Category: Americas

  • MIL-OSI USA: Anthropologist César Abadía Barrero awarded 2024 Alejandro Ángel Escobar National Prize in Social and Human Sciences

    Source: US State of Connecticut

    César Abadía Barrero, associate professor of anthropology, was awarded the 2024 Alejandro Ángel Escobar National Prize in Social and Human Sciences in Bogotá, Colombia, on Wednesday, Oct. 2. 

    He received the honor for his research detailed in the book “Health in Ruins: The Capitalist Destruction of Medical Care at a Colombian Maternity Hospital.” 

    The book investigates the effects of private sector involvement in Colombia’s health system during the 1990s, focusing on El Materno, the country’s oldest maternity and neonatal health center. 

    The Alejandro Ángel Escobar Foundation presents the National Science and Solidarity Awards annually to recognize the most innovative and socially impactful scientific work by Colombian scientists and organizations dedicated to solidarity causes. 

    Established nearly 70 years ago, the award is named for businessman Alejandro Ángel Escobar, who created these incentives inspired by the Nobel Prizes and the Rockefeller Foundation. 

    MIL OSI USA News

  • MIL-OSI USA: Oct 16, 2024 Guelph Transit Workers File for No-Board Report as Contract Talks Reach an Impasse

    Source: US Amalgamated Transit Union

    ATU Local 1189 Warning the Public of Possible Service Disruptions 

    GUELPH, ON – After filing for a No-Board report with the Ministry of Labour when negotiations with the City of Guelph broke down, the Amalgamated Transit Union (ATU) Local 1189, representing approximately 260 Transit professionals at Guelph Transit, is advising the riding public that interruptions to public transit services could take effect as early as the beginning of November.

    “Let me be clear, we are committed to ensuring that our passengers are kept informed and are not left scrambling or stranded at bus stops, so the ATU will not withdraw our service or take direct strike action without giving a 3-day notice to our Riders,” said ATU Local 1189 President/Business Agent Scott Bate.

    The parties remain miles apart from a deal – and there are no additional days scheduled to bargain before the deadline, but ATU 1189 is ready to meet anytime in the interest of getting a fair deal done for its members.

    “While we have no way of predicting what next steps the Employer is contemplating, we believe it’s important to let riders and the general public know: if a disruption to transit occurs at the beginning of November, it will be a direct result of the Employer refusing to negotiate a fair contract and the City’s refusal to stop bringing concessions to the table. It will not be an action taken lightly by the ATU,” Bate continued.

    “Our negotiations team knows how important transit service is to our community, and we deeply care about those who depend on us, so we are fully committed to getting this contract settled at the bargaining table by reaching the fair deal that our members deserve – but Guelph Transit must come back to the table prepared to make an offer that meets the needs of our transit workers. If not, our members are prepared to do what is necessary to get a fair deal.”

    Frustrated by a lack of progress with negotiations, Guelph Transit workers voted 99.5% in favour of a strike if it becomes necessary. 

    After months of negotiations, it has become clear that the City of Guelph has no interest in giving their transit workers the fair and just contract they deserve,” said ATU International President John Costa. “The ATU International, with our more than 200,000 members across North America, support our Local 1189 members in their struggle.”

    MIL OSI USA News

  • MIL-OSI USA: FEMA Assistance Available to Georgia Renters After Storms

    Source: US Federal Emergency Management Agency 2

    strong>ATLANTA. – FEMA assistance is available to renters, including students, with uninsured losses from Hurricane Helene and Tropical Storm Debby, with an incident period of Aug. 4–20, 2024. 

    FEMA may be able to help renters as well as homeowners with serious needs, displacement costs, temporary lodging, basic home repair costs, personal property loss or other disaster-caused needs. Renters may qualify for assistance including the replacement or repair of necessary personal property, such as furniture, appliances, clothing, textbooks or school supplies; replacement or repair of tools and other job-related equipment; vehicle repair; and medical/dental bills.

    Assistance is available to people with disaster-caused damage in Appling, Atkinson, Bacon, Ben Hill, Berrien, Brantley, Brooks,  Bryan, Bulloch, Burke, Butts, Camden, Candler, Charlton, Chatham, Clinch, Coffee, Colquitt, Columbia, Cook, Dodge, Echols, Effingham, Elbert, Emanuel, Evans, Fulton, Glascock, Glynn, Hancock, Irwin, Jeff Davis, Jefferson, Jenkins, Johnson, Lanier, Laurens, Liberty, Lincoln, Long, Lowndes, McDuffie, McIntosh, Montgomery, Newton, Pierce, Rabun, Richmond, Screven, Tattnall, Telfair, Thomas, Tift, Toombs, Treutlen, Ware, Warren, Washington, Wayne and Wheeler counties.

    There are several ways to apply: Go online to DisasterAssistance.gov, use the FEMA App or call the FEMA Helpline at 800-621-3362. The telephone line is open every day and help is available in most languages. If you use a relay service such as Video Relay Service, captioned telephone or other service, give FEMA your number for that service.

    To view an accessible video on how to apply, visit Three Ways to Apply for FEMA Disaster Assistance – YouTube.

    What You’ll Need When You Apply

    • A current phone number where you can be contacted.
    • Your address at the time of the disaster and the address where you are now staying.
    • Your Social Security number.
    • A general list of damage and losses.
    • Banking information if you choose direct deposit.
    • If insured, the policy number or the agent and/or the company name.

    If you have homeowners, renters or flood insurance, you should file a claim as soon as possible. FEMA cannot duplicate benefits for losses covered by insurance. If your policy does not cover all your disaster expenses, you may be eligible for federal assistance.

    U.S. Small Business Administration Disaster Loans

    The U.S. Small Business Administration (SBA), FEMA’s federal partner in disaster recovery, may also be able to help. FEMA has streamlined the application process so people can apply to FEMA and SBA at the same time. The SBA disaster loan program is designed for your long-term recovery, to make you whole and get you back to your pre-disaster condition. No need to wait on the decision for a FEMA grant or for your insurance to settle; apply online and receive additional disaster assistance information at sba.gov/disaster.

    SBA representatives will also be available to provide one-on-one assistance to disaster loan applicants at Disaster Recovery Centers scheduled to open throughout Georgia. In addition, applicants may call the SBA’s Customer Service Center at (800) 659-2955 or send an email to disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services. 

    For the latest information about Georgia’s recovery, visit fema.gov/disaster/4830. Follow FEMA on X at x.com/femaregion4 or on Facebook at facebook.com/fema.

    MIL OSI USA News

  • MIL-OSI USA: Twelve Additional North Carolina Counties Eligible for FEMA Individual Assistance

    Source: US Federal Emergency Management Agency 2

    strong>RALEIGH, N.C. – Homeowners and renters in Cabarrus, Cherokee, Forsyth, Graham, Iredell, Lee, Nash, Rowan, Stanly, Surry, Union and Yadkin counties who had uninsured damage or losses caused by Tropical Storm Helene are now eligible to apply for FEMA disaster assistance.

    FEMA may be able to help with serious needs, displacement, temporary lodging, basic home repair costs, personal property loss or other disaster-caused needs. Previously, Alexander, Alleghany, Ashe, Avery, Buncombe, Burke, Caldwell, Catawba, Clay, Cleveland, Gaston, Haywood, Henderson, Jackson, Lincoln, Macon, Madison, McDowell, Mecklenburg, Mitchell, Polk, Rutherford, Swain, Transylvania, Watauga, Wilkes and Yancey counties and the Eastern Band of Cherokee Indians were authorized for assistance to households.

    The quickest way to apply is to go online to DisasterAssistance.gov. You can also apply using the FEMA App for mobile devices or calling toll-free 800-621-3362. The telephone line is open every day and help is available in most languages. If you use a relay service, such as Video Relay Service (VRS), captioned telephone or other service, give FEMA your number for that service. To view an accessible video on how to apply visit Three Ways to Apply for FEMA Disaster Assistance – YouTube. 

    What You’ll Need When You Apply

    • A current phone number where you can be contacted.
    • Your address at the time of the disaster and the address where you are now staying.
    • Your Social Security number.
    • A general list of damage and losses.
    • Banking information if you choose direct deposit.
    • If insured, the policy number or the agent and/or the company name.

    If you have homeowners, renters’ or flood insurance, you should file a claim as soon as possible. FEMA cannot duplicate benefits for losses covered by insurance. If your policy does not cover all your disaster expenses, you may be eligible for federal assistance.

    For the latest information about North Carolina recovery, visit Hurricane Helene | NC DPS or fema.gov/disaster/4827. Follow FEMA on X at x.com/femaregion4 or on Facebook at facebook.com/fema.

    MIL OSI USA News

  • MIL-OSI USA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

    Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

    This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

    The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

    Download the PDF version of this report:

    For a downloadable list of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Overview of Activity

    The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

    Initial Access and Persistence

    The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

    Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

    • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
    • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

    The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

    Lateral Movement

    The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

    Credential Access

    The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

    Privilege Escalation

    In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

    Discovery

    The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

    • Nltest /dclist
    • Nltest /domain_trusts
    • Nltest /domain_trusts/all_trusts
    • Net group “Enterprise admins” /domain
    • Net group “Domain admins” /domain

    Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                               $i=0
                                               $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                               $L='LDAP://' . $D
                                               $D = [ADSI]$L
                                               $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                               $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                               $s = [adsisearcher]$str
                                               $s.searchRoot = $L.$D.distinguishedName
                                               $s.PropertiesToLoad.Add('cn') > $Null
                                               $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                               $s.PropertiesToLoad.Add('description') > $Null
                                               $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                               Foreach ($CA in $s.FindAll()) {
                                                             Write-Host $CA.Properties.Item('cn')
                                                             $CA.Properties.Item('operatingsystem')
                                                             $CA. Properties.Item('description')
                                                             $CA.Properties.Item('distinguishedName')
                                                             $i++
                                               }
                                               Write-host Total servers: $i

    Command and Control

    On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

    Exfiltration and Collection

    In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

    Detection

    To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

    To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

    • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
    • Look for one IP used for multiple accounts, excluding expected logins.
    • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
    • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
    • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
    • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
    • Look for unusual activity in typically dormant accounts.
    • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

    Mitigations

    The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

    • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
    • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
    • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
    • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
    • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
      • Detecting unsuccessful login attempts [CPG 2.G].
      • Having users deny MFA requests they have not generated.
      • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
    • Ensure password policies align with the latest NIST Digital Identity Guidelines.
      • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
    • Disable the use of RC4 for Kerberos authentication.

    These mitigations apply to critical infrastructure entities across sectors.

    The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

    Validate Security Controls

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

    Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

    Version History

    October 16, 2024: Initial version.

    Appendix A: MITRE ATT&CK Tactics and Techniques

    See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Reconnaissance
    Technique Title  ID Use
    Gather Victim Identity Information T1589 The actors likely gathered victim information.
    Table 2: Resource Development
    Technique Title  ID Use
    Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
    Table 3: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
    Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
    External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
    Table 4: Execution
    Technique Title  ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
    Table 5: Persistence
    Technique Title ID Use
    Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
    Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
    Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
    Table 6: Privilege Escalation
    Technique Title ID Use
    Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
    Table 7: Defense Evasion
    Technique Title ID Use
    Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Table 8: Credential Access
    Technique Title ID Use
    Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
    Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
    Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
    Table 9: Discovery
    Technique Title ID Use
    Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
    Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
    Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
    Table 10: Lateral Movement
    Technique Title  ID Use
    Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
    Table 11: Collection
    Technique Title ID Use
    Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
    Table 12: Command and Control
    Technique Title ID Use
    Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
    Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
    Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

    Appendix B: Indicators of Compromise

    See Tables 13 to 15 for IOCs obtained from FBI investigations.

    Table 13: Malicious Files Associated with Iranian Cyber Actors
    Hash Description
    1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
    3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

    Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

    Table 14: Network Indicators
    IP Address Date Range
    95.181.234.12 01/30/2024 to 02/07/2024
    95.181.234.25 01/30/2024 to 02/07/2024
    173.239.232.20 10/06/2023 to 12/19/2023
    172.98.71.191 10/15/2023 to 11/27/2023
    102.129.235.127 10/21/2023 to 10/22/2023
    188.126.94.60 10/22/2023 to 01/12/2024
    149.40.50.45 10/26/2023
    181.214.166.59 10/26/2023
    212.102.39.212 10/26/2023
    149.57.16.134 10/26/2023 to 10/27/2023
    149.57.16.137 10/26/2023 to 10/27/2023
    102.129.235.186 10/29/2023 to 11/08/2023
    46.246.8.138 10/31/2023 to 01/26/2024
    149.57.16.160 11/08/2023
    149.57.16.37 11/08/2023
    46.246.8.137 11/17/2023 to 01/25/2024
    212.102.57.29 11/19/2023 to 01/17/2024
    46.246.8.82 11/22/2023 to 01/28/2024
    95.181.234.15 11/26/2023 to 02/07/2024
    45.88.97.225 11/27/2023 to 02/11/2024
    84.239.45.17 12/04/2023 to 12/07/2023
    46.246.8.104 12/07/2023 to 02/07/2024
    37.46.113.206 12/07/2023
    46.246.3.186 12/07/2023 to 12/09/2023
    46.246.8.141 12/07/2023 to 02/10/2024
    46.246.8.17 12/09/2023 to 01/09/2024
    37.19.197.182 12/15/2023
    154.16.192.38 12/25/2023 to 01/24/2024
    102.165.16.127 12/27/2023 to 01/28/2024
    46.246.8.47 12/29/2023 to 01/29/2024
    46.246.3.225 12/30/2023 to 02/06/2024
    46.246.3.226 12/31/2023 to 02/03/2024
    46.246.3.240 12/31/2023 to 02/06/2024
    191.101.217.10 01/05/2024
    102.129.153.182 01/08/2024
    46.246.3.196 01/08/2024
    102.129.152.60 01/09/2024
    156.146.60.74 01/10/2024
    191.96.227.113 01/10/2024
    191.96.227.122 01/10/2024
    181.214.166.132 01/11/2024
    188.126.94.57 01/11/2024 to 01/13/2024
    154.6.13.144 01/13/2024 to 01/24/2024
    154.6.13.151 01/13/2024 to 01/28/2024
    188.126.94.166 01/15/2024
    89.149.38.204 01/18/2024
    46.246.8.67 01/20/2024
    46.246.8.53 01/22/2024
    154.16.192.37 01/24/2024
    191.96.150.14 01/24/2024
    191.96.150.96 01/24/2024
    46.246.8.10 01/24/2024
    84.239.25.13 01/24/2024
    154.6.13.139 01/26/2024
    191.96.106.33 01/26/2024
    191.96.227.159 01/26/2024
    149.57.16.150 01/27/2024
    191.96.150.21 01/27/2024
    46.246.8.84 01/27/2024
    95.181.235.8 01/27/2024
    191.96.227.102 01/27/2024 to 01/28/2024
    46.246.122.185 01/28/2024
    146.70.102.3 01/29/2024 to 01/30/2024
    46.246.3.233 01/30/2024 to 02/15/2024
    46.246.3.239 01/30/2024 to 02/15/2024
    188.126.89.35 02/03/2024
    46.246.3.223 02/03/2024
    46.246.3.245 02/05/2024 to 02/06/2024
    191.96.150.50 02/09/2024
    Table 15: Devices
    Device Type Description
    Samsung Galaxy A71 (SM-A715F) Registered with MFA
    Samsung SM-G998B Registered with MFA
    Samsung SM-M205F Registered with MFA

    MIL OSI USA News

  • MIL-OSI USA: CISA, FBI, NSA, and International Partners Release Advisory on Iranian Cyber Actors Targeting Critical Infrastructure Organizations Using Brute Force

    News In Brief – Source: US Computer Emergency Readiness Team

    Today, CISA—with the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and international partners—released joint Cybersecurity Advisory Iranian Cyber Actors Brute Force and Credential Access Activity Compromises Critical Infrastructure. This advisory provides known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by Iranian actors to impact organizations across multiple critical infrastructure sectors.

    Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in the healthcare and public health (HPH), government, information technology, engineering, and energy sectors.

    CISA and partners recommend critical infrastructure organizations follow the provided guidance, as well as ensure all accounts use strong passwords and register a second form of authentication.

    For more information on Iranian state-sponsored threat actor activity, see CISA’s Iran Cyber Threat Overview and Advisories page. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including more recommended baseline protections.

    MIL OSI USA News

  • MIL-OSI USA: On World Food Day, Rededicating Ourselves to Food Security for All

    Source: USAID

    When Tanzanian farmer and entrepreneur Prakseda Melkior was in just the third grade, she sold a head of spinach that she had grown in her backyard – and decided that she wanted to make a career out of producing food. 

    After studying agriculture at university, she went on to start her own farm, cultivating tomatoes, peppers, and bananas. But the usual method of watering crops using an old pumping water generator powered by diesel fuel was cutting into her profits, costing her the equivalent of thousands of U.S. dollars per year in fuel costs. Fortunately, a local USAID program was offering training to farmers in Melkior’s area in innovative farming techniques and irrigation methods. She used those techniques to water and grow her crops more efficiently, and went on to help train other farmers in the same methods. She also championed an idea for the U.S. government’s Feed the Future initiative to support farmers in installing solar-powered irrigation systems. When Melkior’s own solar system is completed, it will slash her irrigation costs by 70 percent and allow her to keep expanding her farm. “We’ll be harnessing the power of the sun to irrigate our crops,” she said. “It is a game-changer, allowing us to grow more, serve more customers and create more jobs in our community.”

    Helping farmers like Melkior grow more food is particularly important today, as we mark World Food Day amid a historic number of food crises. More than 175 million people globally face life-threatening food insecurity, fueled by conflicts and climate-driven disasters including the recent historic floods in West Africa and El Niño-induced drought across southern Africa. As the world’s largest donor of emergency food assistance, USAID provided more than $5 billion in food security assistance to 134 million people in 61 countries in 2023 – including surging emergency food items to civilians in places like the Democratic Republic of the Congo, Ethiopia, Gaza, Sudan, and South Sudan. 

    On World Food Day, it is also important to underscore that our ambition is not just to respond to hunger crises, but to strengthen food systems so we can help prevent many of these crises altogether. As part of this goal, I announced last month the launch of the “Feed the Future Accelerator,” an effort to deepen our partnerships with Malawi, Tanzania, and Zambia – three countries with both high need for investment in their food systems and high potential for their agricultural sectors to drive long-term, regional reductions in poverty, malnutrition, and hunger. In these countries, we are aligning resources from across the U.S. government, NGOs, foreign governments, and the private sector to advance their progress at becoming agricultural breadbaskets that not only feed hungry people within their borders, but also help to stabilize the food supply across the African continent. 

    As we commemorate this year’s World Food Day, USAID is committed to taking action to address hunger crises and build a future where everyone has sufficient, nourishing, and safe food. 

    MIL OSI USA News

  • MIL-OSI USA: CISA and FBI Release Product Security Bad Practices for Public Comment

    News In Brief – Source: US Computer Emergency Readiness Team

    WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad Practices for public comment today. This catalog outlines practices that are deemed exceptionally risky and provides recommendations for software manufacturers to mitigate these risks. It urges software manufacturers to avoid these bad practices, especially those who produce software used in service of critical infrastructure or national critical functions (NCFs). Members of the public may submit public comment on this guidance starting today.

    The National Cybersecurity Strategy calls for a fundamental shift to rebalance the responsibility to defend cyber space onto those best positioned to bear it; namely, the software manufacturers who build products underpinning our collective digital infrastructure. Fully realizing this shift requires an understanding of the most egregious software development practices that software manufacturers must avoid. This catalog enumerates such practices.

    “It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop. These product security bad practices pose unacceptable risks in this day and age, and yet are all too common.” said CISA Director Jen Easterly. “We hope that by following this clear-cut, voluntary guidance, software manufacturers can lead by example in taking ownership of their customers’ security outcomes and fostering a secure by design future. Please provide input and let us know how we can improve this list of bad practices.”

    “Our National Cybersecurity Strategy highlights the importance of securing our nation’s critical infrastructure and shoring up our cyber defenses,” said White House National Cyber Director Harry Coker Jr. “The impact of product security bad practices has wide-ranging consequences across our nation and is often felt by the American people. Our private sector partners must shoulder their responsibility and build secure products and I’m glad to see this document as another tool to help software manufacturers do just that. We need to work together to prioritize best practices to better protect our nation.”

    “Bad practices in software development, especially when that software will be used by critical infrastructure, put both customers and our national security at risk,” said Assistant Director of the FBI’s Cyber Division Bryan Vorndran. “The FBI urges software manufacturers to avoid the risky practices described in this guidance, which lead to vulnerabilities that malicious actors routinely exploit.”

    These product security bad practices represent the next major step in CISA and partners’ global Secure by Design initiative, which has joined forces with 18 U.S. and international agencies to publish guidance and catalyzed commitments from over 220 software manufacturers to CISA’s Secure by Design Pledge. The bad practices build on practices laid out in the pledge and other guidance including NIST’s Secure Software Development Framework. This catalog will be a central guiding document in CISA’s Secure by Design initiative going forward, playing a key role informing future guidance and actions.

    This joint guidance lists the bad practices in three categories:

    • Product properties, which describe observable, security-related qualities of a software product.
    • Security features, which describe the security functionalities that a product supports.
    • Organizational processes and policies, which describe the actions taken by a software manufacturer to ensure strong transparency in its approach to security.

    CISA selected the bad practices based on the threat landscape as representing the most dangerous and pressing items that software manufacturers should avoid.

    The public comment period concludes on Monday, December 2, 2024. During the comment period, members of the public can provide comments and feedback via the Federal Register at Request for Comment on Product Security Bad Practices Guidance. Following the public comment period, CISA will issue a revised version of the bad practices.

    To learn more about the Secure by Design initiative, visit Secure by Design on CISA.gov.

    ###

    About CISA 

    As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

    Visit CISA.gov for more information and follow us on XFacebookLinkedIn, Instagram

    MIL OSI USA News

  • MIL-OSI USA: Department of Labor cites Kumho Tire Georgia $271K in penalties, finds 15 safety violations in wake of 57-year-old worker’s fatal injury

    Source: US Department of Labor

    MACON, GA – Federal safety inspectors found a Macon tire manufacturing facility with a history of safety and health violations could have prevented the fatal injuries sustained by a 57-year-old maintenance worker in April 2024. 

    The U.S. Department of Labor’s Occupational Safety and Health Administration investigated the fatal incident at Kumho Tire Georgia Inc., which occurred on April 10, 2024, when a worker was fatally injured after the machine they were working on unexpectedly started. 

    OSHA cited Kumho Tire Georgia after an investigation found the company bypassed safety procedures meant to prevent machinery from accidentally starting during maintenance. The company relied on basic on/off controls and sensors instead of following proper safety measures. As a result, the company was cited for one repeat, 12 serious, and two other-than-serious violations. The company was also cited for repeatedly failing to train authorized employees to safely perform servicing and maintenance activities.

    “Kumho Tire Georgia has repeatedly failed to protect its employees, and this time that negligence resulted in a preventable tragedy,” said OSHA Area Director Joshua Turner in Atlanta. “Every year, thousands of these incidents occur, causing serious and sometimes fatal injuries. There is no excuse for endangering the lives of the employees who keep their operations running.”

    The agency found the employer’s facility lacked sufficient machine guarding, designed to protect workers from caught-in hazards. Investigators also found missing guardrails and uncovered holes, leaving workers exposed to fall hazards. Kumho Tire Georgia Inc. faces a total of $271,930 in penalties.

    Kumho Tire Georgia has a substantial history of non-compliance with safety and health requirements. Since 2015, the facility has been inspected nine times, resulting in 52 violations. 

    Located in Macon, Kumho Tire Georgia is a Chinese and Korean-owned tire manufacturer that employs approximately 560 workers from both Korea and the U.S. The facility has been in operation in the U.S. since 2016. 

    The employer has 15 business days from receipt of the citations and penalties to comply, request an informal conference with OSHA’s area director, or contest the findings before the independent Occupational Safety and Health Review Commission.

    Learn more about OSHA.

    MIL OSI USA News

  • MIL-OSI USA: Biden-Harris Administration Approves More Than $1.8 Billion for Hurricane Response and Recovery Efforts

    Source: US Federal Emergency Management Agency

    Headline: Biden-Harris Administration Approves More Than $1.8 Billion for Hurricane Response and Recovery Efforts

    Biden-Harris Administration Approves More Than $1.8 Billion for Hurricane Response and Recovery Efforts

    WASHINGTON — The Biden-Harris Administration has approved more than $1.8 billion in federal assistance for individuals and communities affected by Hurricanes Helene and Milton. FEMA Administrator Deanne Criswell continues to lead the federal response, working in coordination with state and local partners to ensure that survivors receive the resources they need to jumpstart their recovery. 

    Currently, FEMA has deployed more than 4,400 personnel to the affected areas, working side by side with over 8,000 federal responders to support state and local governments in their recovery efforts. FEMA personnel on the ground are actively coordinating with local officials, conducting damage assessments and helping individuals apply for disaster assistance programs.

    Federal assistance for those affected by the hurricanes includes $597 million to support survivors with housing repairs, personal property replacement and other essential recovery efforts. Additionally, over $934 million has been approved for debris removal and emergency protective measures, which are necessary to save lives, protect public health and prevent further damage to public and private property.

    Applying for assistance is a critical first step towards recovery. Disaster survivors in certain areas of Georgia, Florida (Helene), Florida (Milton), North Carolina, South Carolina, Tennessee and Virginia can begin their recovery process by applying for federal assistance through FEMA. Individuals affected by the hurricanes are encouraged to apply as soon as they are able to by visiting DisasterAssistance.gov, which is the fastest way to get an application started. Individuals can also apply using the FEMA App, calling 1-800-621-3362 or in person at a local Disaster Recovery Center. Disaster Recovery Centers in the affected communities can provide survivors with in-person help on their applications and answer questions. Center locations can be found at FEMA.gov/DRC. FEMA also has Disaster Survivor Assistance team members in the field supporting survivors and helping them with the application process.

    Federal assistance for individuals may include upfront funds to help with essential items like food, water, baby formula, breastfeeding supplies and other emergency supplies. Funds may also be available to repair storm-related damage to homes and personal property, as well as assistance to find a temporary place to stay. Homeowners and renters with damage to their home or personal property from previous disasters, whether they received FEMA funds or not, are still eligible to apply for and receive assistance for other federally declared disasters.   

    FEMA’s National Flood Insurance Program is ready to respond to insured flood losses. Those with an NFIP-backed flood insurance policy that suffered flood damage should begin filing their claim by contacting their flood insurance agent or company. 

    Recovery Update

    For those affected by Hurricane Helene, FEMA has approved over $911.1 million in assistance. This includes $581.1 million in assistance for individuals and families, along with more than $330 million for debris removal and efforts to protect public health and safety. In response to Hurricane Milton, FEMA has approved more than $620.2 million in assistance, with $16.2 million allocated for individuals and families and over $604 million for debris removal and safety measures.

    To support response and recovery efforts, FEMA delivered over 12.6 million meals and 12.9 million liters of water to states impacted by Helene. For Milton, FEMA delivered more than 2.2 million meals and 780,000 liters to Florida.

    FEMA continues to open Disaster Recovery Centers in affected communities, offering in-person assistance, information on available resources and help with FEMA assistance applications. Disaster Survivor Assistance Teams are also on the ground in all affected states, helping survivors apply for aid and connect with additional resources from state, local, federal and voluntary agencies.

    Support for North Carolina

    As ongoing response efforts continue in western North Carolina, FEMA has approved over $100 million in housing and other types of assistance for over 77,000 households.

    More than 3,000 families who cannot return home are staying in safe and clean lodging through FEMA’s Transitional Sheltering Assistance program. Shelter numbers remain steady, with 13 shelters housing just over 560 occupants

    Commodity distribution, mass feeding and hydration operations remain in areas of western North Carolina. Voluntary organizations are supporting feeding operations with bulk food and water deliveries coming via truck and aircraft. 

    • Residents can visit: ncdps.gov/Helene to get information and additional assistance.  
    • Residents can get in touch with loved ones by calling 2-1-1 or visiting unitedwaync.org to add them to search and rescue efforts.  

    There are over 370 Disaster Survivor Assistance members in communities providing support. There are also six Disaster Recovery Centers now open in Asheville, Bakersville, Boone, Lenoir, Marion and Sylva where survivors can speak directly with FEMA and state personnel for assistance with their recovery. To find the nearest center, visit FEMA.gov/DRC.

    Support for Florida 

    In response to Helene, FEMA has approved over $213 million in housing and other types of assistance for more than 71,000 households. Additionally, FEMA has approved more than $330 million in Public Assistance for debris removal and emergency work. In response to Milton, FEMA has approved over $16 million in housing and other types of assistance for over 19,000 households. Additionally, FEMA has approved more than $604 million in Public Assistance for debris removal and emergency work. 

    There are 120 Disaster Survivor Assistance members in communities to provide support. There are also 12 Disaster Recovery Centers now open supporting survivors from Debby, Helene and Milton where survivors can speak to state and federal personnel to help with their recovery. Survivors may find their closest center by visiting FEMA.gov/DRC.

    Residents in need of information or resources should call the State Assistance Information Line (SAIL) at 1-800-342-3557. English, Spanish and Creole speakers are available to answer questions.  

    Support for South Carolina 

    FEMA has approved over $132 million in housing and other types of assistance for more than 146,000 households. 

    There are 92 Disaster Survivor Assistance members in communities providing support. There are also five Disaster Recovery Centers now open in Anderson, Barnwell, Batesburg, Easley, Greenville and North Augusta where survivors can speak to state and federal personnel to help with their recovery. Survivors may find their closest center by visiting FEMA.gov/DRC.

    Residents with questions on Helene can call the state’s toll-free hotline, open 24 hours a day, at 1-866-246-0133. Residents who are dependent on medical equipment at home and who are without power due to Helene may be eligible for a medical needs shelter. Call the state’s Department of Public Health Care Line at 1-855-472-3432 for more information. 

    Support for Georgia 

    FEMA has approved over $119 million in housing and other types of assistance for more than 118,000 households

    There are 139 Disaster Survivor Assistance members in communities providing support. There are also four Disaster Recovery Centers now open in Valdosta, Douglas, Sandersville and Augusta where survivors can speak to state and federal personnel to help with their recovery. Survivors may find their closest center by visiting FEMA.gov/DRC.

    Residents can find resources like shelters and feeding sites at gema.georgia.gov/hurricane-helene. 

    Support for Virginia  

    To date, FEMA has approved over $4.7 million in housing and other types of assistance for more than 1,500 households

    There are about 57 Disaster Survivor Assistance members in communities providing support. There are also four Disaster Recovery Centers open in Damascus, Dublin, Independence and Tazewell where survivors can speak to state and federal personnel to help with their recovery. Survivors may find their closest center by visiting FEMA.gov/DRC.

    Residents can find resources like shelters and feeding sites at: Recover – Hurricane Helene | VDEM (vaemergency.gov).

    Support for Tennessee 

    FEMA has approved more than $11.8 million in housing and other types of assistance for more than 2,400 households. FEMA Disaster Survivor Assistance Teams are on the ground in neighborhoods across the affected counties, helping survivors apply for FEMA assistance and connecting them with additional state, local, federal and voluntary agency resources.

    There are more than 42 Disaster Survivor Assistance members in communities providing support. There is now one Disaster Recovery Center open in Erwin where survivors can speak to state and federal personnel to help with their recovery. Survivors may find their closest center by visiting FEMA.gov/DRC.

    Counties continue to establish donation centers. For the evolving list, visit TEMA’s website. 

    FEMA remains steadfast in its mission to support survivors as they begin their recovery from these historic storms. The agency will continue to work with federal, state and local partners to ensure the safety and well-being of those impacted by Milton and Helene.

    amy.ashbridge

    MIL OSI USA News

  • MIL-OSI USA: Department of Labor releases AI Best Practices roadmap for developers, employers, building on AI principles for worker well-being

    Source: US Department of Labor

    WASHINGTON — The U.S. Department of Labor today announced the release of comprehensive Artificial Intelligence Best Practices designed to ensure that emerging technologies such as AI enhance job quality and benefit workers when they are used in the workplace.

    The department’s AI Best Practices provide developers and employers with a detailed roadmap to implement the department’s AI and Worker Well-being: Principles for Developers and Employers, which were released under President Biden’s Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. These guidelines further the department’s commitment to centering worker empowerment and well-being, particularly workers in underserved communities, as AI systems are increasingly used in the workplace.

    “We have a shared responsibility to ensure that AI is used to expand equality, advance equity, develop opportunity and improve job quality,” said Acting Secretary of Labor Julie Su. “These Best Practices provide a roadmap for responsible AI in the workplace, helping businesses harness these technologies while proactively supporting and valuing their workers. As we embrace the opportunities that AI can offer, we must ensure workers are lifted up, not left behind.”

    The Best Practices provide strategies for how AI can benefit workers and businesses, while maintaining a focus on workers’ rights, job quality, well-being, privacy and economic security. These approaches include: 

    • Ethically developing AI standards, review processes and establishing governance structures. 
    • Ensuring meaningful human oversight for significant employment decisions.
    • Being transparent with workers about the use of AI and identifying how AI can assist workers.
    • Centering workers and their input on the use of AI in the workplace.
    • Protecting workers’ labor and employment rights.
    • Providing AI training for workers. 
    • Securing and protecting worker data.

    As part of its commitment to responsible AI, the Department of Labor is aligning its own operations with these AI Principles and Best Practices. The department will continue to engage with companies, unions, workers, and other stakeholders to protect and empower workers when AI is used in the workplace. 

    Editor’s Note: Register to join the live virtual event on Oct. 16 at 3:30 p.m. EDT.

    Learn more about the department’s AI Principles and Best Practices.

    MIL OSI USA News

  • MIL-OSI Canada: NFB and Telefilm Canada to share office space in Halifax, promoting synergy and benefiting the industry

    Source: Government of Canada News

    As of November 4, the National Film Board of Canada and Telefilm Canada will be sharing the office space currently occupied by the NFB production team at 5475 Spring Garden Road in downtown Halifax.

    October 10, 2024

    As of November 4, the National Film Board of Canada and Telefilm Canada will be sharing the office space currently occupied by the NFB production team at 5475 Spring Garden Road in downtown Halifax. Sharing space will promote synergy between the two organizations and benefit Atlantic Canadian filmmakers, partners and producers, who will be able to meet with Canada’s two main federal film agencies under one roof.

    Quotes

    “The NFB has been a presence in Atlantic Canada and Acadia for more than 50 years, and we are loudly and clearly re-affirming our commitment to the region. From the idea to the screen, our teams are here to identify projects and receive proposals for animation and documentary films, supporting directors and co-producers, and developing marketing and distribution strategies. Our goal is to ensure that stories from this wonderful region are told and shared with Canadians across the country,” said Suzanne Guèvremont, Government Film Commissioner and Chairperson of the NFB.

    “Stimulating and supporting the region’s film industry is a priority for Telefilm Canada,” said Julie Roy, Executive Director and CEO, Telefilm Canada. “This objective guided the development of our Atlantic Strategy, which we recently unveiled. Our goal is to create and provide opportunities that strengthen expertise and stimulate creative and financial competitiveness across the sector’s entire value chain. So this announcement is very much in line with our desire to strengthen our commitment, reflecting Telefilm’s spirit of collaboration with key players in the ecosystem.”

    The NFB and Telefilm in Atlantic Canada

    The NFB has been a presence in Atlantic Canada for more than 50 years and remains rooted in the region as a producer and co-producer.

    Telefilm is proud to unveil its 2024-2027 Atlantic Strategy, developed for and with Newfoundland and Labrador, Nova Scotia, New Brunswick and Prince Edward Island industry professionals. Learn more here:

    Telefilm Canada unveils its 2024-2027 Atlantic Strategy for the region’s cinema industry  | Telefilm Canada

    About the NFB

    Founded in 1939, the National Film Board of Canada (NFB) is a one-of-a-kind producer, co-producer and distributor of engaging, relevant and innovative documentary and animated films. As a talent incubator, it is one of the world’s leading creative centres. The NFB has enabled Canadians to tell and hear each other’s stories for over eight decades, and its films are a reliable and accessible educational resource. The NFB is also recognized around the world for its expertise in preservation and conservation, and for its rich and vibrant collection of works, which form a pillar of Canada’s cultural heritage. To date, the NFB has produced more than 14,000 works, 7,000 of which can be streamed free of charge at nfb.ca. The NFB and its productions and co-productions have earned over 7,000 awards, including 11 Oscars and an Honorary Academy Award for overall excellence in cinema.

    About Telefilm Canada

    As a Partner of Choice, Telefilm Canada is a Crown corporation dedicated to the success of Canada’s audiovisual industry, fostering access and excellence by delivering programs that support cultural resonance and audience engagement. With a lens of equity, inclusivity and sustainability, Telefilm bolsters dynamic companies and a range of creative talent at home and around the world. Telefilm also makes recommendations regarding the certification of audiovisual coproduction treaties to the Minister of Canadian Heritage, and administers the programs of the Canada Media Fund. Launched in 2012, the Talent Fund raises private donations which principally support emerging talent.

    – 30 –

    MIL OSI Canada News

  • MIL-OSI USA: Disaster Recovery Center in Marion, Va. Will Open Oct. 17

    Source: US Federal Emergency Management Agency

    Headline: Disaster Recovery Center in Marion, Va. Will Open Oct. 17

    Disaster Recovery Center in Marion, Va. Will Open Oct. 17

    BRISTOL, Va.– A Disaster Recovery Center (DRC) will be opening in Smyth County at the Public Safety Administration Building, located at 230 S. Park Street in Marion on Thursday, Oct. 17, 2024, at 8 a.m. Disaster survivors can visit any DRC to receive assistance. Additional centers will be opening in the coming weeks throughout southwest Virginia.

    The center is located at: 

    Smyth County  

    Public Safety Administration Building 

    230 S. Park St

    Marion, Virginia 24354

    Hours of operation:

    Monday – Saturday, 8 a.m. to 6 p.m.

    Closed Sundays

    “Smyth County is very proud to work with FEMA and the Commonwealth to provide a Disaster Recovery Center. We have worked through Helene to provide avenues for citizens to get help. We encourage everyone who has needs, please seek help. The County’s partnership with FEMA will allow citizens get additional help that is available,” said Chief C.W. Crawford, Smyth County Emergency Services Coordinator.

    “FEMA is grateful for the partnership with Smyth County and the Commonwealth for coming together to open this Disaster Recovery Center,” said FEMA Federal Coordinating Officer Timothy Pheil. “Survivors can visit any open Disaster Recovery Center and no appointment is needed. FEMA is eager to provide residents of southwest Virginia with resources, help survivors apply for assistance, and answer questions about their recovery.” 

    Survivors do not have to visit a DRC to register with FEMA. You can call 800-621-FEMA (3362). The toll-free telephone line operates seven days a week. If you use a relay service, such as video relay service (VRS), captioned telephone service or others, give FEMA the number for that service. You can also register online at DisasterAssistance.gov or through the FEMA App on your phone.

    The deadline to apply for FEMA disaster assistance is Dec. 2, 2024.

    If you have received a letter from FEMA about your application status, visit a DRC to learn more about next steps. DRC staff can help you submit additional information or supporting documentation for FEMA to continue to process your application and answer any questions you may have.

    FEMA has set up a rumor response webpage to clarify our role in the Helene response. Visit Hurricane Helene: Rumor Response.

    For more information on Virginia’s disaster recovery, visit vaemergency.gov, the Virginia Department of Emergency Management Facebook page , fema.gov/disaster/4831 and facebook.com/FEMA.  

    ###

    FEMA’s mission is helping people before, during and after disasters. FEMA Region 3’s jurisdiction includes Delaware, the District of Columbia, Maryland, Pennsylvania, Virginia and West Virginia. Follow us on X at x.com/FEMAregion3 and on LinkedIn at linkedin.com/company/femaregion3.

    To apply for FEMA assistance, please call the FEMA Helpline at 1-800-621-3362, visit https://www.disasterassistance.gov/, or download and apply on the FEMA App. If you use a relay service, such as video relay service (VRS), captioned telephone service or others, give FEMA the number for that service. Multilingual operators are available (press 2 for Spanish and 3 for other languages). Disaster recovery assistance is available without regard to race, color, religion, nationality, sex, age, disability, English proficiency, or economic status.

    erika.osullivan

    MIL OSI USA News

  • MIL-OSI Canada: Backgrounder: Canada Retraining and Opportunities Initiative

    Source: Government of Canada News

    The new Canada Retraining and Opportunities Initiative provides supplemental support to organizations helping workers and local communities affected by an unforeseen economic event, including mass layoffs of an exceptional nature.

    A mass layoff is defined by:

    • 50 or more employees permanently laid off in one establishment in one community during a four-week period;
    • significant job loss impact (as a proportion of the community’ s labour force); and
    • challenging local labour market conditions, making it difficult for affected workers to transition to new jobs.

    Objectives
    The objectives of this initiative are to:   

    • bring together community-based organizations, employers, training providers and others to develop a community workforce plan that identifies impacted workers, local employers looking to hire, and the skills required to meet demand. 
    • help workers develop the skills needed to transition to new jobs through training and work experiences; and 
    • support employers to fill jobs in demand. 


    Application Process
    Eligible organizations can apply through a two-phased process.

    An expression of interest phase:  Only organizations that meet the criteria in this  phase will be invited to submit an application.

    An application phase:  The Department will assess other criteria at the application phase. An invitation to apply does not guarantee success.

    Applications will be accepted between October 16, 2024 and March 31, 2025. The call may close earlier if funding has been fully committed.

    MIL OSI Canada News

  • MIL-OSI Canada: Tribunal Continues Finding—Carbon steel welded pipe from Pakistan, Philippines, Türkiye and Vietnam

    Source: Government of Canada News

    The Canadian International Trade Tribunal today continued its finding made on February 15, 2019, in inquiry NQ-2018-003, concerning the dumping of carbon steel welded pipe from the Islamic Republic of Pakistan, the Republic of the Philippines, the Republic of Türkiye (excluding those goods exported by Erbosan Erciyas Boru Sanayii ve Ticaret A.S.) and the Socialist Republic of Vietnam.

    Ottawa, Ontario, October 16, 2024—The Canadian International Trade Tribunal today continued its finding made on February 15, 2019, in inquiry NQ-2018-003, concerning the dumping of carbon steel welded pipe from the Islamic Republic of Pakistan, the Republic of the Philippines, the Republic of Türkiye (excluding those goods exported by Erbosan Erciyas Boru Sanayii ve Ticaret A.S.) and the Socialist Republic of Vietnam.

    The Tribunal found that the expiry of the finding was likely to result in injury. As such, the Tribunal continued its finding. The Canada Border Services Agency will therefore continue to impose anti-dumping duties on this product.

    The Tribunal is an independent quasi-judicial body that reports to Parliament through the Minister of Finance. It hears cases on dumped and subsidized imports, safeguard complaints, complaints about federal government procurement and appeals of customs and excise tax rulings. When requested by the federal government, the Tribunal also provides advice on other economic, trade and tariff matters.

    MIL OSI Canada News

  • MIL-OSI Canada: Government of Canada invests in retraining opportunities for workers

    Source: Government of Canada News (2)

    Today, Minister of Employment, Workforce Development and Official Languages, Randy Boissonnault, while hosting Workforce Summit 2024 in Montreal, announced the launch of the Canada Retraining and Opportunities Initiative call for proposals. This $30 million fund will be provided to projects that bring together community-based organizations, that provide new skills training opportunities for workers.

    October 16, 2024              (Gatineau, Quebec)              Employment and Social Development Canada

    When communities are hit with mass layoffs, the long-term impacts of unemployment affect everyone. As economies grow and change, there needs to be supports in place to help workers transition into new opportunities.

    That is why today, Minister of Employment, Workforce Development and Official Languages, Randy Boissonnault, while hosting Workforce Summit 2024 in Montreal, announced the launch of the Canada Retraining and Opportunities Initiative call for proposals. This $30 million fund will be provided to projects that bring together community-based organizations, that provide new skills training opportunities for workers.

    The Canada Retraining and Opportunities Initiative is part of the Government’s response to significant job losses impacting a community and provides funding to address exceptional situations. This initiative will help bolster community resilience by complementing existing programs and services to help displaced workers transition into new jobs.

    Interested organizations can apply by first submitting an expression of interest. Organizations that meet the criteria in the expression of interest will be invited to submit a full application. Applications will be accepted between October 16, 2024, and March 31, 2025. The call may close earlier if funding has been fully committed. For more information, please consult the Canada Retraining and Opportunities Initiative webpage.

     “Local leaders know their communities best. That’s why we created the Canada Retraining and Opportunities Initiative; to give local leaders what they need to support workforce planning and help displaced workers find work. That’s how we’re empowering communities to address labour challenges, drive innovation and create good paying jobs across the country.”

    – Minister of Employment, Workforce Development and Official Languages, Randy Boissonnault 

    Alice Hansen
    Director of Communications
    Office of the Minister of Employment, Workforce Development and Official Languages
    alice.hansen@hrsdc-rhdcc.gc.ca

    MIL OSI Canada News

  • MIL-OSI Economics: Clean Energy Industries Rally Behind Illinois Bills to Save Ratepayers $3 Billion Through Grid Modernization

    Source: American Clean Power Association (ACP)

    Headline: Clean Energy Industries Rally Behind Illinois Bills to Save Ratepayers $3 Billion Through Grid Modernization

    HB5856 and SB3959 will increase the reliability of the Illinois energy grid, protect ratepayers from rising costs, future-proof the economy, and help the state achieve climate goals
    ILLINOIS, October 15, 2024 – Illinois clean energy industries are unified in supporting HB5856 and SB3959, new legislation that will future-proof Illinois’ energy grid and economy, lower consumer costs, meet climate goals, create family-sustaining careers, and mitigate increasing risks of blackouts.
    “Clean energy is the future, and it’s my duty to work toward that future for the benefit of all Illinois residents,” said State Rep. Barbara Hernandez (D-Aurora), lead House sponsor of HB5856. “HB5856 and SB3959 will provide many benefits to Illinois for decades to come, from lowering consumer costs to ushering in thousands of jobs to preventing dangerous blackouts to bolstering our power grid to make Illinois an attractive investment for energy-intensive tech companies.”
    These bills establish the first clean energy storage procurement mandate for the state to ensure a more reliable grid and address challenges that are slowing down renewable energy resource development. HB5856 and SB3959 would save Illinois consumers $30 per month on their energy bills, prevent more than $7 billion in blackout-related expenses, and create as much as $16 billion in economic benefits.
    “Illinois has an ambitious plan to be a national leader in the climate change fight while supercharging the state’s clean energy economy,” said State Sen. Bill Cunningham (D-Chicago). “While Illinois is on the right path to meet its goals, it is at risk of not meeting its more immediate deadlines, which will arrive as early as 2030. HB5856 and SB3959 are thoughtful, strategic bills that will help unleash the clean energy economy’s full potential while strengthening our electric grid to make it more reliable, encouraging development and job growth, and creating additional protections for consumers and all ratepayers.”
    The clean energy industries collectively agree that HB5856 and SB3959 are necessary to address the urgent need for more clean energy storage in Illinois. Federal, regional, and state regulators identify Illinois as at risk for falling short of energy needs. This means the state will face challenges in maintaining a reliable grid and that consumers may experience increased and unpredictable energy rates. Legislative action is needed now because deploying large-scale energy storage resources takes time. Illinois residents are already feeling the impact of regulators’ projections, as the July 2024 PJM Interconnection energy capacity auction saw an 833% increase in energy prices, due to an anticipated energy capacity shortfall that will increase power bills by as much as $30 per month for millions of Illinois residents within the PJM Interconnection territory. HB5856 and SB3959 will directly address this risk by providing incentives to supercharge more solar and wind energy and storage developments for a more diverse, reliable power grid.
    “HB5856 and SB3959 are critical to building on the success of the landmark Climate and Equitable Jobs Act (CEJA) in Illinois,” said Andrew Linhares, Senior Manager, Central Region at Solar Energy Industries Association (SEIA). “The Illinois clean energy economy has flourished in recent years but there’s more work to be done to secure the state’s clean energy future. This thoughtfully crafted legislation will help unleash the full potential of solar and storage and help Illinois achieve 100% clean energy by 2050.”
    A recent study by Mark Pruitt, former director of the Illinois Power Agency, founder of The Power Bureau, and a professor at Northwestern University, found that HB5856’s and SB3959’s target to create at least 8,500 MW of clean energy storage would provide up to $3 billion in consumer cost savings, save up to $7.3 billion in blackout-related costs through increased grid reliability, and generate up to $16.3 billion in economic activity in Illinois by 2050. The study also found that energy storage is the most cost-effective, immediate, and attainable long-term solution. Not only would HB5856 and SB3959 create those benefits, but they would also ensure Illinois meets the clean energy mandates established by CEJA.
    “American Clean Power (ACP) was proud to help lead this collaborative effort to ramp up the procurement and deployment of storage and solar technologies in a way that delivers for the people of Illinois,” said Erika Kowall, Director of Midwestern State Affairs for ACP. “HB5856 and SB3959 will meet the state’s clean energy goals, unleashing the full potential of clean energy’s cost efficiency and economic benefits. We appreciate the leadership of Sen. Cunningham and Rep. Hernandez for swiftly taking up this legislation and hope it can be implemented quickly.”
    “Energy storage will improve the reliability of the Illinois electric grid, and this legislation can’t come at a more important moment,” said Trish Demeter, Managing Director of Advanced Energy United. “The sooner we can begin adding more energy storage, the sooner we can address energy capacity shortfalls due to the ever-growing energy demand from residents and businesses, retiring power stations, and continued investments from energy-intensive industries, while providing savings to consumers and supercharging the Illinois economy.”
    “All of these pieces work together – storage, grid reliability, ratepayer savings, climate goals, and equity,” said Lesley McCain, Executive Director of Illinois Solar Energy and Storage Association. “HB5856 and SB3959 tie together each of these pieces to move Illinois closer toward achieving its climate goals. Energy storage is essential to creating a more reliable grid. A more reliable grid is critical to protecting residents from rising prices and attracting investments from new businesses. Incentivizing growth in these areas will accelerate progress toward our climate goals, which will remove high-polluting energy generators from low-income areas. More growth will stimulate the creation of more high-quality job and career opportunities for all Illinois residents. We’ve made great progress toward the aggressive climate goals established by CEJA, but we must keep learning, adapting, and growing if we want to achieve those goals.”
    Interconnection is another important topic addressed by HB5856 and SB3959. Interconnection is the process of connecting an energy generating system, such as a new residential solar panel installation or a community solar array, to the existing power grid. Currently, the process varies significantly from project to project, which can result in large, unanticipated costs to connect a system to the energy grid. Oftentimes, the large, unanticipated cost arises after the development is completed, which can terminate a project even if the system is built and ready to be energized. HB5856 and SB3959 aim to increase transparency and predictability on the interconnection process to reduce surprise changes and costs and maintain the integrity and safety of the power grid.
    “There are many critical stages to solar energy project development, and interconnection is one of the most critical,” said Carlo Cavallaro, Midwest Regional Director of Coalition for Community Solar Access. “When the system has been built and all that is left is to connect it to the grid, this is not when a project should be stalled or failed. Unfortunately, it happens more than one might think, so HB5856 and SB3959 address this in a way that makes the process more transparent and collaborative. If we can make this process more efficient, then it’ll benefit all ratepayers because the process will be cheaper and faster; and it will help us add new clean energy resources to the grid and reach our clean energy goals faster.”
    “Building on CEJA’s landmark goals, HB5856 and SB3959 are a progressive, evidence-based approach that will establish Illinois’ energy grid as the nation’s leader in clean, affordable, and reliable electricity. It will positively benefit electricity customers, improve grid reliability, and send a bold message far and wide that Illinois is open for clean energy business,” said Jeff Danielson, Vice President of Advocacy at Clean Grid Association. “We’re proud to stand with Illinois’ new generation of energy leaders in the Senate and House, who are focused on building the grid of tomorrow right here in the heartland of America. They are standing up for the clean energy opportunities Illinois’ citizens deserve and showing that a reliable grid and business investments of the future go hand-in-hand. The rest of the Midwest, indeed the USA, will take notice.”
    HB5856 and SB3959 address the following:
    Grid Resilience and Reliability
    Establishes an 8.5 GW utility-scale cumulative storage procurement target for the Illinois Power Agency. Storage is a critical component of a stable and resilient grid, as it provides on-time support for grid infrastructure during high-usage Peak Load periods.
    Creates a storage + solar/wind ecosystem that empowers increased storage development at all scales and multi-tech, from behind-the-meter to utility-scale.
    Creates incentive programs for customers to adopt technology that reduces peak loads, behind-meter storage that reduces peak loads or exports, and combined community solar + storage developments.
    Establishes a robust storage and Virtual Power Plant (VPP) ecosystem that makes it less likely a grid will need to tap non-renewable and high-pollutant fuels during periods of high usage, and ensures the grid uses clean, renewable sources that work together regardless of whether or not the sun is shining or the wind is blowing, increasing the overall reliability of the grid in a sustainable way.
    Economic Benefits, Consumer Protections, and Agency Modernization
    Creates a VPP program to provide cost-savings by tapping devices such as rooftop solar and storage to inject power to the grid during peak times, rather than burning extra non-renewable fuel to meet periods of peak demand.
    Implements a more efficient interconnection process to encourage more clean energy development.
    Fosters utility-scale solar development through new IPA storage procurement targets.
    Creates new incentives that eliminate barriers for ratepayers to adopt solar and storage.
    Creates guaranteed savings for consumers by requiring utilities to pass clean energy savings through to consumers.
    Uncaps the residential Illinois Shines Block to eliminate waiting lists and enable more households to install solar, which will create more demand and jobs for clean energy developers and contribute to a more stable grid.
    Stimulates new storage, solar, and wind development, which will lead to the creation of new high-quality clean energy jobs in every corner of Illinois.
    Modernizes IPA procurement processes to ensure efficient procurement of clean energy and keeps Illinois on track to achieve CEJA goals.
    HB5856 and SB3959 can be read in its entirety HERE. To learn more about the legislation, visit http://www.solarpowersillinois.com/legislation-hb-5856.
    ###
    About Solar Powers Illinois Solar Powers Illinois is a collaborative partnership between the Illinois Solar Energy and Storage Association, Coalition for Community Solar Access, and Solar Energy Industries Association that works to promote the adoption of solar power in Illinois for consumers, businesses, and communities through education, advocacy, and action.
    About Advanced Energy United
    Advanced Energy United educates, engages, and advocates for policies that allow our member companies to compete to repower our economy with 100% clean energy. We work with decision makers at every level of government as well as regulators of energy markets to achieve this goal. The businesses we represent are lowering consumer costs, creating millions of new jobs, and providing the full range of clean, efficient, and reliable energy and transportation solutions. Together, we are united in our mission to accelerate the transition to 100% clean energy in the United States. Advanced Energy United is online at AdvancedEnergyUnited.org and @AdvEnergyUnited.
    About Clean Grid Association (CGA)
    Clean Grid Association (CGA) is a 501(c)(6) nonprofit organization based in St. Paul, Minn., whose mission is to advance renewable energy in the Midwest. CGA has been an active stakeholder in the MISO process at the state and regional levels and a leading organization working on transforming state energy policy. CGA’s membership includes businesses investing in wind, solar, storage, hydrogen and transmission projects, as well as environmental nonprofit organizations, public advocacy groups & clean energy advocates who come together to build the clean energy grid of the future. Learn more at cleangridalliance.org.
    About Coalition for Community Solar Access (CCSA)
    CCSA is a national trade association representing over 130 community solar developers, businesses, and nonprofits. Together, we are building the electric grid of the future where every customer has the freedom to support the generation of clean, local solar energy to power their lives. Through legislative and regulatory advocacy, and the support of a diverse coalition — including advocates for competition, clean energy, ratepayers, landowners, farmers, and environmental justice — we enable policies that unlock the potential of distributed energy resources, starting with community solar. For more information, visit https://www.communitysolaraccess.org and follow the group on X (Twitter), LinkedIn, and Youtube.
    About Illinois Solar Energy and Storage Association (ISEA)
    The Illinois Solar Energy and Storage Association (ISEA) is a non-profit organization that promotes the widespread application of solar and other forms of renewable energy through our mission of education and advocacy. Representing over 150 solar businesses, ISEA is the state resource for renewable energy related policy developments, educational classes, events and access to local renewable energy businesses. http://www.illinoissolar.org.
    About Solar Energy Industries Association (SEIA)
    The Solar Energy Industries Association® (SEIA) is leading the transformation to a clean energy economy, creating the framework for solar to achieve 30% of U.S. electricity generation by 2030. SEIA works with its 1,000 member companies and other strategic partners to fight for policies that create jobs in every community and shape fair market rules that promote competition and the growth of reliable, low-cost solar power. Founded in 1974, SEIA is the national trade association for the solar and solar + storage industries, building a comprehensive vision for the Solar+ Decade through research, education and advocacy. Visit SEIA online at www.seia.org and follow @SEIA on Twitter, LinkedIn and Instagram.

    MIL OSI Economics

  • MIL-OSI: Goodman & Company, Investment Counsel Inc. Announces Resignation of Co-Lead Portfolio Manager to Investment Funds

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, Oct. 16, 2024 (GLOBE NEWSWIRE) — Goodman & Company, Investment Counsel Inc. (the “Manager”) announces that Emily Griffiths, Vice President and Portfolio Manager has resigned from the Manager effective today. Ms. Griffiths was the co-lead Portfolio Manager for the following funds:

    • CMP 2023 Resource Limited Partnership
    • Dundee Resource Class

    Mr. Matthew Goodman will continue as the Portfolio Manager until the completion of the previously announced sale of the investment management business to Next Edge Capital Corp.

    About the Manager
    The Manager is a subsidiary of Dundee Corporation (TSX:DC.A). The Manager is a registered portfolio manager and exempt market dealer across Canada, and a registered investment fund manager in the provinces of Ontario, Quebec and Newfoundland and Labrador.

    About CMP
    CMP™ is a pioneer in flow-through investing, with a history dating back to when flow-through shares were first introduced by the federal government. Since its creation in 1984, CMP has successfully raised and invested over $3.1 billion in companies active in exploration and development efforts across Canada. When combined with the flow-through limited partnerships of Canada Dominion, the two form the largest flow-through investing platform in Canada, raising a combined total of more than $4.4 billion in assets throughout their history.

    For more information, contact our Customer Relations Centre at 1.866.694.5672 or visit http://goodmanandcompany.com/.

    The MIL Network

  • MIL-OSI: Willis Lease Finance Corporation Announces Timing of Third Quarter 2024 Earnings and Conference Call

    Source: GlobeNewswire (MIL-OSI)

    COCONUT CREEK, Fla., Oct. 16, 2024 (GLOBE NEWSWIRE) — Willis Lease Finance Corporation (NASDAQ: WLFC) (“WLFC”) plans to announce its financial results for the third quarter 2024 before the opening of Nasdaq on Monday, November 4, 2024.

    WLFC plans to hold a conference call with members of WLFC’s executive management team on Monday, November 4, 2024, at 10:00 a.m. Eastern Standard Time to discuss its third quarter 2024 results. Individuals wishing to participate in the conference call should dial: US and Canada (888) 632-5004, International +1 (646) 828-8082, wait for the conference operator and provide the operator with the Conference ID 512645. A digital replay will be available two hours after the completion of the conference call. To access the replay, please visit our website at http://www.wlfc.global under the Investors section for details.

    A copy of the press release and an earnings supplement will be posted to the Investor Relations section of the Company’s website, http://www.wlfc.global prior to the call.

    Willis Lease Finance Corporation

    Willis Lease Finance Corporation leases large and regional spare commercial aircraft engines, auxiliary power units and aircraft to airlines, aircraft engine manufacturers and maintenance, repair, and overhaul providers worldwide. These leasing activities are integrated with engine and aircraft trading, engine lease pools and asset management services through Willis Asset Management Limited, as well as various end-of-life solutions for engines and aviation materials provided through Willis Aeronautical Services, Inc. Additionally, through Willis Engine Repair Center®, Jet Centre by Willis, and Willis Aviation Services Limited, the Company’s service offerings include Part 145 engine maintenance, aircraft line and base maintenance, aircraft disassembly, parking and storage, airport FBO and ground and cargo handling services.

    CONTACT: Scott B. Flaherty
      Executive Vice President &
    Chief Financial Officer
      sflaherty@willislease.com
      561.413.0112

    The MIL Network

  • MIL-OSI New Zealand: Arts – NEW ZEALAND-CANADIAN JAZZ TRUMPETER LEX FRENCH UNVEILS HIS NEW ALBUM

    Source: Eric Alper

    NEW ZEALAND-CANADIAN JAZZ TRUMPETER LEX FRENCH UNVEILS HIS NEW ALBUM: IN THE WORLD’S FIRST SUMMER. OUT NOW VIA JUSTIN TIME/NETTWERK

    LISTEN HERE: https://lexfrench.ffm.to/intheworldsfirstsummer 

    October 4, 2024 – Today, New Zealand-Canadian jazz trumpeter Lex French is proud to release his debut album, In the World’s First Summer, out now via Justin Time/Nettwerk. Traces of Miles Davis can be heard throughout the eight-song release, as French cites the seminal jazz trumpeter among his many inspirations. He also takes cues from poetry and paintings that add to the album’s artful nature. Listen to In the World’s First Summer on all digital retailers (here https://lexfrench.ffm.to/intheworldsfirstsummer )

    Lex explains in his own words: “In the World’s First Summer is a setting of James K. Baxter’s poem On the Death of Her Body, while Colour Grid is inspired by Paul Klee’s painting New Harmony. Falling Up was a tune that floated around in my head for about 5 years before I figured out how to write it down and keep the spirit of the song intact.  A number of the other pieces–Nana, Going Home, V’la L’bon Vent–are arrangements of folk songs from different traditions, while Huancavelica is a new composition inspired by such a tune. My arrangements of these songs are attempts to make sense of this music that reaches through time, and still manages to tell our stories. Bye Bye Blackbird brings us back to Miles and the end of his first quintet with John Coltrane… check out the version on Live from the Olympia and you’ll see the first glimmerings of his second quintet off in the distance, the same glimmering light that reached through time from 1967 to 1999, grabbed hold of me and never let go.”

    LISTEN & SHARE LEX FRENCH’S ‘IN THE WORLD’S FIRST SUMMER’ HERE:

    https://lexfrench.ffm.to/intheworldsfirstsummer

    ‘In the World’s First Summer’ marks the debut recording of New Zealand-Canadian jazz trumpet player Lex French on the Justin Time label.  Hailed by Radio Canada jazz critic Stanley Pean as “an extraordinary trumpeter”, he is fast becoming a bright star on the Canadian jazz scene, and is a highly in-demand composer and arranger.

    This project takes inspiration from Miles Davis’s seminal second quintet in its approach, a group that has influenced so many musicians over the last 50 years. “When I was about 16 years old, in 1998 or ’99, I bought a copy of Miles Davis’1967 album, Miles Smiles,” says French, “and was immediately captivated. Ever since that first listen, I’ve wanted to lead a group that followed in the footsteps of Miles’s seminal second quintet. His quintet was a band that prioritised communication and improvisation, embraced lush and open harmonic soundscapes, and above all, placed the spirit of spontaneity at the center of everything. In order to play with such spontaneity and open lines of communication, it is important that each musician in the group is an exceptional musician in their own right. François Bourassa (piano), Morgan Moore (bass), and Jim Doxas (drums) are all improvising musicians of the highest order who can bring their individual and personal approaches to the music but also function as members of the group in order to create a whole that is great than the sum of its parts.”

    Track List:

    1. Colour Grid

    2. Bye Bye Blackbird

    3. Falling Up

    4. Lullaby (Nana)

    5. Huancavelica

    6. In the World’s First Summer

    7. Going Home

    8. V’la l’bon Vent.

    CONNECT WITH LEX FRENCH:  https://lexfrenchmusic.com/

    MIL OSI New Zealand News

  • MIL-OSI USA: Congressman DeSaulnier Announces Walk and Talk Town Hall at EBMUD’s Lafayette Reservoir

    Source: United States House of Representatives – Congressman Mark DeSaulnier Representing the 11th District of California

    Walnut Creek, CA – Today, Congressman Mark DeSaulnier (CA-10) announced he will host a Walk and Talk Town Hall at the Lafayette Reservoir on Saturday, October 19th at 10:00 a.m. The Congressman will provide a legislative update and answer questions from constituents. Check-in will begin at 9:30 a.m. and attendees are encouraged to bring their dogs. 

    Walk and Talk Town Hall at the Lafayette Reservoir
    Saturday, October 19th

    10:00 a.m. – 11:00 a.m. PT

    Lafayette Reservoir

    3849 Mt. Diablo Blvd., Lafayette, CA

    This event is open to the public and press. To reserve your spot or request special accommodations, visit https://desaulnier.house.gov/town-hall-rsvp or call (925) 933-2660.

    This will be Congressman DeSaulnier’s 217th town hall and mobile district office hour since coming to Congress in January 2015.

    MIL OSI USA News

  • MIL-OSI USA: Tax Relief for the Heartland: Wagner Joins Ways & Means Tax Team Event in St. Louis

    Source: United States House of Representatives – Congresswoman Ann Wagner (R-MO-02)

    Washington, D.C. – Representative Ann Wagner (R-MO) joined Ways and Means Committee Chairman Jason Smith (MO-08) and Ways and Means Representative Darin LaHood (IL-16) in hosting a roundtable discussion at Centene in St. Louis, Missouri, to hear from local business leaders and workers urging Congress to take action to prevent the looming $7 trillion tax hike proposed by the Biden-Harris Administration.

    “I joined my Missouri colleague Congressman Jason Smith, Chair of the Ways and Means Committee, for a roundtable in St. Louis with local business leaders. We had an extremely productive conversation about the upcoming expiration of the Tax Cuts and Jobs Act and how much our local businesses, employees, and economy here in St. Louis will be harmed if taxes are hiked,” said Rep. Wagner. “If the Trump tax cuts expire, the average taxpayer in Missouri’s 2nd District would have their taxes raised by 20%, a nearly unmanageable cost, especially in the wake of Joe Biden and Kamala’s Harris’ rampant inflation.”

    “It is abundantly clear that the tax hikes proposed by the Biden-Harris Administration would be devastating for the workers and job creators of the heartland and communities across this country,” said Chairman Smith. “The Ways and Means Committee has held 120 Tax Team events in 20 states across the country, and the message is clear. Workers’ wages are still lagging behind inflation and small businesses are struggling to grow. If we want to repair the economic damage of the last four years, Congress must build on the success of the Trump Tax Cuts and deliver pro-growth policies that allow families to thrive, businesses to expand, and workers to earn a living.”

    “It was a pleasure to join Ways and Means Chairman Jason Smith in St. Louis to hear from Midwest businesses about the success of the Trump Tax Cuts, bringing business back to United States, incentivizing growth, and strengthening our workforce. The Trump Tax Cuts created the best economy of my lifetime for small businesses and workers of all backgrounds, and we can’t allow that progress to be undone,” said Rep. LaHood. “Under Chairman Smith’s leadership, Ways and Means Republicans have hit the ground running through our Tax Teams to ensure that we strengthen the Trump Tax Cuts, and that House Republicans are prepared for the ‘Super Bowl of Tax’ on day one of 119th Congress. As the Chair of the American Workforce Tax Team, I’ll continue to work with Chairman Smith and our Ways and Means colleagues to advance pro-growth tax policies that allow our communities in Illinois and across the country to thrive.”

    Over the past several months, Ways and Means Committee Republicans have been traveling to communities throughout the country to listen to workers and small business owners on how best to extend key provisions of the 2017 Trump Tax Cuts before their expiration next year. The St. Louis roundtable marks the second tax team event Chairman Smith has personally hosted in Missouri to bring attention to the economic challenges facing the Show Me State.

    During the event, attendees stressed the need for Congress to extend the Section 199A small business deduction, a provision in the 2017 Trump Tax Cuts that allows small businesses to compete fairly with larger corporations and helps them expand, hire new employees, grow wages, and reinvest in their communities. Participants noted that the Biden-Harris plan to see this provision expire would increase the tax rate paid by small businesses to over 43 percent – nearly 20 percentage points higher than what businesses pay in Communist China.

    Roundtable attendees included:

    • Centene
    • Evernorth Health Services
    • Wideman Pools
    • Speed Fabrication LLC
    • Reinsurance Group of America (RGA)
    • Ameren
    • Hunter Engineering
    • Bunge
    • Sitelines
    • Emerson

    To learn more about the work of the Ways and Means Committee Tax Teams, click here.

    MIL OSI USA News

  • MIL-OSI USA: Governor Katie Hobbs Announces Jerry McPherson as New Executive Director of the Commission of African American Affairs

    Source: US State of Arizona

    Phoenix, AZ – Today, Governor Katie Hobbs announced that Jerry McPherson, longtime Phoenix community leader, will serve as the new Executive Director of the Commission of African American Affairs. The Commission plays an important role in serving the vibrant African American community in Arizona, including supporting economic advancement, promoting equality and justice, and providing educational tools and resources needed to thrive.

    “I am thrilled to have Jerry McPherson as The Commission’s new Executive Director,” said Governor Katie Hobbs. “He has a strong track record of leadership in both the public and private sectors and has spent his career finding new and innovative ways to empower his community. I know Jerry’s breadth of experience and determination will unlock a bright future for The Commission and I look forward to seeing what they will accomplish together.”

    “I am deeply honored and grateful to Governor Hobbs and our Commissioners for entrusting me with this critical responsibility,” said Jerry McPherson. “Our mission—to unite African American leaders and communities in the pursuit of opportunity and equity—has never been more urgent. I look forward to collaborating with our elected and appointed officials to transform our aspirations into lasting change. Through our pillars of Economic Development, Justice, Health, and Education, we can ensure that African-Americans throughout the state can embrace a future filled with promise and opportunity.”

    Jerry McPherson is a U.S. Army Veteran and graduate of the Flinn-Brown Fellowship. He has served in advisory roles for the cities of Phoenix and Tempe, and has experience leading some of Arizona’s most pivotal economic and community organizations including the Greater Phoenix Urban League and Valley of the Sun United Way. Jerry most recently served as a Commissioner on the Commission of African American Affairs and was Managing Director at Per Scholas Phoenix.

    MIL OSI USA News

  • MIL-OSI USA: Governor’s Office Opens Arizona Game And Fish Commission Application

    Source: US State of Arizona

    Mesa, AZ – The Governor’s Office is now accepting applications to fill an upcoming vacancy on the Arizona Game and Fish Commission. Residents knowledgeable and passionate about Arizona wildlife and conservation in eligible counties are welcome to apply.

    The five-member Game and Fish Commission establishes policy, rules, and regulations for the management, preservation and harvest of wildlife and fishery resources, as well as watercraft and off-highway vehicle operations. The commission also serves in an advisory role to the Arizona Game and Fish Department. For more information about the Arizona Game and Fish Commission and its mission visit the Arizona Game and Fish Commission website.

    The commission is structured to ensure geographical and political representation from across Arizona. The current opening must be filled by a resident of Apache, Cochise, Coconino, Graham, Greenlee, La Paz, Mohave, Navajo, Pinal, Yuma, or Yavapai counties. Applicants must disclose their party affiliation on their application and must not have changed party registration within the past two years in order to be eligible.

    Applicants must be received no later than 11:59 p.m. on Monday, October 7th.

    Individuals interested in applying must do so through the Boards and Commissions website. Applicants are required to include their current residential address, political party, and a resume with their application. Any additional materials or letters of recommendation that applicants wish to be included in their application packet should be emailed to [email protected].

    The Game and Fish Appointment Recommendation Commission will be meeting in October to review applications and conduct interviews in-person. Questions regarding the review process should be directed to Cindy Freehauf ([email protected]) with the Arizona Game and Fish Department.

    Individuals also may contact the Governor’s Office of Boards and Commissions by emailing [email protected].

    MIL OSI USA News

  • MIL-OSI USA: Preliminary Injunction Entered in Justice Department Suit to Stop Alabama’s Systematic Removal of Voters from Registration Rolls

    Source: US Justice – Antitrust Division

    Headline: Preliminary Injunction Entered in Justice Department Suit to Stop Alabama’s Systematic Removal of Voters from Registration Rolls

    A federal court in the Northern District of Alabama has entered an order requiring the State of Alabama and the Alabama Secretary of State to cease a recently-implemented program to remove voters from Alabama’s voting rolls between now and the Nov. 5 general election. The court further ordered the State to issue guidance to all counties in Alabama to immediately restore deactivated voters unless those voters requested removal or are subject to removal for other reasons.

    MIL OSI USA News

  • MIL-OSI USA: Shapiro Administration Awards $3.4 Million for Stream and Watershed Restoration Projects

    Source: US State of Pennsylvania

    October 16, 2024Harrisburg, PA

    Shapiro Administration Awards $3.4 Million for Stream and Watershed Restoration Projects

    The Pennsylvania Department of Environmental Protection (DEP) has awarded more than $3.4 million in grants to projects to improve water quality and fish and wildlife habitat throughout Pennsylvania’s part of the Chesapeake Bay watershed and other watersheds.

    “Ensuring clean water and healthy watersheds is a fundamental right for all Pennsylvanians. With these grant awards we will continue our work to reduce pollution and improve water quality in Pennsylvania,” said DEP Acting Secretary Jessica Shirley. “These projects are creating healthier streams and wetlands across Pennsylvania, reducing flood risk and improving fish and wildlife habitat. We are building on the success we are seeing in the Chesapeake Bay watershed by restoring streambanks, removing legacy sediment, and treating mine water discharge, among other improvements.”

    The 12 awards are funded by the Section 319 Grant program from the U.S. Environmental Protection Agency and selected by DEP. The purpose of the grants is to support projects that carry out best management practices (BMPs) specified in Watershed Implementation Plans for 43 watersheds around the state. The program also supports development of new Watershed Implementation Plans for impaired watersheds in Environmental Justice (EJ) areas. Ten of the 12 grants are for projects in the Chesapeake Bay watershed.

    List of Speakers:
    Adam Ortiz, EPA Region 3 Regional Administrator
    Jill Whitcomb, Acting Deputy Secretary for Water Programs, DEP
    Chris Thompson, Lancaster County Conservation District Manager
    Amanda Goldsmith, Watershed Specialist with Lancaster County Conservation District
    Matt Kofroth, Asst. District Mgr. with the Lancaster County Conservation District

    MIL OSI USA News

  • MIL-OSI USA: Leaders of Dangerous Mexican Drug Cartel Responsible for Extreme Violence Charged with International Drug Trafficking and Firearms Offenses

    Source: US Justice – Antitrust Division

    Headline: Leaders of Dangerous Mexican Drug Cartel Responsible for Extreme Violence Charged with International Drug Trafficking and Firearms Offenses

    An indictment was unsealed in the District of Columbia charging leaders of the violent drug trafficking organization known as Los Zetas, and its successor organization, Cartel del Noreste (CDN), with engaging in a continuing criminal enterprise; drug trafficking conspiracy; firearms offenses; and international money laundering conspiracy.

    MIL OSI USA News

  • MIL-OSI Canada: Ministers LeBlanc and Virani to co-host the FPT Ministers Responsible for Justice and Public Safety Meeting

    Source: Government of Canada News

    Media advisory

    The Honourable Dominic LeBlanc, Minister of Public Safety, Democratic Institutions and Intergovernmental Affairs, and the Honourable Arif Virani, Minister of Justice and Attorney General of Canada, will co-host the Federal-Provincial-Territorial (FPT) Ministers responsible for Justice and Public Safety meeting, alongside R.J. Simpson, Premier of the Northwest Territories.

    Media will have an opportunity to capture b-roll footage (cameras only, no audio).

    Date:
    Thursday, October 17, 2024

    Time:
    8:45 a.m. (MDT)

    Location:
    Katimavik Meeting Room
    The Explorer Hotel
    4825 49 Avenue
    Yellowknife, Northwest Territories

    Note for media:

    • Media representatives must arrive 30 minutes in advance of the event to sign-in and present photo ID and credentials. Photo ID must be visible at all times.

    Contacts

    Gabriel Brunet
    Press Secretary
    Office of the Honourable Dominic LeBlanc, Minister of Public Safety, Democratic Institutions and Intergovernmental Affairs
    819-665-6527
    gabriel.brunet@iga-aig.gc.ca

    Chantalle Aubertin
    Deputy Director, Communications
    Office of the Minister of Justice and Attorney General of Canada
    613-992-6568
    Chantalle.Aubertin@justice.gc.ca

    Media Relations
    Public Safety Canada
    613-991-0657
    media@ps-sp.gc.ca

    Media Relations Office
    Department of Justice Canada
    613-957-4207
    media@justice.gc.ca

    MIL OSI Canada News

  • MIL-OSI USA: Sacrifice and Success: NASA Engineer Honors Family Roots

    Source: NASA

    Lee esta historia en Español aquí.
    Born and raised in Peru, Daniel Velasquez moved to the United States when he was 10 years old. While that decision was a big transition for his family, it also created many opportunities for him. Now Velasquez is an operations engineer for NASA’s Air Mobility Pathfinders project at NASA’s Armstrong Flight Research Center in Edwards, California.
    Velasquez develops flight test plans for electric vertical take-off and landing (eVTOL) aircraft, specifically testing how they perform during various phases of flight, such as taxi, takeoff, cruise, approach, and landing. He was drawn to NASA Armstrong because of the legacy in advancing flight research and the connection to the Space Shuttle program.
    “Being part of a center with such a rich history in supporting space missions and cutting-edge aeronautics was a major motivation for me,” Velasquez said. “One of the biggest highlights of my career has been the opportunity to meet (virtually) and collaborate with an astronaut on a possible future NASA project.”

    Velasquez is incredibly proud of his Latino background because of its rich culture, strong sense of community and connection to his parents. “My parents are my biggest inspiration. They sacrificed so much to ensure my siblings and I could succeed, leaving behind the comfort of their home and family in Peru to give us better opportunities,” Velasquez said. “Their hard work and dedication motivate me every day. Everything I do is to honor their sacrifices and show them that their efforts weren’t wasted. I owe all my success to them.”
    Velasquez began his career at NASA in 2021 as an intern through the Pathways Internship Program while he was studying aerospace engineering at Rutgers University in New Brunswick, New Jersey. Through that program, he learned about eVTOL modeling software called NASA Design and Analysis of Rotorcraft to create a help guide for other NASA engineers to reference when they worked with the software.
    At the same time, he is also a staff sergeant in the U.S Army Reserves and responsible for overseeing the training and development of junior soldiers during monthly assemblies. He plans, creates, and presents classes for soldiers to stay up-to-date and refine their skills while supervising practical exercises, after action reviews, and gathering lessons learned during trainings.

    “This job is different than what I do day-to-day at NASA, but it has helped me become a more outspoken individual,” he said. “Being able to converse with a variety of people and be able to do it well is a skill that I acquired and refined while serving my country.”
    Velasquez said he never imagined working for NASA as it was something he had only seen in movies and on television, but he is so proud to be working for the agency after all the hard work and sacrifices he made that lead him to this point. “I am incredibly proud to work every day with some of the most motivated and dedicated individuals in the industry.”

    MIL OSI USA News

  • MIL-OSI USA: Casey, Colleagues Call on Biden Administration to Speed Up Enforcement of Iran Sanctions

    US Senate News:

    Source: United States Senator for Pennsylvania Bob Casey

    In letter, bipartisan group of Senators call out Administration for missing deadlines on Iran sanctions

    The missed deadlines were put in place by Casey’s Stop Harboring Iranian Petroleum Act, which cracks down on Iran’s petroleum trade

    Senators: “Due to the quantity of oil that Iran is able to trade and the subsequent profits, as well as their historical pattern of utilizing these funds to foster violence and chaos, it is vital that the United States take concrete action to disrupt their petroleum trade”

    Washington, D.C. – U.S. Senator Bob Casey (D-PA) joined his colleagues Kyrsten Sinema (I-AZ), Jacky Rosen (D-NV), Tammy Baldwin (D-WI), Chuck Grassley (R-IA), Eric Schmitt (R-MO), and John Hoeven (R-ND) in a letter urging the Administration to speed up enforcement of sanctions on Iran’s petroleum trade. The letter pointed out that the Administration has missed several deadlines put in place by the Stop Harboring Iranian Petroleum Act, which cracks down on foreign persons who knowingly engage in the petroleum trade with Iran.

    “Due to the quantity of oil that Iran is able to trade and the subsequent profits, as well as their historical pattern of utilizing these funds to foster violence and chaos, it is vital that the United States take concrete action to disrupt their petroleum trade. Therefore, we ask the administration to honor the reporting deadlines and enforcement requirements prescribed within the SHIP and Fight CRIME Acts,” wrote the Senators.

    On April 23, 2024, Senator Casey voted to pass an emergency supplemental spending law with legislative provisions to strengthen U.S. national security, including the Stop Harboring Iranian Petroleum (SHIP) Act and the Fight and Combat Rampant Iranian Missile Exports (Fight CRIME) Act

    The SHIP Act includes important provisions to sanction foreign persons that knowingly engage in the petroleum trade with the Islamic Republic of Iran, and the Fight CRIME Act restricts certain missile-related activities and transfers by Iran. The bills include a number of reporting deadlines and enforcement requirements for the Administration so that Congress can track efforts to deny Iran the resources and ability to engage in destabilizing activities, commit human rights violations, support international terrorism, and fund weapons development.

    Senator Casey has long pushed to protect American economic and national security by monitoring Iranian oil activity. Earlier this year, Casey cosponsored the bipartisan Iranian Sanctions Enforcement Actlegislation establishing a fund to cover expenses related to the seizure or forfeiture of property found in violation of sanctions imposed by the United States against Iran or a covered proxy of Iran, including Hamas, the Islamic Revolutionary Guard Corps’ Quds Force, the Palestinian Islamic Jihad, Hezbollah, the Houthis, and Iran-sponsored militias in Iraq and Syria. Additionally, after learning about potential Iranian oil transport on Panamanian vessels in violation of U.S. sanctions, Casey urged the Panamanian Maritime Authority (AMP) to investigate the hundreds of vessels of concern. Thanks to Casey’s advocacy, AMP launched investigations into all Panamanian ships suspected of transporting Iranian oil, de-flagged vessels that had no evidence of oil transport, and removed dozens of ships from its registry.  

    Read the full letter HERE or below:

    Dear Secretary Blinken, Secretary Yellen, Acting Director Palluconi, and Administrator DeCarolis:

    On April 23, 2024, Congress passed H.R. 815, an emergency supplemental appropriation for Fiscal Year (FY) 2024, that was signed into law by President Biden on April 24. The supplemental package included additional funding for Ukraine, Israel, the Indo-Pacific, and humanitarian assistance. The national security package also included legislation to strengthen U.S. national security, including the Stop Harboring Iranian Petroleum (SHIP) Act and the Fight and Combat Rampant Iranian Missile Exports (Fight CRIME) Act. The SHIP Act includes important provisions to sanction foreign persons that knowingly engage in the petroleum trade with the Islamic Republic of Iran, and the Fight CRIME Act restricts certain missile-related activities and transfers by Iran. The legislation includes a number of regulation publishing and reporting requirements from the administration in order for Congress to track efforts to deny Iran the resources and ability to engage in destabilizing activities, commit human rights violations, support international terrorism, and fund weapons development.

    For decades, there has been evidence that Iran has funded direct attacks on America and our allies. Since Hamas’ attack on Israel on October 7, 2023, Iran has only become more emboldened to act against democratic interests across the globe. To cite just two recent events, the International Atomic Energy Agency confirmed in its August 2024 report that Iran continues to increase its stockpile of enriched uranium, and on September 10, 2024, the Pentagon confirmed reports that Iran has transferred shipments of Fath 360 close-range ballistic missiles to Russia to support their continued aggression against Ukraine. Iran is able to further these disrupting activities due to profits from their oil trade.  According to United Against Nuclear Iran, a non-partisan watchdog organization that tracks Iranian oil shipment, Iran exported 1,626,866 barrels per day in August 2024.  Due to the quantity of oil that Iran is able to trade and the subsequent profits, as well as their historical pattern of utilizing these funds to foster violence and chaos, it is vital that the United States take concrete action to disrupt their petroleum trade. Therefore, we ask the administration to honor the reporting deadlines and enforcement requirements prescribed within the SHIP and Fight CRIME Acts that were included in H.R. 815, the emergency supplemental appropriations.

    To date, the administration has not met the following deadlines:

    • By July 23, 2024 (90 after enactment, and every 180 days thereafter), the Secretary of State shall provide a report that identifies Iranian persons utilizing an unmanned combat aerial vehicle against a United States citizen. P.L. 118-50, Div. K Sec.6(a)
    • By August 12, 2024 (10 days before regulation enactment), the President shall notify the appropriate Congressional committees of the proposed regulations to combat proliferation of Iranian missiles. P.L. 118-50, Div. K Sec. 5(f)(2)
    • By August 22, 2024 (120 days after enactment), the President shall promulgate regulations as necessary for the implementation of sanctions to combat proliferation of Iranian missiles. P.L. 118-50, Div. K Sec. 5(f)(1)
    • By August 22, 2024 (120 days after enactment, and annually thereafter), the Administrator of the Energy Information Administration shall submit a report describing Iran’s growing exports of petroleum and petroleum products, including their exports to the People’s Republic of China and the ships and ports involved in the oil sales. P.L. 118-50, Div. J Sec. 4(a)
    • By August 22, 2024 (120 days after enactment), the Secretary of State shall submit written strategy on the role of the People’s Republic of China’s role in evading U.S.-imposed sanctions on Iranian-origin petroleum products. P.L. 118-50, Div. J Sec. 5

    The following deadlines are upcoming within the next 30 days:

    • By October 11, 2024, (10 days before regulation enactment) the President shall notify and brief the appropriate Congressional Committees on the regulations to be established to implement the SHIP Act. P.L. 118-50, Div. J Sec. 3(e)(2)
    • By October 21, 2024 (180 days after enactment), the President shall prescribe necessary regulations to implement sanctions enforcement. P.L. 118-50, Div. J Sec. 3(e)(2)
    • On and after October 21, 2024 (180 days after enactment), the President shall impose sanctions on foreign persons determined to have knowingly engaged in the Iranian petroleum trade. P.L. 118-50, Div. J Sec. 3(a)

    Given the havoc Iran is wreaking in the Middle East and the wider region, this information is both timely and vital for Congress to carry out appropriate sanctions oversight and understand what greater legislative action is required to ensure Iran does not have the resources to harm the United States or our partners and allies. We look forward to these timely reports and enhanced understanding of the administration’s plan to counter Iranian oil trade and accessible revenue for their funding of terrorism. We ask that you honor the October deadlines and work to address the deadlines already missed in order to provide Congress with the relevant reports as quickly as possible.

    We further request that you provide our offices an update on your efforts and when to expect these reports no later than October 29, 2024. Thank you for your continued work and attention to this matter.

    MIL OSI USA News