renewed commitment to transforming Africa’s fisheries sector through strengthened regional cooperation and governance. This gathering marks another important step in Africa’s journey toward sustainable fisheries management and blue-economic development.

    The dialogue is part of annual meetings held with RECs to strengthen project implementation on Fisheries Governance issues. Read about similar meetings on AU-IBAR’s work with Regional Economic Communities on fisheries governance:

    https://www.au-ibar.org/resources/dialogue-regional-economic-communities-recs-implementation-fisheries-governance-project
    https://www.au-ibar.org/news/latest-news/dialogue-recs-held-strengthen-implementation-fisheries-governance-2-project

    Distributed by APO Group on behalf of The African Union – Interafrican Bureau for Animal Resources (AU-IBAR).

    MIL OSI Africa

  • MIL-OSI Africa: President John Dramani Mahama Partakes in the 178th Independence Day Celebrations in Monrovia

    Source: APO


    .

    President John Dramani Mahama, on Saturday, joined President Joseph Nyuma Boakai and the people of Liberia to celebrate their 178th Independence Day celebration in Monrovia. The event held at the Centennial Memorial Pavilion in Monrovia, Montserrado County, was attended by heads of states from the subregion including the Presidents of Senegal, Sierra Leone, and Guinea Bissau. There were also representatives of the governments of Cote D’Ivoire, Nigeria, and Gambia. Liberia used the occasion to recognise ECOWAS member states that contributed troops to the multinational peacekeeping force, ECOMOG, which played a key role in ending the civil war as well as securing humanitarian corridors during the Liberian war. President Mahama received Ghana’s honour from the Liberian President on behalf of the Ghana Armed Forces and the people of Ghana for the contribution of its gallant soldiers. President Boakai in a spirit of national reconciliation said Liberia must heal itself, unite for a common purpose and inspire all for a faster development of the country. He called on all his citizens to leverage on technology to transform Liberia. The celebration as on the theme “One people, one destiny, healing the past and building the future the ceremony reflected on the past, need for stock taking, reconciliation, a united national identity to rebuild a peaceful Liberia, endowed with rich natural resources”. The President was accompanied by the Minister for Defence, Dr Edward Omane Boamah, the Chief of Defence Staff of the Ghana Armed Forces, Lt. General William Agyapong and Deputy Chief of Staff, Operations, Stanislav Xoese Dogbe.

    Distributed by APO Group on behalf of Embassy of Ghana in Liberia.

    MIL OSI Africa

  • MIL-OSI Africa: Cricket’s great global divide: elite schools still shape the sport

    Source: The Conversation – Africa – By Habib Noorbhai, Professor (Health & Sports Science), University of Johannesburg

    If you were to walk through the corridors of some of the world’s leading cricket schools, you might hear the crack of leather on willow long before the bell for the end of the day rings.

    Across the cricketing world, elite schools have served as key feeder systems to national teams for decades. They provide young players with superior training facilities, high-level coaching and competitive playing opportunities.

    This tradition has served as cricket’s most dependable talent pipeline. But is it a strength or a symptom of exclusion?

    My recent study examined the school backgrounds of 1,080 elite men’s cricketers across eight countries over a 30-year period. It uncovered telling patterns.


    Read more: Cricket: children are the key to the future of the game, not broadcast rights


    Top elite cricket countries such as South Africa, England and Australia continue to draw heavily from private education systems. In these nations, cricket success seems almost tied to one’s school uniform.

    I argue that if cricket boards want to promote equity and competitiveness, they will need to broaden the talent search by investing in grassroots cricket infrastructure in under-resourced areas.

    For cricket to be a sport that anyone with talent can succeed in, there will need to be more school leagues and entry-level tournaments as well as targeted investment in community-based hubs and non-elite school zones.

    Findings

    South Africa is a case in point. My previous study in 2020 outlined that more than half of its national players at One-Day International (ODI) World Cups came from boys-only schools (mostly private).

    These schools are often well-resourced, with turf wickets, expert coaches and an embedded culture of competition. Unsurprisingly, the same schools tend to produce a high number of national team batters, as they offer longer game formats and better playing surfaces. Cricket’s colonial origins have influenced the structure and culture of school cricket being tied to a form of privilege.


    Read more: Elite boys’ schools still shape South Africa’s national cricket team


    In Australia and England, the story is not very different. Despite their efforts to diversify player sourcing, private schools still dominate. Even in cricketing nations that celebrate working-class grit, such as Australia, private school players continue to shape elite squads.

    The statistics say as much; for example: about 44% of Australian Ashes test series players since 2010 attended private schools, and for England, the figure is 45%. That’s not grassroots, it could be regarded as gated turf…

    Proportion of elite male cricketers by school type. Habib Noorbhai

    Yet not all countries follow this route. The West Indies, Pakistan and Sri Lanka reflect very different models. Club cricket, informal play and community academies provide their players with opportunities to rise. These countries have lower reliance on private schools. Some of their finest players emerged from modest public schooling or neighbourhood cricketing networks.

    India provides an interesting hybrid. Although elite schools such as St. Xavier’s and Modern School contribute players, most national stars emerge from public institutions or small-town academies. The explosion of the Indian Premier League since 2008 has also democratised access, pulling in talent from previously overlooked and underdeveloped cities.

    In these regions, scouting is based on potential, not privilege.

    So why does this matter?

    At first glance, elite schools producing elite cricketers might appear logical. These institutions have the resources to nurture talent. But scratch beneath the surface and troubling questions appear.

    Are national teams truly reflecting their countries? Or are they simply echo chambers of social advantage?


    Read more: Cricket inequalities in England and Wales are untenable – our report shows how to rejuvenate the game


    In South Africa, almost every Black African cricketer to represent the country has come through a private school (often on scholarship). That suggests that talent without access remains potentially invisible. It also places unfair pressure on the few who make it through, as if they carry the hopes of entire communities.

    I found that in England, some county systems have started integrating players from state schools, but progress is slow. In New Zealand, where cricket is less centralised around private institutions, regional hubs and public schools have had more success in spreading opportunities. However, even there, Māori and Pasifika players remain underrepresented in elite squads.

    Four steps that can be taken

    1. One solution lies in recognising that schools don’t have a monopoly on talent. Cricket boards must increase investment in grassroots infrastructure, particularly in under-resourced areas. Setting up community hubs, supporting school-club partnerships and more regional competitions could discover hidden talent.

    2. Another step is to improve the visibility and reach of scouting networks. Too often, selection favours players from known institutions. By diversifying trial formats and leveraging technology (such as video submissions or performance-tracking apps), selectors can widen their net. It’s already happening in India, where IPL scouts visit the most unlikely of places.

    3. Coaching is another stumbling block. In many countries, high-level coaches are clustered in elite schools. National boards should consider optimising salaries as well as rotating certified coaches into public schools and regional academies. They should also ensure coaches are developed to be equipped to work with diverse learners and conditions.

    4. Technology offers other exciting possibilities too. Virtual simulations, motion tracking and AI-assisted video reviews are now common in high-performance centres. Making simplified versions available to lower-income schools could level the playing field. Imagine a township bowler in South Africa learning to analyse their technique using only a smartphone and a free app?

    Fairness in sport

    The conversation about schools and cricket is not just about numbers or stats. It is about fairness. Sport should be the great leveller, not another mechanism of exclusion. If cricket is to thrive, it needs to look beyond scoreboards and trophies. It must ask who gets to play and who never gets seen?


    Read more: Why is cricket so popular on the Indian sub-continent?


    A batter from a village school in India, a wicket-keeper from a government school in Sri Lanka or a fast bowler in a South African township; each deserves the chance to be part of the national story. Cricket boards, policymakers and educators must work together to make that possible.

    The game will only grow when it welcomes players from all walks of life. That requires more than scholarships. It requires a reset of how we think about talent. Because the next cricket superstar may not wear a crest on their blazer. They may wear resilience on their sleeve.

    – Cricket’s great global divide: elite schools still shape the sport
    – https://theconversation.com/crickets-great-global-divide-elite-schools-still-shape-the-sport-261709

    MIL OSI Africa

  • MIL-OSI Africa: The African activists who challenged colonial-era slavery in Lagos and the Gold Coast

    Source: The Conversation – Africa – By Michael E Odijie, Associate Professor, University of Oxford

    When historians and the public think about the end of domestic slavery in west Africa, they often imagine colonial governors issuing decrees and missionaries working to end local traffic in enslaved people.

    Two of my recent publications tell another part of the story. I am a historian of west Africa, and over the past five years, I have been researching anti-slavery ideas and networks in the region as part of a wider research project.

    My research reveals that colonial administrations continued to allow domestic slavery in practice and that African activists fought this.

    In one study I focused on Francis P. Fearon, a trader based in Accra, the Ghanaian capital. He exposed pro-slavery within the colonial government through numerous letters written in the 1890s (when the colony was known as the Gold Coast).

    In another study I examined the Lagos Auxiliary, a coalition of lawyers, journalists and clergy in Nigeria. Their campaigning secured the repeal of Nigeria’s notorious Native House Rule Ordinance in 1914. That ordinance had been enacted by the colonial government to maintain local slavery in the Niger Delta region.

    Considered together, the two studies demonstrate how local campaigners used letters, print culture, imperial pressure points and personal networks to oppose practices that had kept thousands of Africans in bondage.

    The methods Fearon and the Lagos Auxiliary pioneered still matter because they show how marginalised communities can compel power‑holders to close the gap between laws and lived reality. They remind us that well‑documented local testimony, amplified trans-nationally, can still overturn official narratives, compel policy change, and keep institutions honest.

    Colonial ‘abolition’ that wasn’t

    West Africa was a major source of enslaved people during the transatlantic slave trade. The transatlantic trade was suppressed in the early 19th century, but this did not bring an end to domestic slavery.

    One of the principal rationales for colonisation in west Africa was the eradication of domestic slavery.

    Accordingly, when the Gold Coast was formally annexed as a British colony in 1874, the imperial government declared slave dealing illegal. And slave-dealing was criminalised across southern Nigeria in 1901. On paper these measures promised freedom, but in practice loopholes empowered slave-holders, chiefs and colonial officials who continued to demand coerced labour.

    On the Gold Coast, the 1874 abolition law was never enforced. The British governor informed slave-owners that they might retain enslaved persons provided those individuals did not complain. By 1890, child slavery had become widespread in towns such as Accra. According to the local campaigners, it was even sanctioned by the colonial governor. This led to some Africans uniting to establish a network to oppose it.

    The Niger Delta region of Nigeria had a similar experience. The colonial administration enacted the Native House Rule Ordinance to counteract the effects of the Slave-Dealing Proclamation of 1901 which criminalised slave dealing with a penalty of seven years’ imprisonment for offenders. The Native House Rule Ordinance required every African to belong to a “House” under a designated head. It went on to criminalise any person who attempted to leave their “House”. In the Niger Delta kingdoms such as Bonny, Kalabari and Okrika, the word “House” never referred to a single dwelling. Rather, it denoted a self-perpetuating, named corporation of relatives, dependants and slaves under a chief, which owned property and spoke with one voice. By the 1900s, “Houses” had become the primary units through which slave ownership was organised.

    Therefore, the Native House Rule Ordinance compelled enslaved people in Houses to remain with their masters. The masters were empowered to use colonial authority to discipline them. District commissioners executed arrest warrants against runaways. In exchange, the House heads and local chiefs supplied the colonial administration with unpaid labour for public works.

    African campaigners in Accra and Lagos organised to challenge what they perceived as the British colonial state’s support for slavery.

    Fearon: an undercover abolitionist in Accra

    Francis Fearon was an educated African, active in the Accra scene during the second half of the 19th century. He was highly literate and part of elite circles. He was closely associated with the journalist Edmund Bannerman. He regularly wrote to local newspapers, often expressing concerns about racism against Black people and moral decay.

    On 24 June 1890, Fearon sent a 63-page letter, with ten appendices, to the Aborigines’ Protection Society in London. That dossier would form the basis of several further communications. He alleged that child trafficking continued.

    As evidence, he transcribed the confidential court register of Accra and claimed that Governor W. B. Griffith had instructed convicted slave-owners to recover their “property”.

    Fearon’s tactics were audacious. He remained anonymous, relied on court clerks for documents, and supplied the Aborigines’ Protection Society with evidence. He pleaded with the society to investigate the colonial administration in the Gold Coast.

    Although the society publicised the scandal, subsequent narratives quietly effaced the African source.

    Lagos elites organise – and name the problem

    Like Fearon, Nigerian campaigners also wrote to the Anti-Slavery and Aborigines’ Protection Society. They denounced the colonial government in Nigeria for promoting slavery, but they did not remain anonymous.

    By this time, the Native House Rule Ordinance had prompted some enslaved people to flee the districts in which it was enforced. They sought refuge in Lagos. Through these arrivals, Lagosian elites learned of the ordinance. They unleashed a vigorous campaign against the colonial state.

    The principal figures in this movement included Christopher Sapara Williams, a barrister, and James Bright Davies, editor of The Nigerian Times. Others included politician Herbert Macaulay, Herbert Pearse, a prominent merchant, Bishop James Johnson and the Reverend Mojola Agbebi. Unlike Fearon’s lone-wolf strategy, they mounted a coordinated assault on the colonial administration. They drafted petitions, briefed sympathetic European organisations, and inundated local newspapers with commentary.

    Their arguments blended humanitarian indignation with constitutional acumen. They insisted that the ordinance contravened both British liberal ideals and African custom.

    After years of pressure the law was amended and then quietly repealed in 1914.

    Why these stories matter now

    Contemporary scholarship on abolition is gradually shifting from asking “what Britain did for Africa” to examining the role Africans played in ending slavery.

    Many African abolitionists who fought and lost their lives in the struggle against slavery have long gone unacknowledged. This is beginning to change.

    The two articles discussed here highlight the creativity of Africans who, decades before radio or civil-rights NGOs, used transatlantic information circuits. They exposed colonial governments that continued to rely on forced-labour economies long after slavery was supposed to have ended.

    They remind us that grassroots documentation can overturn official narratives. Evidence-based advocacy, coalition-building, and the strategic use of global media remain potent instruments.

    – The African activists who challenged colonial-era slavery in Lagos and the Gold Coast
    – https://theconversation.com/the-african-activists-who-challenged-colonial-era-slavery-in-lagos-and-the-gold-coast-261089

    MIL OSI Africa

  • MIL-OSI Analysis: The African activists who challenged colonial-era slavery in Lagos and the Gold Coast

    Source: The Conversation – Africa – By Michael E Odijie, Associate Professor, University of Oxford

    When historians and the public think about the end of domestic slavery in west Africa, they often imagine colonial governors issuing decrees and missionaries working to end local traffic in enslaved people.

    Two of my recent publications tell another part of the story. I am a historian of west Africa, and over the past five years, I have been researching anti-slavery ideas and networks in the region as part of a wider research project.

    My research reveals that colonial administrations continued to allow domestic slavery in practice and that African activists fought this.

    In one study I focused on Francis P. Fearon, a trader based in Accra, the Ghanaian capital. He exposed pro-slavery within the colonial government through numerous letters written in the 1890s (when the colony was known as the Gold Coast).

    In another study I examined the Lagos Auxiliary, a coalition of lawyers, journalists and clergy in Nigeria. Their campaigning secured the repeal of Nigeria’s notorious Native House Rule Ordinance in 1914. That ordinance had been enacted by the colonial government to maintain local slavery in the Niger Delta region.

    Considered together, the two studies demonstrate how local campaigners used letters, print culture, imperial pressure points and personal networks to oppose practices that had kept thousands of Africans in bondage.

    The methods Fearon and the Lagos Auxiliary pioneered still matter because they show how marginalised communities can compel power‑holders to close the gap between laws and lived reality. They remind us that well‑documented local testimony, amplified trans-nationally, can still overturn official narratives, compel policy change, and keep institutions honest.

    Colonial ‘abolition’ that wasn’t

    West Africa was a major source of enslaved people during the transatlantic slave trade. The transatlantic trade was suppressed in the early 19th century, but this did not bring an end to domestic slavery.

    One of the principal rationales for colonisation in west Africa was the eradication of domestic slavery.

    Accordingly, when the Gold Coast was formally annexed as a British colony in 1874, the imperial government declared slave dealing illegal. And slave-dealing was criminalised across southern Nigeria in 1901. On paper these measures promised freedom, but in practice loopholes empowered slave-holders, chiefs and colonial officials who continued to demand coerced labour.

    On the Gold Coast, the 1874 abolition law was never enforced. The British governor informed slave-owners that they might retain enslaved persons provided those individuals did not complain. By 1890, child slavery had become widespread in towns such as Accra. According to the local campaigners, it was even sanctioned by the colonial governor. This led to some Africans uniting to establish a network to oppose it.

    The Niger Delta region of Nigeria had a similar experience. The colonial administration enacted the Native House Rule Ordinance to counteract the effects of the Slave-Dealing Proclamation of 1901 which criminalised slave dealing with a penalty of seven years’ imprisonment for offenders. The Native House Rule Ordinance required every African to belong to a “House” under a designated head. It went on to criminalise any person who attempted to leave their “House”. In the Niger Delta kingdoms such as Bonny, Kalabari and Okrika, the word “House” never referred to a single dwelling. Rather, it denoted a self-perpetuating, named corporation of relatives, dependants and slaves under a chief, which owned property and spoke with one voice. By the 1900s, “Houses” had become the primary units through which slave ownership was organised.

    Therefore, the Native House Rule Ordinance compelled enslaved people in Houses to remain with their masters. The masters were empowered to use colonial authority to discipline them. District commissioners executed arrest warrants against runaways. In exchange, the House heads and local chiefs supplied the colonial administration with unpaid labour for public works.

    African campaigners in Accra and Lagos organised to challenge what they perceived as the British colonial state’s support for slavery.

    Fearon: an undercover abolitionist in Accra

    Francis Fearon was an educated African, active in the Accra scene during the second half of the 19th century. He was highly literate and part of elite circles. He was closely associated with the journalist Edmund Bannerman. He regularly wrote to local newspapers, often expressing concerns about racism against Black people and moral decay.

    On 24 June 1890, Fearon sent a 63-page letter, with ten appendices, to the Aborigines’ Protection Society in London. That dossier would form the basis of several further communications. He alleged that child trafficking continued.

    As evidence, he transcribed the confidential court register of Accra and claimed that Governor W. B. Griffith had instructed convicted slave-owners to recover their “property”.

    Fearon’s tactics were audacious. He remained anonymous, relied on court clerks for documents, and supplied the Aborigines’ Protection Society with evidence. He pleaded with the society to investigate the colonial administration in the Gold Coast.

    Although the society publicised the scandal, subsequent narratives quietly effaced the African source.

    Lagos elites organise – and name the problem

    Like Fearon, Nigerian campaigners also wrote to the Anti-Slavery and Aborigines’ Protection Society. They denounced the colonial government in Nigeria for promoting slavery, but they did not remain anonymous.

    By this time, the Native House Rule Ordinance had prompted some enslaved people to flee the districts in which it was enforced. They sought refuge in Lagos. Through these arrivals, Lagosian elites learned of the ordinance. They unleashed a vigorous campaign against the colonial state.

    The principal figures in this movement included Christopher Sapara Williams, a barrister, and James Bright Davies, editor of The Nigerian Times. Others included politician Herbert Macaulay, Herbert Pearse, a prominent merchant, Bishop James Johnson and the Reverend Mojola Agbebi. Unlike Fearon’s lone-wolf strategy, they mounted a coordinated assault on the colonial administration. They drafted petitions, briefed sympathetic European organisations, and inundated local newspapers with commentary.

    Their arguments blended humanitarian indignation with constitutional acumen. They insisted that the ordinance contravened both British liberal ideals and African custom.

    After years of pressure the law was amended and then quietly repealed in 1914.

    Why these stories matter now

    Contemporary scholarship on abolition is gradually shifting from asking “what Britain did for Africa” to examining the role Africans played in ending slavery.

    Many African abolitionists who fought and lost their lives in the struggle against slavery have long gone unacknowledged. This is beginning to change.

    The two articles discussed here highlight the creativity of Africans who, decades before radio or civil-rights NGOs, used transatlantic information circuits. They exposed colonial governments that continued to rely on forced-labour economies long after slavery was supposed to have ended.

    They remind us that grassroots documentation can overturn official narratives. Evidence-based advocacy, coalition-building, and the strategic use of global media remain potent instruments.

    Research for these articles was funded by the European Research Council under the European Union’s Horizon 2020 research and innovation programme (Grant Agreement No. 885418).

    ref. The African activists who challenged colonial-era slavery in Lagos and the Gold Coast – https://theconversation.com/the-african-activists-who-challenged-colonial-era-slavery-in-lagos-and-the-gold-coast-261089

    MIL OSI Analysis

  • MIL-OSI Analysis: Cricket’s great global divide: elite schools still shape the sport

    Source: The Conversation – Africa – By Habib Noorbhai, Professor (Health & Sports Science), University of Johannesburg

    If you were to walk through the corridors of some of the world’s leading cricket schools, you might hear the crack of leather on willow long before the bell for the end of the day rings.

    Across the cricketing world, elite schools have served as key feeder systems to national teams for decades. They provide young players with superior training facilities, high-level coaching and competitive playing opportunities.

    This tradition has served as cricket’s most dependable talent pipeline. But is it a strength or a symptom of exclusion?

    My recent study examined the school backgrounds of 1,080 elite men’s cricketers across eight countries over a 30-year period. It uncovered telling patterns.




    Read more:
    Cricket: children are the key to the future of the game, not broadcast rights


    Top elite cricket countries such as South Africa, England and Australia continue to draw heavily from private education systems. In these nations, cricket success seems almost tied to one’s school uniform.

    I argue that if cricket boards want to promote equity and competitiveness, they will need to broaden the talent search by investing in grassroots cricket infrastructure in under-resourced areas.

    For cricket to be a sport that anyone with talent can succeed in, there will need to be more school leagues and entry-level tournaments as well as targeted investment in community-based hubs and non-elite school zones.

    Findings

    South Africa is a case in point. My previous study in 2020 outlined that more than half of its national players at One-Day International (ODI) World Cups came from boys-only schools (mostly private).

    These schools are often well-resourced, with turf wickets, expert coaches and an embedded culture of competition. Unsurprisingly, the same schools tend to produce a high number of national team batters, as they offer longer game formats and better playing surfaces. Cricket’s colonial origins have influenced the structure and culture of school cricket being tied to a form of privilege.




    Read more:
    Elite boys’ schools still shape South Africa’s national cricket team


    In Australia and England, the story is not very different. Despite their efforts to diversify player sourcing, private schools still dominate. Even in cricketing nations that celebrate working-class grit, such as Australia, private school players continue to shape elite squads.

    The statistics say as much; for example: about 44% of Australian Ashes test series players since 2010 attended private schools, and for England, the figure is 45%. That’s not grassroots, it could be regarded as gated turf…

    Yet not all countries follow this route. The West Indies, Pakistan and Sri Lanka reflect very different models. Club cricket, informal play and community academies provide their players with opportunities to rise. These countries have lower reliance on private schools. Some of their finest players emerged from modest public schooling or neighbourhood cricketing networks.

    India provides an interesting hybrid. Although elite schools such as St. Xavier’s and Modern School contribute players, most national stars emerge from public institutions or small-town academies. The explosion of the Indian Premier League since 2008 has also democratised access, pulling in talent from previously overlooked and underdeveloped cities.

    In these regions, scouting is based on potential, not privilege.

    So why does this matter?

    At first glance, elite schools producing elite cricketers might appear logical. These institutions have the resources to nurture talent. But scratch beneath the surface and troubling questions appear.

    Are national teams truly reflecting their countries? Or are they simply echo chambers of social advantage?




    Read more:
    Cricket inequalities in England and Wales are untenable – our report shows how to rejuvenate the game


    In South Africa, almost every Black African cricketer to represent the country has come through a private school (often on scholarship). That suggests that talent without access remains potentially invisible. It also places unfair pressure on the few who make it through, as if they carry the hopes of entire communities.

    I found that in England, some county systems have started integrating players from state schools, but progress is slow. In New Zealand, where cricket is less centralised around private institutions, regional hubs and public schools have had more success in spreading opportunities. However, even there, Māori and Pasifika players remain underrepresented in elite squads.

    Four steps that can be taken

    1. One solution lies in recognising that schools don’t have a monopoly on talent. Cricket boards must increase investment in grassroots infrastructure, particularly in under-resourced areas. Setting up community hubs, supporting school-club partnerships and more regional competitions could discover hidden talent.

    2. Another step is to improve the visibility and reach of scouting networks. Too often, selection favours players from known institutions. By diversifying trial formats and leveraging technology (such as video submissions or performance-tracking apps), selectors can widen their net. It’s already happening in India, where IPL scouts visit the most unlikely of places.

    3. Coaching is another stumbling block. In many countries, high-level coaches are clustered in elite schools. National boards should consider optimising salaries as well as rotating certified coaches into public schools and regional academies. They should also ensure coaches are developed to be equipped to work with diverse learners and conditions.

    4. Technology offers other exciting possibilities too. Virtual simulations, motion tracking and AI-assisted video reviews are now common in high-performance centres. Making simplified versions available to lower-income schools could level the playing field. Imagine a township bowler in South Africa learning to analyse their technique using only a smartphone and a free app?

    Fairness in sport

    The conversation about schools and cricket is not just about numbers or stats. It is about fairness. Sport should be the great leveller, not another mechanism of exclusion. If cricket is to thrive, it needs to look beyond scoreboards and trophies. It must ask who gets to play and who never gets seen?




    Read more:
    Why is cricket so popular on the Indian sub-continent?


    A batter from a village school in India, a wicket-keeper from a government school in Sri Lanka or a fast bowler in a South African township; each deserves the chance to be part of the national story. Cricket boards, policymakers and educators must work together to make that possible.

    The game will only grow when it welcomes players from all walks of life. That requires more than scholarships. It requires a reset of how we think about talent. Because the next cricket superstar may not wear a crest on their blazer. They may wear resilience on their sleeve.

    Habib Noorbhai does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Cricket’s great global divide: elite schools still shape the sport – https://theconversation.com/crickets-great-global-divide-elite-schools-still-shape-the-sport-261709

    MIL OSI Analysis

  • MIL-OSI Africa: Government welcomes reduction in repo rate 

    Source: Government of South Africa

    Government welcomes reduction in repo rate 

    Government has welcomed the South African Reserve Bank’s (SARB) decision to cut the repo rate by 25 basis points  to 7%.

    “Government welcomes the decision by the South African Reserve Bank to reduce the repo rate by 25 basis points to 7%. The move provides much-needed relief for South African households, many of whom continue to face financial pressure due to the rising cost of living,” Acting Government Spokesperson, Nomonde Mnukwa, said on Thursday.

    Addressing a media briefing on the MPC’s decision on the repo rate, SARB Governor Lesetja Kganyago said the decision to reduce the policy rate was unanimous.

    READ | Reserve Bank cuts repo rate by 25 basis points

    Mnukwa said the rate cut is expected to ease the burden on consumers by lowering the cost of borrowing, while also creating conditions more conducive to stimulating investment, supporting businesses, and driving economic activity.

    “The decision reaffirms the soundness of South Africa’s monetary policy framework and the importance of coordinated efforts to support inclusive growth. Government continues to implement structural reforms and improving the ease of doing business to unlock the full potential of the economy and create jobs,” Mnukwa explained. – SAnews.gov.za

    Neo

    MIL OSI Africa

  • MIL-OSI Europe: AFRICA/DR CONGO – Caritas Bunia: “In July alone, more than 100 people died in Ituri despite the state of siege in place for four years”

    Source: Agenzia Fides – MIL OSI

    Kinshasa (Agenzia Fides) – “In our province alone, in July, more than 100 people, including women and children, were brutally murdered in attacks of unspeakable brutality.” This was revealed by the diocesan Caritas of Bunia (Ituri province, eastern Democratic Republic of Congo), whose territory includes the church of Blessed Anuarite de Komanda, attacked by a commando unit of the Allied Democratic Forces (ADF) on the night of Saturday, July 26 and Sunday, July 27 (see Fides, 28/7/2025).The 100 deaths recorded in July of this year alone represent, according to Caritas Bunia, “the flagrant failure of the state of siege” decreed on May 3, 2021, by President Félix Tshisekedi in Ituri and North Kivu, with the aim of “neutralizing the armed groups operating in the two provinces, restoring state authority through a temporary military government, protecting the civilian population, and stabilizing the region.””Four years and nearly 100 extensions later, the results are disappointing because new armed groups have emerged and are more active than ever,” Caritas states. Impunity reigns, and massacres continue without investigation or prosecution of the criminals. Even worse, there is compelling evidence revealing the complicity, passive or active, of the Congolese army, as in the recent Lopa massacre, where CODECO militiamen desecrated the Church of Saint John of Capistrano (see Fides, 23/7/2025). The desecration of the church “forced His Excellency Monsignor Dieudonné Uringi, Bishop of Bunia, to close the parish, whose reopening remains undefinite.”Meanwhile, more details have emerged about the attack on the village of Komanda. The attackers entered the village around 2:00 a.m. from their stronghold on Mount Hoyo. They attacked the parish church of Blessed Anuarite, killing about twenty people with machetes who were attending a prayer vigil. Other bodies were found in burned homes and businesses near the church, including that of a charred man found in a truck set on fire by the attackers. The total death toll is 43, with dozens injured.According to Caritas, the attack on the village of Komanda has sown widespread panic, causing a mass exodus of its population to Bunia, Beni, and Kisangani. It has also led to the suspension of economic and religious activities. All of this has exacerbated the existing humanitarian crisis due to the influx of newly displaced people. Caritas Bunia denounces “the unacceptable passivity of the security forces and MONUSCO (UN Mission in the Democratic Republic of the Congo), which, despite being stationed less than 3 kilometers from the crime scene, failed to intervene to protect civilians.”In a statement sent to Fides, Caritas Bunia highlights the deteriorating security situation in Ituri: “With the emergence of a new rebel movement (Convention for Popular Revolution), recently founded by Thomas Lubanga and his accomplices in Uganda, and the unnatural alliances between the regular army (FARDC) and the criminal militias it was supposed to fight, Ituri is sinking into unprecedented chaos. The population, left to itself, no longer knows who to trust.”To prevent further massacres and improve security in the area, Caritas calls for the immediate lifting of the state of siege, describing it as “an ineffective measure rejected by the population”; the replacement of all FARDC and police personnel deployed in Komanda during the July 27 massacre, as well as in Lopa during the massacres and destruction of July 21, 2025; and the urgent review of civil protection strategies to prevent further tragedies. (L.M.) (Agenzia Fides, 31/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: AFRICA/ETHIOPIA – Negotiations between Addis Ababa and Somalia over sea access stalled

    Source: Agenzia Fides – MIL OSI

    Thursday, 31 July 2025

    Wikipedia

    by Cosimo GrazianiAddis Ababa (Agenzia Fides) – According to diplomatic sources familiar with the matter, diplomatic negotiations between Ethiopia and Somalia to resolve the issue of Addis Ababa’s access to the sea and the related permit granted by Mogadishu are stalled. The last round of negotiations between the two countries took place in February, but the news leaked in the first weeks of July.The announcement has repercussions for African geopolitics, specifically in the Horn of Africa region, and worldwide, as it affects, for example, the transport of goods across the Red Sea.At the heart of the issue is Ethiopia’s request for sea access. In January of last year, the Ethiopian government signed an agreement with the breakaway region of Somaliland to gain access to the sea through a twenty-kilometer stretch along the latter’s coast. Somalia’s reaction, from which Somaliland formally separated, was swift, and Turkey intervened to resolve the dispute, mediating between the two sides. Its mediation led to an agreement last December between the two countries.Thereafter, Somalia and Ethiopia began technical negotiations to explore the possibility of sea access for Addis Ababa, but no meeting between the two countries’ delegations had been scheduled since last April. In addition to sea access, the possibility of recognizing Somaliland’s independence was also on the negotiating table, according to the same diplomatic source cited by the Somali news agency Shabelle.Ethiopia has never officially committed to this diplomatic move, which, moreover, remains a resource it can use at any time.While the December 2024 agreement was considered a success for Turkish diplomacy in Africa, the news of the current impasse weakens Ankara’s position on the continent. Turkish President Recep Tayyip Erdogan has invested considerably in recent years, both economically and politically, in his country’s presence throughout the African continent, especially in the Horn of Africa, whose role in international logistics is crucial. Turkey is present in Africa thanks to a dense network of religious institutions that have facilitated its cultural and social penetration; it has opened embassies throughout the continent; it has signed various military agreements, most notably one last year with Somalia, Libya, Kenya, Rwanda, Nigeria, and Ghana; and Turkish Airlines, the Turkish flag carrier, currently operates flights to more than fifty African destinations. Africa has also acquired strategic importance for Turkey due to its maritime presence, and from this perspective, its presence in the Horn of Africa is even more so. If an agreement brokered by Ankara in the region fails, Turkey’s own position will also be affected.The central issue in relations between Ethiopia and Somalia is the sovereignty of the latter. If Ethiopia were to give in on its recognition of Somaliland, the state would risk being completely dismembered. Armed clashes have recently erupted in the Puntland region, which has been at war with the central government since last year over constitutional amendments approved at the proposal of Somali President Hassan Mohamud. The clashes have occurred between local and pro-government forces. Like Somaliland, which declared its independence from Mogadishu thirty years ago, Puntland has been demanding greater autonomy from the central government since 1998.In this situation, Egypt could gain political leverage in the region, after years of tense relations with Ethiopia, particularly regarding the construction of the Grand Ethiopian Renaissance Dam on the Nile. Turkish mediation between Ethiopia and Somalia had removed it from the dispute, but the stalled negotiations have brought Cairo back into the game of current and future regional balances. At the beginning of the second week of July, Egyptian President Abdel Fattah al-Sisi met with his Somali counterpart and promised increased vigilance in the Red Sea. This was a gesture for Addis Ababa, but also for Ankara, as part of the improvement in relations between Egypt and Turkey in other contexts, such as the Eastern Mediterranean and Libya. (Agenzia Fides, 31/7/2025)
    Share:

    MIL OSI Europe News

  • MIL-OSI Europe: EUROPE/ENGLAND – Saint John Henry Newman, from Propaganda Fide seminarian to Doctor of the Church

    Source: Agenzia Fides – MIL OSI

    Thursday, 31 July 2025

    Rome (Agenzia Fides) – Saint John Henry Newman will be proclaimed a Doctor of the Church. This was established by Pope Leo XIV, who confirmed the decision of the Plenary Session of Cardinals and Bishops, Members of the Dicastery for the Causes of Saints. The English Cardinal, founder of the Oratory of St. Philip Neri in England, will be the 38th saint to hold the title of Doctor.Already in 2010, during his apostolic journey to England, Benedict XVI, speaking to journalists during the papal flight, defined Newman as “a figure of a Doctor of the Church for us and for all,” as well as “a bridge between Anglicans and Catholics” (see Fides, 17/9/2010).Born in London on February 21, 1801, to an Anglican family, Newman studied at Great Ealing School, where he fervently embraced Calvinist doctrines. In June 1824, he was ordained a deacon in the Anglican Church and, the following year, a priest. In 1832, he accompanied his friend, Father Froude, on a trip to southern Europe.At the English College in Rome, he met Father Nicholas Wiseman, the future Catholic Archbishop of Westminster. Between 1833 and 1841, Newman and other exponents of the so-called “Oxford Movement” wrote the “Tracts for the Times,” a collection of 90 essays written to support and attest to the Catholic identity of the Anglican Church. The texts were not well received, and the protests they provoked led the Bishop of Oxford to suspend publication of the Tracts. Condemned by the Hebdomadal Board of Oxford University and disavowed by 42 bishops, in April 1842 he retired with some friends to Littlemore to write the famous “Essay development of christian Doctrine.” After these experiences, his decision to join the Catholic Church fully matured.In 1846, he returned to Rome with some Anglicans who had converted to Catholicism. After careful consideration, he decided to join the Congregation of the Oratory of St. Philip Neri. He attended the Roman church of Chiesa Nuova and frequented the priests of that community. In 1845, he began his studies to become a priest at the College of Propaganda Fide, then located in the Palazzo Ferratini, overlooking Piazza di Spagna.Cardinal Ivan Dias (1936-2017), Prefect of the then Congregation for the Evangelization of Peoples, when inaugurating the Missionary Museum of Propaganda Fide in 2010, described the stay of the future Doctor of the Church in the palace designed by Bernini and Borromini as follows: “Newman describes in his letters the great care shown by Cardinal Fransoni, Prefect of the Congregation of Propaganda Fide, by Monsignor Brunelli, his Secretary General, and by Father Bresciani, Rector of the Urban College, to make them feel at home, adapting everything to ‘English customs’. They were quite moved by the fact that their windows in Propaganda overlooked the church of Sant’Andrea delle Fratte, where Our Lady of the Miraculous Medal had appeared three years earlier to Alphonse Ratisbonne, on January 20, 1842: ‘It is so wonderful to be here in Propaganda is like a dream, and yet so calm, so secure, so happy, as if I had always belonged there, as if there had been no violent rupture or vicissitude in my life, indeed, calmer and happier than before.’The eminent theologian, Cardinal Dias further explained, “he found himself among young priests and seminarians, most of whom came from mission countries. Among the 120 or 150 resident students, 32 different languages were spoken. Newman remembers Indians, Africans, Babylonians, Scots, and Americans, and also Chinese (…) Egyptians, Albanians, Germans, and Irish.” He and Ambrose St. John were the only English students. John Henry Newman was ordained a Catholic priest in the Magi Chapel (in the Palace of Propaganda Fide) on May 30, 1847, and celebrated his first Mass in the upper chapel that now bears his name.”The chapel mentioned by Cardinal Dias, which today also houses a relic of the saint, future Doctor of the Church, is the work of Borromini. Conceived as an oratory for the first floor of the palace, Borromini created it with a vault decorated with angels’ heads, represented as six-winged seraphim. Today, on the right wall, you can admire a painting depicting Newman behind a reliquary containing some hairs of the English saint between two candlesticks. (F.B.) (Agenzia Fides, 31/7/2025)

    Share:

    MIL OSI Europe News

  • MIL-OSI Security: Felony Fugitive Homicide Suspect Deported to the United States from Kenya

    Source: US FBI

    On Friday, July 18, FBI Seattle took felony fugitive Salman Haji into custody following his arrest and deportation from Nairobi, Kenya, as part of an operation targeting violent crime. Haji was wanted for the January 2024 homicide of Mingyuan Huang in the parking lot of a business in Tukwila in what the investigation has determined to have been an attempted robbery. Haji is also charged in a federal armed carjacking case.

    “International fugitive investigations like this one require significant coordination with domestic and international law enforcement partners as well as our Legal Attaché offices, which advance the FBI’s mission worldwide,” said W. Mike Herrington, Special Agent in Charge of the FBI Seattle field office. “The FBI is committed to pursuing those who attempt to flee the criminal justice system and bringing them to justice, even when they seek to evade accountability by hiding overseas. This international operation was a joint effort by the Tukwila Police Department, FBI Seattle, FBI Legal Attachés Nairobi and The Hague, the DEA Nairobi Country Office, the Justice Department’s Office of International Affairs, and Kenya’s Directorate of Criminal Investigations and Office of the Director of Public Prosecutions.”

    “The Tukwila Police Department would like to thank the FBI and all the involved federal and international law enforcement partner agencies for their assistance in locating and taking Haji into custody and stand trial for the homicide of Mingyuan Huang,” said Eric Drever, Chief of Police, Tukwila Police Department.

    The operation that ultimately led to Haji’s arrest is part of Summer Heat, the FBI’s nationwide initiative targeting violent crime during the summer months. As part of this effort, the FBI has launched a multi-pronged offensive to crush violent crime. By surging resources alongside state and local partners, executing federal warrants on violent criminals and fugitives, and dismantling violent gangs nationwide, we are aggressively restoring safety in our communities across the country.

    For information on the federal case, view a press release from the U.S. Attorney’s Office for the Western District of Washington: King County, Washington, murder suspect now indicted in armed carjacking in Seattle.

    MIL Security OSI

  • Trump’s envoy meets Netanyahu for Gaza aid, ceasefire push

    Source: Government of India

    Source: Government of India (4)

    U.S. special envoy Steve Witkoff met Israeli Prime Minister Benjamin Netanyahu on Thursday in a bid to salvage Gaza truce talks and tackle a humanitarian crisis in the enclave, where a global hunger monitor has warned that famine is unfolding.

    Shortly after Witkoff’s arrival, President Donald Trump posted on his Truth Social network: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Indirect ceasefire talks between Israel and Palestinian Islamist group Hamas in Doha ended in deadlock last week with the sides trading blame for the impasse and gaps lingering over issues including the extent of an Israeli military withdrawal.

    Witkoff arrived with Israel facing mounting international pressure over the widespread destruction of Gaza and constraints on aid in the territory, with Canada the latest Western power to say it will recognise a Palestinian state.

    Israel on Wednesday sent a response to Hamas’ latest amendments to a U.S. proposal that would see a 60-day ceasefire and the release of some hostages in exchange for Palestinian prisoners, a source familiar with the details said.

    There was no immediate comment from Hamas. Israeli officials have in recent days said Israel might declare that it would annex parts of Gaza if the stalemate continues.

    Gaza medical officials said at least 23 people were reported killed by Israeli fire across the enclave, including 12 people among crowds who had gathered to receive aid around the Netzarim corridor, an area held by Israeli troops in central Gaza.

    The Israeli military said that its troops had fired warning shots to disperse crowds that were endangering them with no casualties identified.

    Since the war began, the Gaza health ministry has recorded 156 deaths from starvation and malnutrition, most of them in recent weeks, including at least 90 children.

    Israel’s Public Broadcaster Kan said Witkoff would also visit an aid distribution site in Gaza.

    Confronted by rising international outrage over images of starving children, Israel said on Sunday it would halt military operations for 10 hours a day in parts of Gaza and designate secure routes for convoys delivering food and medicine.

    CALLS ON HAMAS TO DISARM

    The U.N. Office for the Coordination of Humanitarian Affairs said on Wednesday the United Nations and its partners had been able to bring more food into Gaza in the first two days of pauses, but the volume was “still far from enough”.

    Even with more aid running through Gaza, residents face peril from Israeli forces and Palestinian looters when trying to reach the supplies.

    “I have tried several times to grab a sack of flour. The only time I managed to do so, someone with a knife froze me in the street and took it away, threatening to stab me,” one man from Deir Al-Balah told Reuters, asking not to be identified.

    With the number of Palestinians killed in almost two years of war passing 60,000 this week, pressure has been mounting in Gaza on Hamas to reach a ceasefire deal with Israel.

    “We can save thousands of lives and maybe the war wouldn’t resume,” Rami from Gaza City told Reuters via a chat app.

    Mothers of hostages led a protest outside Netanyahu’s office, calling on the government to end the war.

    “End this nightmare,” said Yael Engel-Lichi, whose nephew had been taken hostage and released in a previous ceasefire. Twenty of the 50 hostages still held by militants in Gaza are believed to still be alive.

    Netanyahu, whose ruling coalition includes two far-right parties who want to conquer Gaza and re-establish Jewish settlements there, has said he will not end the war until Hamas no longer rules the enclave and lays down its arms.

    Hamas has rejected calls to disarm.

    Qatar and Egypt, who are mediating the ceasefire efforts, backed a declaration on Tuesday by France and Saudi Arabia which outlined steps for a two-state solution to the Israeli-Palestinian conflict.

    The declaration says Hamas “must end its rule in Gaza and hand over its weapons to the Palestinian Authority”, which is led by its rivals and exercises limited self-rule in parts of the Israeli-occupied West Bank.

    Israel has ruled out the Palestinian Authority gaining control of Gaza and on Thursday Defence Minister Israel Katz and Justice Minister Yariv Levin voiced support for annexing the West Bank – territory which the Palestinians seek for a state.

    Israel has denounced declarations by France, Britain and Canada since last week that they may recognise a Palestinian state, which Israel says amounts to rewarding Hamas for its October 7, 2023 assault on Israeli territory.

    That attack, when fighters killed 1,200 people and took 251 hostages back to Gaza, precipitated the war.

    German Foreign Minister Johann Wadephul, embarking on a visit to Israel, said negotiations for a two-state solution must begin but that for Germany, the recognition of a Palestinian state would come at the end of that process.

    (Reuters)

  • MIL-OSI Africa: Prime Minister and Minister of Foreign Affairs Meets UN Secretary-General

    Source: Government of Qatar

    New York, July 29, 2025

    HE Prime Minister and Minister of Foreign Affairs Sheikh Mohammed bin Abdulrahman bin Jassim Al-Thani met Tuesday with HE Secretary-General of the United Nations Antonio Guterres, on the sidelines of the International Conference for the Peaceful Settlement of the Question of Palestine and the Implementation of the Two-State Solution, held in New York.

    During the meeting, they discussed cooperation between the State of Qatar and the United Nations, developments in the Gaza Strip and the occupied Palestinian territories, joint efforts to deliver humanitarian aid to the people of Gaza, ways to advance international efforts for a peaceful resolution of the Palestinian issue and the implementation of the two-state solution, in addition to a number of regional and international issues of common concern.

    HE Prime Minister and Minister of Foreign Affairs reaffirmed during the meeting the State of Qatar’s firm position in supporting the Palestinian cause until the brotherly Palestinian people regain all their legitimate rights.

    MIL OSI Africa

  • MIL-OSI Africa: Africa energy efficiency under the spotlight at G20 meeting

    Source: Government of South Africa

    Africa Energy Commission Executive Director, Rashid Ali Abdallah, has welcomed South Africa’s proposal – through the G20 Presidency legacy programme – to establish an energy efficiency facility.

    He was delivering remarks on the sidelines of the third G20 Energy Transitions Working Group (ETWG) meeting in the North West this week.

    Abdallah highlighted that for the African Union, energy efficiency is “at the core” of the development agenda through the African Energy Efficiency Strategy – which, amongst others, has set a target to increase energy productivity over the next 25 years.

    “To achieve African Energy Productivity target and contribute to the global doubling [of] energy efficiency by 2030… the continent needs access to sustainable finance and a strong coordination of the institutional framework with good human capacity.

    “It is for this reason that we welcome the proposal by the South African G20 Presidency to establish an energy efficiency legacy programme. This decision not only compliments our work as the African Union but reinforces the role of energy efficiency in addressing the challenge of energy security and equality,” he said.

    According to the United Nations Sustainable Development Group, some 600 million Africans still do not have access to electricity.

    Abdallah noted the South African government’s pursuance energy security and access.

    “This agenda is particularly relevant to Africa, as the continent is lagging in achieving the Sustainable Development Goal with over 70% of the population living in energy poverty. 

    “Access to renewable and affordable energy is essential to powering economies and powering essential services such as healthcare, clean water and education and improving living standards,” the Executive Director said.

    He added that as the African continent continues to improve sectors, including health, education, water and food security, “the importance of energy efficiency cannot be overlooked”.

    “Energy efficiency in Africa spans across all sectors. For example, 40% of utility in Africa Union states report electricity losses of over 20% – a stark contrast to the 6 to 10% seen in developed countries.

    “By improving this deficiency, we can save a significant amount of investment on the generation and transmission infrastructure on the continent. This compliments the implementation of the African Single Electricity Market and Continental Power System Master Plan initiative being spearheaded by the African Union,” Abdallah explained.

    Savings will also be extended to cash strapped households.

    “For household appliances and equipment, market transformation not only saves money but also accelerates access of modern cooking.

    “Adopting efficient lighting, modern transformer and cooling appliances has the potential to save African infrastructure investment equivalent to 40GW and more than US $20 billion in savings by 2040,” Abdallah said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Africa steps forward: SA G20 proposed Africa Energy Efficiency Facility hailed

    Source: Government of South Africa

    South Africa’s proposed Africa Energy Efficiency Facility could emerge as a defining achievement of the country’s G20 Presidency – a bold, continent-led initiative that embodies African leadership on the global stage and turns commitments into action.

    United Nations Environment Programme (UNEP) Chief of Mitigation Branch: Climate Division, Hongpeng Lei – who delivered remarks at a side event at the Energy Transitions Working Group meeting this week, applauded South Africa’s “vision of placing energy efficiency at the core of the… G20 energy agenda”.

    “This gathering is more than a technical forum. It is a political and strategic turning point. It is a moment where Africa steps forward with confidence and clarity to shift to a legacy of practical climate action rooted in equity, innovation and resilience.

    “We are here to lay the foundations for what could become a defining outcome of South Africa’s G20 Presidency – the African Energy Efficiency Facility. This initiative reflects the shared priorities of the G20 Energy Transitions Working Group. Affordability, energy access, climate resilience and inclusive growth… all begin with efficiency.”

    Hongpeng noted that South African leadership on the facility “references the G20 evolution from high level priorities to… regional action”. 

    “By the time we reach COP30 in Brazil, it could stand as a model on how the G20 delivers community, credibility and concrete solutions.

    “This facility, proudly championed by South Africa and the African Union and supported by UNEP is… a long-term platform to mobilise finance… technical assistance and skill up the efficiency solutions across the continent. 

    “It will serve as a strategic G20 legacy initiative. One that reflects the ethos of this Presidency, Africa led, globally supported and designed to deliver results where it matters the most,” Hongpeng said.

    The UNEP representative noted that energy efficiency is the most equitable pass way to reduce emissions, expand energy access and ensuring energy security.

    “But it is not just a numbers game. It is about development, dignity and delivery.

    “We have an opportunity and responsibility to ensure that this facility becomes more than a concept. Let it be the enduring symbol of what this G20 Presidency stands for – African solutions for global challenges built on equity, innovation and partnerships.

    “We call on G20 members, development banks and the African partners to secure predictable and ethical financing for this facility. Let the message be clear: Africa is not waiting, Africa is leading. Let us rise to the moment, deliver a legacy worthy of this G20,” Hongpeng concluded. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI USA: Sherrill Statement on the Widespread Famine in Gaza and the Deepening Humanitarian Crisis

    Source: United States House of Representatives – Congresswoman Mikie Sherrill (NJ-11)

    Washington, D.C. — Representative Mikie Sherrill (NJ-11) today issued the following statement urging President Trump and the Israeli government to take immediate action to ensure that aid reaches innocent civilians in Gaza:

    “I am deeply concerned by the famine and perilous security situation in Gaza. In February 2024, I went to the Rafah Crossing in Egypt and saw the backlog of aid trucks being kept out of Gaza. I took my concerns about keeping aid from reaching civilians directly to Prime Minister Netanyahu and President Biden. Restricting life saving aid from reaching civilians was as dangerous then as it is today. Failure to take immediate action now will lead to the deaths of thousands of innocent civilians, including women and children, and the perpetuation of the war. 

    “I was encouraged to see the announcement earlier this week that increased humanitarian aid would be allowed to enter Gaza, but it is not enough. The previous system of distributing aid through the Gaza Humanitarian Foundation was ineffective and directly led to the deaths of civilians at aid sites within days of beginning the operation. It needlessly endangered civilian lives. I immediately called on President Trump to work with the Israeli government and humanitarian organizations operating in Gaza to develop a safer method of delivery aid, but no action was taken. 

    “It is unacceptable that Hamas walked away from the last round of ceasefire negotiations and rejected the proposal agreed to by Israel, the U.S., Egypt, and Qatar. I again urge both parties to return to the negotiating table immediately to reach a ceasefire and bring the hostages home. But that alone will not lead to the end of this conflict. For that to happen, the human suffering must end.

    “It is past time that President Trump stands up for American values and works with the Israeli government to ensure that aid reaches the innocent civilians who desperately need it. Limiting the delivery of aid has only allowed Hamas and criminal gangs to exploit the situation. Ending the humanitarian crisis in Gaza is vital to maintaining America’s values, weakening Hamas’s support, and permanently ending the conflict.”

    ###

    MIL OSI USA News

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI Analysis: Will the latest diplomatic moves to end the war in Gaza work?

    Source: The Conversation – UK – By Jonathan Este, Senior International Affairs Editor, Associate Editor, The Conversation

    This article was first published in The Conversation UK’s World Affairs Briefing email newsletter. Sign up to receive weekly analysis of the latest developments in international relations, direct to your inbox.


    It feels as if things are moving at completely different speeds in Gaza and in the outside world. From the embattled Gaza Strip the narrative is depressingly familiar. Dozens more Palestinian civilians have been killed in the past 24 hours as they try to get hold of scarce supplies of food.

    Aid agencies report that despite air drops of supplies and “humanitarian pauses” in the fighting, the amount of food getting through to the starving people of Gaza remains pitifully insufficient.

    Two more children are reported to have died of starvation, bringing the total number of hunger-related deaths to 159, according to Palestinian sources quoted by al-Jazeera.

    US envoy Steve Witkoff arrived in Jerusalem for more talks as the US president Donald Trump posted his latest bout of social media diplomacy on his TruthSocial site, a message which appears pretty faithful to the Netanyahu government’s position: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Both sides continue to reject the other side’s demands, bringing ceasefire negotiations to an effective standstill.

    In the outside world, meanwhile, events seem to be gathering pace. A “high-level conference” at the United Nations in New York brought together representatives of 17 states, the European Union and the Arab League, resulting in “a comprehensive and actionable framework for the implementation of the two-state solution and the achievement of peace and security for all”.


    Sign up to receive our weekly World Affairs Briefing newsletter from The Conversation UK. Every Thursday we’ll bring you expert analysis of the big stories in international relations.


    What first catches the eye about this proposal, which was signed by Saudi Arabia,
    Qatar, Egypt and Jordan, is that it links a peace deal with the disarming and disbanding of Hamas. It also condemns the militant group’s savage attack on southern Israel on October 23 2023, which was the catalyst for the latest and arguably most grievous chapter of this eight-decade conflict. It’s the first time the Arab League has taken either of these positions.

    The New York declaration, as it has been dubbed, envisages the complete withdrawal of Israeli security forces from Gaza and an end to the displacement of Palestinians. Government will be the responsibility of the Palestinian Authority (PA), and a conference to be scheduled in Egypt will design a plan for the reconstruction of Gaza, much of which has been destroyed in the 20-month assault by the Israel Defense Forces.

    It is, writes Scott Lucas, a “bold initiative” which, “in theory could end the Israeli mass killing in Gaza, remove Hamas from power and begin the implementation of a process for a state of Palestine. The question is whether it has any chance of success.”

    Lucas, an expert in US and Middle East politics at the Clinton Institute of University College Dublin, is not particularly sanguine about the short-term prospects for a ceasefire and the alleviation of the desperate conditions for the people of Gaza. But what it represents more than anything else, is “yet another marker of Israel’s increasing isolation”.

    He points to recent announcements that France, the UK (subject to conditions) and Canada will recognise the state of Palestine at the UN general assembly in September. The prospect of normalisation between Israel and Arab states, at the top of the agenda a few short years ago, is now very unlikely. And in the US, which remains Israel’s staunchest ally, a Gallup poll recently found that public opinion is turning against Israel and its prime minister, Benjamin Netanyahu.




    Read more:
    New peace plan increases pressure on Israel and US as momentum grows for Palestinian statehood


    But how important are the declarations by France, the UK and Canada of intent to potentially recognise Palestinian statehood, asks Malak Benslama-Dabdoub. As expert in international law at Royal Holloway University of London, who has focused on the question of Palestinian statelessness, Benslama-Dabdoub thinks that the French and British pledges bear closer examination.

    The French declaration was made on July 24 on Twitter by the president, Emmanuel Macron. Macron envisages a “demilitarised” state, something Benslama-Dabdoub sees as a serious problem, as it effectively denies the fundamental right of states to self-determination and would rob a future Palestinian state of the necessary right to self-defence.

    The declaration by the UK prime minister that Britain may also recognise Palestinian statehood in September is framed as a threat rather than a pledge. Unless Israel agrees to a ceasefire, allows the UN to recommence humanitarian efforts and engages in a long-term sustainable peace process, the UK will go ahead with recognising Palestine at the UN.

    You have to consider that the UK government’s statement said that the position has always been that “Palestinian statehood is the inalienable right of the Palestinian people”. So to frame this as a threat rather than a demand is arguably to deny that “inalienable right”.




    Read more:
    UK to recognise Palestinian statehood unless Israel agrees to ceasefire – here’s what that would mean


    Paul Rogers also sees serious problems with the pledges to recognise Palestinian statehood. Demands for Hamas to disarm and play no further role in Palestinian government he sees as a non-starter as is the thought of a demilitarised Palestine. “Neither plan has the slightest chance of getting off the ground.”

    Rogers, who has researched and written on the Middle East for more than 30 years, also thinks that without the full backing of the US there is very little chance that a peace plan could succeed.

    Rogers finds it hard to believe that Washington will change tack on the Palestinian question, “unless the US president somehow gets the idea that his own reputation is being damaged”. There’s always a chance of this. News from the Gaza Strip is relentlessly horrifying and the aforementioned polls suggest many voters are reassessing their views of the conflict. But Trump is heavily indebted for his re-election to the far-right Christian Zionist movement, who wield a great deal of power with the White House.

    The other thing that might influence the conflict is if enough of the IDF’s top brass recognise the futility of waging what has always been an unwinnable conflict. This, writes Rogers, is whispered about in Israel’s military circles and one eminent retired general, Itzhak Brik, has come out and said: “Hamas has defeated us.”

    These, writes Rogers, are currently the only routes to an end to the conflict.




    Read more:
    UK and France pledges won’t stop Netanyahu bombing Gaza – but Donald Trump or Israel’s military could


    Inside Trumpian diplomacy

    We mentioned earlier that the Canadian prime minister, Mark Carney, has also pledged to recognise the state of Palestine in September. This was immediately greeted by Trump with the threat that he does so it will derail a trade deal with the US. Whether this will cut any ice with Carney, who had to make concessions to get the trade deal done in the first place, remains to be seen.

    But there’s a broader point here, writes Stefan Wolff. As Wolff reports, this week the foreign ministers of the Democratic Republic of Congo and Rwanda got together in Washington to sign a ceasefire deal, brokered by the US. Trump also claims to have successfully ended a conflict between India and Pakistan at the end of May and hostilities between Thailand and Cambodia earlier this month.

    Meanwhile his efforts to secure peace deals, or even a lasting ceasefire, in Gaza or Ukraine have been unsuccessful.

    Wolff considers why some countries respond to Trump’s diplomatic efforts while others don’t. There are a number of reasons, principally the US president’s ability to apply leverage through trade deals or sanctions and the differing complexity of the conflicts.

    He also points to the depleted resources of the US state department, Trump’s use of personal envoys with little foreign affairs experience and the US president’s insistence on making all the important decisions himself. He concludes: “The White House simply may not have the bandwidth for the level of engagement that would be necessary to get to a deal in Ukraine and the Middle East.”




    Read more:
    Why Donald Trump has stopped some conflicts but is failing with Ukraine and Gaza


    One US government department whose resources haven’t been depleted under Donald Trump is the US Immigration and Customs Enforcement agency, known as Ice. Part of the Department of Homeland Security, Ice has been responsible for identifying and detaining non-citizens and undocumented migrants.

    Their agents carry guns, wear masks and typically operate in plain clothes, although they often wear military kit. The agency received massive funding via Trump’s One Bzig Beautiful Bill Act earlier this month, which will allow the agency to recruit hundreds, if not thousands, of new agents. The number of arrests is increasing steadily, as is the disquiet their operations are prompting in many American cities, where opposition protests are also growing.

    Dafydd Townley, an expert in US politics at the University of Portsmouth, explains how Ice operates and where it sits in Donald Trump’s plan to deport millions of illegal migrants from the US.




    Read more:
    Masked and armed agents are arresting people on US streets as aggressive immigration enforcement ramps up


    World Affairs Briefing from The Conversation UK is available as a weekly email newsletter. Click here to get updates directly in your inbox.


    ref. Will the latest diplomatic moves to end the war in Gaza work? – https://theconversation.com/will-the-latest-diplomatic-moves-to-end-the-war-in-gaza-work-262380

    MIL OSI Analysis

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI