Category: Australia

  • MIL-OSI New Zealand: Supercars for the South Island

    Source: NZ Music Month takes to the streets

    A second round of the hugely successful Supercars events will be held in Christchurch from next year with support from the Government’s Major Events Fund. 
    “For more than 20 years Supercars Championship events have played an important role showcasing our beautiful country to an international audience and I’m thrilled the South Island will now be part of this from next year,” Tourism and Hospitality Minister Louise Upston says. 
    “The Government is investing $5.9 million from the Major Events Fund to support Supercars events in both Taupō and Christchurch for the next three years. 
    “This means international – and domestic – visitors can attend back-to-back rounds across consecutive weekends in Taupō and Christchurch, allowing them to extend their stay and enjoy more of what New Zealand has to offer. 
    “It was fantastic to be part of the estimated 50,000 strong crowd at the recent ITM Supercars440 event in Taupō. The place was buzzing with people in town to enjoy one of the most popular Trans-Tasman motorsport events.
    “We know the 2024 event generated significant economic and tourism benefits for the Taupō region and New Zealand with more than 3,300 international visitors attending and spending more than $5.2 million while here. Not to mention the invaluable exposure in key tourism markets with a total broadcast reach of 246 million, including 3.9 million in Australia. 
    “I’m pleased that with this investment New Zealand’s strong relationship with Supercars will continue in Taupo and extend to include Christchurch, with all the benefits that brings.” 
    Supercars Ltd has selected Ruapuna Motorsport Park, Christchurch as the host venue for the South Island round.

    MIL OSI New Zealand News

  • MIL-OSI USA: Percolating Clues: NASA Models New Way to Build Planetary Cores

    Source: NASA

    A new NASA study reveals a surprising way planetary cores may have formed—one that could reshape how scientists understand the early evolution of rocky planets like Mars.
    Conducted by a team of early-career scientists and long-time researchers across the Astromaterials Research and Exploration Science (ARES) Division at NASA’s Johnson Space Center in Houston, the study offers the first direct experimental and geochemical evidence that molten sulfide, rather than metal, could percolate through solid rock and form a core—even before a planet’s silicate mantle begins to melt.
    For decades, scientists believed that forming a core required large-scale melting of a planetary body, followed by heavy metallic elements sinking to the center. This study introduces a new scenario—especially relevant for planets forming farther from the Sun, where sulfur and oxygen are more abundant than iron. In these volatile-rich environments, sulfur behaves like road salt on an icy street—it lowers the melting point by reacting with metallic iron to form iron-sulfide so that it may migrate and combine into a core. Until now, scientists didn’t know if sulfide could travel through solid rock under realistic planet formation conditions.

    Working on this project pushed us to be creative. It was exciting to see both data streams converge on the same story.

    Dr. Jake Setera
    ARES Scientist with Amentum

    The study results gave researchers a way to directly observe this process using high-resolution 3D imagery—confirming long-standing models about how core formation can occur through percolation, in which dense liquid sulfide travels through microscopic cracks in solid rock.
    “We could actually see in full 3D renderings how the sulfide melts were moving through the experimental sample, percolating in cracks between other minerals,” said Dr. Sam Crossley of the University of Arizona in Tucson, who led the project while a postdoctoral fellow with NASA Johnson’s ARES Division. “It confirmed our hypothesis—that in a planetary setting, these dense melts would migrate to the center of a body and form a core, even before the surrounding rock began to melt.”
    Recreating planetary formation conditions in the lab required not only experimental precision but also close collaboration among early-career scientists across ARES to develop new ways of observing and analyzing the results. The high-temperature experiments were first conducted in the experimental petrology lab, after which the resulting samples—or “run products”—were brought to NASA Johnson’s X-ray computed tomography (XCT) lab for imaging.

    X-ray scientist and study co-author Dr. Scott Eckley of Amentum at NASA Johnson used XCT to produce high-resolution 3D renderings—revealing melt pockets and flow pathways within the samples in microscopic detail. These visualizations offered insight into the physical behavior of materials during early core formation without destroying the sample.
    The 3D XCT visualizations initially confirmed that sulfide melts could percolate through solid rock under experimental conditions, but that alone could not confirm whether percolative core formation occurred over 4.5 billion years ago. For that, researchers turned to meteorites.
    “We took the next step and searched for forensic chemical evidence of sulfide percolation in meteorites,” Crossley said. “By partially melting synthetic sulfides infused with trace platinum-group metals, we were able to reproduce the same unusual chemical patterns found in oxygen-rich meteorites—providing strong evidence that sulfide percolation occurred under those conditions in the early solar system.”
    To understand the distribution of trace elements, study co-author Dr. Jake Setera, also of Amentum, developed a novel laser ablation technique to accurately measure platinum-group metals, which concentrate in sulfides and metals.
    “Working on this project pushed us to be creative,” Setera said. “To confirm what the 3D visualizations were showing us, we needed to develop an appropriate laser ablation method that could trace the platinum group-elements in these complex experimental samples. It was exciting to see both data streams converge on the same story.”
    When paired with Setera’s geochemical analysis, the data provided powerful, independent lines of evidence that molten sulfide had migrated and coalesced within a solid planetary interior. This dual confirmation marked the first direct demonstration of the process in a laboratory setting.

    The study offers a new lens through which to interpret planetary geochemistry. Mars in particular shows signs of early core formation—but the timeline has puzzled scientists for years. The new results suggest that Mars’ core may have formed at an earlier stage, thanks to its sulfur-rich composition—potentially without requiring the full-scale melting that Earth experienced. This could help explain longstanding puzzles in Mars’ geochemical timeline and early differentiation.
    The results also raise new questions about how scientists date core formation events using radiogenic isotopes, such as hafnium and tungsten. If sulfur and oxygen are more abundant during a planet’s formation, certain elements may behave differently than expected—remaining in the mantle instead of the core and affecting the geochemical “clocks” used to estimate planetary timelines.
    This research advances our understanding of how planetary interiors can form under different chemical conditions—offering new possibilities for interpreting the evolution of rocky bodies like Mars. By combining experimental petrology, geochemical analysis, and 3D imaging, the team demonstrated how collaborative, multi-method approaches can uncover processes that were once only theoretical.
    Crossley led the research during his time as a McKay Postdoctoral Fellow—a program that recognizes outstanding early-career scientists within five years of earning their doctorate. Jointly offered by NASA’s ARES Division and the Lunar and Planetary Institute in Houston, the fellowship supports innovative research in astromaterials science, including the origin and evolution of planetary bodies across the solar system.
    As NASA prepares for future missions to the Moon, Mars, and beyond, understanding how planetary interiors form is more important than ever. Studies like this one help scientists interpret remote data from spacecraft, analyze returned samples, and build better models of how our solar system came to be.
    For more information on NASA’s ARES division, visit: https://ares.jsc.nasa.gov/
    Victoria SegoviaNASA’s Johnson Space Center281-483-5111victoria.segovia@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News

  • MIL-OSI: PennantPark Floating Rate Capital Ltd.’s Unconsolidated Joint Venture, PennantPark Senior Secured Loan Fund I LLC Completes the Reset of its $315.8 Million Securitization, Lowering the Cost of Financing

    Source: GlobeNewswire (MIL-OSI)

    MIAMI BEACH, Fla., May 22, 2025 (GLOBE NEWSWIRE) — PennantPark Floating Rate Capital Ltd. (the “Company”) (NYSE: PFLT) today announced that PennantPark Senior Secured Loan Fund I LLC (“PSSL”) through PSSL’s wholly-owned and consolidated subsidiary, PennantPark CLO VI, LLC (“CLO VI”) has closed the reset of a four-year reinvestment period, twelve-year final maturity $315.8 million debt securitization.

    The debt issued in this securitization (the “Debt”) is structured in the following manner:

    Class Par Amount
    ($ in millions)
    % of Capital Structure Coupon Expected Rating
    (S&P)
    Issuance Price
    A-R Loans $ 228,000,000 72.2% 3 Mo SOFR + 1.85% A- 100.0%
    B-R Loans   18,000,000 5.7% 3 Mo SOFR + 4.50% BBB- 100.0%
    C-R Loans   18,000,000 5.7% Retained BB- 100.0%
    Sub. Notes   51,800,000 16.4% N/A NR N/A
    Total $ 315,800,000        
                 

    “The reset of this PSSL securitization is a testament to the strength of the Company’s platform, and highlights our ability to execute on a transaction during a period of significant market volatility,” said Arthur Penn, Chief Executive Officer. “The reset of CLO VI is expected to result in a significant reduction in the Company’s and PSSL’s cost of capital. The increases in scale of both the Company’s and PSSL’s balance sheets coupled with efficiencies gained in their long term financing should continue to drive attractive returns on invested capital and enhance the Company’s earnings momentum. Between PFLT and PSSL, there is approximately $850 million of available capital that can be invested in this attractive vintage of core middle market loans. PennantPark currently manages approximately $4.0 billion in middle market assets in securitizations, and we look forward to continued growth with the support of our current and new investors.”

    PSSL will continue to retain the Subordinated Notes and Class C-R Loans through a consolidated subsidiary. The maturity of the replacement Debt and the existing Subordinated Notes is now extended to April 2037. The replacement Debt is expected to be approximately 100% funded at close. In addition, PSSL continues to act as retention holder in the transaction to retain exposure to the performance of the securitized assets. GreensLedge Capital Markets LLC acted as the structurer and sole arranger in connection with this reset transaction.

    The Debt offered as part of this securitization have not been and will not be registered under the Securities Act of 1933, as amended (the “Securities Act”), or any state “blue sky” laws, and may not be offered or sold in the United States absent registration under Section 5 of the Securities Act or an applicable exemption from such registration requirements. The CLO is a form of secured financing incurred and consolidated by PSSL. This press release shall not constitute an offer to sell or a solicitation of an offer to buy nor shall there be any sale of the Debt in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

    ABOUT PENNANTPARK FLOATING RATE CAPITAL LTD.

    PennantPark Floating Rate Capital Ltd. is a business development company which primarily invests in U.S. middle market private companies in the form of floating rate senior secured loans, including first lien secured debt, second lien secured debt and subordinated debt. From time to time, the Company may also invest in equity investments. PennantPark Floating Rate Capital Ltd. is managed by PennantPark Investment Advisers, LLC.

    ABOUT PENNANTPARK SENIOR SECURED LOAN FUND I LLC

    PennantPark Senior Secured Loan Fund I LLC, is a joint venture between PennantPark Floating Rate Capital Ltd. and a subsidiary of Kemper Corporation (NYSE: KMPR), Trinity Universal Insurance Company, and primarily invests in U.S. middle market companies whose debt is rated below investment grade.

    ABOUT PENNANTPARK INVESTMENT ADVISERS, LLC

    PennantPark Investment Advisers, LLC (“PennantPark”) is a leading middle market credit platform, managing approximately $10.0 billion of investable capital, including available leverage. Since its inception in 2007, PennantPark has provided investors access to middle market credit by offering private equity firms and their portfolio companies as well as other middle market borrowers a comprehensive range of creative and flexible financing solutions. PennantPark is headquartered in Miami, and has offices in New York, Chicago, Houston, Los Angeles and Amsterdam.

    FORWARD-LOOKING STATEMENTS

    This press release may contain “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. You should understand that under Section 27A(b)(2)(B) of the Securities Act and Section 21E(b)(2)(B) of the Securities Exchange Act of 1934, as amended (the “Exchange Act”), the “safe harbor” provisions of the Private Securities Litigation Reform Act of 1995 do not apply to forward-looking statements made in periodic reports PennantPark Floating Rate Capital Ltd. files under the Exchange Act. All statements other than statements of historical facts included in this press release are forward-looking statements and are not guarantees of future performance or results and involve a number of risks and uncertainties. Actual results may differ materially from those in the forward-looking statements as a result of a number of factors, including those described from time to time in filings with the Securities and Exchange Commission. PennantPark Floating Rate Capital Ltd. undertakes no duty to update any forward-looking statement made herein. You should not place undue influence on such forward-looking statements as such statements speak only as of the date on which they are made.

    CONTACT:
    Richard T. Allorto, Jr.
    PennantPark Floating Rate Capital Ltd.
    (212) 905-1000
    www.pennantpark.com

    The MIL Network

  • MIL-OSI USA: To the President’s Desk: Fischer’s Resolution to Overturn California’s EV Mandate, Protect Truckers and Consumers

    US Senate News:

    Source: United States Senator for Nebraska Deb Fischer

    Today, the U.S. Senate approved Senator Deb Fischer’s (R-Neb.) resolution of disapproval to repeal California’s Advanced Clean Trucks (ACT) regulation which imposed unrealistic and stringent emissions requirements for heavy-duty trucks and heavy-duty diesel engines.

    A companion resolution passed the House on April 30, 2025. Now, the resolution will head to the President’s desk where it is expected to be signed into law.

    Fischer also spoke on the Senate Floor in support of her resolution to highlight the necessity in overturning the waiver to stop one state from dictating emission policies for the entire country.

    Click the image above to view a video of Fischer’s remarks

    Click here to download audio
    Click here to download video

    Transcript of Fischer’s remarks as prepared for delivery:

    M. President,

    Today, the United States Senate voted on and passed my resolution to overturn the EPA’s waiver for California’s Advanced Clean Trucks Act.

    First, I’d like to thank my friend and colleague, Chairman Capito, for her strong leadership and work on this very important issue.

    This heavy-handed regulation imposes unrealistic emissions requirements for heavy-duty trucks and heavy-duty diesel engines.

    This government mandate handed down to vehicle manufacturers demand they sell zero-emission trucks at an increased rate from 2024 to 2035.

    We aren’t under any illusion as to what this means.

    We know that the goal is to effectively end the sale of internal combustion engine trucks.

    Now – I’m not here today to disparage electric vehicles – and I’m certainly not here to discourage the manufacturing and purchasing of EVs, either.

    What I am concerned about is the federal government dictating which cars and which trucks are acceptable, and which are not.

    If Americans want to drive an electric or a hybrid car – that’s fine; however, the government should not pick winners and losers in the vehicle marketplace.

    M. President – I believe in the power of America’s free markets – and I believe we should allow the markets to determine the viability of clean trucks.

    Here’s the truth: This California waiver and subsequent regulation is simply not based in reality – and it will have real-world consequences.

    By requiring truckers to meet California’s standards – even while working outside of the state – operator costs will increase, fleet upgrades will be impacted, and interstate commerce will be disrupted.

    And American consumers will bear the brunt of increased costs.

    Hardworking families are already dealing with the high cost of everyday goods and services – and they cannot afford this regulation.

    Let me be clear: This action is necessary to stop one state from dictating emission policies for the entire country.

    Prior to this waiver being granted, California’s own Air Resources Board readily admitted this action would extend beyond its own state borders – and several states have already followed suit.

    I’d also like to address the eligibility of Congress disapproving rules.

    A few weeks ago, I questioned the Government Accountability Office Comptroller during an Appropriations Subcommittee hearing.

    The Comptroller explicitly stated that GAO’s role is just an advisory one – and that it is up to Congress to determine what constitutes a rule.

    Again, let me be clear: We are reclaiming our Congressional authority under the Congressional Review Act.

    I’m proud that this body passed my resolution, which is a commonsense step to keep government overreach at bay, protect consumers, and support America’s free markets.

    With the passage of the House version of this resolution and with the passage of the Senate’s today – it will now head to the President’s desk to be signed into law.

    Thank you, M. President – I yield the floor. 

    MIL OSI USA News

  • MIL-OSI: ESET participates in operation to disrupt the infrastructure of Danabot infostealer

    Source: GlobeNewswire (MIL-OSI)

    • ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure.
    • While primarily developed as an infostealer, Danabot also has been used to distribute additional malware, including ransomware.
    • Danabot’s authors promote their toolset through underground forums and offer various rental options to potential affiliates.
    • This ESET Research analysis covers the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates.
    • Poland, Italy, Spain and Turkey are historically one of the most targeted countries by Danabot.

    PRAGUE and BRATISLAVA, Czech Republic, May 22, 2025 (GLOBE NEWSWIRE) — ESET has participated in a major infrastructure disruption of the notorious infostealer, Danabot, by the US Department of Justice, the FBI, and US Department of Defense’s Defense Criminal Investigative Service. U.S. agencies were working closely with Germany’s Bundeskriminalamt, the Netherlands’ National Police, and the Australian Federal Police. ESET took part in the effort alongside Amazon, CrowdStrike, Flashpoint, Google, Intel471, PayPal, Proofpoint, Team Cymru and Zscaler. ESET Research, which has been tracking Danabot since 2018, contributed assistance that included providing technical analysis of the malware and its backend infrastructure, as well as identifying Danabot’s C&C servers. During that period, ESET analyzed various Danabot campaigns all over the world, with Poland, Italy, Spain and Turkey historically being one of the most targeted countries. The joint takedown effort also led to the identification of individuals responsible for Danabot development, sales, administration, and more.

    “Since Danabot has been largely disrupted, we are using this opportunity to share our insights into the workings of this malware-as-a-service operation, covering the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates. Apart from exfiltrating sensitive data, we have observed that Danabot is also used to deliver further malware, which can include ransomware, to an already compromised system,” says ESET researcher Tomáš Procházka, who investigated Danabot.

    The authors of Danabot operate as a single group, offering their tool for rental to potential affiliates, who subsequently employ it for their malicious purposes by establishing and managing their own botnets. Danabot’s authors have developed a vast variety of features to assist customers with their malevolent motives. The most prominent features offered by Danabot include: the ability to steal various data from browsers, mail clients, FTP clients, and other popular software; keylogging and screen recording; real-time remote control of the victims’ systems; file grabbing; support for Zeus-like webinjects and form grabbing; and arbitrary payload upload and execution. Besides utilizing its stealing capabilities, ESET Research has observed a variety of payloads being distributed via Danabot over the years. Furthermore, ESET has encountered instances of Danabot being used to download ransomware onto already compromised systems.

    In addition to typical cybercrime, Danabot has also been used in less conventional activities such as utilizing compromised machines for launching DDoS attacks… for example, a DDoS attack against Ukraine’s Ministry of Defense soon after the Russian invasion of Ukraine.

    Throughout its existence, according to ESET monitoring, Danabot has been a tool of choice for many cybercriminals and each of them has used different means of distribution. Danabot’s developers even partnered with the authors of several malware cryptors and loaders, and offered special pricing for a distribution bundle to their customers, helping them with the process. Recently, out of all distribution mechanisms ESET observed, the misuse of Google Ads to display seemingly relevant, but actually malicious, websites among the sponsored links in Google search results stands out as one of the most prominent methods to lure victims into downloading Danabot. The most popular ploy is packing the malware with legitimate software and offering such a package through bogus software sites or websites falsely promising users to help them find unclaimed funds. The latest addition to these social engineering techniques are deceptive websites offering solutions for fabricated computer issues, whose only purpose is to lure victims into execution of a malicious command secretly inserted into the user’s clipboard.

    The typical toolset provided by Danabot’s authors to their affiliates includes an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communications between the bots and the actual C&C server. Affiliates can choose from various options to generate new Danabot builds, and it’s their responsibility to distribute these builds through their own campaigns.

    “It remains to be seen whether Danabot can recover from the takedown. The blow will, however, surely be felt, since law enforcement managed to unmask several individuals involved in the malware’s operations,” concludes Procházka.

    For technical overview of Danabot and insight into its operation, check out ESET Research blogpost: “Danabot: Analyzing a fallen empire” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

    Worldwide Danabot detections as seen in ESET telemetry since 2018

    About ESET

    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/2306cbf1-1ef7-4040-8c12-ca8be3cc6689

    The MIL Network

  • MIL-Evening Report: From peasant fodder to posh fare: how snails and oysters became luxury foods

    Source: The Conversation (Au and NZ) – By Garritt C. Van Dyk, Senior Lecturer in History, University of Waikato

    An Oyster cellar in Leith John Burnet, 1819; National Galleries of Scotland, Photo: Antonia Reeve

    Oysters and escargot are recognised as luxury foods around the world – but they were once valued by the lower classes as cheap sources of protein.

    Less adventurous eaters today see snails as a garden pest, and are quick to point out that freshly shucked oysters are not only raw but also alive when they are eaten.

    How did these unusual ingredients become items of conspicuous consumption?

    From garden snail to gastronomy

    Eating what many consider to be a slimy nuisance seems almost counter-intuitive, but consuming land snails has an ancient history, dating to the Palaeolithic period, some 30,000 years ago in eastern Spain.

    Ancient Romans also dined on snails, and spread their eating habits across their empire into Europe.

    Lower and middle class Romans ate snails from their gardens, while elite consumers ate specially farmed snails, fed spices, honey and milk.

    An Ancient Roman mosaic dating to the 4th century AD depicting a basket of snails, Basilica di Santa Maria Assunta, Aquileia, Italy.
    Carole Raddato/Wikimedia Commons, CC BY-SA

    Pliny the Elder (AD 24–79) described how snails were raised in ponds and given wine to fatten them up.

    The first French recipe for snails appears in 1390, in Le Ménagier de Paris (The Good Wife’s Guide), but not in other cookbooks from the period.

    In 1530, a French treatise on frogs, snails, turtles and artichokes considered all these foods bizarre, but surprisingly popular. Some of the appeal had to do with avoiding meat on “lean” days. Snails were classified as fish by the Catholic Church, and could even be eaten during Lent.

    For the next 200 years, snails only appeared in Parisian cookbooks with an apology for including such a disgusting ingredient. This reflected the taste of upper-class urbanites, but snails were still eaten in the eastern provinces.

    Schneckenweib, or Snail Seller, illustrated by Johann Christian Brand in Vienna, after 1798.
    Wien Museum

    An 1811 cookbook from Metz, in the Alsace region in northeastern France, describes raising snails like the Romans, and a special platter, l’escargotière, for serving them. The trend did not travel to Paris until after 1814.

    French diplomat Charles-Maurice de Talleyrand-Périgord (1754–1838) hosted a dinner for Russian Tsar Alexander I, after he marched into Paris following the allied forces’ defeat of Napoleon in 1814.

    The chef catering the meal was the father of French cuisine Marie-Antoine Carême, a native of Burgundy, spiritual home of the now famous escargots de Bourgogne.

    Carême served the Tsar what would become a classic recipe, prepared with garlic, parsley and butter. Allegedly, the Tsar raved about the “new” dish, and snails became wildly popular. A recipe for Burgundy snails first appeared in a French culinary dictionary published in 1825.

    It is ironic that it took the approval of a foreign emperor, who had just conquered Napoleon, to restore luxury status to escargot, a food that became a symbol of French cuisine.

    Snails remain popular today in France, with consumption peaking during the Christmas holidays, but May 24 is National Escargot Day in France.

    Oysters: the original fast food

    Oysters are another ancient food, as seen in fossils dating to the Triassic Era, 200 million years ago. Evidence of fossilised oysters are found on every major land mass, and there is evidence of Indigenous oyster fisheries in North America and Australia that dates to the Holocene period, about 12,000 years ago.

    There are references in classical Greek texts to what are probably oysters, by authors like Aristotle and Homer. Oyster shells found at Troy confirm they were a favoured food. Traditionally served as a first course at banquets in Ancient Greece, they were often cooked, sometimes with exotic spices.

    Music-cover sheet for ‘Bonne-Bouche’ by Emile Waldteufel, 1847-1897.
    © The Trustees of the British Museum, CC BY-NC-SA

    Pliny the Elder refers to oysters as a Roman delicacy. He recorded methods of the pioneer of Roman oyster farming, Sergius Orata, who brought the best specimens from across the Empire to sell to elite customers.

    Medieval coastal dwellers gathered oysters at low tide, while wealthy inland consumers would have paid a premium for shellfish, a perishable luxury, transported to their castles.

    French nobles in 1390 preferred cooked oysters, roasted over coals or poached in broths, perhaps as a measure to prevent food poisoning. As late as the 17th century, authors cautioned:

    But if they be eaten raw, they require good wine […] to aid digestion.

    Oyster Seller, Jacob Gole, 1688–1724.
    Rijksmuseum

    By the 18th century, small oysters were a popular pub snack, and larger ones were added as meat to the stew pot. That century, it is believed as many as 100,000 oysters were eaten each day in Edinburgh and the shells from the tavern in the basement filled in gaps in the brickwork at Gladstone’s Land in Edinburgh’s Royal Mile.

    Scottish oyster farms in the Firth of Forth, an inlet of the North Sea, produced 30 million oysters in 1790, but continual over-harvesting took its toll.

    By 1883 only 6,000 oysters were landed, and the population was declared extinct in 1957.

    As wild oyster stocks dwindled, large oyster farms developed in cities like New York in the 19th century. Initially successful, they were polluted, and infected by typhoid from sewage. An outbreak in 1924 killed 150 people, the deadliest food poisoning in United States history.

    Costumes of Naples: Oyster Sellers, c. 1906–10.
    Rijksmuseum

    Far from the overabundance of oysters we once had, over-fishing, pollution, and invasive species all threaten oyster populations worldwide today. Due to this scarcity of wild oysters and the resources required to safely farm environmentally sustainable oysters, they are now a premium product.

    Next on the menu

    Scarcity made oysters a luxury, and a Tsar’s approval elevated snails to gourmet status. Could insects become the next status food?

    Ancient Romans ate beetles and grasshoppers, and cultures around the world consume insects, but not (yet) as luxury products.

    Maybe the right influencer can make honey-roasted locust the next species to jump from paddock to plate.

    Garritt C. Van Dyk has received funding from the Getty Research Institute.

    ref. From peasant fodder to posh fare: how snails and oysters became luxury foods – https://theconversation.com/from-peasant-fodder-to-posh-fare-how-snails-and-oysters-became-luxury-foods-254299

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: There is a growing number of ‘super-sized’ schools. Does the number of students matter?

    Source: The Conversation (Au and NZ) – By Emma Rowe, Associate Professor in Education, Deakin University

    LBeddoe/Shutterstock

    Earlier this week, The Sydney Morning Herald reported one of Sydney’s top public high schools had more than 2,000 students for the first time, thanks to the booming population in the area.

    This follows similar reports of other “super-sized” schools in Victoria, Western Australia and Queensland.

    Parents may be wondering if a school’s size will impact their child’s opportunities or experience. What does the research say?

    A controversial subject

    Policy-makers have been concerned about school sizes for decades. This largely relates to declining enrolments in some areas and growing demand in others. For example, in Victoria during the Kennett government in the 1990s, some schools were merged into “super schools”.

    Super schools are attractive to policy-makers due to their ability to pool resources. However, anecdotally, parents have tended to oppose mergers on the basis that big schools detract from the community feel and personal relationships.

    There is no national data on average school size, although you can check individual school sizes on the MySchool website.

    Education authorities consider a school to be “small” if it has fewer than 300 students for primary school and fewer than 700 for high school.

    What does the research say?

    Australian-based research tends to support larger schools, on the basis they provide more curriculum choices. In a 2014 study published in the Journal of Education Policy, the authors wrote:

    large schools have more resources and are therefore better placed to offer a large range of curriculum, often including both academic and vocational subjects.

    A 2023 study similarly argued:

    smaller schools are generally less able to offer a wide range and diversity of curricular offerings compared to larger schools.

    Small schools can be beneficial

    But other education advocates argue small schools better facilitate participatory democratic environments for young people, improve discipline and sense of community.

    A 2009 review of 57 studies (the majority from the United States) published after 1990 recommended high schools do not have more than 1,000 students.

    The review said smaller schools can offer a community-like feel for students and are more likely to have smaller class sizes. A smaller school may be particularly advantageous for neurodiverse students if there are lower levels of noise and movement.

    A US-based study from 1991 found schools with less than 400 students lead to better student participation, attendance and satisfaction with school:

    The two primary arguments for large schools, cost savings and curriculum enhancement, pale in comparison with the positive schooling outcomes […] achieved by small schools.

    Smaller schools can offer a stronger sense of community.
    Dean Drobot/ Shutterstock

    But context matters

    In 2000, the Gates Foundation had a “big idea” to break up large high schools and turn them into “small learning communities” of 400 or fewer students.

    The foundation believed the initiative would lift graduation rates and student achievement, especially among minority students, because of the close relationships between students and teachers.

    But by 2008, the foundation conceded it had not worked – there had been no “dramatic improvements” in the number of students who leave high school adequately prepared for further study.

    But it’s not really about size

    So the research offers a mixed picture – this strongly suggests the size of a school on its own is not the most important factor.

    We also need to look at factors such as class size. Research shows smaller class sizes and lower teacher to student ratios are beneficial for student outcomes.

    Smaller class sizes and lower teacher to student ratios can lead to more one-on-one attention, improved relationships and lower noise levels in a classroom.

    Some studies have categorised “small classes” as between 13-17 students and larger classes as between 22-25 students.

    Teaching quality may also be improved with a smaller class size, as the teacher has more time to tailor their instruction to individual students.

    Importantly, the size of a school overall does not necessarily determine class sizes. A large school or a small school can still have large class sizes, and still struggle for quality one-on-one time.

    Similarly, a large school can still offer a strong sense of community and positive relationships between teachers and peers, depending on the way the school is organised (for example, a “school-within-a-school” or specific learning group within the school).

    If a small school is not well-resourced or does not have enough teachers, it may struggle to provide a positive, happy learning environment.

    The point is the school size on its own is not necessarily a positive or negative. What matters is what else is going on inside that school and whether it has the funding and resources to offer smaller class sizes, specialised teachers and access to a wide variety of subjects.

    Emma Rowe receives funding from the Australian Research Council.

    ref. There is a growing number of ‘super-sized’ schools. Does the number of students matter? – https://theconversation.com/there-is-a-growing-number-of-super-sized-schools-does-the-number-of-students-matter-257012

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Australian roads are getting deadlier – pedestrians and males are among those at greater risk

    Source: The Conversation (Au and NZ) – By Milad Haghani, Associate Professor & Principal Fellow in Urban Risk & Resilience, The University of Melbourne

    At least ten people died in fatal crashes earlier this month in a single 48-hour period on Victorian roads. It was the latest tragic demonstration of the mounting road trauma in Australia.

    In the decade up to 2020, the national road toll was gradually declining, albeit with some fluctuations. But the trend has since reversed, with fatalities rising steadily year after year.

    According to the latest official data, 1,296 people died on Australian roads in the year to April. 108 lives were lost last month alone, almost 15% more than the average for April over the previous five years.

    While our population has increased by about 6% over this five-year period, our road deaths have gone up by 18.5%.

    Road fatalities rarely follow evenly distributed averages. They sometimes spike, as they have in Victoria. And while we must never lose sight of the fact that these are people, and not just data, there is value in interrogating clusters when they occur.

    Victoria breakdown

    In the 12 months to May 20 this year, 118 lives were lost on Victorian roads, up 8.3% on the previous year and well above the five-year average of 100 annual deaths.

    The sharpest increases by transport mode have been among pedestrians (up 24%), one of the most vulnerable road-user groups. And a new threat has emerged with the first publicly reported case in Australia of a pedestrian dying after being struck by an electric bike.

    At least one pattern stands out from the recent cluster: five of the eight crashes occurred outside metropolitan Melbourne. This reflects the longstanding reality that fatal collisions remain disproportionately common in regional and remote areas. Over the 12 months, country road deaths have risen by 11%, compared to a 2% increase in metropolitan Melbourne.

    A large share of road deaths continue to occur in the country.
    Inge Blessas/Shutterstock

    Another striking detail is the gender distribution. Male deaths are up 22% on the previous period and now comprise nearly 80% of all fatalities. In contrast, female deaths have declined by 33%.

    Another trend that stands out is the rising toll among older road users. In the last 12 months, 40 people aged 60 and over have died on Victorian roads – a 25% increase on the previous period.

    4 National trends

    The national road fatality data tells us some of these trends are not exclusive to Victoria. They reflect what is happening across the country.

    1. Vulnerable road users: Nationally, pedestrians and motorcyclists have experienced sustained increases in lives lost for at least four years in a row. The share of pedestrians in total road deaths has risen from 11% in 2021 to 14% in the latest period. Despite the growing number, motorcyclist fatalities have remained relatively stable at about 20% of all deaths.

    2. Gender disparity: Men continue to be disproportionately represented in the national road toll, accounting for approximately 75% of all road deaths in Australia.

    3. Older age groups: In the 12 months to April 2025, deaths among individuals aged 75 and over increased by nearly 19% to 185.

    4. Regional and remote areas: in the 12 months to April 2024, there were roughly 818 deaths on country roads, compared to 400 in metropolitan areas.

    What do the trends tell us?

    There are several key points in the data.

    First, the persistent over-representation of men in fatalities remains a defining feature of the road toll. This gender imbalance is not specific to Australia.

    But put simply, we still know very little about what’s driving this pattern. Known behavioural and physiological sex-based differences don’t fully explain the scale of the disparity.

    The rise in fatalities among older Australians does not appear to be particularly abnormal when tracked with demographic changes. From 2020 to 2024, the number of Australians aged 75 and over increased by nearly 31%. In comparison, fatalities in this age group rose by around 25% over the same period. This suggests that the relative risk for older Australians has not necessarily increased.

    As for rural and regional areas, approximately two-thirds of road deaths occur in these areas, while only one-third of Australians reside there. Despite years of acknowledgment, this urban–rural divide in road safety remains wide and unresolved.

    SUVs a menace?

    While vehicles have become safer for their occupants, they have become more dangerous for other road users, especially pedestrians.

    One contributing factor could be the fast growing dominance of SUVs and light trucks in Australia.

    A recent international review that pooled the findings of 24 studies found SUVs were associated with significantly higher fatality rates in crashes involving vulnerable road users, compared to smaller cars. The effect was particularly pronounced for children.

    Heavier vehicles, such as SUVs, pose a higher road risk to pedestrians.
    King Ropes Access/Shutterstock

    The dangers are not limited to pedestrians. In two-vehicle collisions, increasing the striking vehicle’s weight by around 450 kilograms raises the probability of a fatality in the other vehicle by 40–50%.

    New targets

    Australian governments have adopted a Vision Zero goal of no road deaths or serious injuries by 2050.

    The complete elimination of fatalities should remain our moral benchmark. But the current data suggests intermediate targets are urgently needed.

    A more achievable near-term priority may be to first reverse the rising national toll by focusing on where the greatest preventable harms persist: vulnerable road users, especially pedestrians, males and non-urban roads.

    Milad Haghani receives funding from The Australian Government.

    Iman Taheri Sarteshnizi does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Australian roads are getting deadlier – pedestrians and males are among those at greater risk – https://theconversation.com/australian-roads-are-getting-deadlier-pedestrians-and-males-are-among-those-at-greater-risk-256994

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Submissions: Australia – Volunteers get back as much as they give, survey finds – AMES

    Source: AMES

    Volunteering to help individuals can build skills and knowledge, enhance employment opportunities, provide new and challenging experiences as well as deliver feelings of personal satisfaction through contributing, a new survey has found.

    It also delivers measurable benefits to those being supported; including help in finding work and acquiring skills as well intangible and benefits such as friendship and building connections within communities, the survey found.

    To mark National Volunteer Week 2025, the survey was commissioned by migrant and refugee settlement agency AMES Australia. It canvased the attitudes of 85 of the organisation’s volunteers in Melbourne, Sydney and Adelaide, working mostly one-on-one with newly arrived refugees and migrants.

    It found that overwhelmingly, volunteers believed they, themselves, benefitted directly through helping others.

    Asked whether they benefitted from their volunteering work, 32 per cent of volunteers said they benefitted ‘significantly’ and 78 per cent said they benefitted ‘somewhat’.

    Among the top benefits listed were ‘a feeling of satisfaction through contributing’ (96 per cent), ‘learning about new cultures (77 per cent), ‘building social and professional networks’ (59 per cent), ‘improving personal and communication (soft) skills’ and ‘enhancing employment opportunities’ (39 per cent).

    The survey also found that volunteers believed their work delivered practical and intangible benefits to those being supported.

    Ninety-six per cent of volunteers said their work delivered either ‘significant’ or ‘some’ benefits to those being supported and just 4 per cent were ‘not sure’.

    Among the top benefits to those being supported listed were ‘language acquisition support’ (91 per cent), ‘friendship’ (96 per cent),  ‘building connections with local communities’ (68 per cent), ‘practical support in navigating life in Australia’ (53 per cent), ‘understanding how to access services’ (56 per cent) and ‘help in finding employment’ (38 per cent).

    The survey found broad satisfaction with the experience of volunteering and a general feeling that it was productive.

    Fifty-four per cent of volunteers were ‘very satisfied’ with the experience, while 38 per cent were ‘somewhat’ satisfied and 8 per cent were neither satisfied nor dissatisfied.

    Sixty-nine per cent of respondents said they felt their volunteering was ‘very productive’ and 21 per cent said it was ‘somewhat productive’ while ten per cent were ‘not sure’.

    Among the challenges in volunteering cited in the survey were ‘time restrictions’ (39 per cent) and ‘language barriers’ (27 per cent).

    Overwhelmingly, volunteers surveyed were likely to recommend the experience to family and friends with 62 per cent saying they were ‘very likely’ to do so and 23 per cent saying they were ‘likely’ to do so. Ten per cent said they were neither likely nor unlikely to do so.

    More than half (47 per cent) of the volunteers surveyed were aged between 45 and 64 and 20 per cent were aged 25 to 34.

    As a migrant from Greece who arrived in Australian in 1964, Dimitra Kimakidis understands the isolation and confusion that can come with moving to a new country.

    That’s why she has been volunteering with migrant and refugee settlement agency AMES Australia since 1989 helping newly arrived women refugees and migrants settle in and feel welcome.

    “I enjoy volunteering to help ‘my girls’ and sometimes I can share their problems,” said Ms Kimakidis, who was honoured at recent AMES Australia volunteer week event.

    “It makes me happy to support people who maybe don’t have any relations or many friends here,” she said.

    “When I first arrived in this country, I went through the same experience of isolation and with no family here.”

    Ms Kimakidis helps Afghan women in Noble Park to learn English; and she also teaches them knitting and sewing.

    AMES Australia CEO Cath Scarth said the survey showed the added value volunteers can bring to an organisation.

    “Our volunteers at AMES Australia to an amazing job in supporting our refugee and migrant clients and making a real difference in their lives. This gives our organisation extra reach and extra capacity,” Ms Scarth said.

    “But the survey shows that volunteers also get benefits out of volunteering; and not just the feel-good effect of doing something selfless but also valuable skills, experiences and knowledge,” she said.

    MIL OSI – Submitted News

  • MIL-OSI USA: State selects 24 students for West Virginia’s prestigious teaching scholarship  – West Virginia Higher Education Policy Commission

    Source: US State of West Virginia

    Incoming college freshmen will receive $40,000 Underwood-Smith Teaching Scholars award 

    CHARLESTON, W.Va. – Twenty-four high school seniors who graduated this year have been selected as West Virginia’s sixth cohort of Underwood-Smith Teaching Scholars. These students will receive the state’s newest and most prestigious scholarship of up to $10,000 per year – or $40,000 total – for their college education as they prepare to pursue rewarding careers as West Virginia teachers. 

    The Underwood-Smith Teaching Scholars Program is a competitive scholarship for high school seniors and recent high school graduates with a passion for teaching and a history of high academic achievement, community service, and active involvement in extracurricular activities while in high school.

    “I’m incredibly proud of these young scholars, and I can’t wait to see what they accomplish over the next four years and beyond,” said Dr. Sarah Armstrong Tucker, West Virginia’s Chancellor of Higher Education. “This is West Virginia’s preeminent scholarship that is helping produce new generations of outstanding teachers who are eager to make a difference in their hometowns and in the Mountain State. We now have about 150 scholars pursuing their teaching careers right here at home, and we want them to know how important they are to the future of this great state.”

    The Underwood-Smith Teaching Scholars Program is designed to help West Virginia address ongoing teacher shortages in the fields of math, science, special education, and elementary education. Recipients commit to teaching in one of these high-demand fields in West Virginia for at least five years after graduation. To give students the greatest chance at success, each is paired with a practicing classroom teacher mentor, who provides guidance throughout their college careers. 

    The 2025 Underwood-Smith Teaching Scholars beginning their studies in West Virginia this fall are:  

    • Caelyn Bartley from Berkeley Springs High School will be studying elementary education at Shepherd University.
    • Haylee Chapman from Cabell Midland High School will be studying math at Marshall University.
    • Molli Taylor from East Fairmont High School will be studying special education at Fairmont State University.
    • Jenna Groves from Greenbrier East High School will be studying math at Concord University.
    • Donavin Penn from Greenbrier East High School will be studying elementary education at Marshall University.
    • Madison Sherman from Fisher will be studying elementary education at Shepherd University.
    • Abigail Lynch from Midland Trail High School will be studying elementary education at Fairmont State University.
    • Julia Oliverio from Morgantown High School will be studying math at West Virginia University.
    • Amelia Morgan from North Marion High School will be studying elementary education at Fairmont State University.
    • Kailyn Humphrey from Oak Hill High School will be studying elementary education at Concord University.
    • Sydney Davis from Parkersburg High School will be studying elementary education at West Virginia University.
    • Grace Martin from Petersburg High School will be studying elementary education at Shepherd University.
    • Audrey Mongold from Petersburg High School will be studying elementary education at West Virginia University.
    • Lucas Posey from Philip Barbour High School will be studying math at West Virginia University.
    • Miranda Gum from Pocahontas County High School will be studying elementary education at Glenville State University.
    • Elizabeth Handley from Point Pleasant High School will be studying elementary education at Marshall University.
    • Lukas Herrell from Sherman High School will be studying math at West Virginia State University.
    • Mary Morrison from St. Marys High School will be studying elementary education at WVU at Parkersburg.
    • Joshua Copley from Tug Valley High School will be studying science at Marshall University.
    • Carley Bryan from University High School will be studying elementary education at Fairmont State University.
    • Madalyn Brown from Westside High School will be studying elementary education at Concord University.
    • Ciera Faulstick from Wheeling Park High School will be studying elementary education at Wheeling Park High School.
    • Abigail Howard from Wheeling Park High School will be studying elementary education at West Virginia University.
    • Allison Hoffman from Winfield High School will be studying math at Marshall University.

    Scholar highlights will be featured throughout the month of July on the West Virginia Higher Education Policy Commission’s Facebook page.

    MIL OSI USA News

  • MIL-OSI Australia: Job Scam Fusion Cell disrupts fake job networks targeting Australians

    Source: Australian Ministers for Regional Development

    The National Anti-Scam Centre’s Job Scam Fusion Cell removed more than 29,000 scam social media accounts and 1850 fake job advertisements in a crackdown on employment scams targeting vulnerable Australians looking to ease cost of living pressures.

    The fusion cell, which ran from September 2024 to March 2025, has published its report highlighting the combined efforts of government, law enforcement, academics, and the private sector in a coordinated effort to tackle the sharp rise in job and employment scams.

    From 2022 to 2023, financial losses due to job scams increased by 151 per cent. In 2024, Scamwatch received more than 3000 reports of job scams, with reported losses totalling $13.7 million. Average losses to these scams were 5.1 per cent higher than the average for all other scam types.

    “Job scams have been one of the fastest growing scam types, as scammers are increasingly preying on people seeking relief from cost-of-living pressures,” ACCC Deputy Chair Catriona Lowe said.

    “These scams disproportionately impact people on low incomes, culturally and linguistically diverse communities, international students, non-resident visa holders, people with caring responsibilities, and others with limited employment options.”

    “Job scams result in significant financial losses and put people at risk of identity theft through loss of personal information. That’s why we’ve worked collaboratively to disrupt these scams through intelligence-sharing, awareness campaigns, and targeted interventions,” Ms Lowe said.

    Key initiatives undertaken and implemented by the Job Scam Fusion Cell include:

    • Working with Meta to remove 29,000 accounts sharing job scam content
    • Referring 836 scammer cryptocurrency wallets to digital currency exchanges for analysis and investigation, leading to blocking and blacklisting of wallets
    • Referring 1850 scam enablers such as websites and scam job advertisements for removal
    • Disrupting scammers’ impersonation of Australian Government entities, such as the Department of Foreign Affairs and Trade, the Department of Home Affairs, and APSJobs
    • Holding awareness and prevention forums with organisations across the tertiary education sector to enable them to deliver scams awareness messaging
    • Coordinating a social media campaign, tailored for at-risk groups
    • Creating guides for businesses, including about how to protect themselves and the community from impersonation of their business and regarding identification and disruption of Job Scam Payments
    • Establishing data sharing arrangements with cryptocurrency platforms

    The fusion cell identified key risks with the impersonation of healthcare providers in scam job advertisements being used to harvest personal information and extract money from job seekers.

    The National Anti-Scam Centre provided tailored advice to more than 40 organisations in the sector, including major state and territory hospitals, and small healthcare services, to help better protect job seekers. These efforts contributed to a near elimination of Scamwatch reports involving impersonation of healthcare organisations by March 2025.

    In addition to these specific initiatives, the fusion cell provides a great sandbox environment – participants can move beyond saying to doing, to try different techniques and see what works.  A number of Job Scam Fusion Cell initiatives are now being examined for their application to other scam types.  Others have become part of business-as-usual activity past the life of the fusion cell.

    “The work of the job scam fusion cell has been strategically targeted, drawing on data from victims’ experiences, Scamwatch and ReportCyber reports, stakeholder insights, and intelligence from participants. This approach has helped prevent and disrupt scams and has achieved significant and encouraging results,” Ms Lowe said.

    The National Anti-Scam Centre continues to work with partners across sectors to analyse emerging threats, raise awareness, and implement targeted interventions that disrupt scams before they reach consumers.

    Job and employment scams

    • Scammers advertise job opportunities so they can steal money and personal information. Stop and check any job ad that requires payment of money to make money. It could be a scam.
    • Scammers offer jobs that claim to pay well with low effort. But it’s only the scammer that will make money in the end. Often the job doesn’t exist at all.
    • Scammers pretend to be hiring on behalf of high-profile companies and online shopping platforms. They also impersonate well-known recruitment agencies.
    • Scammers may make contact unexpectedly through text message or encrypted message platforms like WhatsApp, Signal or Telegram.
    • Scammers often ask for payment claiming it is required so you can start the role and get the income they’ve promised. Don’t enter any arrangement that asks for up-front payment via bank transfer, PayID or cryptocurrency, like Bitcoin or USDT. It’s rare to get money back that is sent this way.
    • Don’t trust a job ad is real just because it appears on a trusted platform or website – scammers post fake ads too. If you come across a scammer, report it to the platform or agency and to scamwatch.gov.au.
    • Never send passport, identity documents, or bank account details to an employer or recruitment firm unless certain they are genuine.

    How to spot and avoid scams

    STOP – Don’t give money or personal information to anyone if you’re unsure. Scammers will create a sense of urgency. Don’t rush to act. Say ‘no’, hang up, delete.

    CHECK – Ask yourself could the call or text be fake? Scammers pretend to be from organisations you know and trust. Contact the organisation using information you source independently, so that you can verify if the call is real or not.

    PROTECT – Act quickly if something feels wrong. Contact your bank immediately if you lose money. If you have provided personal information call IDCARE on 1800 595 160. The more we talk the less power they have. Report scams to the National Anti-Scam Centre’s Scamwatch service at scamwatch.gov.au when you see them. If you’re contacted on a messaging platform like WhatsApp or iMessage, please also report the scam in the app.

    Background

    Fusion cells are time-limited taskforces designed to bring together expertise from government and the private sector to take timely action to address specific, urgent scam issues. The National Anti-Scam Centre is coordinating a series of fusion cells with different participants to address significant scam issues.

    The second fusion cell was announced in July 2024, following the first fusion cell on combatting investment scams.

    MIL OSI News

  • MIL-Evening Report: NZ Budget 2025: funding growth at the expense of pay equity for women could cost National in the long run

    Source: The Conversation (Au and NZ) – By Jennifer Curtin, Professor of Politics and Policy, University of Auckland, Waipapa Taumata Rau

    Pay equity protest outside parliament on budget day, May 22 2025. Getty Images

    In 1936, when the National Party was created through a merger of the United and Reform parties, there was a recognition among the power brokers that attracting women’s votes was crucial.

    National’s women’s organisations were integral to mobilising support. Throughout the 1940s, the party’s publicity material promised the women of New Zealand a happy family life. This was a consistent approach over the next 20 years, and National was rewarded with the women’s vote.

    Intermittent research on gender differences in vote choice between 1963 and 1993 indicate women made up between 45% and 51% of National’s support compared to 36% and 43% of Labour’s support.

    After 1996, this trend became less consistent. The New Zealand Election Study indicates a decreasing share of the women’s vote going to National, and fluctuations in vote choice among both women and men.

    Given the advent of proportional representation, some volatility may be expected. But there are also some constants. There is evidence women are more likely than men to support government spending on social policy, and they are significantly less likely than men to vote for National’s coalition partners NZ First and ACT.

    Now, with Budget 2025 – in particular its reliance on funds that would otherwise have gone towards settling pay equity claims – National’s historical success at attracting the women’s vote may be under threat.

    Growth before pay equity

    The budget represents a ruthless determination to deliver economic growth, including through its centrepiece “Investment Boost” tax breaks for businesses investing in productive assets.

    There is additional funding for health, defence, education and disability services, and the establishment of a social investment fund, and the budget left national superannuation untouched (for the remainder of this coalition government’s term, at least).

    It focused instead on KiwiSaver. Contributions from employers and employees will increase from 3% to 4%, while the government contribution will be halved for those earning under NZ$180,000 and cancelled for those earning over this amount.

    In summary, the new operational spend comes to $6.7 billion while savings, reprioritised spending and revenue-raising initiatives totalled $5.3 billion. As a result, the government has produced the lowest operational allowance in a decade ($1.3 billion) and promised $4 billion in new capital expenditure.

    But it was the radical restructuring and cancellation of pay equity for a range of undervalued female-dominated occupations that funded this budget. Almost half of the $12 billion recouped will be spent on the business tax incentives.

    The government expects the initiative will increase GDP and wages by 1% to 1.5% over the next 20 years. But given the gender-segregated structure of New Zealand’s labour market, it may take some time for women to benefit from the Investment Boost.

    Pay equity peril: Finance Minister Nicola Willis delivers the budget while Prime Minister Christopher Luxon looks on.
    Getty Images

    The gender gap and economic growth

    Applying a systematic and evidence-based gender analysis as part of the budget preparation process would have revealed more inclusive ways of delivering economic growth.

    For example, OECD modelling demonstrates the historical importance of increases in women’s labour market participation for economic growth, but notes that persistent gender gaps remain in productive capcity and hours of employment.

    Closing these gaps could potentially add a 0.1 percentage point of additional economic growth per year, culminating in a 3.9% boost to GDP in the next 35 years.

    Moreover, increasing women’s labour force participation may be a valuable mechanism to limit declines in the size of the labour force, given the rapidly ageing population.

    Such an outcome would require increased government investment in childcare and early childhood education for under twos, ideally for more than 20 hours per week.

    This would be a significant investment, given OECD data shows the net cost of childcare in New Zealand is as much as 38% of a two-earner couple’s average earnings (after accounting for government subsidies or benefits). This is considerably more expensive than most OECD member states.

    Potential cost to National

    Income and spending averages often mask more extreme impacts for different groups of women and men. For example, traditional economic models value labour used in the production of goods and services in the “market economy” but exclude the production of goods and services for their own use.

    For wāhine Māori, non-market work includes care for whānau, community and land, as well as upholding the mana of the marae, and the intergenerational transfer of knowledge.

    Finally, implementing pay equity, recognising the economic value of the unpaid care economy, and providing increased financial support for childcare, would also contribute to closing the gender pension gap.

    Westpac data shows men have an average KiwiSaver balance 16% higher than women’s, most likely attributable to gender wage gaps and parenting career breaks.

    Therefore the reduction in government contributions to KiwiSaver, and National’s desire to lift the retirement age, matter more to women because statistically they have a longer retirement to fund.

    Budget 2025 came at a cost to many women in New Zealand, and it may yet come at a cost for National.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. NZ Budget 2025: funding growth at the expense of pay equity for women could cost National in the long run – https://theconversation.com/nz-budget-2025-funding-growth-at-the-expense-of-pay-equity-for-women-could-cost-national-in-the-long-run-257225

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Head knocks and ultra-violence: viral games Run It Straight and Power Slap put sports safety back centuries

    Source: The Conversation (Au and NZ) – By Christopher Yorke, Lecturer in sport management, Western Sydney University

    runitstraight24/instagram.com, The Conversation, CC BY

    Created in Australia, “Run It Straight” is a new, ultra-violent combat sport.

    Across a 20×4 metre grassed “battlefield,” players charge at full speed toward one another.

    Alternating between carrying the ball (ball runner) and defending (tackler), victory is awarded via knockout (a competitor cannot continue), or a judge’s decision based on an athlete’s dominance during the collisions.

    Despite neuroscientists issuing grave warnings about the brutal sport’s risks, Run It Straight’s viral popularity, including endorsement among high profile athletes, is accelerating.

    A growing scene

    This month, Melbourne hosted the inaugural “RUNIT Championship League” event.

    Footage showed some participants convulsing after their collisions as the winner celebrated, surrounded by children.

    Drawing hundreds of spectators and millions of online views, the full-speed collision challenge is already turning its violence and social media footprint into commercial success abroad, securing interest in the United States.

    The sport held some events in New Zealand this week, but one was was halted by Auckland Council due to safety concerns and failure to secure necessary permits.

    A history of sport and violence

    In ancient times, symbolic cultural displays of power and physical dominance featured in combat sports such as wrestling, boxing, pankration (a mixed martial art combining boxing and wrestling) and even armoured foot races.

    This brutal entertainment is reflected in contemporary collision sports such as the National Rugby League (NRL) and Australian Football League (AFL).

    In recent decades however, the danger of concussion has resulted in most contact sports changing rules and regulations to protect athletes from head injuries.

    Various measures have been implemented to mitigate, eliminate and treat head trauma.

    The Australian government is exerting influence and committing material resources to support athletes living with brain issues such as chronic traumatic encephalopathy (CTE).




    Read more:
    When does the love of the game outweigh the cost? ABC’s Plum brings rugby league’s concussion crisis to the fore


    Considering this multi-pronged effort to make contact sports safer, the violence of Run It Straight is jarring.

    Why are these new sports so popular?

    With its origins as a social media challenge, Run It Straight is perfect content for short-form social media platforms: an entire competition can be distilled into a 30-second highlight.

    Run It Straight’s accessible and minimalist format is also attractive to fans compared to many collision sports that have complex rules and strategies. This can be a barrier to interest, engagement and commercial returns.

    Run It Straight and other emerging, violent sports such as Power Slap (a fight sport where contestants slap each other so hard they can be knocked unconscious) are simplistic and brutal.

    But athletes in most traditional collision sports use their physical ability and skill to evade contact. Similarly, boxing is not just about strikes to the head, it is punch evasion, physical fitness and point scoring.

    But the visual spectacle and shock of two people running toward one another for an inevitable collision is a form of violence that appeals to an increasing number of sport fans.

    The risks involved

    Run It Straight is a new sport, and to our knowledge there is no empirical peer-reviewed research focusing on it.

    But many neurologists have expressed concerns about its total disregard for scientific evidence showing repeated head trauma damages brain health.

    With Run it Straight appearing to lack the medical resources and infrastructure of professional sports organisations, and with the competition’s expressed intent to have participants collide at high speed, the risk of significant injury is high.

    Power Slap, though, has been the subject of empirical research. A 2024 study reported many of the sport’s combatants showed visible signs of concussion (motor incoordination, slowness to get up and blank and vacant looks during bouts).

    An opportunity for ‘traditional’ sports?

    The rise of Run It Straight and Power Slap creates a unique opportunity for the governing bodies of contact codes such as AFL, NRL and rugby union to highlight what sets them apart.

    Key to this is athlete safety. For years, governing bodies in these codes have invested time and resources to implement concussion management protocols at professional and community levels.

    Currently, the tournament-based format for individual adult participants allows Run It Straight to operate without the broader governance responsibilities of football codes.

    However, it is because of those governance responsibilities that the football codes can amplify their athlete wellbeing credentials to reassure participants and parents who may be nervous about concussion risks.

    Second, the football codes are organised team sports played with multiple players on a team, facilitating skill acquisition, teamwork, mental wellbeing and physical fitness. While there appears to be a degree of camaraderie during Run It Straight events, it is evidently a one-on-one competition.

    Ultimately, the rise and evident popularity of Run It Straight and Power Slap provides a stark reminder there will always be a section of society that is drawn to high-risk behaviours.

    In turn, the football codes should look to highlight the value of balance and their athlete wellbeing credentials.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Head knocks and ultra-violence: viral games Run It Straight and Power Slap put sports safety back centuries – https://theconversation.com/head-knocks-and-ultra-violence-viral-games-run-it-straight-and-power-slap-put-sports-safety-back-centuries-256473

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI USA: ICYMI: Senator Markey, Leader Schumer, Ranking Member Wyden Blast Republicans’ All-Out Assault on Clean Air and Climate

    US Senate News:

    Source: United States Senator for Massachusetts Ed Markey

    Senator Markey joined by Democratic Leader Schumer, Ranking Member Wyden, and climate advocates
    Washington (May 22, 2025) – Senator Edward J. Markey (D-Mass.), co-chair of the Senate Climate Change Task Force, Democratic Leader Chuck Schumer (D-N.Y.), and Senator Ron Wyden (D-Ore.), Ranking Member of the Senate Finance Committee, joined by climate advocacy groups, today hosted a press conference to blast Republicans’ all-out assault on efforts to combat the climate crisis, including unprecedented actions to revoke the California Clean Air Act waivers and repeal clean energy tax credits included in the Inflation Reduction Act.  
    “The Trump administration has made one thing painfully clear: They are putting Oil Above All—above the law, above the economy, and above the health and wallets of working families. The repeal of the Clean Air Act waivers is yet another historic example of the lawlessness of today’s Republican party; no rule, no norm, no standard is safe if it stands between them and what their Big Oil donors want. They’re breaking precedent, breaking Senate process, and breaking public trust. As a result, we will see more asthma. More heart disease. More early deaths. More cancer. That will be the Trump and Republican legacy,” said Senator Markey. “By repealing clean energy and environmental protection funding from the Inflation Reduction Act, Republicans are attacking clean air and clean energy with their tax bill. Republicans are seeking to destroy the tools and programs which are creating hundreds of thousands of jobs, easing costs for working families, and addressing air pollution in our communities. These attacks are dangerous and have far-reaching consequences for all.”
    “When it comes to clean energy and the Republican agenda, I don’t believe we’ve seen this kind of economic self-sabotage in modern American times. Republicans are raising Americans’ electrical bills, destroying thousands of good-paying jobs, and sacrificing our energy security all to pay for handouts to big corporations and ultra-wealthy Trump donors. Back in the campaign, Trump told a room full of oil and gas executives that he’d let them control the agenda if they helped put him back in the White House, and clearly, he’s delivering on that horribly corrupt promise,” said Ranking Member Wyden.
    “Congressional Republicans led a Big Oil-backed effort to circumvent their own rules in order to block California, and other states, from having stronger clean air standards for cars and trucks. This should not be a political or partisan issue, it’s about states’ ability to set standards – like the original tailpipe pollution limits set by Ronald Reagan – that deliver cleaner air for their citizens, said League of Conservation Voters’ Vice President of Federal Policy Matthew Davis. “At the same time, House Republicans have just passed their billionaire tax scam, the most anti-environmental bill in our nation’s history that will drive up families’ energy costs by hundreds of dollars per year. Right now, the Senate must stand up against the anti-environmental billionaire tax scam to protect our clean air and water, and cost-saving, jobs-creating clean energy.”
    “Today Congress has decided to fundamentally deny states their rights to reduce pollution and protect public health. In environmental justice communities, people of color and lower income face the greatest rates of asthma and cancer. This action enables a continued unjust assault on overburdened communities choking on diesel fumes. A clean transportation sector benefits us all and we will continue to fight for one that’s healthier, cheaper, and accessible to everyone,” said Yosef Robele, Federal Policy Manager, WE ACT for Environmental Justice.

    MIL OSI USA News

  • MIL-OSI New Zealand: Budget 2025 – Reverse Robin Hood Budget steals from working people

    Source: NZCTU Te Kauae Kaimahi

    Budget 2025 takes $12.8bn from low-income, female dominated workforces to prop up the Government’s failed economic policies, said NZCTU Te Kauae Kaimahi Economist Craig Renney.

    “The Government has promised this would be a growth budget, yet it has effectively cut the wages of low-income women workers. We know that one of the best ways to stimulate economic growth is by lifting wages – the Government is doing the opposite,” said Renney.

    “The figures released today also showed that the number of people on Jobseekers Support is rising, and higher than forecast just last year. Real wage growth is lower than forecast last year – the Treasury itself says the Budget “lowers wage growth”. This is a Budget that is taking working people backwards.

    “The Budget delivers more cuts to investment, including real terms cuts to early childhood education funding. New funding for learning support is largely being delivered by cutting funding from other programmes in education. Māori Development programmes have been cut significantly, as has funding from our media, culture, and heritage institutions.

    “Promises made in health aren’t provided with new funding and the destruction of the pay equity process will mean we will continue to lose health workers to Australia, putting further stress on the system.

    “Forecasts show we will continue to miss our child poverty targets over the next four years, and we will see thousands of families loose essential income due to cuts to Best Start and Working for Families. The Government is taking money from unemployed 18- and 19-year-olds, while investing nothing in action on climate change.

    “Overall, this is a Budget that works by taking away from some of the poorest people in New Zealand, to fund tax cuts for multinationals, increased investment in corrections, the failed charter schools project, and more spending on defence.

    “This is a Budget with its priorities all wrong – and working people will be paying the price,” said Renney. 

    MIL OSI New Zealand News

  • MIL-Evening Report: Deaf President Now! traces the powerful uprising that led to Deaf rights in the US – now again under threat

    Source: The Conversation (Au and NZ) – By Gemma King, ARC DECRA Fellow in Screen Studies, Senior Lecturer in French Studies, Australian National University

    Archival footage shows Tim Rarus, Greg Hlibok, Bridgetta Bourne-Firl and Jerry Covell, in Apple TV+ Deaf President Now! Apple TV+

    In March 1988, students of the world’s only Deaf university started a revolution that made national news. Now, the first film to document this historic uprising is screening on Apple TV+.

    At the same time, American universities are grappling with the consequences of President Donald Trump’s war on diversity, equity and inclusion.

    Gallaudet, home of the Deaf Rights movement

    By 1988, Washington DC’s Gallaudet University had been educating Deaf students in American Sign Language (ASL) for 124 years. But it had never had a Deaf president.

    For the first time, two Deaf candidates were in the running for the top job. One was Gallaudet’s own Irving King Jordan. The second was Harvey Corson of the American School for the Deaf.

    The third was Elisabeth Zinser, a hearing woman from the University of North Carolina Greensboro. She had no experience of Deaf community or knowledge of ASL.

    As the hearing board of trustees met to choose a new leader, the student body waited with bated breath. Self-determination in higher education – by the Deaf, for the Deaf – was finally a possibility. But once again the board chose a hearing person, Zinser.

    When chair Jane Spilman was questioned about the choice, she replied, “Deaf people are not ready to function in a hearing world.”

    Incensed, Gallaudet students barricaded the campus, gave impassioned media interviews and took to marching. First they marched around the university – Zinser effigies burning – and then all the way to the Capitol.

    The Deaf President Now protest became national news, leading to the resignations of Zinser and Spilman, and the appointment of Jordan as president. It also helped propel the Disability Rights Movement, contributed to the 1990 Americans with Disabilities Act and inspired Deaf Pride movements around the world.

    Jane Bassett Spilman and Elisabeth Zinser resigned as a result of the Deaf President Now movement.
    Apple TV+

    Timely, vital and imperfect

    The 2025 documentary Deaf President Now! opens with footage of a political act: not from the 1988 protests, but from the present day, as the movement’s original student leaders – Bridgetta Bourne, Jerry Covell, Greg Hlibok and Tim Rarus – advise on their interview setups.

    One alerts the crew they can’t see the interpreter. Another explains how much signing space they need in the frame. A third asks, joking but incisive, “What’s the microphone for?”

    These aren’t throwaway moments; they show how inclusion and authenticity are only possible when Deaf people are in control of their own stories.

    The film excels in exposing the paternalistic attitude and tightly-held hearing power that has long shaped Deaf education.

    The film’s most powerful moments are when it contrasts the board’s dismissive rhetoric against the eloquent, impassioned arguments of the Deaf student body. Through intimate interviews and carefully curated archival footage, the documentary dismantles prevailing presumption that Deaf individuals need hearing oversight to succeed.

    At the same time, the film embodies a paradox that mirrors its subject matter, as it is co-directed by hearing filmmaker Davis Guggenheim and Deaf director Nyle DiMarco.

    DiMarco has been active in the screen industry for more than a decade, in acting roles and as a producer on Netflix hits Deaf U (2020) and Audible (2021). Though his involvement represents progress, Guggenheim’s raises an uncomfortable question: when will Deaf filmmakers fully own their narratives and be entrusted to lead projects?

    Nyle DiMarco and Davis Guggenheim co-directed the documentary, with interviews from several of the movement’s leading figures.
    Apple TV+

    The collaboration reflects how stories celebrating Deaf empowerment often require hearing endorsement to reach a mainstream audience. The film’s distribution on Apple TV+ offers unprecedented visibility, but comes through channels controlled by hearing decision-makers.

    This production context reminds us true representation extends beyond what appears onscreen, to who controls the storytelling process — a revolution unfinished in Deaf cinema.

    Using film for Deaf empowerment

    The industry may remain exclusive, but the camera itself can be a tool for Deaf power. Throughout history, Deaf individuals have harnessed film as a means of resistance.

    The extensive archival footage in Deaf President Now! shows how, by 1988, film was already being used by the Deaf community as a form of advocacy. Through the blending of this footage with present-day interviews in ASL, we witness Deaf individuals taking ownership of their history and recounting it in their authentic language form.

    The documentary also mirrors how media attention was integral to spreading the protest’s message back in 1988. This culminated in a national broadcast of a live debate between Zinser and Greg Hlibok, the then student body president.

    To understand the film’s profound importance for the Deaf community, we must recognise how sign languages have historically been undocumented in their true form, with speech and writing considered superior modes of communication.

    Deaf culture, language and community are powerful forces of resistance that have continually defied mainstream oppression.

    Trump: a step back for the movement

    While the film was long overdue, its arrival now is eerily relevant. Trump’s push for conservative policies – part of what he calls “Project 2025” – seeks to dismantle programs and funding that serve minority students, including disability groups.

    Many of the protections in the Americans with Disabilities Act are under threat as a result, including fundamental rights to sign language and interpreting access in higher education and beyond.

    According to the New York Times, hundreds of terms including “accessibility”, “disability”, “minority” and “inequality” are being limited or outright removed from official government materials. In some cases, grant proposals and contracts have been automatically flagged for including “woke” terminology.

    The spirit of the Deaf President Now! resistance has never been more vital.

    But if Deaf history has taught us anything, it’s that the Deaf community forges a deep sense of pride and connection in the face of such pressures. And films like Deaf President Now! show us how integral film is to this resistance.

    Gemma King receives funding from the Australian Research Council.

    Samuel Martin and Sofya Gollan do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Deaf President Now! traces the powerful uprising that led to Deaf rights in the US – now again under threat – https://theconversation.com/deaf-president-now-traces-the-powerful-uprising-that-led-to-deaf-rights-in-the-us-now-again-under-threat-257233

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: KiwiSaver at a crossroads: budget another missed opportunity to fix NZ’s underperforming retirement scheme

    Source: The Conversation (Au and NZ) – By Aaron Gilbert, Professor of Finance, Auckland University of Technology

    Lynn Grieveson/Getty Images

    When KiwiSaver was introduced in 2007 it was built on a stark reality: New Zealand Super alone will not be enough for most people to retire with dignity.

    As the population ages and the cost of superannuation continues to climb, the gap between what the state provides and what retirees actually need is only going to grow. KiwiSaver was designed to bridge that gap – to give New Zealanders a fighting chance at financial independence in retirement.

    But changes to KiwiSaver laid out in this year’s budget undermine what was already an underperforming scheme.

    Despite 17 years of operation, KiwiSaver balances remain shockingly low. As of mid-2024, the average sits around NZ$37,000. That’s barely enough for a couple of years’ worth of modest top-ups, let alone funding a comfortable retirement.

    For many nearing retirement, balances are even lower. And about 40% of members aren’t actively contributing. That includes people on contribution holidays, in irregular work, or who opted out altogether. Many accounts are effectively dormant “ghost accounts” created by auto-enrolment and never activated.

    Let’s be blunt: a retirement savings scheme that doesn’t result in meaningful savings for the majority of its members isn’t working.

    The 2025 Budget from the National Party, ACT and NZ First, included changes to the KiwiSaver scheme.
    Hagen Hopkins/Getty Images

    Small cuts, big consequences

    KiwiSaver’s design isn’t its only problem. Political decisions have steadily chipped away at the scheme’s effectiveness. Every tweak and cut might seem minor on its own. But together they’ve eroded the core engine of the scheme: compounding contributions over time.

    Take the $1,000 kick-start payment from the state, scrapped in 2015. Left invested in a growth fund for 40 years, that single payment could have grown to over $8,000.

    Or look at the member tax credit – an annual payment made by the government to eligible members. The reduction from $1,042 to $521.43 might seem modest, but over a working life, that change alone could shave more than $70,000 off your KiwiSaver balance. This year’s budget has cut it further to $260.72.

    Then there’s the tax on employer contributions – the amount paid into KiwiSaver by employers. For someone earning $80,000 a year, that tax can reduce total contributions by around 1% of salary annually. Over 40 years, that means nearly $100,000 less at retirement.

    These aren’t just numbers on a spreadsheet. They’re the difference between retiring with options and retiring with anxiety. The $200,000 that past policy changes have stripped from the average KiwiSaver balance could have provided an extra $170 a week in retirement – enough to cover basics like food, power or transport.

    By eroding those balances now, we’re not saving money. We’re simply passing the bill to future governments and taxpayers who will have to pick up the slack.

    The worst time to weaken saving

    There’s never a good time to undermine a long-term savings scheme, but doing it during a cost-of-living crisis is especially reckless. People are already struggling to keep up with everyday expenses. Contributions to KiwiSaver – despite their long-term benefits – are one of the first things households cut when budgets are tight.

    If people start to believe KiwiSaver won’t be there for them – or that it’s not worth the effort – they’ll opt out or reduce contributions. And the scheme, already struggling with engagement, will lose even more ground.

    Which brings us to the current budget.

    The changes to the member tax credit will undermine the core purpose of KiwiSaver, reducing the amount people will retire with by another $35,000 for someone investing for 40 years in a growth fund.

    Income-testing the member tax credit, coming into effect on July 1 this year, is pitched as targeting support where it’s needed. But that assumes income is a good proxy for need. It isn’t. Plenty of people have high incomes now but low KiwiSaver balances due to career gaps, home purchases or starting late.

    If we want to better target support, base it on balances, not income. That would help those with low savings regardless of their current salary – and encourage rebuilding after big life expenses, such as buying a first home.

    Raising the minimum contribution rate from 3% to 4% of gross salary sounds promising. Nudging people into saving more is smart policy – in theory. Plus requiring higher employer contributions is a welcome benefit.

    But with households stretched thin, there’s a real risk people will just cease contributing at all. The danger is we end up with a headline policy that looks bold but delivers little – or worse, backfires.

    The bottom line

    The bigger issue? These are tweaks around the edges. They don’t address the fundamental problem: KiwiSaver is not set up to deliver retirement security at scale.

    Plenty of experts have put forward good ideas to improve it. But right now, the urgent priority isn’t invention – it’s protection. Every time we reduce incentives, chip away at contributions or confuse the message, we undermine the very idea that long-term saving is worth it.

    A retirement savings scheme only works if people trust it. That means policy stability. That means recognising KiwiSaver not as a cost, but as a commitment – a promise that if you put money aside during your working life, the system will have your back when you stop.

    KiwiSaver is at a crossroads. It can continue its slow drift into irrelevance –eroded by short-term thinking and piecemeal reform. Or it can be treated as the critical infrastructure it is: a tool for ensuring financial independence in retirement and relieving future pressure on the public purse.

    Budget decisions should honour KiwiSaver’s original promise. We owe future retirees – and future taxpayers – nothing less.

    Aaron Gilbert does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. KiwiSaver at a crossroads: budget another missed opportunity to fix NZ’s underperforming retirement scheme – https://theconversation.com/kiwisaver-at-a-crossroads-budget-another-missed-opportunity-to-fix-nzs-underperforming-retirement-scheme-257341

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Corroboree 2000, 25 years on: the march for Indigenous reconciliation has left a complicated legacy

    Source: The Conversation (Au and NZ) – By Heidi Norman, Professor of Aboriginal political history, Faculty of Arts, Design and Architecture, Convenor: Indigenous Land & Justice Research Group, UNSW Sydney

    First Nations people please be advised this article speaks of racially discriminating moments in history, including the distress and death of First Nations people.


    On a cold day 25 years ago, a bitter wind swept up from the south, pushing against an endless throng of people crossing one of Australia’s most famous landmarks.

    Some 250,000 people were walking across Sydney Harbour Bridge in support of Indigenous reconciliation. It was an event called Corroboree 2000.

    It took more than six hours for the mass of people to make their way from north to south, into the city. Across the nation, in small towns and in the capital cities, bridge walks symbolised overcoming a difficult past and coming together.

    But Australia’s relationship with First Nations people in the years since has been sometimes tumultuous, occasionally optimistic and often vexed. What legacy did the event leave?

    A ‘decade of reconciliation’?

    A “Decade of Reconciliation” started with the unanimous passage of the Council for Aboriginal Reconciliation Act through the federal parliament in 1991. “Reconciliation” was to be achieved between Indigenous and non-Indigenous Australians by the centenary of Federation in 2001.

    The act made a national commitment for the federal government to address both “Aboriginal disadvantage and aspirations”.

    It didn’t, however, specify what reconciliation was or what a reconciled nation would look like. The 2001 deadline would come and go without any way of knowing if it had been achieved.

    The amorphous nature of the concept likely contributed to the widespread political support for reconciliation. But whether it meant addressing Indigenous rights, or disadvantage, or both, was often decided down political party lines.

    Some First Nations activists were unequivocal in their criticism of reconciliation. It was widely perceived as a poor substitute for Bob Hawke’s 1984 promise of national land rights, and later, Treaty.

    The late Uncle Chicka Dixon renamed the movement “ReCONsillynation”. The “con” was the call to “walk together” as an alternative to Treaty and land rights.

    Instead, the Council for Aboriginal Reconciliation was established in 1991. Its approach to reconciliation was largely about building knowledge and understanding among non-Indigenous Australians about Australian Indigenous lives, experience and history. This was seen as essential to advancing justice.

    Changing hearts and minds

    For more than a decade, the council worked to achieve its vision, recruiting thousands of participants to the cause. It produced educational materials to guide learning about First Peoples histories and cultures. It also promoted reconciliation activities in the community.

    Community-led reconciliation activities proliferated quickly. Some of these continue today, helping establish a foundation for truth-telling.

    Huge historical events were unfolding alongside this work. In 1992, the Mabo decision in the High Court ruled Australia was not terra nullius (land belonging to nobody) when it was claimed by Britain in 1770. This led to native title laws, which have made it possible for some Aboriginal and Torres Strait Islander people to claim ownership of their traditional lands.

    In 1997, the Bringing Them Home report highlighted the trauma caused to generations of Aboriginal and Torres Strait children across Australia by removing them from their families. They are known as the Stolen Generations.

    The report recommended all Australian governments apologise to Indigenous people for their involvement in the policies and practices of forcible child removal.

    By 1999, all states and territory governments had apologised. The federal government had not.

    A contested history

    These seismic shifts in public conversation inevitably came to feature in federal politics.

    In the 1996 election, the two leaders – Labor Prime Minister Paul Keating and Liberal leader John Howard – outlined very different political visions based on opposing approaches to Australian history.

    While Keating was in office, he combined two causes – native title and the republic – hoping they would help generate a new story of the nation’s foundation.

    He sought to replace the positive, comforting and Anglo-centric view of Australian history. He highlighted the impact of colonisation on Aboriginal people and cast doubt on the morality of British occupation.

    Howard largely framed his history in opposition to Keating’s. Whereas Keating’s history dwelled on identifiable historical wrongs, Howard famously said Australians should “feel comfortable and relaxed about their history”.

    For Howard, there was much to be proud of in the story of the nation’s past. He accused the Labor party of peddling “the rhetoric of apology and shame”, or what came to be known as the “black armband” view of the past.

    Despite the recommendation of the Bringing Them Home report, Howard didn’t apologise to Indigenous people. He championed “practical outcomes” instead of “symbolism”, although ultimately failed to deliver either.

    A historic culmination

    With all these debates brewing throughout the 1990s, Australians used the new millennium to make their own large, symbolic gesture.

    Corroboree 2000 was held over two days in May. At the first event held on May 27, Indigenous and non-Indigenous leaders met at the Sydney Opera House. The Council for Aboriginal Reconciliation presented non-Indigenous leaders with two documents: the Australian Declaration Towards Reconciliation and the Roadmap for Reconciliation.

    All the leaders who took part left their handprints on a canvas to show their support.

    But in the intervening years, the shape of reconciliation and what Indigenous people could expect from it changed.

    Reflecting the Howard government’s emphasis on practical reconciliation, the council’s final report emphasised that “overcoming disadvantage is central to the reconciliation process”. The original brief for reconciliation to also address “Aboriginal aspirations” was forgotten.

    Howard gave a speech at the event and expressed “regret” for the past treatment of Aboriginal and Torres Strait Islander people, but he did not apologise. This left many in the crowd unhappy.

    The apology would eventually come in 2008 from Labor Prime Minister, Kevin Rudd.

    Where are we now?

    In his recent election victory speech, Prime Minister Anthony Albanese emphasised national unity. He again placed reconciliation at the forefront of the Australian government’s Indigenous affairs agenda, saying:

    we will be a government that supports reconciliation with First Nations people, because we will be a stronger nation when we close the gap between Indigenous and non-Indigenous Australians.

    It was a far cry from his 2022 victory speech when he promised the full implementation of the Uluru Statement from the Heart.

    In the aftermath of the Voice referendum, the Albanese government says it is focusing on First Nations economic independence and empowerment, along with continuing to “Close the Gap” in experiences of disadvantage.

    So 25 years on from the bridge walk, reconciliation remains a feature of the government’s response to First Peoples’ calls for recognition and justice.

    But reconciliation can be seen as a safe harbour to merely rebuild consensus, when more ambitious Indigenous affairs agendas stall or fail.

    Heidi Norman receives funding from the Australian Research Council.

    Anne Maree Payne has previously received research funding from Reconciliation Australia.

    ref. Corroboree 2000, 25 years on: the march for Indigenous reconciliation has left a complicated legacy – https://theconversation.com/corroboree-2000-25-years-on-the-march-for-indigenous-reconciliation-has-left-a-complicated-legacy-252805

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Why Donald Trump has put Asia on the precipice of a nuclear arms race

    Source: The Conversation (Au and NZ) – By Ian Langford, Executive Director, Security & Defence PLuS and Professor, UNSW Sydney

    For the past 75 years, America’s nuclear umbrella has been the keystone that has kept East Asia’s great‑power rivalries from turning atomic.

    President Donald Trump’s second‑term “strategic reset” now threatens to crack that arch.

    By pressuring allies to shoulder more of the defence burden, hinting that US forces might walk if the cheques do not clear and flirting with a return to nuclear testing, Washington is signalling that its once‑ironclad nuclear guarantee is, at best, negotiable.

    In Seoul, Tokyo and even Taipei, a once-unthinkable idea — building nuclear weapons — has begun to look disturbingly pragmatic.

    Nuclear umbrella starting to fray

    Extended deterrence is the promise the United States will use its own nuclear weapons, if necessary, to repel an attack on an ally.

    The logic is brutally simple: if North Korea contemplates a strike on South Korea, it must fear an American retaliatory strike, as well.

    The pledge allows allies to forgo their own bombs, curbing nuclear proliferation while reinforcing US influence.

    The idea dates to Dwight D. Eisenhower’s “New Look” military strategy, which relied on the threat of “massive retaliation” against the Soviet Union to defend Europe and Asia at a discount: fewer troops, more warheads.

    John F. Kennedy replaced that hair‑trigger doctrine with a “flexible response” defence strategy. This widened the spectrum of options to respond to potential Soviet attacks, but kept the nuclear backstop in place.

    By the 1990s, the umbrella seemed almost ornamental. Russia’s nuclear arsenal had rusted, China was keeping to a “minimal deterrent” strategy (maintaining a small stockpile of weapons), and US supremacy looked overwhelming.

    In 2020, then-President Barack Obama’s Nuclear Posture Review reaffirmed the umbrella guarantee, though Obama had voiced aspirations for the long‑term abolition of nuclear weapons.

    Barack Obama’s 2009 speech advocating nuclear disarmament in Prague.

    The Biden administration then embraced a new term – “integrated deterrence”, which fused cyber, space and economic tools with nuclear forces to deter potential foes.

    In recent years, however, North Korea’s sprint towards intercontinental ballistic missiles and the modernisation and expansion of China’s nuclear arsenal began testing the faith of US allies.

    Trump has now turbo‑charged those doubts. He has mused that his “strategic reset” ties protection to payment. If NATO’s Article 5 (which obliges members to come to each other’s defence) is “conditional” on US allies paying their fair share, why would Asia be different?

    Reports the White House has weighed a resumption of underground nuclear tests – and, under the Biden administration, even a more extensive arsenal – have rattled non‑proliferation diplomats.

    A Politico analysis bluntly warns that sustaining global “extended deterrence” in two parts of the world (Europe and Asia) may be beyond Trump’s patience — or pocketbook.

    A regional nuclear arms race

    Allies are taking note. Last month, an Institute for Strategic Studies survey found officials in Europe and Asia openly questioning whether an American president would risk San Francisco to save Seoul.

    In South Korea, public backing for a bomb now tops 70%.

    Japan’s ruling Liberal Democratic Party is, for the first time since 1945, considering a “nuclear sharing” arrangement with the US. Some former defence officials have even called for a debate on nuclear weapons themselves.

    Taiwan’s legislators — long muzzled on the subject — whisper about a “porcupine” deterrent based on asymmetrical warfare and a modest nuclear capability.

    If one domino tips, several could follow. A South Korean nuclear weapon program would almost certainly spur Japan to act. That, in turn, would harden China’s strategic outlook, inviting a regional arms race and shredding the fragile Nuclear Non‑Proliferation Treaty.

    The respected international relations journal Foreign Policy has already dubbed Trump’s approach “a nuclear Pandora’s box.”

    The danger is not just about more warheads, but also the shorter decision times to use them.

    Three or four nuclear actors crammed into the world’s busiest sea lanes — with hypersonic missiles and AI‑driven, early‑warning systems — create hair‑trigger instability. One misread radar blip over the East China Sea could end in catastrophe.

    What does this mean for Australia?

    Australia, too, has long relied on the US umbrella without demanding an explicit nuclear clause in the ANZUS treaty.

    The AUKUS submarine pact with the US and UK deepens technological knowledge sharing, but does not deliver an Australian bomb. Prime Minister Anthony Albanese insists the deal is about “deterrence, not offence,” yet the debate over funding nuclear-powered submarines exposes how tightly Australian strategy is lashed to American political will.

    A regional cascade of nuclear proliferation would confront Australia with agonising choices. Should it cling to the shrinking US umbrella, invest in a missile defence shield, or contemplate its own nuclear deterrent? Any such move towards its own weapon would collide with decades of proud non‑proliferation diplomacy and risk alienating Southeast Asian neighbours.

    More likely, Canberra will double down on alliance management — lobbying Washington to clarify its commitments, urging Seoul and Tokyo to stay the non‑nuclear course, and expanding regional defence exercises that make American resolve visible.

    In a neighbourhood bristling with new warheads, middle powers that remain non‑nuclear will need thicker conventional shields and sharper diplomatic tools.

    This means hardening Australia’s northern bases against a potential attack, accelerating its long‑range strike programs, and funding diplomatic initiatives that keep the Non-Proliferation Treaty alive.

    The Trump administration’s transactional posture risks broadcasting a deficit of will precisely when East Asian security hangs in the balance. If Washington allows confidence in extended deterrence to erode, history will not stand still; it will split the atom again, this time in Seoul, Tokyo or beyond.

    Australia has every incentive to prod its great power ally back toward strategic steadiness. The alternative is a region where the umbrellas proliferate — and, sooner or later, fail.

    Ian Langford is affiliated with the University of New South Wales.

    ref. Why Donald Trump has put Asia on the precipice of a nuclear arms race – https://theconversation.com/why-donald-trump-has-put-asia-on-the-precipice-of-a-nuclear-arms-race-256577

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Submissions: Australia – Gen Z cuts back on healthcare with cost of living pressure – CBA

    Source: Commonwealth Bank of Australia (CBA)

    Gen Z and younger millennials cut back on costs while young families and retirees spending more on health.

    Young Gen Z Australian adults aged between 18–24 years old increased spending on health services by 3.1 per cent over the last year, a rate below annual inflation for the Health Consumer Price Index of 4.1 per cent, representing a decline in spending in real terms amid cost of living pressures.

    Over the last year, 18 to 24-year-olds wound back spending on physiotherapy, chiropractors and osteopaths (down 5 per cent on the prior year), dental and optometry (down 4 per cent) which contributed to an overall decline in health spending in real terms.

    Older Gen Zs and younger millennials between 25-34 years increased their health spending by 6.4 per cent while millennials aged between 35-44 increased spending by 7.8 per cent over the last year. Gen X aged between 45-54 spent less than the older millennial group increasing spending by just 7.5 per cent. Older Australians drove spending higher with those aged between 65-74 increasing by 8.9 per cent over the same period and over 75s spending 12.6 per cent more than the previous year.

    The findings were released today in the inaugural CommBank Health Insights report which uncovers trends in healthcare spending. For the first time, the report uses CommBank iQ de-identified healthcare transactions from approximately 7 million Australians, providing a comprehensive overview of how consumer spending on healthcare has evolved over the past year with Australia’s largest transactional data set.

    Haseda Fazlic, Executive General Manager Commercial Banking, CBA said: “The CommBank Health Insights Report highlights the healthcare spending sacrifices that younger generations are making while showing the growing share of healthcare in household budgets for older generations in particular. Older Australians and young families are doing their best to prioritise their health, with significant increases in spending over the last year. At the same time, we can see that younger Australians are still investing in their health while aiming to minimise their spending in a challenging cost of living environment.

    “The findings over the last year come ahead of the Federal Government’s additional commitments to strengthening access to health services with additional Medicare funding.”

    Key findings include:

    General Practitioners benefiting from more frequent visits: Almost six in ten Australians visited a GP in the past year with an average of 5.4 visits per person. Overall, spending on GP visits increased by 12.7 per cent on the previous year with an average annual spend of $523 per person, reflecting increased demand and rising costs coupled with private billing.
    Pharmacies booming with ecommerce driving growth: Pharmacy grew at 9.9 per cent with an average spend of $710 per person. Online purchases were up by 28 per cent, compared to 9 per cent growth for in-store. While in-store remains more common, accounting for over 95 per cent of total sales in the last year, those buying online spent significantly more with each purchase. The average purchase size was $101 for an online basket, compared to $41 for in-store.
    Specialists and allied health see strong growth:Specialists saw growth of 9.1 per cent at $846 per person. Radiology increased by 8.2 per cent with $459 annual spend while physios, chiropractors and osteopaths grew by 7 per cent with an average spend of $429 per person.
    Health insurance moderating: While maintaining a large proportion of overall health spend with an average $3,088 per person, health insurance spend experienced more moderate growth than other categories at 6.5 per cent.
    Dental growing through repeat visitors: While only 1 in 3 Australians regularly visit the dentist, those that do are coming back more regularly at 2.4 times per year and paying $321 on average per visit, contributing to overall growth of 5.5 per cent on the previous year. Spending growth on dental is led by older generations, with over 75s lifting by 14 per cent. 18-24 year olds were the only group to trim their dental spend, down by 4 per cent.
    Vets only category to decline overall: Medical spending on furry friends increased by 2.2 per cent at an average of $873 per person, the only category to see a decline in real terms.  

    “It is encouraging to see Australians visiting their GPs and dentists more regularly and attending specialists and allied health appointments when needed. With an ageing population, it is becoming increasingly important that providers continue to meet the needs of older patients while ecommerce is offering greater opportunities to meet needs for pharmaceutical care for those in regional and remote communities in particular,” Ms Fazlic said.

    “Understanding demographic spending patterns can help those in the health industry adapt and make more informed decisions to better meet the needs of their customers.”

    About the research

    All data is sourced from CommBank iQ, that uses Australia’s largest transactional dataset to evaluate spending behaviours. This includes online and in-store transactions from approximately 7 million Australians.

    This analysis is based on CommBank iQ data covering spending in eight healthcare sectors from 01 April 2024 to 31 March 2025, including: general practice, dental services, medical specialists, radiology, pharmacies, Physio, Chiro and osteo, vets and pet services, and health insurance. All figures are spend per capita rather than total consumption.

    MIL OSI – Submitted News

  • MIL-Evening Report: Air New Zealand to resume Auckland-Nouméa flights from November

    By Patrick Decloitre, RNZ Pacific correspondent French Pacific desk

    Air New Zealand has announced it plans to resume its Auckland-Nouméa flights from November, almost one and a half years after deadly civil unrest broke out in the French Pacific territory.

    “Air New Zealand is resuming its Auckland-Nouméa service starting 1 November 2025. Initially, flights will operate once a week on a Saturday. This follows the New Zealand Government’s decision to update its safe travel advisory level for New Caledonia”, the company stated in its latest update yesterday.

    “The resumption of services reflects our commitment to reconnecting New Zealand and New Caledonia, ensuring that travel is safe and reliable for our customers. We will continue to monitor this route closely.

    “Passengers are encouraged to check the latest travel advisories and Air New Zealand’s official channels for updates on flight schedules”, said Air New Zealand general manager short haul Lucy Hall.

    In its updated advisory regarding New Caledonia, the New Zealand government still recommends “Exercise increased caution” (Level 2 of 4).

    It said this was “due to the ongoing risk of civil unrest”.

    In some specific areas (the Loyalty Islands, the Isle of Pines (Iles de Pins), and inland of the coastal strip between Mont Dore and Koné), it is still recommended to “avoid non-essential travel (Level 3 of 4).”

    Warning over ‘civil unrest’
    The advisory also recalls that “there was a prolonged period of civil unrest in New Caledonia in 2024. Political tensions and civil unrest may increase at short notice”.

    “Avoid all demonstrations, protests, and rallies as they have the potential to turn violent with little warning”.

    Air New Zealand ceased flights between Auckland and the French territory’s capital, Nouméa on 15 June 2024, at the height of violent civil unrest.

    Since then, it has maintained its no-show for the French Pacific territory, one of its closest neighbours.

    Air New Zealand’s general manager international Jeremy O’Brien said at the time this was due to “pockets of unrest” remaining in New Caledonia and “safety is priority”.

    New Caledonia’s international carrier Air Calédonie International (Aircalin) is also operating two weekly flights to Auckland from the Nouméa-La Tontouta international airport.

    The riots that broke out on 13 May 2024 resulted in 14 deaths and more than 2.2 billion euros (NZ$4.1 billion) in damages, bringing New Caledonia’s economy to its knees, with thousands of businesses and jobs destroyed.

    Tourism from its main regional source markets, namely Australia and New Zealand, also came to a standstill.

    Specifically regarding New Zealand, local statistics show that between the first quarters of 2024 and 2025, visitor numbers collapsed by 90 percent (from 1731 to 186).

    New Caledonia’s tourism stakeholders have welcomed the resumption of the service to and from New Zealand, saying this will allow the industry to relaunch targeted promotional campaigns in the New Zealand market.

    This article is republished under a community partnership agreement with RNZ.

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Global: What’s the difference between skim milk and light milk?

    Source: The Conversation – Global Perspectives – By Margaret Murray, Senior Lecturer, Nutrition, Swinburne University of Technology

    bodnar.photo/Shutterstock

    If you’re browsing the supermarket fridge for reduced-fat milk, it’s easy to be confused by the many different types.

    You can find options labelled skim, skimmed, skinny, no fat, extra light, lite, light, low fat, reduced fat, semi skim and HiLo (high calcium, low fat).

    So what’s the difference between two of these common milks – skim milk and light milk? How are they made? And which one’s healthier?

    What do they contain?

    Skim milk

    In Australia and New Zealand, skim milk is defined as milk that contains no more than 1.5% milk fat and has at least 3% protein. On the nutrition information panel this looks like less than 1.5 grams of fat and at least 3g protein per 100 millilitres of milk.

    But the fat content of skim milk can be as low as 0.1% or 0.1g per 100mL.

    Light milk

    Light milk is sometimes spelled “lite” but they’re essentially the same thing.

    While light milk is not specifically defined in Australia and New Zealand, the term “light” is defined for food generally. If we apply the rules to milk, we can say light milk must contain no more than 2.4% fat (2.4g fat per 100mL).

    In other words, light milk contains more fat than skim milk.

    You can find the fat content by reading the “total fat per 100mL” on the label’s nutrition information panel.

    How about other nutrients?

    The main nutritional difference between skim milk and light milk, apart from the fat content, is the energy content.

    Skim milk provides about 150 kilojoules of energy per 100mL whereas light milk provides about 220kJ per 100mL.

    Any milk sold as cow’s milk must contain at least 3% protein (3g protein per 100mL of milk). That includes skim or light milk. So there’s typically not much difference there.

    Likewise, the calcium content doesn’t differ much between skim milk and light milk. It is typically about 114 milligrams to 120mg per 100mL.

    You can check these and other details on the label’s nutrition information panel.

    How are they made?

    Skim milk and light milk are not made by watering down full-cream milk.

    Instead, full-cream milk is spun at high speeds in a device called a centrifuge. This causes the fat to separate and be removed, leaving behind milk containing less fat.

    Here’s how fat is removed to produce skim and light milk.

    Who should be drinking what?

    Australian Dietary Guidelines recommend we drink mostly reduced-fat milk – that is, milk containing no more than 2.4g fat per 100mL. Skim milk and light milk are both included in that category.

    The exception is for children under two years old, who are recommended full-cream milk to meet their growing needs.

    The reason our current guidelines recommend reduced-fat milk is that, since the 1970s, reduced-fat milk has been thought to help with reducing body weight and reducing the risk of heart disease. That’s because of its lower content of saturated fat and energy (kilojoules/calories) than full cream milk.

    However, more recent evidence has shown drinking full-cream milk is not associated with weight gain or health risks. In fact, eating or drinking dairy products of any type may help reduce the risk of obesity and other metabolic disorders (such as heart disease and type 2 diabetes), especially in children and adolescents.

    The science in this area continues to evolve. So the debate around whether there are health benefits to choosing reduced-fat milk over full cream milk is ongoing.

    Whether or not there any individual health benefits from choosing skim milk or light milk over full cream will vary depending on your current health status and broader dietary habits.

    For personalised health and dietary advice, speak to a health professional.

    Margaret Murray does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. What’s the difference between skim milk and light milk? – https://theconversation.com/whats-the-difference-between-skim-milk-and-light-milk-255608

    MIL OSI – Global Reports

  • MIL-OSI Global: Russia is labelling Oscar Jenkins a ‘mercenary’, not a prisoner of war. What’s the difference – and why does this matter?

    Source: The Conversation – Global Perspectives – By Shannon Bosch, Associate Professor (Law), Edith Cowan University

    Oscar Jenkins, a 33-year-old former teacher from Melbourne, was one of many foreigners who responded to Ukrainian President Volodymyr Zelensky’s call in 2022 for volunteers to join Ukraine’s armed forces to help repel Russia’s invasion.

    In early 2024, Jenkins joined Ukraine’s International Legion of Territorial Defence, which has attracted some 20,000 fighters from 50 countries since the war began. He had no previous military experience, but this wasn’t a requirement to join.

    In December, Jenkins was captured by Russian forces in Russian-occupied eastern Ukraine and accused of serving as a “mercenary” in Ukraine’s 66th Mechanised Brigade’s 402nd Rifle Battalion. He was tried in a Russian court and sentenced on May 16 to 13 years imprisonment in a maximum-security penal colony.

    When a foreigner volunteers to fight in a war, their legal status under international law can be complicated.

    Are they a soldier with the full authorisation of one of the warring parties to engage in hostilities? Or are they an illegal mercenary?

    And what happens if they are captured?

    Why legal status matters

    The answers to these questions have very real importance to the thousands of foreigners who have joined Ukraine’s International Legion since 2022.

    Russian authorities have classified all of Ukraine’s foreigner fighters as “mercenaries”. They’ve used this label to deny foreign fighters the status of “prisoner of war” (POW), with the requisite protections that come along with that under international humanitarian law.

    While foreigners are permitted under international law to enlist in the armed forces of a state for political or moral reasons, mercenaries have historically been outlawed due to their sole motivation being financial gain.

    International humanitarian law (the rules that govern war) define mercenaries as individuals who are not nationals or residents of a state engaged in war and are recruited to fight outside that state’s official armed forces.

    They are motivated solely by private gain (like money or promises of reward), often well in excess of what the traditional armed forces are paid. Mercenaries are essentially professional soldiers who sell their services to a state without any real ties to that country.

    Once a fighter is classified as a “mercenary”, they lose all the legal protections that are traditionally afforded lawful combatants.

    This includes prisoner of war status if they are captured and immunity from prosecution for fighting in a conflict. Prisoners of war are also entitled to humane treatment and access to food and medical care. And they cannot be subjected to sham trials or torture.

    According to my research, many of the foreign nationals who joined the International Legion were motivated by a desire to defend Ukraine against Russia’s aggression. They were sworn into Ukraine’s armed forces and paid the same as a Ukrainian soldier of equal rank.

    Once enlisted in the armed forces, they were immediately exempt from “mercenary” status, irrespective of their motivation for joining.

    As such, these foreign fighters should be entitled to the full range of protections guaranteed to members of Ukraine’s armed forces under the Geneva Conventions.

    Labelling lawful foreign members of the Ukrainian armed forces as “mercenaries”, and denying them their protections, is an abuse of international law.

    How can Australia protect its nationals?

    If an Australian enlists in Ukraine’s armed forces and is captured by Russian forces, there is a limited toolkit the Australian government can use to help him or her. However, it is not powerless.

    Through its embassy in Moscow, Australia can request access to detainees to assess their welfare while in prison. Russia can, however, decline this access. Details of a detainee’s capture may also be withheld.

    Australia can also apply diplomatic pressure to ensure humane treatment of prisoners and their full POW rights.

    This can be done by working with international bodies, such as the UN Working Group on Arbitrary Detention or organisations like the International Committee for the Red Cross (ICRC), which can request access to detainees.

    It appears the government is already doing some of these things. According to Foreign Minister Penny Wong, the government has been working with Ukraine and the ICRC to advocate for Jenkins’ welfare and release, and providing consular support to Jenkins’ family.

    Australia also has an obligation to warn its citizens they will likely face severe consequences if they travel to Ukraine to fight and are captured by Russian forces, given Russia’s misuse of the “mercenary” label.

    Through back-channel negotiations, Australia could also push Ukraine or its allies to include Australians being held by Russia in future prisoner swaps.

    In January of this year, Ukraine and Russia carried out such an exchange of 470 prisoners from both nations. And in talks last week in Turkey, both sides agreed to release another 1,000 prisoners on each side.

    Such exchanges have involved foreign fighters in the past. In 2022, 10 foreign citizens were included in a prisoner swap, including five Britons, two Americans, a Croatian, a Swede and a Moroccan. Several of them had been convicted of being mercenaries and sentenced to death after a Russian sham trial.

    There is no guarantee Jenkins would qualify for such an exchange, however, if Russia continues to classify him as a mercenary.

    Shannon Bosch does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Russia is labelling Oscar Jenkins a ‘mercenary’, not a prisoner of war. What’s the difference – and why does this matter? – https://theconversation.com/russia-is-labelling-oscar-jenkins-a-mercenary-not-a-prisoner-of-war-whats-the-difference-and-why-does-this-matter-256996

    MIL OSI – Global Reports

  • MIL-OSI Global: Semicolons are becoming increasingly rare; their disappearance should be resisted

    Source: The Conversation – Global Perspectives – By Roslyn Petelin, Honorary Associate Professor in Writing, The University of Queensland

    Tung Cheung/Shutterstock

    A recent study has found a 50% decline in the use of semicolons over the last two decades. The decline accelerates a longterm trend:

    In 1781, British literature featured a semicolon roughly every 90 words; by 2000, it had fallen to one every 205 words. Today, there’s just one semicolon for every 390 words.

    Further research reported that 67% of British students never or rarely use a semicolon; more than 50% did not know how to use it. Just 11% of respondents described themselves as frequent users.

    These findings may not be definitive. According to the Guardian, the Google Books Ngram Viewer database, which surveys novels and nonfiction, indicates that

    semicolon use in English rose by 388% between 1800 and 2006, before falling by 45% over the next 11 years. In 2017, however, it started a gradual recovery, with a 27% rise by 2022.

    Yet when you put the punctuation mark itself into the database, rather than the word “semicolon”, you get a quite different result – one that looks very much like a steady decline.

    Virulent detractors

    The semicolon first appeared in 1494, so it has been around for a long time. So have arguments about it.

    Its dectractors can be quite virulent. It is sometimes taken as a sign of affected elitism. Adrian Mole, the pretentious schoolboy protagonist of Sue Townsend’s popular novels, says snobbishly of Barry Kent, the skinhead bully at his school: “He wouldn’t know what a semicolon was if it fell into his beer.” Kurt Vonnegut (whose novels are not entirely free of semicolons) said semicolons represented “absolutely nothing” and using them just showed that you “went to college”.

    Kurt Vonnegut, antagonist of the semicolon.
    Bernard Gotfryd / Adam Cuerden, Public domain, via Wikimedia Commons

    Other writers have expressed pure animosity. American journalist James Kilpatrick denounced the semicolon “girly”, “odious”, and the “most pusillanimous, sissified utterly useless mark of punctuation ever invented”.

    The utility of this much maligned punctuation mark in contemporary prose has been called into question. British author Ben McIntyre has claimed Stephen King “wouldn’t be seen dead in a ditch with a semicolon”.

    He obviously hasn’t read page 32 of King’s wonderful book On Writing, where King uses semicolons in three sentences in a row.

    Impeccable balance

    Before I defend the semicolon, it is worth clarifying what it actually does. Its two uses are as follows:

    1) it separates independent clauses, but establishes a relation between them. It suggests that the statements are too closely connected to stand as separate sentences. For example: “Speech is silver; silence is golden.”

    2) it can be used to clarify a complicated list. For example: “Remember to check your grammar, especially agreement of subjects and verbs; your spelling, especially of tricky words such as ‘liaison’; and your punctuation, especially your use of the apostrophe.”

    Semicolons have long played a prominent role in classic literature. Journalist Amelia Hill notes that Virginia Woolf relies heavily on semicolons in her meditation on time, Mrs Dalloway. The novel includes more than 1000 of them, often used in unorthodox ways, to capture the flow of its protagonist’s thoughts.

    Virginia Woolf, semicolon enthusiast.
    Public Domain, via Wikimedia Commons

    Other supporters of the semicolon include Salman Rushdie, John Updike, Donna Tartt, Mark Twain, Charles Dickens and Jane Austen. Novelist Philip Hensher has celebrated the semicolon as “a cherished tool, elegant and rational.” In 1953, theatre critic Kenneth Tynan called it “the prize-winning supporting crutch of English prose”.

    In his essay Semicolons: A Love Story, Ben Dolnick refers to William James’s deft use of semicolons to pile on the clauses. He claims this is like saying to a reader, who is already holding one bag of groceries, “Here, I know it’s a lot, but can you take another?”

    “The image of the grocery bags,” observed Mary Norris, a highly respected copyeditor at the New Yorker, “reinforces the idea that semicolons are all about balance.” Harvard professor Louis Menand has praised as “impeccable” the balancing semicolon on a public service placard (allegedly amended by hand) that exhorted subway riders not to leave their newspapers behind on the train: “Please put it in a trash can; that’s good news for everyone.”

    The poet Lewis Thomas beautifully captures the elegance of a well-used semicolon in his essay Notes on Punctuation:

    The semicolon tells you there is still some question about the preceding full sentence; something needs to be added. It is almost always a greater pleasure to come across a semicolon than a full stop. The full stop tells you that is that; if you didn’t get all the meaning you wanted or expected, you got all the writer intended to parcel out and now you have to move along. But with a semicolon there you get a pleasant little feeling of expectancy; there is more to come; read on; it will get clearer.

    As Australian novelist David Malouf has argued, the semicolon still has a future, and an important function, in nuanced imaginative prose:

    I tend to write longer sentences and use the semicolon so as not to have to break the longer sentences into shorter ones that would suggest things are not connected that I want people to see as connected. Short sentences make for fast reading; often you want slow reading.

    We cannot do without the semicolon. The Apostrophe Protection Society is going along very strongly. I would be more than happy to join a Semicolon Supporting Society.

    Roslyn Petelin does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Semicolons are becoming increasingly rare; their disappearance should be resisted – https://theconversation.com/semicolons-are-becoming-increasingly-rare-their-disappearance-should-be-resisted-257019

    MIL OSI – Global Reports

  • MIL-OSI Global: Evidence shows AI systems are already too much like humans. Will that be a problem?

    Source: The Conversation – Global Perspectives – By Sandra Peter, Director of Sydney Executive Plus, University of Sydney

    Studiostoks / Shutterstock

    What if we could design a machine that could read your emotions and intentions, write thoughtful, empathetic, perfectly timed responses — and seemingly know exactly what you need to hear? A machine so seductive, you wouldn’t even realise it’s artificial. What if we already have?

    In a comprehensive meta-analysis, published in the Proceedings of the National Academy of Sciences, we show that the latest generation of large language model-powered chatbots match and exceed most humans in their ability to communicate. A growing body of research shows these systems now reliably pass the Turing test, fooling humans into thinking they are interacting with another human.

    None of us was expecting the arrival of super communicators. Science fiction taught us that artificial intelligence (AI) would be highly rational and all-knowing, but lack humanity.

    Yet here we are. Recent experiments have shown that models such as GPT-4 outperform humans in writing persuasively and also empathetically. Another study found that large language models (LLMs) excel at assessing nuanced sentiment in human-written messages.

    LLMs are also masters at roleplay, assuming a wide range of personas and mimicking nuanced linguistic character styles. This is amplified by their ability to infer human beliefs and intentions from text. Of course, LLMs do not possess true empathy or social understanding – but they are highly effective mimicking machines.

    We call these systems “anthropomorphic agents”. Traditionally, anthropomorphism refers to ascribing human traits to non-human entities. However, LLMs genuinely display highly human-like qualities, so calls to avoid anthropomorphising LLMs will fall flat.

    This is a landmark moment: when you cannot tell the difference between talking to a human or an AI chatbot online.

    On the internet, nobody knows you’re an AI

    What does this mean? On the one hand, LLMs promise to make complex information more widely accessible via chat interfaces, tailoring messages to individual comprehension levels. This has applications across many domains, such as legal services or public health. In education, the roleplay abilities can be used to create Socratic tutors that ask personalised questions and help students learn.

    At the same time, these systems are seductive. Millions of users already interact with AI companion apps daily. Much has been said about the negative effects of companion apps, but anthropomorphic seduction comes with far wider implications.

    Users are ready to trust AI chatbots so much that they disclose highly personal information. Pair this with the bots’ highly persuasive qualities, and genuine concerns emerge.

    Recent research by AI company Anthropic further shows that its Claude 3 chatbot was at its most persuasive when allowed to fabricate information and engage in deception. Given AI chatbots have no moral inhibitions, they are poised to be much better at deception than humans.

    This opens the door to manipulation at scale, to spread disinformation, or create highly effective sales tactics. What could be more effective than a trusted companion casually recommending a product in conversation? ChatGPT has already begun to provide product recommendations in response to user questions. It’s only a short step to subtly weaving product recommendations into conversations – without you ever asking.

    What can be done?

    It is easy to call for regulation, but harder to work out the details.

    The first step is to raise awareness of these abilities. Regulation should prescribe disclosure – users need to always know that they interact with an AI, like the EU AI Act mandates. But this will not be enough, given the AI systems’ seductive qualities.

    The second step must be to better understand anthropomorphic qualities. So far, LLM tests measure “intelligence” and knowledge recall, but none so far measures the degree of “human likeness”. With a test like this, AI companies could be required to disclose anthropomorphic abilities with a rating system, and legislators could determine acceptable risk levels for certain contexts and age groups.

    The cautionary tale of social media, which was largely unregulated until much harm had been done, suggests there is some urgency. If governments take a hands-off approach, AI is likely to amplify existing problems with spreading of mis- and disinformation, or the loneliness epidemic. In fact, Meta chief executive Mark Zuckerberg has already signalled that he would like to fill the void of real human contact with “AI friends”.

    Relying on AI companies to refrain from further humanising their systems seems ill-advised. All developments point in the opposite direction. OpenAI is working on making their systems more engaging and personable, with the ability to give your version of ChatGPT a specific “personality”. ChatGPT has generally become more chatty, often asking followup questions to keep the conversation going, and its voice mode adds even more seductive appeal.

    Much good can be done with anthropomorphic agents. Their persuasive abilities can be used for ill causes and for good ones, from fighting conspiracy theories to enticing users into donating and other prosocial behaviours.

    Yet we need a comprehensive agenda across the spectrum of design and development, deployment and use, and policy and regulation of conversational agents. When AI can inherently push our buttons, we shouldn’t let it change our systems.

    Jevin West receives funding from the National Science Foundation, the Knight Foundation, and others. The full list of funders and affiliated organizations can be found here: https://jevinwest.org/cv.html

    Kai Riemer and Sandra Peter do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Evidence shows AI systems are already too much like humans. Will that be a problem? – https://theconversation.com/evidence-shows-ai-systems-are-already-too-much-like-humans-will-that-be-a-problem-256980

    MIL OSI – Global Reports

  • MIL-OSI Global: Compression tights and tops: do they actually benefit you during (or after) exercise?

    Source: The Conversation – Global Perspectives – By Ben Singh, Research Fellow, Allied Health & Human Performance, University of South Australia

    Olena Yakobchuk/Shutterstock

    You’ve seen them in every gym: tight black leggings, neon sleeves and even knee-length socks.

    Compression gear is everywhere, worn by weekend joggers, elite athletes and influencers striking poses mid-squat.

    But do compression garments actually improve your performance, or is the benefit mostly in your head?

    Let’s dive into the history, the science and whether they are worth your money.

    From hospitals to hashtags

    Compression garments didn’t start in sport. They were originally used in medical settings to improve blood flow in patients recovering from surgery or with circulation issues such as varicose veins.

    Doctors found tight garments that applied gentle pressure to limbs could help move blood and reduce swelling.

    But in the late 1990s and early 2000s, athletes, scientists and sports brands began experimenting with compression wear in training and competition.

    Companies such as SKINS, 2XU, and Under Armour entered the scene with bold promises: improved performance, reduced fatigue and faster recovery.

    Then, by the 2010s, compression wear wasn’t just for athletes – it had become a fashion statement.

    Social media helped drive the trend: influencers wore these items in gym selfies, TikTokers praised the sleek, sculpted look. And with the rise of athleisure, compression garments became everyday apparel, blending fitness with fashion.

    What are these garments supposed to do?

    Compression gear is designed to fit tightly against the skin and apply gentle, consistent pressure to muscles. The big claims made by manufacturers include:

    You’ll hear gym-goers say they feel “more supported” or “less sore” after using compression gear.

    Some even report improved posture or a mental boost – like stepping into a superhero suit.

    What the science says

    Research into compression garments has been growing steadily and the results are mixed – but interesting.

    A 2013 major meta-analysis reported moderate benefits across several recovery markers, including lower levels of creatine kinase (a sign of muscle damage) and less delayed-onset muscle soreness up to 72 hours after exercise.

    A 2016 review found compression garments reduced muscle soreness and swelling and boosted muscle power and strength. These improvements were up to 1.5 times greater (compared to people who didn’t wear compression garments) in some cases.

    Building on this, a 2017 review found people who wore compression gear recovered strength more quickly, with noticeable improvements within eight to 24 hours after a workout. Strength recovery scores were around 60% higher in those wearing compression gear compared to those who didn’t.

    But the findings are not consistent. A 2022 review of 19 trials found little effect on strength during the first few days post-exercise.

    And when it comes to actual performance, a comprehensive 2025 review of 51 studies concluded compression garments do not enhance race time or endurance performance in runners. And while they may reduce soft tissue vibration (which might feel more comfortable), they offered no meaningful edge in speed, stamina or oxygen use.

    Overall, in simpler terms: compression gear may help you recover faster but don’t expect it to turn you into an Olympic sprinter.

    When compression gear might help (and when it won’t)

    Here are some situations when compression garments can be genuinely useful:

    But don’t count on them to:

    • improve your times: there’s no strong evidence they boost speed or endurance

    • make you stronger: while some research has noted improvements in strength and power, this won’t necessarily have a noticeable effect on your athletic performance

    • replace training or good sleep: recovery still depends on the basics – rest, hydration and nutrition.

    So, should you wear them?

    Compression outfits won’t magically transform your body or training results. But they aren’t a waste of money either.

    If they make you feel more comfortable, confident or supported, that’s a valid reason to wear them. The psychological boost alone can be enough to enhance motivation or focus.

    And when it comes to post-exercise recovery, the evidence is solid enough to justify keeping a pair in your gym bag.

    Think of them like a good pair of shoes. They won’t run the race for you, but they might make the journey a little smoother.

    And if you’re just wearing them for the outfit photo on Instagram? That’s fine, too. Sometimes, confidence is the best workout gear of all.

    Ben Singh does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Compression tights and tops: do they actually benefit you during (or after) exercise? – https://theconversation.com/compression-tights-and-tops-do-they-actually-benefit-you-during-or-after-exercise-255719

    MIL OSI – Global Reports

  • MIL-OSI Australia: Stolen motor vehicle pursuit – Palmerston

    Source: Northern Territory Police and Fire Services

    Strike Force Trident have arrested four youths in relation to a stolen motor vehicle and pursuit in Palmerston yesterday afternoon.

    Around 2:30pm, the Joint Emergency Services Communication Centre received reports of a Toyota Hilux driving dangerously through Berrimah along the Stuart Highway. Checks of the vehicle’s registration identified that it had been stolen from an address in Darwin City.

    A short time later, Trident members sighted the vehicle stationary on Bailey Circuit, Driver, with one male youth exiting before it drove away. The 16-year-old male attempted to flee on foot but was arrested at the scene.

    A pursuit of the vehicle was initiated; however, it was terminated shortly after when it ran through a red light.

    A search was commenced involving Strike Force Trident, Dog Operations Unit, General Duties and CCTV operators resulting in the vehicle being sighted on Osgood Drive, Eaton, where the group abandoned it and fled the scene on foot. After a short foot pursuit, three youths were apprehended.

    A 15-year-old male was charged with multiple offences including, Damage property, Drive whilst unlicensed, Driving, riding, Using motor vehicle without consent, Drive motor vehicle speed dangerous, and Dangerous driving during a pursuit. He was remanded to appear in court on 23 May 2025.

    Three youths aged 15, 16 and 17 will be dealt with under the Youth Justice Act 2005.

    Police continue to urge those who witness a crime or anti-social behaviour to make contact on 131 444. Anonymous reports can also be made through Crime Stoppers on 1800 333 000 or via https://crimestoppersnt.com.au/.

    MIL OSI News

  • MIL-OSI Australia: Charges – Assault with intent to steal – Casuarina

    Source: Northern Territory Police and Fire Services

    Three males, aged 13, 15 and 20-years-old, have been arrested after assaulting workers in a carpark of a shopping centre in Casuarina.

    About 8:25pm last night, police received reports of four cleaners being assaulted by three males in separate incidents. It is alleged the first three cleaners were physically assaulted and the fourth cleaner was threatened with a hammer while the group demanded money and jewellery. No injuries were reported.

    Casuarina General Duties and the Dog Operations Unit deployed and arrested the three males nearby.

    The 13-year-old male will be dealt with under the provisions of the Youth Justice Act.

    The 15-year-old male was charged with Assault with Intent to Steal and is awaiting bail review.

    The 20-year-old male was charged with Assault with Intent to Steal and was remanded to appear in the Darwin Local Court later today.

    Casuarina General Duties Officers have carriage of the investigation.

    Anyone who witnesses or experiences crime or anti-social behaviour is urged to contact police on 131 444. In an emergency dial Triple Zero.

    MIL OSI News

  • MIL-OSI Australia: Truck driver charged over crash at Blackwood

    Source: New South Wales – News

    A truck driver was arrested after a crash that seriously injured a motorcyclist at Blackwood yesterday afternoon.

    Just after 3.30pm on Thursday 22 May, police were called to Shepherds Hill Road, Blackwood after reports of a collision between a truck and motorcycle.

    The rider, a 46-year-old man from Blackwood, sustained serious injuries in the crash and was rushed to hospital. He remains in a critical condition.

    The truck driver, a 38-year-old man from Holden Hill, was not injured.

    Major Crash Investigators attended the scene to determine the circumstances surrounding the crash.

    Last night, the truck driver was arrested and charged with cause serious harm by dangerous driving.  He was issued with an immediate loss of licence until further order and bailed to appear in the Christies Beach Magistrates Court on 31 July.

    Anyone who witnessed the crash and hasn’t yet spoken to police or has dashcam or CCTV footage that captured the collision or either the truck or motorcycle in the vicinity of Shepherds Hill Road yesterday is asked to contact Crime Stoppers at www.crimestopperssa.com.au or on 1800 333 000. You can remain anonymous.

    MIL OSI News