Category: Americas

  • MIL-OSI USA: Murkowski Highlights Opportunities, Challenges with Interior Budget Request

    US Senate News:

    Source: United States Senator for Alaska Lisa Murkowski
    05.22.25
    Washington, DC – Yesterday, U.S. Senator Lisa Murkowski (R-AK), Chair of the Senate Appropriations Subcommittee on Interior, Environment, and Related Agencies, hosted the Secretary of the Interior in subcommittee to discuss the Department’s budget request. The Senator reinforced her appreciation for the administration’s approach to resource development in Alaska, while also addressing staffing concerns, public land sales, and other avenues of potential for the department.
    Watch the Senator’s opening statement here.
    Read the Senator’s full opening statement below.
    FULL TRANSCRIPT
    Senator Murkowski: Good to have you here to discuss the President’s Fiscal Year 2026 Budget Request for the Department of the Interior. I’m pleased to have the opportunity today to talk about the important work that the Department does, including its leading role in supporting America’s energy agenda, empowering Indian country and Tribal nations, providing recreational opportunities to tens of millions of Americans, and generating billions of dollars in economic output.
    It’s been a real pleasure, I have appreciated the meetings that we’ve had, the conversations that we’ve had by phone, and it’s been great to meet the various Assistant Secretary nominees from the Department. I’ve enjoyed our conversations there. I’m impressed by their understanding of the issues that they focus on, and their commitment to public service.
    You’re building out quite the team. It was great to be able to talk to Kate MacGregor. She has a little bit of history with the Department, and comes with a lot of knowledge and understanding, certainly on Alaska–related issues, so we were glad to get her confirmed and to work as well as some of the other nominees. As the Chairman of the Indian Affairs Committee, we’re anxious to have a nominee for the [Assistant Secretary for Indian Affairs] as well.
    So, I want to thank you, I want to thank President Trump for recognizing Alaska’s amazing natural resource potential. This was very significant in the day-one executive order: everything from the Ambler Road to the NPR-A, to non-wilderness Coastal Plain, Alaska
    LNG. There’s been very swift, very early, and decisive action in this space. It’s welcome both here in Washington, DC, and certainly in my state. So, I’m looking forward to working with you to further facilitate the development of Alaska’s resources.
    I know you are looking forward to going to Alaska in just a couple weeks. Hopefully, it’s going to be a great trip, lots of good information, good feedback, and good weather. I’m hopeful that Denali will be out in all of its majesty and splendor and you’ll be reminded why Alaskans prefer the Koyukon-Athabascan name, “Denali,” meaning ‘the Great One.’
    The President and you have set out an ambitious agenda, particularly with respect to the focus on energy and economic development. I’m very supportive of this endeavor, and know that I want to be your partner in achieving so many of the goals.
    Beyond resource development, the Department of the Interior can be an economic force for good in many different ways. One of the most important economic drivers that we see up in Alaska, aside from the resource end of things, within the Department is the National Parks System. The National Parks in the home states of the members on this subcommittee generate a collective $7.4 billion of economic output annually. That’s more than the gross domestic product of 40 different countries. But it’s not just the economic output that makes parks so important, it’s the experiences of traveling to parks, seeing the wildlife, having an adventure that creates a lifetime of memories. And, we’ve had discussions about some of your early years and the significance of that.
    Back home in Alaska, we’ve already had about 150,000 people come through on cruise ships this year. That might not surprise other people, but this is early for us. We estimate a total of 1.65 million visitors for the tourism season – that’s about double the population of our state. So, when we see a skinny budget that proposes to cut $1.2 billion or 35% from the Park Service, it’s hard to square it with the claims that DOI is focused on fostering the American economy, again recognizing that our economy is more than just our natural resource development.
    Another area of concern that I will address in my questions within the National Park Service budget proposal is the concept of turning over management of National Parks to the states. I’m trying to figure out exactly how this would work, and I’m kind of thinking it’s like me putting my kids in charge of the upkeep for the house that I own. In some instances, it might make good sense, but as a wholesale best practice I worry about how that might impact the parks or our people. So, should this concept be included in the full budget request, I’d hope that we have a really thorough conversation with you to better understand the justification for the proposal.
    I am concerned about what the skinny budget proposes for the BIA and the BIE. Cutting nearly $1 billion from Indian Affairs would hurt the federal government’s ability to meet its trust responsibility to Native people. In some of our conversations, I’ve shared some of the areas where I think the Department has failed Indian Country, and this is in areas like probate, where we have an extraordinary backlog, public safety and justice, missing and murdered indigenous people, as well as the education of Native American children.
    While I appreciate that the skinny budget alleges that proposed cuts would enable Tribes to focus on law enforcement, I’m not sure how reducing BIA law enforcement funding by $107 million is treating the program as a core priority of Tribes. I know, because I hear Tribes have been requesting more support for this program to address a serious lack of policing, so I worry that cuts of this magnitude can’t be made up for by directing Tribes to apply for grants at DOJ as the skinny budget suggests.
    I want to end my opening comments this morning by talking about what I consider to be, and I know that you put equal priority to, and that’s the men and women of the Department. The people who actually make things happen.
    We’ve talked about a lot of good ideas for using new systems, IT systems, artificial intelligence, how we can make the Department more efficient. These are good goals, worthy goals, and I hope to see that detailed more in the budget. But I think we know when we’re talking about management of our public lands, if you don’t have the necessary staff, whether out in the field or in the headquarters, all the investments that we want to make become less efficient.
    When I think about the Executive Order as it relates specifically to Alaska, we’ve got some good things that we want to do up north when it comes to resource development, but scientific and ecological assessments that are provided by USGS are relied upon by not just federal land management agencies, but by the industry as well. USGS science helps avoid polar bear dens, identify permafrost, map caribou migration patterns. So, when we see cuts to USGS, but also BLM, BOEM, BSSE, and OSMRE, it causes me to wonder, are we going to be able to accomplish what we’re all seeking to accomplish together?
    I think it’s important also that people have expertise and knowledge about the places that they serve. I had this conversation with folks in the Forest Service. You just can’t take somebody who maybe comes from Indianapolis, a good Forest Service person, but you put them out at the Mendenhall Glacier Visitors Center where their job is bear management and they don’t have a clue about bear management.
    We want to make sure that we’re making good and smart decisions. I know you’re probably going to get a lot of questions today about staffing cuts, and how that is going to impact the operations of the Department not just here in Washington, but around the country. I do wish that the Acting Assistant Secretary for Policy, Management, and Budget, Mr. Hassan, [was] here today to answer some of these questions because he seems to be in charge of making a lot of the decisions about the staffing and the [reorganization]. I’m hoping that he is going to be in a position to be more responsive to my staff about some of the questions that we have raised. But ultimately, and you know, you’ve been a governor you know the buck stops with you. He can be responsible for certain things, but ultimately it is you that is accountable.
    So, getting the answers to questions about the reorganizations, the impacts of RIFs, how the Department will operate National Parks, protect reserves, and implement the President’s energy agenda. Getting this channel of communication going back and forth in a good and a constructive way, I think is going to be important. But, my bottom line to you this morning is [that] I’m I pleased with your nomination, I’m excited that you are there at the Department.
    I’m really excited about the shift that we’re seeing in Alaska where the Department has really gone from being a problem to being a partner in so many different areas. So, [I’m] looking forward to what we’re going to be able to do together.

    MIL OSI USA News

  • MIL-OSI USA: Warner and Kaine on House GOP Bill to Gut Medicaid to Pay for Tax Cuts for the Ultra-Wealthy

    US Senate News:

    Source: United States Senator for Commonwealth of Virginia Mark R Warner
    WASHINGTON – Today, U.S. Sens. Mark R. Warner and Tim Kaine (D-VA) issued the following statement after Republicans in the House of Representatives voted in the dead of night to approve legislation to cut taxes for the ultra-wealthy while slashing Medicaid and nutrition assistance, raising taxes on working families, and exploding the national debt:  
    “This bill would do real harm to Virginia families, workers, and communities. It would raise taxes on working families and rip health care away from more than 262,000 people in Virginia in order to give tax breaks to Donald Trump and his billionaire friends. Virginians deserve better, and we will oppose this bill with everything we’ve got as it comes to the Senate. “
    Warner and Kaine have been sounding the alarm about the effects of the GOP plan on Virginia if Republicans in Congress continue to insist on gutting vital programs in order to pay for tax breaks for the richest Americans, noting that the GOP bill would strip health insurance from more than 262,000 Virginians; rip nutrition assistance away from at least 204,000 Virginians, including children; raise energy costs for Virginia households; jeopardize more than 20,000 Virginia jobs; and raise taxes on minimum wage workers while giving the richest 0.1% a $188,000 tax cut.

    MIL OSI USA News

  • MIL-OSI Video: President Trump Participates in a MAHA Commission Event

    Source: United States of America – The White House (video statements)

    The White House

    https://www.youtube.com/watch?v=dDkYJxE9WTc

    MIL OSI Video

  • MIL-OSI Video: National Maritime Day Observance with Secretary Duffy | U.S. Department of Transportation

    Source: United States of America – Federal Government Departments (video statements)

    Join the U.S. Department of Transportation for our National Maritime Day 2025 Observance, honoring the vital contributions of America’s maritime industry and those who serve at sea.
    This year’s theme—Restoring America’s Maritime Dominance—reflects the nation’s renewed commitment to shipbuilding, supply chain resilience, and the future of the U.S. maritime workforce.

    Remarks by:
    – The Honorable Sean P. Duffy, U.S. Secretary of Transportation
    – LTG Jered P. Helwig, U.S. Transportation Command
    – Mark Barker, President, Interlake Steamship Company
    – Elizabeth O’Connor, Chief Counsel, Maritime Administration (in lieu of the Administrator)

    U.S. Department of Transportation Headquarters, Washington, DC
    May 22, 2025 | 10:00 AM ET

    https://www.youtube.com/watch?v=rinLTj8e0pQ

    MIL OSI Video

  • MIL-OSI USA: Kean Applauds Passage of the House Reconciliation Package

    Source: US Representative Tom Kean, Jr. (NJ-07)

    (May 22, 2025) WASHINGTON, D.C. — Today, Congressman Tom Kean, Jr. (NJ-07) released the following statement after the House passed its reconciliation package, a historic piece of legislation that delivers middle-class tax relief, unleashes American energy and innovation, and roots out waste, fraud, and abuse.

    Kean said, “We did it. The House just passed the Reconciliation package, a major step forward that delivers important wins for New Jerseyans and all Americans. I stood up for New Jersey every step of the way, even when it meant standing alone or standing against my own party’s leadership. I led the fight to restore our property tax deduction, and we won. The House bill restores the full SALT deduction for middle-class families, providing up to $40,000 in deductibility.

    “On healthcare, we protected Medicaid for every intended beneficiary in New Jersey and across the country and stopped illegal immigrants from stealing taxpayer-funded benefits. By rooting out waste, fraud, and abuse, we can ensure that this vital program is there for current and future generations of Americans. We also boosted the Child Tax Credit to $2,500, giving young families a much-needed return at a time when they need it most. We secured critical relief for Somerset and Morris Counties and the whole state of New Jersey by providing tens of millions of dollars for local and state law enforcement, ensuring they are supported while protecting President Trump over the next four years. We continued delivering for the American people by voting to secure our borders, unleash American energy and innovation, and invest in national security, all while cutting wasteful spending and making the federal government more efficient, accountable, and effective.

    “This bill lays the foundation for a stronger, more affordable America for middle-class families in the Seventh District, but the fight doesn’t stop here. I will continue advocating for the hardworking taxpayers in New Jersey until this bill reaches the President’s desk.”

     

    Key Wins in the House Reconciliation Package for New Jersey and the Nation:

    • SALT Deduction Raised: Raises the cap on the State and Local Tax deduction to $40,000, providing major relief for all middle-class families.

     

    • Medicaid Integrity Restored: Ensures benefits go only to eligible recipients and that those who are able to contribute to their community are doing so in order to receive Medicaid benefits. Preserves funding for New Jersey’s hospitals, nursing homes, and other providers.

     

    • Secret Service Reimbursement Secured: Secures vital federal support for local and state law-enforcement who provide protection when President Trump is at his home in Bedminster.

     

    • Border Security Strengthened: Provides resources to support border patrol agents, detect illegal drug smuggling, and secure our southern border.

     

    • American Energy Independence Advanced: Unleashes American energy production to help us meet our growing energy needs.

     

    • Child Tax Credit Boosted: Increased to $2,500, offering direct support for families after years of rising costs.

     

    • PBM Reform Achieved: Cracks down on abusive middlemen in the prescription drug market to lower costs for Medicare and consumers.

     

    • “Doc Fix” Enacted: Addresses long-standing Medicare physician payment issues to ensure that New Jersey’s doctors receive fair reimbursement for their important services.

     

    • Orphan Cures Act Passed: Eliminates a misguided law that slowed the development of drugs for patients with rare diseases. Many of these treatments are developed by New Jersey’s unparalleled biotech innovation industry.

     

    • Air Traffic Control Modernized: Delivers a $12.5 billion investment to overhaul, modernize, and staff our air traffic control system.

    ###

    MIL OSI USA News

  • MIL-OSI United Nations: Experts of the Committee on the Rights of the Child Praise Qatar’s Investments in Child Health and Education, Ask about the Age of Criminal Responsibility and Penalties for Child Offenders

    Source: United Nations – Geneva

    The Committee on the Rights of the Child today concluded its consideration of the fifth and sixth combined periodic reports of Qatar under the Convention on the Rights of the Child, with Committee Experts praising the State’s investments in child health and education, and raising questions about its efforts to raise the minimum age of criminal responsibility and prohibit the imposition of harsh penalties, including the death penalty and flagellation, on child offenders aged 16 years and over.

    Aissatou Alassane Sidikou, Committee Expert and Taskforce Coordinator for Qatar, commended Qatar’s efforts to invest in children’s health and education; implement its national development programme, which promoted sustainable development; establish its Ministry of Social Development and Family; and implement the Committee’s recommendations.

    Ms. Sidikou asked whether Qatar’s draft bill on children’s rights would increase the minimum age of criminal responsibility of children, which was currently one of the lowest in the world at seven years, and prohibit imprisonment, flagellation and forced labour for children, which was currently allowed from 16 years of age.  In Qatar, children could be sentenced to death. What measures were in place to strictly prohibit the application of the death penalty on children?

    Rosaria Correa, Committee Expert and Country Taskforce Member, said that despite the recommendations of various human rights mechanisms, the new nationality law did not allow Qatari women married to foreign citizens to pass on their nationality to their children. What steps had been taken to amend this law and other laws to allow Qatari women to pass on their nationality to their children?

    Introducing the report, Ahmad bin Hassan Al-Hammadi, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, said that, over the reporting period, Qatar had worked to strengthen legislative and institutional measures to protect children’s rights in the fields of education, health, social protection and criminal justice. The Qatar National Vision 2030 and the State’s third national development strategy 2024-2030 included key measures addressing children’s rights, and promoted equality and non-discrimination of children.

    The delegation said Qatar had reduced sentences for cases where perpetrators of crimes were children.  Sanctions for children under 16 years did not include corporal punishment or flagellation.  The draft law on the rights of the child would increase the minimum age of criminal liability and define all persons less than 18 years old as children.  It would be adopted and published soon.

    The delegation also said the death penalty could be imposed on children aged 16 to 18, who were more aware of their actions, but judges could commute the sentence, considering the age of the child when the crime was committed.  No one aged 16 to 18 had been sentenced to death in Qatar.

    The Qatari Nationality Code addressed the issue of kinship, the delegation said.  Children of non-Qatari fathers were given the nationality of their father, but such children also had the ability to access Qatari nationality if they had permanent residence.  The State had made great strides in reducing statelessness.

    In closing remarks, Ms. Sidikou said many efforts had been made by the State for children, but challenges remained.  The Committee hoped that the dialogue would help to improve protections for children in Qatar.

    Mr. Al-Hammadi, in concluding remarks, thanked the Committee and all persons who contributed to the constructive dialogue.  Qatar was committed to cooperating with the Committee and to addressing the challenges and risks it faced concerning the rights of the child.  It had achieved great progress in human rights over the years through cooperation with human rights mechanisms.

    Sophie Kiladze, Committee Chair, said in concluding remarks that the information provided by the State party would help the Committee to assess the achievements made by Qatar and the challenges it faced.  The Committee would do its best to develop concluding observations that would strengthen the rights of children in Qatar to the extent possible.

    The delegation of Qatar consisted of representatives from the Ministry of Foreign Affairs; Ministry of Interior; Ministry of Public Health; Ministry of Social Development and Family; Ministry of Education and Higher Education; Ministry of Justice; Supreme Judiciary Council; Public Prosecution; National Group for Protection of Children from Abuse and Violence; and the Permanent Mission of Qatar to the United Nations Office at Geneva.

    The Committee will issue the concluding observations on the report of Qatar at the end of its ninety-ninth session on 30 May. Those, and other documents relating to the Committee’s work, including reports submitted by States parties, will be available on the session’s webpage.  Summaries of the public meetings of the Committee can be found here, while webcasts of the public meetings can be found here.

    The Committee will next meet in public this afternoon at 3 p.m. to consider the combined fifth to seventh periodic reports of Brazil (CRC/C/BRA/5-7).

    Report

    The Committee has before it the fifth and sixth combined periodic reports of Qatar (CRC/C/QAT/5-6).

    Presentation of Report

    AHMAD BIN HASSAN AL-HAMMADI, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, said that Qatar was firmly and permanently committed to the principles of the Convention. Articles 21 and 22 of the Constitution emphasised the role of the family in protecting children from exploitation and neglect, and supporting their development.  The State had worked to strengthen legislative and institutional measures to protect children’s rights in the fields of education, health, social protection and criminal justice.

    The national report was the result of consultation and cooperation between the various national authorities, civil society and children.  The State had made great efforts to address and implement most of the previous recommendations made by the Committee, contributing to tangible progress in ensuring the rights of children.

    The Qatar National Vision 2030 and the State’s third national development strategy 2024-2030 included key measures addressing human rights issues in various fields, including children’s rights, and promoted equality and non-discrimination of children.  Over the reporting period, there had been extensive legislative amendments regarding the protection and promotion of children’s rights, most notably law 22 of 2021 regulating health care services, which included provisions promoting access to health care for all children, and the anti-cybercrime law, which criminalised sexual exploitation.  A draft law on children’s rights was also currently under review; it established effective mechanisms for the protection and development of children’s capacities and promoted the best interests of the child.

    The Ministry of Social Development and Family, established in 2021, was responsible for following up on childhood issues through specialised departments on family development, community welfare, and social protection.  The Qatar Foundation for Social Work had mechanisms for monitoring, follow-up and reporting on protection measures for child victims of violence, as well as awareness campaigns informing children of their rights and methods of reporting and seeking assistance.  The State had also established the National Planning Council, which was responsible for planning and implementing public policies related to children.  The Council of Ministers approved in April 2025 the establishment of the Digital Safety Committee for Children and Young People, and an awareness campaign on the safe use of technology would also be launched in June 2025.

    Efforts had continued to increase the enrolment rates of children, including children with disabilities, in compulsory education.  The overall enrolment rate was more than 97.5 per cent.  The State was encouraging girls to enrol in scientific disciplines; the percentage of girls in these disciplines had reached about 54 per cent at the secondary level.  New schools had also been established to provide technical and specialised education for both boys and girls.  The national education strategy 2024-2030 focused on improving the quality and inclusiveness of education, ensuring equal opportunities and enhancing governance. Five “peace schools” that received children of various nationalities, especially from countries in crisis, including children with disabilities, had been established.

    In the health sector, the national health strategy 2024-2030 was launched, which aimed to promote children’s health by preventing chronic diseases such as obesity and diabetes, and paying attention to oral health.  The State had established a system of child-friendly hospitals and general paediatric clinics.  The national team for child protection from violence and neglect received approximately 500 cases annually of suspected cases of child abuse and implemented preventive measures in response.  Effective countermeasures adopted during the COVID-19 pandemic contributed to Qatar having one of the lowest child mortality rates globally.

    Qatar’s Labour Code protected children from exploitation, prohibited their employment before reaching the legal age, and regulated the types of work that children could not do.  Moreover, the consumer protection law and the food control law promoted children’s rights as vulnerable consumers, while the Ministries of Health and Commerce were closely monitoring to ensure safe and healthy food for children.  The State had also launched plans to reduce and assess environmental pollution, especially in areas near schools and residential areas.

    The State had also paid attention to building the capacity of professionals working with children, such as judges, teachers, doctors and media professionals, through training programmes on the Convention delivered in cooperation with civil society.  Qatar was also studying the possibility of establishing a national children’s parliament and had established interactive platforms that allowed children to express their opinions and suggestions, especially when discussing policies that directly affected their lives.

    To protect children’s rights, Qatar was cooperating with United Nations agencies, including the United Nations Children’s Fund, which opened an office at the United Nations House in Doha in 2022. It was working to protect children in conflict areas in countries such as Syria, Palestine, Yemen, Somalia, Afghanistan, Russia and Ukraine.  The Qatari Education Above All initiative had reached over 17 million children in more than 65 countries.  Qatar had provided humanitarian assistance, including food and health care, to children in Gaza.

    Qatar was fully committed to the implementation of the Convention and its two Optional Protocols, and the protection of children’s rights.  Achieving this goal required continuous reform efforts through measures that kept pace with emerging changes and challenges.

    Questions by Committee Experts 

    AISSATOU ALASSANE SIDIKOU, Committee Expert and Taskforce Coordinator for Qatar, commended Qatar’s efforts to invest in children’s health and education; implement its national development programme, which promoted sustainable development; establish its Ministry on the Rights of Children and Families; and implement the Committee’s recommendations. Why had the State party maintained its reservations to articles two and 14 of the Convention?  The provisions in article two of the Convention were much broader than those of articles 34 and 35 of the Constitution. 

    Why was there was no schedule for adoption of the draft bill on children’s rights, which had been considered by the State for over 15 years?  Would the bill increase the minimum age of criminal responsibility of children, which was currently at seven years, and prohibit imprisonment, flagellation and forced labour for children, which was currently allowed from 16 years of age?  Did the National Human Rights Commission and the National Planning Council have sufficient resources?  How did they coordinate to protect child rights?

    Qatar’s investments in health and education had increased in 2022 and 2024, but these amounts were still below global standards.  Would this be addressed?  Were funds allocated for children in the budget clearly outlined?  How did the State party ensure that resources were equitably assigned?  A national survey conducted in 2023 contained very little information on vulnerable children. What was being done to strengthen data collection on such children?

    Did migrant children have access to mechanisms to report violations of their rights?  How did the State party support access to remedies for child victims? Were there capacity building and awareness raising mechanisms on child rights for State officials, civil society, the media and the public?  Did the National Human Rights Commission’s monitoring mechanism follow up on the implementation of the Convention and receive complaints on violations of the rights of children, including from migrant children?  How did the State party monitor policies and programmes on children’s rights?  Were there regulations that promoted compliance with international standards on children’s rights in the private sector?

    Girls in Qatar continued to face multiple forms of discrimination due to traditional beliefs.  What actions had been taken to change these negative social norms?  Children with disabilities, children with unmarried or foreign parents, and the children of migrant workers were subject to widespread discrimination.  How did the State party ensure that all children had access to basic social services?  Was there a general law prohibiting all forms of discrimination?

    There were no guidelines for professionals on determining the best interests of the child.  Would these be developed?  How did the State party ensure that this principle was applied consistently in all legal procedures?  In Qatar, children could be sentenced to death.  What measures were in place to strictly prohibit the application of the death penalty on children?  How did the State party facilitate the participation of children in matters affecting them?

    Despite the recommendations of various human rights mechanisms, the new nationality law did not allow Qatari women married to foreign citizens to pass on their nationality to their children. What steps had been taken to amend this law and other laws to allow Qatari women to pass on their nationality to their children?

    ROSARIA CORREA, Committee Expert and Taskforce Member, welcomed that the State party had taken several measures to address corporal punishment.  Had it assessed the impact that these measures had had on society? There was no law prohibiting corporal punishment.  What legislative efforts had been made to prohibit corporal punishment in all settings? Had studies into violent disciplining been carried out?  What measures had schools adopted to protect children?  How many child victims of violence had received remedies?  How was the State party monitoring child protection measures?  Did the draft bill on child rights address the child protection system?  Who was responsible for representing minors in the courts?

    How was the State party combatting the sale and trafficking of children domestically and internationally?  What was preventing the State from developing a law to ban child marriages?  How did the electronic monitoring system for convicted children work and how effective was it?  What social and psychological programmes were in place to protect the rights of children in conflict with the law and prevent their stigmatisation?

    TIMOTHY P.T. EKESA, Committee Expert and Taskforce Member, welcomed the data on children with disabilities that the State party had collected in 2016.  There were concerns that the State party did not provide access to mainstream education to all children with disabilities, as many were enrolled in special schools.  Only a small percentage of schools had inclusive education programmes, and a medical model was used to determine whether children with disabilities were enrolled in special schools.  Many children with disabilities remained out of school due to denial of admission or the inability of their families to pay school fees.  Could the State party provide data on the number of children with disabilities enrolled in mainstream education?

    Responses by the Delegation

    The delegation said its reservations to articles two and 14 of the Convention were consistent with Islamic Sharia and public morals.  The draft law on the rights of the child would increase the minimum age of criminal liability.  It would be adopted and published soon.

    In 2016, a programme was set up to investigate cases of violations of children’s rights and provide protection and remedies to victims.  It dealt with between 500 and 600 cases a year, some 30 per cent of which involved violence and negligence.  The programme included awareness raising campaigns on children’s rights and on reporting mistreatment of children.  A confidential hotline had been set up for reporting violence; it received 300 calls a year, 60 per cent of which came from children.  A register for cases of child abuse had recorded some 3,000 cases in recent years, and the Qatari Care Centre had provided psychological care to more than 4,000 children.  A conference on combatting violence against children held in 2020 in Qatar was attended by around 2,000 people.

    Qatar monitored the impact of business activities on children, guided by the United Nations Guiding Principles on Business and Human Rights.  The National Human Rights Committee monitored child labour but had not registered any cases. A regional conference had been held in Qatar that had called on businesses not to violate children’s rights in digital spaces.

    The Ministry of Social Affairs had signed a memorandum of understanding with the National Human Rights Committee on cooperation on protecting children’s rights.  This Committee was made up of eight representatives of civil society and five Government employees.  It reviewed legislation concerning children, visited schools to assess violations of children’s right to education, and conducted yearly awareness raising campaigns on the Convention.

    Qatari law did not permit marriages for boys under the age of 17 and girls under the age of 16.  Marriages under the age of 18 were permitted by judges only when there were exceptional circumstances.  A committee had been set up to review the Family Code; it was considering revising the legal minimum age of marriage.  It was very rare for families to allow their children to marry before the age of 18.

    Some six per cent of the national budget was allocated to education, and some 25 per cent of the Ministry of Social Affairs’ budget was allocated to programmes for children.  The State party had dispersed several million Qatari riyals for supporting vulnerable children and families.  A new centre for orphans was established in 2024.

    The Ministry of Education promoted gender equality at all stages of education.  Enrolment rates for boys and girls were equal at primary and secondary schools, and literacy rates were over 99 per cent in 2023.  The Ministry had launched awareness raising campaigns on human rights and non-discrimination.  Guidance was provided to teachers on preventing discrimination against children.  Qataris and non-Qataris received the same treatment in State schools and hospitals. Employers provided migrant workers with health insurance.

    The Qatari Nationality Code addressed the issue of kinship.  Children of non-Qatari fathers were given the nationality of their father, but such children also had the ability to access Qatari nationality if they had permanent residence.  The State had made great strides in reducing statelessness.

    Qatar had laws that enabled children to receive remedies such as compensation if they were victims of a crime. Specialised courts for crimes committed by children and cases of violence against children had been established, which could conduct hearings online.  There was also a witness protection programme for children. Courts had an interpretation and translation service that supported foreign children.  The State assigned lawyers to persons who could not afford them.

    All schools had student councils that allowed students to express their views on issues such as the environment, culture and education.  Cultural activities were organised for children.  Each school calculated its carbon footprint.

    Articles 21 and 68 of the Constitution incorporated the Convention into the legal order.  The State party had increased penalties for trafficking in persons when the victim was under 18 and reduced sentences for cases where perpetrators of crimes were children.  Sanctions for children under 16 years did not include corporal punishment, flagellation or the death penalty. 

    Articles permitting corporal punishment were removed from legislation after the adoption of the Convention. Persons, including parents, who used corporal punishment were held criminally liable.  Guidelines had been developed for parents on disciplining children without using corporal punishment and a centre that worked to educate parents on protecting children had been set up.  Corporal punishment in schools was banned in the 1990s. Inspectors conducted visits to schools to ensure that the rights of students were not violated. 

    The Prosecutor’s Office stepped in if there were conflicts of interest between parents and children.  Child psychologists were deployed to determine the best interests of the child.  Children’s confidentiality was protected in courts.

    The Ministry of Education attached great importance to inclusive education.  Curricula were adapted for children with disabilities and protocols had been adopted for children with autism.  There were programmes for vocational training for children with disabilities.

    Questions by Committee Experts

    ROSARIA CORREA, Committee Expert and Country Taskforce Member, said that Qatar had a set of measures to combat violence between children in schools.  Were there response measures and a recording mechanism for such violence? Some 83 per cent of children reportedly suffered from some form of harassment in primary school.

    What measures had been taken to ensure children could grow up in a pollution-free environment and access green spaces?  How did education programmes address climate change?  What impact was climate change having on Qatari children and how was the State working to mitigate its effects?  How was the State party encouraging children’s involvement in designing environmental policies?  How did the State party monitor children’s nutrition?

    How did the State party ensure that parents equally shared responsibilities concerning child-rearing? When parents divorced, the mother lost custody of her children in Qatar.  Were women who were victims of sexual exploitation criminalised in the Criminal Code?

    TIMOTHY P.T. EKESA, Committee Expert and Country Taskforce Member, said the national action plan on the inclusion of children with disabilities in schools had commendable objectives, but there was a lack of clarity on measures being implemented to achieve inclusion. Had the plan, which expired in 2023, been renewed?  Were there provisions in draft legislation on persons with disabilities that prohibited discrimination against children with disabilities in education?  The Committee had previously called on the State party to implement a national action plan on human rights education; had this been done?

    The Committee commended the State party’s high quality and widely accessible health care system and the launch of the national health strategy for 2023-2030.  Would children receive targeted attention under the strategy? There were reports of discrimination in access to health centres for non-Qatari citizens.  What measures were in place to address disparities in access to healthcare?  Qatar had one of the highest rates of adolescent obesity in the region.  How was the State party addressing this?  How was it promoting access to mental health for children and adolescents?

    BENOIT VAN KEIRSBILCK, Committee Expert and Country Taskforce Member, said that Qatar had not ratified the United Nations Educational, Scientific and Cultural Organization Convention against Discrimination in Education.  Why was this?  Why did most Qatari families choose private schools, while non-Qataris typically attended public schools?  What was the State party doing to support education costs?  There were schools that supported children who had dropped out of school; how effective were they?  Was there an official sexual and reproductive health education programme in schools? What was being done to promote access to safe and inclusive spaces for play and recreation?

    The Committee was concerned that Qatar continued to detain migrant children and families.  In which detention centres were migrants placed? Were there plans to revise the policy of detaining migrant children?  Most migrant workers in Qatar were men.  Were there plans to revise family reunification rules to make it more accessible for workers with low wages?  Were there plans to regularise the children of migrants born in Qatar?

    Members of the Al-Ghufran clan had been deprived of their nationality many years ago. How many of these people still did not have Qatari nationality, and were there plans to resolve their situation? How did the State party ensure that migrant children could enrol in schools and how did it investigate complaints issued by domestic workers?  How many girls were working as domestic workers?  What programmes were in place that supported children in street situations? What results had been achieved by the law on trafficking in persons?  What measures had been implemented to prevent and prosecute cases of trafficking in children occurring during the 2022 World Cup?

    Qatar had one of the lowest minimum ages of criminal responsibility in the world, at seven years of age, and many legal protections for child offenders only applied for children under age 16.  How many children up to 18 years old were deprived of liberty and in what settings? Were they mixed with adults?  Were children in detention informed about the National Human Rights Committee’s complaints mechanism?  Did the State party intend to ratify the Safe Schools Declaration?

    Responses by the Delegation

    The delegation said corporal punishment against all persons was prohibited, including punishment of persons with disabilities.  There was no dedicated legislation on domestic violence, but there were legislative measures that covered domestic violence, and a court had been set up that specialised in domestic violence and temporary shelters, mandated to protect women and children who were victims of domestic violence.  In 2024, the State party organised workshops training for around 5,000 people on issues such as protecting children from violence and intimidation.  There were around 40,000 confirmed cases of domestic violence between 2024 and 2025.

    Initiatives had been adopted to minimise the impact of climate change on children, including adaption of infrastructure and measures to reduce carbon emissions and increase the use of renewable energy.  The State party had constructed 18 square kilometres of green zones in 2023 and an additional eight in 2024.  There was also a course within the school curriculum that focused on protecting the environment and living sustainably.  Schools celebrated a “sustainability week”.  Qatar had also taken measures to ensure the provision of good quality water.  It periodically monitored water and air quality in schools, kindergartens and public hospitals. 

    Qatar promoted children’s health through various measures.  Nine free health check-ups were provided to children up to age five.  The State party encouraged exclusive breastfeeding up to six months; there had been a sharp increase in breastfeeding rates over the past decade.  The State party had developed programmes to tackle the child obesity rate, which aimed to reduce this rate by 30 per cent by 2030.  School nutrition clinics provided specialised services to prevent childhood obesity and nutritional problems.  A 2022 law governed universal healthcare coverage.

    Sexual and reproductive health education and education on drug addiction were provided in schools from primary level, and there was also teaching on the protection of children from neglect, and online and sexual exploitation.  Children were instructed on how to find psychological assistance, and on alerting authorities about threats.

    Qatar promoted access to a healthy environment for children with disabilities.  It had beaches that had been adapted to ensure accessibility.  Various projects were being developed for children with disabilities up to 2030.  A single database covering all children with disabilities in the education system had been set up.  Qatar had over 5,300 pupils with disabilities in public and private schools.  Some 62 per cent of schools were inclusive. There were specialised training programmes for children with disabilities that supported them to become autonomous.

    Children with disabilities had access to specialised healthcare through 10 healthcare centres tailored to their needs, including four centres for children with autism.  The third national strategy 2024-2030 included measures for improving rehabilitation and diagnosis services for persons with disabilities. Social workers, family and community members were trained to care for children with disabilities and support their inclusion in society. 

    Qatari legislators sought to recognise children with disabilities as having legal capacity on par with others, and to promote their access to work, education and other rights.  The draft disability code had been developed and was now being deliberated by the Government.  Measures to exempt persons with disabilities from certain Government fees were being developed.  Legislators sought to promote access to complaints mechanisms for children with disabilities and their families.  The State funded legal aid services to support children in court, including children with disabilities.

    The draft child code defined all persons less than 18 years old as children.

    As part of the 2024-2030 development strategy, the State party had visited schools and engaged in dialogue with students, parents and teachers.  “Sustainability ambassadors” who promoted environmental protection were appointed in schools, and young people could contribute to the Shura Council. Many children had taken part in drafting the State party’s report.

    The State party was promoting awareness of human rights for children through social education courses and campaigns in schools, through which children learned about the Convention, gender equality, democracy, acceptance of others, cybersecurity, and preventing bullying.  Media campaigns on children’s rights were carried out and manuals and training programmes had been developed to inform teachers, social workers and other public officials about children’s rights.  The State party organised annual events to mark Children’s Day.

    Qatar was committed to protecting school establishments from attack.  It had signed the Safe Schools Declaration and participated in the Education for All initiative.  Qatar helped organise events on 9 September each year at United Nations offices in New York and Geneva to mark the International Day to Protect Education from Attack.

    Public schools applied international standards, including the international baccalaureate programme. Migrant parents could choose the school that their children attended and the language of instruction.  The State ensured the provision of free schooling to students coming from regions of armed conflict.

    Questions by Committee Experts

    BENOIT VAN KEIRSBILCK, Committee Expert and Country Taskforce Member, asked whether police provided sexual education in schools?  Was legal aid free for every child and accessible from the first stage of arrest? Did the State party criminally prosecute children who were addicted to drugs?

    TIMOTHY P.T. EKESA, Committee Expert and Country Taskforce Member, said Qatar generally prohibited abortion, only allowing it in three special cases.  There were severe penalties imposed on women who received unauthorised abortions.  How many unauthorised abortions had the State recorded over the reporting period?

    Another Committee Expert asked about the likelihood of approving the children’s act soon.  Would Qatar provide a complete definition of the child in this legislation?

    A Committee Expert asked about awareness raising campaigns in place to reduce the rate of child deaths from road accidents, which remained quite high in Qatar.  How was wastewater treated and what percentage of the population had access to potable water?

    One Committee Expert asked if Qatari children had access to contraception.  Were children who were the product of rape given Qatari nationality? Did national institutions take a gender specific approach?  Was free legal assistance provided to victims of domestic violence?

    A Committee Expert asked about the level of integration that the State party’s hotline had with law enforcement, health services and social services.  What services were provided to children of adults deprived of liberty, including adults on death row?

    SOPHIE KILADZE, Committee Chair, asked whether the State party had measures to reduce children’s screen time and a policy on artificial intelligence and its effects on children.

    Responses by the Delegation

    The delegation said the 2015 law on the departure of migrants set up a mechanism for entering and exiting Qatar. It regulated the provision of housing, healthcare and education for migrants, as well as the conditions migrants needed to meet to obtain residence permits.  Migrants who did not meet these conditions were deported following the standard procedure.  Persons without identity documents who were accompanied by children, as well as stateless and unaccompanied children, were placed in a shelter while being processed. In 2024, there were 22 such detentions, and thus far there had been six detentions in 2025.  The State party worked with relevant embassies to support processing of these people.

    A directorate had been established that was mandated to prevent road accidents.

    Psychological support was provided to children whose parents had been sentenced to death.  The Criminal Procedural Code provided for two years of reprieve from detention for pregnant women, and when both parents were charged with the same crime, one parent was granted reprieve from detention to care for their children while the other parent was detained.

    The age of criminal liability started from seven years.  From ages seven to 16, judges could only impose sanctions requiring the child’s parents to obey certain commitments or send the child to rehabilitation programmes. The juvenile justice system was based on rehabilitation, not punishment.  Children aged 16 to 18 were more aware of their actions and thus had increased criminal liability.  The death penalty could be used on such children, but judges could commute the sentence, considering the age of the child when the crime was committed.  No one aged 16 to 18 had been sentenced to death in Qatar.

    Qatar had evacuated over 65,000 people from Afghanistan in 2021.  Qatar provided these people with housing and psychological support and facilitated their voluntary travel to other countries.  The State had also evacuated many children from Gaza to Qatar, providing them with free healthcare and education.

    Sexual education was provided by teachers and social workers, not police, in schools.  A national workshop had been set up to develop sexual education; psychologists were involved in this process.

    The State had a legal aid office with attorneys who provided children with free legal assistance and defended them in court.  The office also provided assistance in cases of domestic violence.

    Islamic Sharia was the source of laws in Qatar.  Criminal legislation on abortion was in line with Sharia.  In the State’s view, foetuses had the same rights as adults and benefited from legal protection.  Abortions could only take place if the pregnancy threatened the life of the mother.  Children who were the product of rape could access Qatari nationality.

    Qatar had created legislation combatting cybercrime, which punished all digital intimation and threats.  There were harsher sentences when the victim was a child or had a disability.  The State had also launched a platform that aimed to educate children and families on the safe use of digital technology and build children’s digital skills.  It had a national strategy on artificial intelligence and was committed to developing digital infrastructure that respected human rights. 

    Qatar had acceded to International Labour Organization Conventions 138 and 180 on child labour.  The State’s law on domestic workers protected such workers from exploitation.  The law banned hiring people under 18 years of age for domestic work.  Migrant workers needed to be 18 years of age or older. Domestic workers had the same rights as other workers, including regarding access to healthcare.  There was a Government Department that received complaints from domestic workers, which operated in 11 different languages.

    The State party respected the rights of migrant workers to live with their families.  These workers could bring their children to the State if they fulfilled a strict set of conditions.

    Qatar had criminalised all forms of trafficking of persons, including labour exploitation.  Penalties for trafficking were increased when the victim was a child.  There was a committee within the Ministry of Labour that was responsible for combatting trafficking in persons.  Qatari law was in line with the Optional Protocol on the sale of children, child prostitution and child pornography.

    The hotline for reporting violations of children’s rights was manned by psychologists, who assessed the urgency of the complaint and referred it to the relevant authorities.

    The Qatar Social Work Foundation worked to enhance family bonds and to prevent domestic violence.  It provided lectures for prospective parents and counselling and mediation services seeking to resolve family problems amicability. The Foundation worked to defend children’s rights in cases of divorce, providing them with psychological counselling. Legislation had been developed that ensured that custody could be provided to mothers in cases of divorce.

    Concluding Remarks 

    AISSATOU ALASSANE SIDIKOU, Committee Expert and Taskforce Coordinator, thanked the delegation for the interesting dialogue.  Many efforts had been made by the State for children, but challenges remained.  The Committee hoped that the dialogue would help to improve protections for children in Qatar.  Ms. Sidikou said she hoped that the members of the State party would carry all children in their hearts in their work.

    AHMAD BIN HASSAN AL-HAMMADI, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, thanked the Committee and all persons who had contributed to the constructive dialogue, which was an important opportunity to promote the rights of the child and global peace.  The State party would use the Committee’s concluding observations to improve measures for children.  The Committee needed to consider the information provided by the State and its cultural specificities.  Qatar was committed to cooperating with the Committee and to addressing the challenges and risks it faced concerning the rights of the child.  It had achieved great progress in human rights over the years through cooperation with human rights mechanisms.

    SOPHIE KILADZE, Committee Chair, said that the information provided by the State party would help the Committee to assess the achievements made by Qatar and the challenges it faced. The Committee respected States’ cultural specificities, but violations of the Convention could not be justified in any circumstances.  The Committee would do its best to develop concluding observations that would strengthen the rights of children in Qatar to the extent possible.  It hoped that the State party would present further progress for children in its next dialogue with the Committee.

    ___________

    Produced by the United Nations Information Service in Geneva for use of the media; 
    not an official record. English and French versions of our releases are different as they are the product of two separate coverage teams that work independently.

     

    CRC25.014E

    MIL OSI United Nations News

  • MIL-OSI Canada: Langley urgent and primary care centre opens at permanent location

    Source: Government of Canada regional news

    People living in and around Langley have better access to team-based primary care and medical imaging services as, on May 13, 2025, the permanent location of the Langley Urgent and Primary Care Centre (UPCC) opened.

    “We recognize how important it is that people feel safe and comfortable when accessing the care they need,” said Josie Osborne, Minister of Health. “Transitioning to the permanent Langley UPCC location means consistent care under one roof, for patients and care providers alike. This opening also marks the beginning of extended care hours and medical imaging services for the quickly growing community of Langley.”

    Located at 202 – 20434 64th Ave., the centre includes medical imaging services, such as X-rays and computed tomography (CT) scans. The imaging services operate independently from the care provided by the UPCC. All CT scan services require a referral and appointment. However, general radiography (X-ray) services are available by referral on a walk-in basis. No appointment is needed. Residents in the community can use these services through referral by their primary care provider or through accessing care at the UPCC.

    “Since opening in its temporary location last year, the Langley UPCC has delivered timely urgent and primary care closer to home,” said Dr. Lynn Stevenson, interim president and CEO, Fraser Health. “With the move to its permanent home, the UPCC will be alongside community-based medical imaging services, enhancing access to vital health care outside the hospital for more residents.”

    The UPCC delivers urgent primary care services from 9 a.m. to 8 p.m. seven days a week, which is extended from the temporary facility’s schedule of 5-9 p.m. Monday through Friday, and 9 a.m. to 8 p.m. on weekends and statutory holidays.

    Once fully staffed, the UPCC will have a staffing complement of primary health-care workers including family physicians, nurse practitioners, nurses and allied health providers.

    In the permanent location, the Langley UPCC will continue to provide comprehensive, culturally safe and person-centred primary care through a team-based model of care. The focus of the centre is to provide in-person access to primary care services. However, virtual care will be provided as needed, usually for followup to an in-person visit.

    The UPCC will continue to provide same-day care for people who need support for their health concerns within 12 to 24 hours, but do not require an emergency department. Examples include sprains, cuts, high fevers and minor infections. While the UPCC will offer both longitudinal and urgent, episodic primary care, the priority for initial implementation is the expansion of urgent primary care services.

    The capital cost for the UPCC, including medical imaging, is more than $16 million.

    Quick Facts:

    • The interim location of the Langley UPCC opened March 20, 2024, and provided almost 12,000 patient visits from its opening to March 31, 2025.
    • The medical imaging services will provide an expected 10,000 X-rays and 8,500 CT scans annually.
    • Including Langley UPCC, there are 10 UPCCs delivering care in the Fraser Health region. 
    • To date, including Langley UPCC, 41 UPCCs are delivering urgent and primary care in communities throughout B.C.

    Learn More:

    To access primary care, and other health services, in your community, visit HealthLinkBC: https://www.healthlinkbc.ca/find-care/find-health-services

    To learn more about the Province’s Primary Care Strategy, visit:
    https://news.gov.bc.ca/releases/2018PREM0034-001010 or https://www2.gov.bc.ca/gov/content/health/accessing-health-care/bcs-primary-care-system

    To learn about the Province’s Health Human Resources Strategy, visit:
    https://news.gov.bc.ca/releases/2022HLTH0059-001464

    MIL OSI Canada News

  • MIL-OSI USA: Representative Peters Votes NO on GOP Tax Plan

    Source: United States House of Representatives – Congressman Scott Peters (52nd District of California)

    Washington, D.C. – Today, Representative Scott Peters (CA-50) voted against the Republican plan to cut healthcare for millions of vulnerable patients under Medicaid and the Affordable Care Act to pay for tax cuts for wealthy individuals and corporations that don’t need them. The Republican plan would kick 13.7 million people off of their healthcare, according to an analysis by the independent Congressional Budget Office. And the non-partisan Committee for a Responsible Federal Budget has found that the bill could add $37 trillion to the national debt over the next 30 years. After the House voted 215-214 to advance the legislation, Rep. Peters released the following statement:  

    “Not only is the Republican tax plan fiscally irresponsible, it is also unnecessarily cruel. Our country borrows $2 trillion every year just to keep the lights on. That number will only grow and add to our colossal debt under this tax plan. But Republicans aren’t trying to reduce the debt, they are kicking people off their healthcare to lower taxes for the highest earners. If we allowed marginal taxes for people making more than $609,000 to go from 37 to 39.6 percent, where it was in 2017, we could generate up to $402 billion in revenue over 10 years. Those people would pay a bit more in taxes, and we could avoid kicking millions of people off their healthcare. 

    “Irresponsible borrowing like this is why Moody’s, for the first time ever, downgraded our credit rating, why the stock market is falling, why the bond markets are going haywire, and why consumers are worried they won’t be able to keep up with rising prices. It is time to have an honest and tough bipartisan conversation about how we reduce the debt. While today’s vote was disappointing, I will continue to fight this debt-financed plan as it moves through the Senate.” 

    Read about Rep. Peters’ opposition to the tax plan in the Energy and Commerce Committee here.  

    Read about Rep. Peters’ opposition to the tax plan in the Budget Committee here.  

    CA-50 Medicaid Facts: 

    • 156,100 people in the district rely on Medicaid for health coverage—that’s 20 percent of all district residents. 
      • 34,700 children in the district are covered by Medicaid. 
      • 17,700 seniors in the district are covered by Medicaid. 
      • 64,900 adults in the district have Medicaid coverage through Medicaid expansion—that includes pregnant women who are able to access prenatal care sooner because of Medicaid expansion, parents, caretakers, veterans, people with substance use disorder and mental health treatment needs, and people with chronic conditions and disabilities. 
    • At least five hospitals in the district had negative operating margins in 2022. These hospitals would be especially hard-hit by cuts to Medicaid. For example: 
      • Scripps Mercy Hospital had a negative 25.3 percent operating margin—and nearly 22 percent of its revenue came from Medicaid. 
      • Sharp Coronado Hospital had a negative 3.5 percent operating margin—and over 36 percent of its revenue came from Medicaid. 
      • University of California San Diego Medical Center had a negative 2.4 percent operating margin—and nearly 19 percent of its revenue came from Medicaid. 
    • There are 54 health center delivery sites in the district that serve 529,944 patients. 
    • Those health centers and patients rely on Medicaid—statewide, 69 percent of health center patients rely on Medicaid for coverage. 
    • Health centers will not be able to stay open and provide the same care that they do today, with more uninsured and underinsured patients. They are already operating on thin margins—in 2023, nationally, nearly half of health centers had negative operating margins. 
    • Medicaid cuts put health centers at risk, including: 
      • Family Health Centers of San Diego 
      • Neighborhood Healthcare 
      • North County Health Project 
      • San Diego American Indian Health Centers 
      • St. Vincent De Paul Village 

    Representative Peters is the co-author of the Fiscal Commission Act, legislation to create a bicameral and open-door commission to tackle our nation’s long-term debt, help us avoid automatic and across-the-board cuts to Social Security and Medicare, and secure a more prosperous future for our children. 

    ###

    MIL OSI USA News

  • MIL-OSI USA: US Department of Labor recovers $207K in back wages, damages for 157 workers after Michigan-based contractor failed to pay correct overtime wages

    Source: US Department of Labor

    LOUISVILLE, KY – The U.S. Department of Labor has recovered more than $207,470 in back wages and damages for 157 workers after finding a Michigan-based electrical services contractor failed to pay proper overtime rates to workers at job sites in Arizona and Kentucky.

    Investigators with the department’s Wage and Hour Division found that M.J. Electric LLC did not include non-discretionary bonuses in employees’ regular rate of pay when calculating overtime pay, a violation of the Fair Labor Standards Act. The investigation initially revealed the overtime violation at the Tennessee Valley Authority’s Paradise Simple Cycle Project in Drakesboro, Kentucky. The investigation was expanded after similar violations were found at an M.J. Electric project in Ehrenberg, Arizona.

    In addition to collecting $207,470 in back wages and damages, the division assessed the company a $19,782 civil money penalty for a repeat FLSA violation. In 2018, the department investigated M.J. Electric and found the company violated federal law by not properly paying overtime on non-discretionary bonuses. 

    “The U.S. Department of Labor is committed to holding employers accountable, especially when they deny employees their hard-earned wages,” said Wage and Hour Division Acting District Director Wildali De Jésus in Louisville, Kentucky. “We urge employers who are unsure of their obligations to contact us for assistance to avoid compliance issues.”

    A subsidiary of Quanta Services, M.J. Electric LLC is headquartered in Iron Mountain, Michigan. The contractor provides electrical services such as power line work and power generation throughout the U.S.

    For more information about compliance assistance and employee rights enforced by the division, contact the toll-free helpline at 866-4US-WAGE (487-9243). Learn more about the Wage and Hour Division, including a search tool that workers can use if they think they may be owed back wages collected by the division.

    Download the agency’s free Timesheet App for Android and iPhone devices to ensure hours and pay are accurate.

    MIL OSI USA News

  • MIL-OSI USA: CFTC Staff Issues Advisory on Market Volatility Controls

    Source: US Commodity Futures Trading Commission

    CFTC Staff Issues Advisory on Market Volatility Controls | CFTC

    /PressRoom/PressReleases/9078-25
    Skip to main content

    May 22, 2025

    WASHINGTON, D.C. — The Commodity Futures Trading Commission’s Division of Clearing and Risk and Division of Market Oversight today issued a staff advisory reminding designated contract markets (DCMs) and derivatives clearing organizations (DCOs) of certain Core Principle and regulatory obligations under the Commodity Exchange Act and CFTC regulations related to controls designed to address market volatility.
    Market volatility controls can play an important role in mitigating market disruptions while supporting continued price discovery in stressed or volatile market conditions. Best practices developed by DCMs, industry groups, CFTC advisory committees, and others can help to guide the derivatives industry towards effective volatility controls. In cases where volatility controls may be in effect at times critical to DCO decisions, DCOs should exercise careful discretion and informed judgment in making those decisions in light of the economic factors relevant to the underlying market. DCOs should provide transparency to both clearing members and end users about possible impacts on, e.g., settlement prices.
    Today’s staff advisory addresses a recommendation by the CFTC’s Global Markets Advisory Committee. 

    -CFTC-

    MIL OSI USA News

  • MIL-OSI USA: Harvard University Loses Student and Exchange Visitor Program Certification for Pro-Terrorist Conduct

    Source: US Federal Emergency Management Agency

    Headline: Harvard University Loses Student and Exchange Visitor Program Certification for Pro-Terrorist Conduct

    lass=”text-align-center”>Harvard is being held accountable for collaboration with the CCP, fostering violence, antisemitism, and pro-terrorist conduct from students on its campus

    WASHINGTON – Today, Homeland Security Secretary Kristi Noem ordered DHS to terminate the Harvard University’s Student and Exchange Visitor Program (SEVP) certification

    This means Harvard can no longer enroll foreign students and existing foreign students must transfer or lose their legal status

    Harvard’s leadership has created an unsafe campus environment by permitting anti-American, pro-terrorist agitators to harass and physically assault individuals, including many Jewish students, and otherwise obstruct its once-venerable learning environment

    Many of these agitators are foreign students

    Harvard’s leadership further facilitated, and engaged in coordinated activity with the CCP, including hosting and training members of a CCP paramilitary group complicit in the Uyghur genocide

    “This administration is holding Harvard accountable for fostering violence, antisemitism, and coordinating with the Chinese Communist Party on its campus,” said Secretary Noem

    “It is a privilege, not a right, for universities to enroll foreign students and benefit from their higher tuition payments to help pad their multibillion-dollar endowments

    Harvard had plenty of opportunity to do the right thing

    It refused

    They have lost their Student and Exchange Visitor Program certification as a result of their failure to adhere to the law

    Let this serve as a warning to all universities and academic institutions across the country


    On April 16, 2025, Secretary Noem demanded Harvard provide information about the criminality and misconduct of foreign students on its campus

    Secretary Noem warned refusal to comply with this lawful order would result in SEVP termination

    This action comes after DHS terminated $2

    7 million in DHS grants for Harvard last month

    Harvard University brazenly refused to provide the required information requested and ignored a follow up request from the Department’s Office of General Council

    Secretary Noem is following through on her promise to protect students and prohibit terrorist sympathizers from receiving benefits from the U

    S

    government

    Facts about Harvard’s toxic campus climate:

    A joint-government task force found that Harvard has failed to confront pervasive race discrimination and anti-Semitic harassment plaguing its campus

    Jewish students on campus were subject to pervasive insults, physical assault, and intimidation, with no meaningful response from Harvard’s leadership

    A protester charged for his role in the assault of a Jewish student on campus was chosen by the Harvard Divinity School to be the Class Marshal for commencement

    Harvard’s own 2025 internal study on anti-Semitism revealed that almost 60% of Jewish students reported experiencing “discrimination, stereotyping, or negative bias on campus due to [their] views on current events


    In one instance, a Jewish student speaker at a conference had planned to tell the story of his Holocaust survivor grandfather finding refuge in Israel

    Organizers told the student the story was not “tasteful” and laughed at him when he expressed his confusion

    They said the story would have justified oppression

    Meanwhile, Pro-Hamas student groups that promoted antisemitism after the October 7 attacks remained recognized and funded

    Instead of protecting its students, Harvard has let crime rates skyrocket, enacted racist DEI practices, and accepted boatloads of cash from foreign governments and donors

    ###

    MIL OSI USA News

  • MIL-OSI USA: NASA Astronaut to Answer Questions from Students in Washington State

    Source: NASA

    NASA astronaut and Spokane, Washington, native Anne McClain will participate in an event with students from the Mobius Discovery Center located in her hometown. McClain will answer prerecorded questions submitted by students from aboard the International Space Station.
    Watch the 20-minute Earth-to-space call on the NASA STEM YouTube Channel.
    The event will take place at 1:25 p.m. EDT on Tuesday, May 27. Media interested in covering the event must RSVP no later than 5 p.m. EDT on Friday, May 23, to Karen Hudson at 509-321-7125 or via email at: mkhudson@mobiusspokane.org.
    The Mobius Discovery Center will host the event for elementary, middle, and high school students from various schools across the region, nonprofit organizations, and the Kalispel Tribe. This event is designed to foster imagination among students through exploration of hands-on exhibits and science, technology, engineering, art, and mathematics learning opportunities while inspiring students to consider McClain’s career path.
    For more than 24 years, astronauts have continuously lived and worked aboard the space station, testing technologies, performing science, and developing skills needed to explore farther from Earth. Astronauts aboard the orbiting laboratory communicate with NASA’s Mission Control Center in Houston 24 hours a day through SCaN’s (Space Communications and Navigation) Near Space Network.
    Important research and technology investigations taking place aboard the space station benefit people on Earth and lays the groundwork for other agency missions. As part of NASA’s Artemis campaign, the agency will send astronauts to the Moon to prepare for future human exploration of Mars, inspiring Artemis Generation explorers, and ensuring the United States continues to lead in space exploration and discovery.
    See videos of astronauts aboard the space station at:
    https://www.nasa.gov/stemonstation
    -end-
    Gerelle DodsonHeadquarters, Washington202-358-1600gerelle.q.dodson@nasa.gov
    Sandra JonesJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: Sols 4547-4548: Taking in the View After a Long Drive

    Source: NASA

    Written by Alex Innanen, Atmospheric Scientist at York University
    Earth planning date: Wednesday, May 21, 2025
    Monday’s single-sol plan included a marathon 45-meter drive (about 148 feet), which put us in position for two full sols of imaging. This means both sols have what we call “targeted” science blocks, in which we have images of the workspace down from the last plan and can carefully choose what we want to take a closer look at. This always means a lot of good discussion amongst the geology and mineralogy theme group (GEO) about what deserves this closer look. As an outsider on the environmental theme group (ENV), I don’t always grasp the complexities of these discussions, but it’s always interesting to see what GEO is up to and to learn new things about the geology of Mount Sharp.
    GEO ended up picking “Big Bear Lake” as our contact science target, which is getting its typical treatment from APXS and MAHLI, as well as a LIBS observation from ChemCam. Aside from that there was plenty of room for remote sensing. ChemCam is also taking a LIBS observation of “Volcan Mountains” and a long-distance mosaic of the Texoli butte. Mastcam is also taking mosaics of a nearby trough, as well as two depressions known as “Sulphur Spring,” a more distant boxwork structure, and the very distant Mishe Mokwa butte.
    All of ENV’s activities are remote sensing, and we managed to squeeze in a few of those too. We have a couple dust monitoring observations, looking for dust devils and checking the amount of dust in the atmosphere. And since we’re still in the cloudy season we always try to make room for cloud observations. Today that meant a suraphorizon movie looking for clouds just above the horizon to the south, and a phase function sky survey, which captures clouds all around the rover, to try to understand how these clouds scatter sunlight.

    MIL OSI USA News

  • MIL-OSI USA: Preflight Flower

    Source: NASA

    A NASA photographer took this picture of a flower called Borshchov’s tulip near the launch pad at the Baikonur Cosmodrome in Kazakhstan on April 7, 2025, ahead of NASA astronaut Jonny Kim and cosmonauts Sergey Ryzhikov and Alexey Zubritsky launching to the International Space Station. The flower is unique to Kazakhstan, attracting many to study and appreciate its beauty.
    Image credit: NASA/Joel Kowsky

    MIL OSI USA News

  • MIL-OSI USA: Local 778 Volunteers Return to Revitalize Kansas City Park

    Source: US GOIAM Union

    Fifteen dedicated members of IAM Local 778 recently donated their time and effort to support Raytown Parks and Recreation with a major cleanup at Minor Smith Park near Kansas City, Mo.

    This marks the second time Local 778 has volunteered in the park, demonstrating their ongoing commitment to community service. Volunteers focused on clearing heavy overgrowth surrounding a popular leisure path and bridge. Once the area was cleared, the team gave the bridge a fresh coat of paint, dramatically improving both the appearance and accessibility of the park.

    “It’s not just about cleaning up, it’s about making the community better for everyone,” said IAM Midwest Territory General Vice President Sam Cicinelli. “Every time we volunteer, we strengthen our bond, not just with each other, but with the community we serve. It’s rewarding to give back and see the immediate impact.”

    “This is our second time at Minor Smith Park, and it’s easy to see how quickly nature can take over,” said IAM Local 778 Directing Business Representative Scott Brown. “The community always shows their appreciation, and it’s inspiring to see our members along with new faces eager to pitch in and make a difference.”

    IAM Local 778 represents over 3,000 working families in the Kansas City area and continues to uphold its strong tradition of giving back to the communities where its members live and work.

    H.E.L.P.S. stands for Honoring, Engaging, Lifting, Providing and Servicing.

    For more information on IAM H.E.L.P.S. in the Community, click here.

    The post Local 778 Volunteers Return to Revitalize Kansas City Park appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: Percolating Clues: NASA Models New Way to Build Planetary Cores

    Source: NASA

    A new NASA study reveals a surprising way planetary cores may have formed—one that could reshape how scientists understand the early evolution of rocky planets like Mars.
    Conducted by a team of early-career scientists and long-time researchers across the Astromaterials Research and Exploration Science (ARES) Division at NASA’s Johnson Space Center in Houston, the study offers the first direct experimental and geochemical evidence that molten sulfide, rather than metal, could percolate through solid rock and form a core—even before a planet’s silicate mantle begins to melt.
    For decades, scientists believed that forming a core required large-scale melting of a planetary body, followed by heavy metallic elements sinking to the center. This study introduces a new scenario—especially relevant for planets forming farther from the Sun, where sulfur and oxygen are more abundant than iron. In these volatile-rich environments, sulfur behaves like road salt on an icy street—it lowers the melting point by reacting with metallic iron to form iron-sulfide so that it may migrate and combine into a core. Until now, scientists didn’t know if sulfide could travel through solid rock under realistic planet formation conditions.

    Working on this project pushed us to be creative. It was exciting to see both data streams converge on the same story.

    Dr. Jake Setera
    ARES Scientist with Amentum

    The study results gave researchers a way to directly observe this process using high-resolution 3D imagery—confirming long-standing models about how core formation can occur through percolation, in which dense liquid sulfide travels through microscopic cracks in solid rock.
    “We could actually see in full 3D renderings how the sulfide melts were moving through the experimental sample, percolating in cracks between other minerals,” said Dr. Sam Crossley of the University of Arizona in Tucson, who led the project while a postdoctoral fellow with NASA Johnson’s ARES Division. “It confirmed our hypothesis—that in a planetary setting, these dense melts would migrate to the center of a body and form a core, even before the surrounding rock began to melt.”
    Recreating planetary formation conditions in the lab required not only experimental precision but also close collaboration among early-career scientists across ARES to develop new ways of observing and analyzing the results. The high-temperature experiments were first conducted in the experimental petrology lab, after which the resulting samples—or “run products”—were brought to NASA Johnson’s X-ray computed tomography (XCT) lab for imaging.

    X-ray scientist and study co-author Dr. Scott Eckley of Amentum at NASA Johnson used XCT to produce high-resolution 3D renderings—revealing melt pockets and flow pathways within the samples in microscopic detail. These visualizations offered insight into the physical behavior of materials during early core formation without destroying the sample.
    The 3D XCT visualizations initially confirmed that sulfide melts could percolate through solid rock under experimental conditions, but that alone could not confirm whether percolative core formation occurred over 4.5 billion years ago. For that, researchers turned to meteorites.
    “We took the next step and searched for forensic chemical evidence of sulfide percolation in meteorites,” Crossley said. “By partially melting synthetic sulfides infused with trace platinum-group metals, we were able to reproduce the same unusual chemical patterns found in oxygen-rich meteorites—providing strong evidence that sulfide percolation occurred under those conditions in the early solar system.”
    To understand the distribution of trace elements, study co-author Dr. Jake Setera, also of Amentum, developed a novel laser ablation technique to accurately measure platinum-group metals, which concentrate in sulfides and metals.
    “Working on this project pushed us to be creative,” Setera said. “To confirm what the 3D visualizations were showing us, we needed to develop an appropriate laser ablation method that could trace the platinum group-elements in these complex experimental samples. It was exciting to see both data streams converge on the same story.”
    When paired with Setera’s geochemical analysis, the data provided powerful, independent lines of evidence that molten sulfide had migrated and coalesced within a solid planetary interior. This dual confirmation marked the first direct demonstration of the process in a laboratory setting.

    The study offers a new lens through which to interpret planetary geochemistry. Mars in particular shows signs of early core formation—but the timeline has puzzled scientists for years. The new results suggest that Mars’ core may have formed at an earlier stage, thanks to its sulfur-rich composition—potentially without requiring the full-scale melting that Earth experienced. This could help explain longstanding puzzles in Mars’ geochemical timeline and early differentiation.
    The results also raise new questions about how scientists date core formation events using radiogenic isotopes, such as hafnium and tungsten. If sulfur and oxygen are more abundant during a planet’s formation, certain elements may behave differently than expected—remaining in the mantle instead of the core and affecting the geochemical “clocks” used to estimate planetary timelines.
    This research advances our understanding of how planetary interiors can form under different chemical conditions—offering new possibilities for interpreting the evolution of rocky bodies like Mars. By combining experimental petrology, geochemical analysis, and 3D imaging, the team demonstrated how collaborative, multi-method approaches can uncover processes that were once only theoretical.
    Crossley led the research during his time as a McKay Postdoctoral Fellow—a program that recognizes outstanding early-career scientists within five years of earning their doctorate. Jointly offered by NASA’s ARES Division and the Lunar and Planetary Institute in Houston, the fellowship supports innovative research in astromaterials science, including the origin and evolution of planetary bodies across the solar system.
    As NASA prepares for future missions to the Moon, Mars, and beyond, understanding how planetary interiors form is more important than ever. Studies like this one help scientists interpret remote data from spacecraft, analyze returned samples, and build better models of how our solar system came to be.
    For more information on NASA’s ARES division, visit: https://ares.jsc.nasa.gov/
    Victoria SegoviaNASA’s Johnson Space Center281-483-5111victoria.segovia@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: FEMA Fire Management Assistance Grant Approved for Cody Fire

    Source: US Federal Emergency Management Agency

    Headline: FEMA Fire Management Assistance Grant Approved for Cody Fire

    FEMA Fire Management Assistance Grant Approved for Cody Fire

    OAKLAND, Calif

     – The Federal Emergency Management Agency’s (FEMA) Region 9 Administrator authorized the use of federal funds to assist the state of Arizona in combating the Cody Fire burning in Pinal County

    On May 21, the State of Arizona submitted a request for a Fire Management Assistance Grant (FMAG) declaration for the Cody Fire

     At the time of the request, the fire was threatening approximately 3,126 homes in and around Oracle  and San Manuel

    The fire started on May 21, and has burned more than 800 acres

     FMAGs provide federal funding for up to 75 percent of eligible firefighting costs

     The Disaster Relief Fund provides allowances for FMAGs through FEMA to assist in fighting fires that threaten to become major incidents

    Eligible costs covered by FMAGs can include expenses for field camps, equipment use, materials, supplies and mobilization, and demobilization activities attributed to fighting the fire

    For more information on FMAGs, visit fema

    gov/assistance/public/fire-management-assistance

    eileen

    chao
    Thu, 05/22/2025 – 16:47

    MIL OSI USA News

  • MIL-OSI USA: NASA’s Moffett Federal Airfield Hosts Boeing Digital Taxi Tests

    Source: NASA

    New technology tested by an industry partner at NASA’s Ames Research Center in California’s Silicon Valley could improve how commercial planes taxi to and from gates to runways, making operations safer and more efficient on the surfaces of airports.
    Airport taxiways are busy. Planes come and go while support vehicles provide maintenance, carry fuel, transport luggage, and more. Pilots must listen carefully to air traffic control when getting directions to the runway – and garbled communications and heavy workloads can cause issues that could lead to runway incursions or collisions.
    Researchers at Boeing are working to address these issues by digitizing taxiway information and automating aircraft taxi functions. The team traveled to NASA Ames to collaborate with researchers while testing their technology at the Moffett Federal Airfield and NASA’s FutureFlight Central, an air traffic control simulation facility.

    To test these new technologies, Boeing brought a custom single-engine test plane to the airfield. Working from FutureFlight Central, their researchers developed simulated taxiway instructions and deployed them to the test pilot’s digital tablet and the autonomous system.
    Typically, taxiing requires verbal communication between an air traffic controller and a pilot. Boeing’s digital taxi release system displays visual turn-by-turn routes and directions directly on the pilot’s digital tablet.
    “This project with Boeing lends credibility to the research being done across Ames,” said Adam Yingling, autonomy researcher for the Air Traffic Management-eXploration (ATM-X) program at NASA Ames. “We have a unique capability with our proximity to Moffett and the work Ames researchers are doing to advance air traffic capabilities and technologies to support the future of our national airspace that opens the door to work alongside commercial operators like Boeing.”
    The team’s autonomous taxiing tests allowed its aircraft to follow the air traffic control’s digital instructions to transit to the runway without additional pilot inputs.

    As commercial air travel increases and airspace gets busier, pilots and air traffic controllers have to manage heavier workloads. NASA is working with commercial partners to address those challenges through initiatives like its Air Traffic Management-eXploration project, which aims to transform air traffic management to accommodate new vehicles and air transportation options.
    “In order to increase the safety and efficiency of our airspace operations, NASA research in collaboration with industry can demonstrate how specific functions can be automated to chart the course for enhancing traffic management on the airport surface,” said Shivanjli Sharma, ATM-X project manager at Ames. 

    MIL OSI USA News

  • MIL-OSI USA: NASA’s Dragonfly Mission Sets Sights on Titan’s Mysteries

    Source: NASA

    When it descends through the thick golden haze on Saturn’s moon Titan, NASA’s Dragonfly rotorcraft will find eerily familiar terrain. Dunes wrap around Titan’s equator. Clouds drift across its skies. Rain drizzles. Rivers flow, forming canyons, lakes and seas. 

    But not everything is as familiar as it seems. At minus 292 degrees Fahrenheit, the dune sands aren’t silicate grains but organic material. The rivers, lakes and seas hold liquid methane and ethane, not water. Titan is a frigid world laden with organic molecules. 
    Yet Dragonfly, a car-sized rotorcraft set to launch no earlier than 2028, will explore this frigid world to potentially answer one of science’s biggest questions: How did life begin?
    Seeking answers about life in a place where it likely can’t survive seems odd. But that’s precisely the point.
    “Dragonfly isn’t a mission to detect life — it’s a mission to investigate the chemistry that came before biology here on Earth,” said Zibi Turtle, principal investigator for Dragonfly and a planetary scientist at the Johns Hopkins Applied Physics Laboratory in Laurel, Maryland. “On Titan, we can explore the chemical processes that may have led to life on Earth without life complicating the picture.”
    On Earth, life has reshaped nearly everything, burying its chemical forebears beneath eons of evolution. Even today’s microbes rely on a slew of reactions to keep squirming.
    “You need to have gone from simple to complex chemistry before jumping to biology, but we don’t know all the steps,” Turtle said. “Titan allows us to uncover some of them.”
    Titan is an untouched chemical laboratory where all the ingredients for known life — organics, liquid water and an energy source — have interacted in the past. What Dragonfly uncovers will illuminate a past since erased on Earth and refine our understanding of habitability and whether the chemistry that sparked life here is a universal rule — or a wonderous cosmic fluke. 
    Before NASA’s Cassini-Huygens mission, researchers didn’t know just how rich Titan is in organic molecules. The mission’s data, combined with laboratory experiments, revealed a molecular smorgasbord — ethane, propane, acetylene, acetone, vinyl cyanide, benzene, cyanogen, and more. 
    These molecules fall to the surface, forming thick deposits on Titan’s ice bedrock. Scientists believe life-related chemistry could start there — if given some liquid water, such as from an asteroid impact.
    Enter Selk crater, a 50-mile-wide impact site. It’s a key Dragonfly destination, not only because it’s covered in organics, but because it may have had liquid water for an extended time.

    The impact that formed Selk melted the icy bedrock, creating a temporary pool that could have remained liquid for hundreds to thousands of years under an insulating ice layer, like winter ponds on Earth. If a natural antifreeze like ammonia were mixed in, the pool could have remained unfrozen even longer, blending water with organics and the impactor’s silicon, phosphorus, sulfur and iron to form a primordial soup.
    “It’s essentially a long-running chemical experiment,” said Sarah Hörst, an atmospheric chemist at Johns Hopkins University and co-investigator on Dragonfly’s science team. “That’s why Titan is exciting. It’s a natural version of our origin-of-life experiments — except it’s been running much longer and on a planetary scale.”
    For decades, scientists have simulated Earth’s early conditions, mixing water with simple organics to create a “prebiotic soup” and jumpstarting reactions with an electrical shock. The problem is time. Most tests last weeks, maybe months or years.
    The melt pools at Selk crater, however, possibly lasted tens of thousands of years. Still shorter than the hundreds of millions of years it took life to emerge on Earth, but potentially enough time for critical chemistry to occur. 
    “We don’t know if Earth life took so long because conditions had to stabilize or because the chemistry itself needed time,” Hörst said. “But models show that if you toss Titan’s organics into water, tens of thousands of years is plenty of time for chemistry to happen.”
    Dragonfly will test that theory. Landing near Selk, it will fly from site to site, analyzing the surface chemistry to investigate the frozen remains of what could have been prebiotic chemistry in action. 
    Morgan Cable, a research scientist at NASA’s Jet Propulsion Laboratory in Southern California and co-investigator on Dragonfly, is particularly excited about the Dragonfly Mass Spectrometer (DraMS) instrument. Developed by NASA’s Goddard Space Flight Center in Greenbelt, Maryland, with a key subsystem provided by the CNES (Centre National d’Etudes Spatiales), DraMS will search for indicators of complex chemistry.
    “We’re not looking for exact molecules, but patterns that suggest complexity,” Cable said. On Earth, for example, amino acids — fundamental to proteins — appear in specific patterns. A world without life would mainly manufacture the simplest amino acids and form fewer complex ones. 
    Generally, Titan isn’t regarded as habitable; it’s too cold for the chemistry of life as we know it to occur, and there’s is no liquid water on the surface, where the organics and likely energy sources exist. 
    Still, scientists have assumed that if a place has life’s ingredients and enough time, complex chemistry — and eventually life —  should emerge. If Titan proves otherwise, it may mean we’ve misunderstood something about life’s start and it may be rarer than we thought.
    “We won’t know how easy or difficult it is for these chemical steps to occur if we don’t go, so we need to go and look,” Cable said. “That’s the fun thing about going to a world like Titan. We’re like detectives with our magnifying glasses, looking at everything and wondering what this is.” 
    Dragonfly is being designed and built under the direction of the Johns Hopkins Applied Physics Laboratory (APL), which manages the mission for NASA. The team includes key partners at NASA’s Goddard Space Flight Center and NASA’s Jet Propulsion Laboratory. Dragonfly is managed by NASA’s Marshall Space Flight Center in Huntsville, Alabama, for the agency’s Science Mission Directorate at NASA Headquarters in Washington.
    For more information on Dragonfly, visit:

    Dragonfly

    By Jeremy RehmJohns Hopkins Applied Physics Laboratory, Laurel, Md.
    Media Contacts:Karen Fox / Molly WasserHeadquarters, Washington202-358-1600 karen.c.fox@nasa.gov / molly.l.wasser@nasa.gov    
    Mike BuckleyJohns Hopkins Applied Physics Laboratory443-567-3145michael.buckley@jhuapl.edu

    MIL OSI USA News

  • MIL-OSI USA: Winners Announced in NASA’s 2025 Gateways to Blue Skies Competition

    Source: NASA

    A team from South Dakota State University, with their project titled “Soil Testing and Plant Leaf Extraction Drone” took first place at the 2025 NASA Gateways to Blue Skies Competition, which challenged student teams to research aviation solutions to support U.S. agriculture.
    The winning project proposed a drone-based soil and tissue sampling process that would automate a typically labor-intensive farming task. The South Dakota State team competed among eight finalists at the 2025 Blue Skies Forum May 20-21 in Palmdale, California, near NASA’s Armstrong Flight Research Center. Subject matter experts from NASA and industry served as judges.
    “This competition challenges students to think creatively, explore new possibilities, and confront the emerging issues and opportunity spaces solvable through aviation platforms,” said Steven Holz, assistant project manager for University Innovation with NASA’s Aeronautics Research Mission Directorate and Blue Skies judge and co-chair. “They bring imaginative ideas, interesting insights, and an impressive level of dedication. It’s always an honor to work with the next generation of innovators participating in our competition.”

    Steven holz
    Assistant Project Manager for University Innovation

    The winning team members were awarded an opportunity to intern during the 2025-26 academic year at any of four aeronautics-focused NASA centers — Langley Research Center in Hampton, Virginia, Glenn Research Center in Cleveland, Ames Research Center in California’s Silicon Valley, or Armstrong Flight Research Center in Edwards, California.  
    “It’s been super-rewarding for our team to see how far we’ve come, especially with all these other amazing projects that we were competing against,” said Nathan Kuehl, team lead at South Dakota State University. “It wouldn’t have been possible without our graduate advisor, Allea Klauenberg, and advisor, Todd Lechter. We want to thank everybody that made this experience possible.”
    Other awards included: 

    Second Place — University of Tulsa, CattleLog Cattle Management System
    Best Technical Paper — Boston University, PLAANT: Precision Land Analysis and Aerial Nitrogen Treatment

    Sponsored by NASA’s Aeronautics Research Mission Directorate, this year’s competition asked teams of university students to research new or improved aviation solutions to support agriculture that could be applied by 2035 or sooner. The goal of the competition, titled AgAir: Aviation Solutions for Agriculture, was to enhance production, efficiency, sustainability, and resilience to extreme weather. 
    At the forum, finalist teams presented concepts of aviation systems that could help the agriculture industry.Students had the opportunity to meet with NASA and industry experts, tour NASA Armstrong, and gain insight into the agency’s aviation mission.
    U.S. agriculture provides food, fuel, and fiber to the nation and the world. However, the industry faces significant challenges. NASA Aeronautics is committed to supporting commercial, industrial, and governmental partners in advancing aviation systems to modernize agricultural capabilities.  
    The Gateways to Blue Skies competition is sponsored by NASA’s Aeronautics Research Mission Directorate’s University Innovation Project and is managed by the National Institute of Aerospace.
    The National Institute of Aerospace has made available a livestream of the competition, as well as information about the finalists and their projects, and details about the 2025 competition.

    MIL OSI USA News

  • MIL-OSI USA: Following Uber’s Reported ‘Congestion’ Overcharge, IAM, SEIU-led Illinois Drivers Alliance Call on Chicago City Council to Launch Investigation

    Source: US GOIAM Union

    Scores of rideshare drivers rallied outside Chicago City Hall to demand accountability from Uber after the company imposed an allegedly unauthorized $1.50 “congestion surcharge” on riders, which according to public reports, was done without City approval or public notice. The rally and press conference, organized by the Illinois Drivers Alliance – a coalition powered by SEIU Local 1 and IAM Local 701 – alongside the Chicago Gig Alliance, urged members of the Chicago City Council to hold formal investigative hearings into Uber’s actions. 

    During the event, a statement was read on behalf of Alderperson Silverstein announcing that she would be launching investigative hearings through the City Council’s Committee on Pedestrian and Traffic Safety to uncover how Uber may have allegedly imposed the surcharge outside of city regulations – and if needed, determine how to prevent a recurrence of the alleged charges. 

    The Statement from 50th Ward Alderwoman Debra Silverstein read: “No company should be allowed to operate in the City of Chicago without transparency and accountability. The unauthorized surcharge imposed by Uber, without the City’s approval or public disclosure, demands answers. That’s why, as Chair of the Committee on Pedestrian and Traffic Safety, I will be leading investigative hearings to get to the bottom of how this happened. Our job as alderpeople is to protect the public and ensure that nothing like this ever slips through the cracks again. Chicagoans deserve to know the truth, and drivers deserve fairness. This investigation, alongside the push for the Rideshare Living Wage and Safety Ordinance, is a critical step toward restoring trust and putting real guardrails on the industry.”

    “These unregulated rideshare corporations are reaping millions in profits off the backs of Chicago workers—while siphoning that revenue out of our city. These profits are generated here, by the people who live and work in Chicago. It’s time to hold these companies accountable and ensure that the wealth created in Chicago stays in Chicago,” said Ronnie Gonzalez, IAM Midwest Territory Special Representative. “The people of Chicago have a right to transparency, and rideshare drivers have a right to dignity and fair treatment. We support this investigation and the Rideshare Living Wage and Safety Ordinance. We’re glad to be part of the turning point in rideshare—bringing accountability to an industry that has operated without limits for too long.”

    “Rideshare companies don’t take us into account when it comes to prices, standards, safety, or any other decision that directly affects us and we deserve to be heard,” said Clyde Marshall, a Chicago area rideshare driver. “Uber just upcharged passengers a congestion fee, and the drivers didn’t see a dime while we were the ones who face the customers and drive in the congestion. That’s why I am here today with the Illinois Drivers Alliance fighting for our right to fair representation with a union.”

    Drivers also reiterated their call for the passage of the Rideshare Living Wage and Safety Ordinance, a critical measure that not only addresses pay and safety but also creates enforceable transparency standards to prevent future abuses in the rideshare industry.

    The post Following Uber’s Reported ‘Congestion’ Overcharge, IAM, SEIU-led Illinois Drivers Alliance Call on Chicago City Council to Launch Investigation appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: FEMA Resumes In-Person Trainings at National Schoolhouses to Strengthen State and Local Government’s Ability to Respond to Disasters

    Source: US Federal Emergency Management Agency

    Headline: FEMA Resumes In-Person Trainings at National Schoolhouses to Strengthen State and Local Government’s Ability to Respond to Disasters

    FEMA Resumes In-Person Trainings at National Schoolhouses to Strengthen State and Local Government’s Ability to Respond to Disasters

    WASHINGTON — FEMA announced today that in-person training will resume at three national schoolhouses in early June—the Center for Domestic Preparedness (CDP) in Anniston, Ala

    , the National Fire Academy (NFA) and the National Disaster and Emergency Management University (NDEMU) in Emmitsburg, Md

     In-person training was paused in March of 2025 following President Trump’s Executive Order 14222, Implementing the President’s “Department of Government Efficiency” Cost Efficiency Initiative to ensure alignment with the Administration’s priority of good use of taxpayer funds

        Following a comprehensive review by FEMA and the U

    S

    Fire Administration (USFA), it was determined certain courses provide effective training to enhance national readiness for state, local, tribal and territorial emergency managers, first responders and local leaders

    FEMA’s principles for emergency management assert that disasters are best managed when they’re federally supported, state managed and locally executed

     
    amy

    ashbridge
    Thu, 05/22/2025 – 15:16

    MIL OSI USA News

  • MIL-OSI USA: Strong New Contract Ratified by IAM Local 2525 Members at South Dakota Military Base

    Source: US GOIAM Union

    Members of IAM Local 2525, working under the B1 Training Support SCA contract with AT2, LLC and Systems Application & Technologies, Inc. (SA-TECH), have unanimously ratified a new three-year collective bargaining agreement. The contract, effective through June 25, 2028, delivers significant improvements in wages, benefits, and retirement security for the bargaining unit based in Belle Fourche, S.D.

    Negotiations were led by IAM Aerospace Coordinator Stephen P. Jordan, who worked closely with District 5 Business Representative Steve Allard, whose leadership and professionalism were instrumental in achieving this agreement.

    The newly ratified contract includes an immediate $2 equity pay adjustment, along with 4% general wage increases each year of the agreement. Health and welfare contributions will increase annually. Additionally, the IAM National Pension Plan contributions will grow from $3 per hour to $3.75 per hour over the life of the contract.

    “I would like to acknowledge Business Representative Steve Allard for his great work and professionalism in achieving this agreement,” said Jordan. “Steve has a great mindset in doing what’s right in representing the membership. I would also like to acknowledge the shop committee Chay Ericks and Reggie Hunt for their work representing the bargaining unit.”

    The 100% ratification vote reflects the membership’s strong support for the agreement and the improvements it delivers.

    “With the support of IAM Aerospace Coordinator Stephen Jordan, contract negotiations for our members at SA-TECH went exceedingly well,” said IAM Midwest Territory General Vice President Sam Cicinelli. “We are proud of the bargaining committee’s efforts and the incredible contract they brought to Local 2525 members. My thanks to everyone involved and congratulations to these members on a great new agreement.”

    The post Strong New Contract Ratified by IAM Local 2525 Members at South Dakota Military Base appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: What to Expect After You Apply for FEMA Assistance

    Source: US Federal Emergency Management Agency 2

    What to Expect After You Apply for FEMA Assistance

    LITTLE ROCK – If you live in Greene, Hot Spring, Independence, Izard, Jackson, Lawrence, Randolph, Sharp and Stone counties and were affected by the severe storms and tornadoes that occurred March 14-15, you may be eligible for FEMA assistance for losses not covered by insurance.How To Apply for FEMA AssistanceApply online at www.DisasterAssistance.gov.Download the FEMA App for mobile devices.Call the FEMA helpline at 800-621-3362 between 6 a.m. and 10 p.m. CT. Help is available in most languages. If you use a relay service, such as video relay (VRS), captioned telephone or other service, give FEMA your number for that service.To view an accessible video about how to apply visit: Three Ways to Register for FEMA Disaster Assistance – YouTube.Home InspectionsWithin 10 days after applying, a FEMA inspector may contact you to schedule an appointment. To be prepared for the visit, please have the following available:Photo identification.Proof that you owned or occupied the house at the time of the disaster.Receipts for home repairs or replacement of damaged items.Pictures of any damage that may now be repaired.For an accessible video on FEMA home inspections, go to FEMA Accessible: Home Inspections.Your Determination LetterWithin 10 days after the inspector’s visit, you will receive a letter in the mail or via email explaining your application status and how to respond. This is your determination letter. The letter will explain whether FEMA has approved you for assistance, how much, and how the assistance must be used.If your letter says you’re not approved, it does not mean you’re denied. You may need to submit additional information or supporting documentation. The letter will explain how to appeal the decision if you do not agree with it. For an overview of the appeal process, visit How Do I Appeal the Final Decision? | FEMA.gov.Digital PaymentFEMA is partnering with the U.S. Treasury to provide new options for survivors to receive their disaster assistance money more quickly through digital payments. When applying for FEMA assistance, survivors can select which method they prefer to receive their funds. Payment can be issued through:A direct deposit into your bank account.A credit to your Visa or Mastercard debit card.Your U.S. Debit Card used to receive other federal benefits.An electronic check sent to a pre-paid debit card sent by FEMA.PayPal account.Digital payments can provide money to eligible survivors on the same day in most cases. Beware of FraudArkansas survivors should be aware that con artists and criminals may try to obtain money or steal personal information through fraud or identity theft. In some cases, thieves try to apply for FEMA assistance using names, addresses and Social Security numbers they have stolen from survivors.Don’t believe anyone who promises a disaster grant in return for payment. Don’t give your banking information to a person claiming to be a FEMA housing inspector. FEMA inspectors are never authorized to collect your personal financial information.If you believe you are the victim of fraud or a scam, report it immediately to your local police or sheriff’s department or contact the Office of the Arkansas Attorney General Consumer Protection Hotline at 800-482-8982.   For more information, visit fema.gov/disaster/4865. Follow FEMA Region 6 on social media at x.com/FEMARegion6 and at facebook.com/FEMARegion6/.
    joy.li
    Thu, 05/22/2025 – 13:33

    MIL OSI USA News

  • MIL-OSI USA: Solidarity, Family, and Service

    Source: US GOIAM Union

    This article was featured in the Summer 2025 IAM Journal and was written by IAM Communications Representative Elias Flamenco Rivera.

    In today’s fast-paced world, balancing a successful career, union commitments, and family life can be impossible. However, for three dedicated IAM mem­bers, this reality is a daily com­mitment that speaks to their work ethic, union pride, and dedication to their professions and families. These members rise before dawn and work well beyond the typical eight-hour workday, driven by their deep-rooted commitment to
    their jobs, families, and the IAM.

    “For JAM members, it’s not about managing time – it’s about commitment. The long hours are made bearable by the strength we find in our families, our union, and our shared mission to serve,” said !AM Southern Territory General Vice President Craig Martin.

    Many of you reading this story have experienced the drill: early mornings, long shifts, and balan­cing work and family. It’s the life of an !AM member in the South, and it’s a testament to our dedication. JAM Union Southern Terri­ tory members Berrin McFadden, Steve Blackwell, and Scott Gar­dner are three exceptional indivi­duals who are balancing work and family to serve JAM members.

    BERRIN MCFADDEN has devoted over three decades of his life to the Jacksonville Transportation Authority (JTA), where he has become an integral part of the workplace and the broader com­ munity. As a seasoned mechanic in the HVAC shop, McFadden spends his mornings ensuring buses are fully operational, provi­ding essential heating and air-con­ditioning services, and offering quick fixes to ensure the safety and comfort of passengers. But it’s not just about the work; it’s about the pride McFadden takes in his craft and the people he serves. Since joining the JAM in 1990, McFadden has taken on various leadership roles within his Local, including eight years as financial secretary and currently serving as conductor sentinel. He values the union’s support for his professional growth and the enhancement of his personal financial skills, which he uses to manage his household budget effectively with his wife.

    “Being part of the TAM helped me become a better financial manager. It made me more disciplined with money and allowed me to share those les­ sons with others,” said McFadden.

    McFadden works long hours during the week to keep things running smoothly, then clearly separates work from personal life on the weekends, maintaining a healthy equilibrium.

    “I dedicate my weekends to my family and myself,” said McFadden. “I’ve learned that it’s important to shut off work and focus on the things that matter the most at home.”

    Beyond work, McFadden is actively engaged in beautification and landscaping projects within his neighborhood, a hobby he has cherished for many years. He believes that a well-maintained lawn reflects the residents’ care and pride.

    His lawn care and landscaping expertise have earned him the respect of his neighbors, who fre­quently seek his advice and gui­dance on maintaining their yards.

    “I’m just doing what I love, and that’s what drives me. I want to leave a legacy showing the importance of community, hard work, and caring for the people around you,” says McFadden.

    STEVE BLACKWELL currently works as a Quality Assurance Representative at Amentum Group. With an extensive background in avia­tion, including roles as Corro­sion Control Mechanic Lead and Aircraft Mechanic 2, he has built a career centered on maintaining safety and efficiency in aviation. Though his daily routine can be unpredictable, his commitment to ensuring every task is performed to the highest standard remains constant.

    “Every day is different in avia­tion,” says Blackwell.

    The role comes with significant responsibilities, including perfor­ming final inspections for mainte­nance actions involving the safety offlight, investigating safety inci­dents, and drafting reports like engineering investigation requests and quality deficiency reports. Blackwell is also responsible for monitoring various maintenance programs, training other staff, and compiling reports to support the Program Management Office.

    “You need solid technical expertise and a deep unders­tanding of aviation standards,” says Blackwell. “Working alon­gside qualified and competent mechanics to ensure tasks are completed efficiently is essential.” As a member of IAM Local 2777 for over seven years, Bla­ckwell has seen firsthand how union membership contributes to a positive work environment.

    “Being part of the JAM has been beneficial in building cama­raderie, especially among those of us who have military backgrou­nds. We work well together and support each other in achieving our goals,” reflects Blackwell.

    In addition to his role as a Chief Steward, Blackwell also serves as the Vice President of his Local.

    “I help lead efforts to resolve issues at the site and ensure that our members are supported,” he says, underscoring the collabora­tive spirit that defines union work. Despite his job’s demanding nature, Blackwell tries to balance work with his personal life. ‘Tm fortunate to have an understanding family, especially my wife, the rock in our hou­sehold. She supports me as I take on additional responsibilities at work,” he says.

    Outside of work, Blackwell is passionate about music. As a local musician, he performs live shows to unwind and support charitable causes.

    “My band donates 100% of our tips to organizations like United Service Organizations (USO) and the Children’s Rescue Initiative (CR!), which fights human traffi­cking,” he explains.

    “I also make time to work out whenever possible, and I set clear boundaries for work-no calls after 7:45 p.m. unless it’s an emergency so that I can be pre­ sent for my family and personal well-being.”

    “I see my work at Amentum as contributing to the security of our community. The aircraft we maintain help train pilots who will protect future generations,” says Blackwell. “The work we do directly impacts the future of avia­tion and defense. It’s rewarding to know that my efforts contribute to the safety of our country and the well-being of the people I work with.”

    SCOTT GARDNER begins the day early as a mechanic at Textron Aviation. The first task includes stretching exercises and a crew meeting to set the stage for the day’s work. From there, it’s all about getting hands-on with tasks, assembling aircraft parts, and ensuring every job is completed precisely. As an assembly ins­ taller, the responsibility is clear: follow Textron Aviation’s blue­ prints and specifications to main­tain quality and safety.

    “In my role, I perform assem­bly work in the final assem­bly area. We work on a weekly sequence, positioning and prepa­ring aircraft as part of the 40-hour moving schedule,” says Gardner, who has been with Textron for 28 years.

    The work is physically deman­ding but highly specialized, and precision is key.

    As a shop steward, Gardner also balances his technical duties with advocating for his coworkers. “A big part of my job invol­ves answering questions, moni­toring safety, and addressing any arising issues throughout the day. I’m constantly in discussions with leadership about daily matters and broader issues affecting our team,” explains Gardner.

    This role involves significant leadership and communication skills, which come naturally to someone who has been a part of JAM Local 774 for nearly 20 years.

    For Gardner, being part of the IAM has provided a sense of voice and security.

    “The !AM has been a big help as it has given me a plat­ form where I can make sure my coworkers’ rights are heard,” said Gardner. “We have benefits that we wouldn’t otherwise have in a right-to-work state.”

    The IAM has helped him grow as an advocate, primarily through leadership classes at the William W. Winpisinger Education and Technology Center.

    “It’s been a great way to bring those lessons back to my family, teaching them the importance of our rights as workers and the advantages of being part of a union,” explains Gardner.

    Gardner also has served as [AM Local 774 Communications Representative, a role that required him to ensure timely and effective communication between union leadership and the members.

    While his work and union res­ponsibilities can be demanding, he strives to ensure his family life doesn’t take a backseat.

    “Although it’s challenging at times, I maintain clear bounda­ries by carving out time for work, union responsibilities, and family, so [ can stay present at home.”

    Family remains his top prio­rity, and his commitment to them is evident in his career choices and personal values.

    “My wife and I have always prioritized our family first. Now that the kids are out of the house, it’s easier to balance things. But even when they were younger, made sure they always came first,” shares Gardner.

    He and his wife are acti­vely involved in the community, supporting local charities like Flags of Freedom and Wreaths Across America. He also attends the annual United Way of the Plains/AFL-CIO Community Ser­ vices Conference in the area.

    “Our work at Textron is critical to the local community. We manu­facture world-class aircraft, and as one of the largest employers in the city, our wages, benefits, and working conditions are vital to the community’s economic health,” says Gardner proudly.

    “My work means something. I know that someone’s loved one might be flying on one of these aircraft, which motivates me to ensure that everything I do is up to the highest standard,” continues Gardner.

    THE SPIRIT OF IAM: COMMITMENT TO SOLIDARITY, WORK, AND SERVICE

    “These workers’ stories are not just about what they do but why they do it – to create a bet­ter future for their families, their communities, and the union that stands behind them,” said Mar­ tin. ‘Through their tireless efforts, they remind us that the true stren­gth of any union is not just in its contracts but in the support we provide one another. Their jour­neys are a powerful reminder that when we work together with pur­pose, we all rise.”

    VIDEO PLAYLIST
    IAM Southern Territory members share their stories of balancing their work, union commitments, and family life with dedication and pride. iam4.me/southemsolidarity

    The post Solidarity, Family, and Service appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: IAM Local 701 Helps Feed Children Around The World With Annual Volunteer Event

    Source: US GOIAM Union

    On April 26, more than 150 volunteers from IAM Local 701 came together to support the community at Feed My Starving Children (FMSC) in Aurora, Ill., during their annual IAM HELPS event. Participants included Local 701 Business Representatives; staff; apprenticeship training center instructors and staff; Health, Welfare and Pension Department personnel; as well as union members and their families.

    Working side by side, the volunteers hand-packed meals consisting of rice, soy, dried vegetables, and a nutritionally balanced blend of vitamins and minerals. These meals were then sealed, boxed, and prepared for shipment to global partners fighting hunger.

    In total, the Local 701 team packaged 41,040 meals – 190 boxes with 36 bags each – enough to feed more than 112 children one nutritious meal every day for an entire year.

    “IAM HELPS is more than just a program, it’s a promise to our communities that we will show up, lend a hand, and make a difference,” said IAM Midwest Territory General Vice President Sam Cicinelli. “Packing meals may seem like a small act, but each bag represents hope, health, and a better future for a child in need.”

    FMSC is an international organization that provides meals to children worldwide who suffer from malnutrition. FMSC meals are developed by food science and nutrition professionals to supplement nutritional deficits and reduce problems caused by malnutrition.

    “The IAM Local 701 HELPS program has continued to grow over the years, and we’re proud to see increased participation from our members each year,” said IAM Local 701 Directing Business Representative Mark Grasseschi. “This event not only builds solidarity among our membership but also strengthens the bonds between our union, our families, and the communities we serve. We look forward to future events and even greater involvement from Local 701 within the community.”

    The IAM Midwest Territory “IAM H.E.L.P.S. in the Community” initiative stands for Honoring, Engaging, Lifting, Providing, and Servicing.

    For more information on IAM H.E.L.P.S. in the Community, click here.

    The post IAM Local 701 Helps Feed Children Around The World With Annual Volunteer Event appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: New Best Practices Guide for Securing AI Data Released

    News In Brief – Source: US Computer Emergency Readiness Team

    This information sheet highlights the critical role of data security in ensuring the accuracy, integrity, and trustworthiness of AI outcomes. It outlines key risks that may arise from data security and integrity issues across all phases of the AI lifecycle, from development and testing to deployment and operation. 

    Defense Industrial Bases, National Security Systems owners, federal agencies, and Critical Infrastructure owners and operators are encouraged to review this information sheet and implement the recommended best practices and mitigation strategies to protect sensitive, proprietary, and mission critical data in AI-enabled and machine learning systems. These include adopting robust data protection measures; proactively managing risks; and strengthening monitoring, threat detection, and network defense capabilities. 

    As AI systems become more integrated into essential operations, organizations must remain vigilant and take deliberate steps to secure the data that powers them. For more information on securing AI data, see CISA’s Artificial Intelligence webpage. 

    MIL OSI USA News

  • MIL-OSI USA: New Grains Gluten Free Bakery Issues Allergy Alert on Undeclared Eggs, Tree Nuts, Soy, and Milk in Bakery Products

    Source: US Food and Drug Administration

    Summary

    Company Announcement Date:
    May 21, 2025
    FDA Publish Date:
    May 22, 2025
    Product Type:
    Food & BeveragesAllergens
    Reason for Announcement:

    Recall Reason Description
    Undeclared Allergen – Egg, tree nuts Soy and Milk

    Company Name:
    New Grains Gluten Free Bakery
    Brand Name:

    Brand Name(s)
    New Grain Gluten Free Bakery

    Product Description:

    Product Description
    Breads, bagels, caramel bars, cookies and croutons

    Company Announcement
    May 21, 2025 — Spanish Fork, Utah — New Grains Gluten Free Bakery is recalling a variety of products, including breads, bagels, cookies, and croutons, because they may contain undeclared eggs, tree nuts, soy, and milk. People who have an allergy or severe sensitivity to eggs, tree nuts, soy, or milk run the risk of serious or life-threatening allergic reactions if they consume these products.
    The following products are affected by this recall:

    Artisan White Bread (Contains: Egg)
    Artisan Multigrain Bread (Contains: Egg)
    Artisan Sourdough Bread (Contains: Egg)
    Artisan Cinnamon Raisin Bread (Contains: Egg)
    Blueberry Bagels (Contains: Egg)
    Cinnamon Raisin Bagels (Contains: Egg)
    Plain Bagels (Contains: Egg)
    Multigrain Bagels (Contains: Egg)
    Artisan Sourdough Ciabatta Rolls (Contains: Egg)
    Chocolate Chip Cookie (Contains: Egg, Milk, Soy)
    Dye-Free Frosted Sugar Cookie (Contains: Egg, Milk, Soy)
    Frosted Sugar Cookie (Contains: Egg, Milk, Soy)
    Coconut Macaroon Cookie (Contains: Egg, Milk, Soy)
    Pecan Caramel Bar (Contains: Egg, Milk, Tree nuts)
    Brownie Chocolate Chip Cookie (Contains: Egg, Milk, Soy)
    Artisan Seasoned Croutons (Contains: Egg, Milk)
    Seasoned Bread Crumbs (Contains: Egg, Milk)

    These products were distributed between 04/07 and 04/21 under lot numbers 90–107 in the state of Utah through retail stores. The breads and croutons were packaged in clear vacuum-sealed plastic bags, while the cookies were packaged in regular clear plastic bags. The affected products have labels that indicate they are “gluten-free” and display the New Grains brand name. The label colors could be red, purple, orange, blue, green, or pink.
    The recall was initiated after it was discovered that products containing eggs, tree nuts, soy, and milk were distributed in labels that did not reveal the presence of eggs, tree nuts, soy, and milk.
    No illnesses have been reported to date.
    Consumers who have purchased the affected products are urged not to consume the products and to return them to the place of purchase for a full refund.
    Consumers with questions may contact New Grains Gluten Free Bakery at 801-980-5751 between 10 AM and 3 PM MST, Monday through Friday.
    This recall is being made with the knowledge of the U.S. Food and Drug Administration.
    Link to Initial Press Release

    Company Contact Information

    Consumers:
    New Grains Gluten Free Bakery, Ed Janotti, Office Manager
    801-980-5751

    Content current as of:
    05/22/2025

    Regulated Product(s)

    Topic(s)

    Follow FDA

    MIL OSI USA News

  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News