Category: Business

  • MIL-OSI NGOs: EU/China: Joint NGO letter ahead of EU-China Summit

    Source: Amnesty International –

    Dear President Costa,

    Dear President von der Leyen,

    We write to urge you to prioritize human rights in the forthcoming European Union (EU)-China Summit to be held in China on July 24-25. At the recent G7 meeting, European Commission President Ursula von der Leyen spoke of a “new China shock,” and urged that G7 members respond with greater cooperation, resilience and alternative approaches. We believe similar ambition should apply to the approach of the EU and its member states regarding the deepening human rights crisis in China, and that new initiatives be publicly articulated at the forthcoming Summit to build on and go beyond existing commitments set out in the March 2019 EU-China Strategic Outlook.

    We appreciate the EU’s longtime support to independent civil society and human rights defenders across China, and welcome public remarks, such as strong statements at the United Nations (UN) Human Rights Council, identifying particular cases of concern. We thank the EU for condemning the arbitrary detention of human rights legal activists Xu Yan and Yu Wensheng, who were detained en route to meeting with EU officials. In September 2022, then-High Representative and Vice President Josep Borrell helpfully echoed the UN Office of the High Commissioner for Human Rights’ (OHCHR) concern that Chinese government policies in the Uyghur region “may constitute international crimes, in particular crimes against humanity.” We acknowledge the recent – the fortieth – round of the EU-China human rights dialogue.

    Yet these EU and member states’ initiatives have not deterred Chinese authorities’ wholesale assault on human rights since President Xi Jinping assumed power in 2012. He and other officials are confident in their impunity for widespread arbitrary detention, forced assimilation, forced labour and torture in China; and transnational repression, including in Europe. Chinese authorities not only refuse to comply with the vast majority of their international human rights obligations, they also seek to rewrite global human rights norms and weaken key international institutions.

    We urge the EU and its member states to confront this human rights crisis—which increasingly affects not only people across China but also people worldwide—with the same determination to identify and commit to alternative approaches as it is now setting out on security and trade issues.

    In that spirit, our organizations urge you to use the Summit to ensure justice for victims and survivors of Beijing’s violations and abuses by publicly:

    1. Condemning the Chinese government’s crimes against humanity, and the impunity that sustains them, echoing the findings and recommendations of UN bodies, including the August 2022 OHCHR report on Xinjiang, the 2023 reviews of China by the Committee for the Elimination of All Forms of Discrimination Against Women (CEDAW) and the Committee on Economic, Social and Cultural Rights, the 2024 Universal Periodic Review (UPR), and UN Special Procedures. The EU should reiterate that crimes against humanity are subject to universal jurisdiction, and that those responsible can and should be held criminally responsible and face justice, including in EU member states. The 18 June 2025 announcement by Argentina’s highest criminal court to hear a case brought by Uyghurs alleging Chinese authorities have committed genocide and crimes against humanity should lend confidence and momentum to similar initiatives across EU member states, and to a push for accountability through UN mechanisms. Doing so is consistent with High Representative Kaja Kallas’ March 2025 remarks broadly supporting international law and the need for perpetrators to be “brought to justice.”
    2. Calling for the immediate and unconditional releases of human rights defenders who have been detained for their work, naming individuals explicitly, including EU citizen Gui Minhai, Sakharov Prize laureate Ilham Tohti and others identified in the most recent EU statement at the UN Human Rights Council: Gulshan Abbas, Anya Sengdra, Ekpar Asat, Chadrel Rinpoche, Rahile Dawut, Ding Jiaxi, Ding Yuande, Dong Yuyu, Drugdra, Gao Zhen, Gao Zhisheng, Go Sherab Gyatso, Golog Palden, He Fangmei, Huang Qi, Huang Xueqin, Hushtar Isa, Yalkun Isa, Ji Xiaolong, Li Yanhe, Lobsang Gephel, Lobsang, Khedrub, Lu Siwei, Peng Lifa, Qin Yongmin, Ruan Xiaohuan, Semkyi Dolma, Tashi Dorje, Tashpolat Tiyip, Wang Bingzhang, Pastor Wang Yi, Kamile Wayit, Xie Yang, Xu Na, Xu Zhiyong, Yang Hengjun, Yang Maodong, Yu Wensheng, Pastor Zhang Chunlei and Zhang Zhan.
    3. Emphasizing the commitments made at the G7 to ending transnational repression (TNR), including abuses undertaken by the Chinese government, both across EU member states and elsewhere. Those commitments can be demonstrated through investigations and prosecutions, while also supporting and protecting individuals and communities who may be or have already been targeted by TNR. These human rights abuses include intimidation, surveillance, threats or acts of physical violence, threats against family members and digital repression, in particular sexual harassment or degrading language targeting women.
    4. Reiterating that the EU and its member states are ready to use all tools at their disposal to hold Chinese government officials accountable for human rights violations, including the right to freedom of religion or belief, such as in the context of the selection of the next Dalai Lama.
    5. Stressing that the EU expects the Chinese government to comply with its freely-undertaken human rights obligations under international law, and calling for the urgent repeal of laws and criminal provisions incompatible with those obligations, including but not limited to the Hong Kong National Security Law, the Hong Kong Safeguarding National Security Ordinance, “picking quarrels and provoking trouble,” “subversion” and “inciting subversion of state power,” and the criminal procedure of “residential surveillance at a designated location,” in line with recommendations by UN human rights bodies.

    After 50 years of EU-China relations, the EU should take stock of deepening Chinese government repression inside and outside the country, and express solidarity with people across China who seek to exercise, uphold and defend human rights. The EU’s recent decision to cancel an economic and trade dialogue with the Chinese government over serious differences suggests a willingness to pressure Beijing in new and different ways. Grave and worsening human rights violations by Chinese authorities should motivate new strategies. Without those, people across China—and in Europe—are increasingly at risk.

    Amnesty International

    Asian Forum for Human Rights and Development (FORUM-ASIA) Chinese Human Rights Defenders

    Christian Solidarity Worldwide

    CIVICUS: World Alliance for Citizen Participation Front Line Defenders

    Hong Kong Watch Human Rights in China Human Rights Watch

    Human Rights Without Frontiers International Campaign for Tibet

    International Federation for Human Rights (FIDH), in the framework of the Observatory for the Protection of Human Rights Defenders

    International Partnership for Human Rights (IPHR) International Service for Human Rights

    The Rights Practice

    World Organisation Against Torture (OMCT), in the framework of the Observatory for the Protection of Human Rights Defenders

    World Uyghur Congress

    MIL OSI NGO

  • MIL-OSI Africa: Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) ministerial committee endorses membership of Sahel countries as non-Economic Community of West African States (ECOWAS) members

    Source: APO

    The 2nd Extraordinary Meeting of the GIABA Ministerial Committee (GMC) concluded in Accra, Ghana on the 19th of July, 2025, with a decision to allow the three Sahel countries that have withdrawn from the Economic Community of West African States (ECOWAS) to join the Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) as Non-ECOWAS Members.

    The Ministers present at the high-level meeting unanimously considered the importance of dealing with insecurity in the region in a collaborative manner. The decision will be transmitted to the ECOWAS Council of Ministers and the Authority of Heads of State and Government for consideration.

    During the session,Nigeria’s Minister of Justice handed over the chairmanship of the GMC to the Minister of Finance of Sierra Leone, who assumes the role as the new Chair of the Committee.

    The meeting was officially declared open by the Vice President of the Republic of Ghana, Professor Jane Naana Opoku-Agyemang.

    Distributed by APO Group on behalf of Economic Community of West African States (ECOWAS).

    Media files

    .

    MIL OSI Africa

  • MIL-OSI USA: HHS, FDA Praise Consumer Brands Association’s Vow to Remove Artificial Colors from America’s Food Supply

    Source: US Department of Health and Human Services – 3

    For Immediate Release:
    July 22, 2025

    WASHINGTON – Today the leadership of the U.S. Department of Health and Human Services (HHS) praised the Consumer Brands Association for its pledge on behalf of the makers of the nation’s food and beverage products to remove certified Food, Drug & Cosmetic (FD&C) petroleum-based colors from America’s food supply. With support from the Trump Administration, this pledge urges member companies to stop manufacturing with FD&C colors by December 31, 2027.
    President Trump, Health and Human Services Secretary Robert F. Kennedy, Jr. and U.S. Food and Drug Administration Commissioner Dr. Marty Makary have made the removal of artificial colors a priority. This pledge is another example of the Trump Administration and industry working together to bring results quickly to the American people.
    “America is entering a new era of nutrition,” said Secretary Kennedy. “In just a few months, the nation’s leading food and beverage producers have taken bold steps to clean up products loved by children and families. Replacing synthetic food dyes with natural colors marks another major victory in our mission to Make America Healthy Again.”
    “Promises made, promises kept,” said FDA Commissioner Makary. “We’ve worked hard with industry over the past three months to meet our goal to phase out all petroleum-based dyes from the nation’s food supply. During this time, the FDA also approved four new natural color additives. Today is a win for America’s kids.”
    Consumer Brands Association recently announced a voluntary commitment to remove FD&C colors from foods served in schools nationwide by the start of the 2026-2027 school year. Through today’s voluntary commitment they are agreeing to eliminate the use of FD&C Blue No. 1, Blue No. 2, Green No. 3, Red No. 40, Yellow No. 5, and Yellow No. 6 from their product portfolios.

    Consumer:888-INFO-FDA

    ###

    Boilerplate

    The FDA, an agency within the U.S. Department of Health and Human Services, protects the public health by assuring the safety, effectiveness, and security of human and veterinary drugs, vaccines and other biological products for human use, and medical devices. The agency also is responsible for the safety and security of our nation’s food supply, cosmetics, dietary supplements, radiation-emitting electronic products, and for regulating tobacco products.

    Content current as of:
    07/22/2025

    Follow FDA

    MIL OSI USA News

  • MIL-OSI Economics: Introducing Surface Laptop 5G: Seamless connectivity, built for business

    Source: Microsoft

    Headline: Introducing Surface Laptop 5G: Seamless connectivity, built for business

    We’re excited to announce the expansion of our Surface Copilot+ PC portfolio for business customers. The new Surface Laptop 5G, 13.8-inch powered by Intel Core Ultra (Series 2) processors, will begin shipping Aug. 26, and the new Surface Laptop, 13-inch and Surface Pro, 12-inch are available starting today.[1]

    AI is every organization’s competitive edge—but only when it’s accessible the moment it’s needed. Surface Laptop 5G delivers that advantage with a 40+ trillion operations per second (TOPS) Neural Processing Unit (NPU) that powers fast, on-device intelligence, making everyday workflows more intuitive and efficient. Whether it’s staying focused in meetings, finding and acting on information faster, or reducing routine tasks, AI accelerates what matters most. With an integrated 5G modem, users stay continuously connected to Microsoft 365 Copilot[2] and other cloud tools, enabling deeper insights and real-time collaboration.

    Adding 5G to Surface Laptop has been one of the most requested features from our business customers. But the ask was never just about adding a modem—it reflected a deeper need to eliminate friction, with the ability to connect instantly, securely and reliably without worrying about signal strength or searching for a hotspot.

    Meeting that need was the driving force behind the design of Surface Laptop 5G. We set out to build the best 5G-connected laptop—one where connectivity fades into the background. Whether you’re a consultant joining a Teams call on a train, a field engineer uploading site data from the field or a sales leader finishing a proposal in a hotel lobby, Surface Laptop 5G keeps business moving wherever work happens.

    Surface Laptop 5G represents Microsoft’s end-to-end innovation in action. Hardware, software and cloud services come together to deliver intelligent, secure and connected experiences for today’s mobile workforce. The Surface for Business portfolio offers a complete solution for every user scenario, from tablet-first flexibility to high-performance laptops, all supported by Microsoft’s modern management and industry-leading security.

    Engineered for seamless 5G performance

    Adding 5G to Surface Laptop required more than just dropping in a modem. Every layer of Surface Laptop 5G was reengineered to deliver a seamless, reliable and secure experience, while preserving the design, performance and portability our customers expect.

    Dynamic antenna system

    At the heart of Surface Laptop 5G is a dynamic antenna system that continuously adapts to its environment. With six strategically placed antennas, the device automatically adjusts signal paths and power based on how it’s being held or used, ensuring strong, reliable connectivity exactly when and where it’s needed.[4] As users move between environments, the device seamlessly transitions between 5G and Wi-Fi networks, keeping a steady and secure connection to cloud-based apps, updates, and corporate resources. This innovative antenna design also enables Surface Laptop 5G to act as a mobile hotspot, securely sharing its 5G connection with other devices when Wi-Fi isn’t available.[3]

    Thoughtfully designed hardware

    Many laptops place antennas near the base, where signals are more likely to be blocked by objects or the user’s legs. Surface Laptop 5G was designed differently, with antennas strategically positioned higher on the device to reduce interference and maintain a strong, reliable and consistent connection.

    This design required a new material, one that allows radio signals to pass through without impacting performance, while still delivering the durability, premium feel and lightness our customers are looking for. We developed a custom multi-layered laminate that meets all of these needs, enabling reliable 5G performance without compromising portability or design.

    Surface Laptop 5G also includes both NanoSIM and eSIM options, integrated to preserve its slim profile while enabling global connectivity.[4] Weighing under 3 pounds, it is light and easy to carry across campuses, through airports or from meeting to meeting.

    Tested for the real world

    In Surface we don’t just simulate real-world use, we build for it. Surface Laptop 5G was tested in homes, apartments and active office environments replicating everyday scenarios. Moving between rooms, switching networks, multitasking and working from laps helped us fine-tune antenna placement, thermal performance and connectivity behavior to reflect how people actually work.

    To ensure global performance, the 5G hardware was field-tested with over 100 mobile operators across more than 50 countries. The result is reliable 5G connectivity that travels with your workforce around the world.[5]

    Secure and connected for smarter management

    With support for 5G built-in, Surface Laptop devices stay continuously connected, enabling IT to deliver security updates, enforce policies and access real-time insights, from almost anywhere. This integration is possible because Surface is engineered in partnership with Windows and Intune, combining hardware, software and cloud-based management into a unified Microsoft solution.

    IT can remotely deploy and manage eSIM profiles, allowing cellular connectivity to be preconfigured and pushed to enrolled Surface devices.6 Paired with Windows Autopilot, it enables a true zero-touch deployment experience where devices arrive fully configured, secured and ready to use.

    The Surface Management Portal within the Intune Admin Center provides centralized visibility into device health, compliance and usage across the Surface fleet. Now with Security Copilot integrated, IT can act faster with AI-powered tools to detect issues, assess risk and respond with greater confidence.

    For an extra layer of protection, the PanzerGlass Privacy Screen Protector helps safeguard on-screen information and can reduce the risk of visual data exposure when working in public spaces.[6]

    Surface is where Microsoft’s hardware, software and cloud come together to deliver an experience that’s easy to manage, safe to deploy and ready for AI from day one.

    A connected future, built for business

    Surface offers powerful protection that safeguards your data and privacy while enabling your employees to achieve more.

    Surface Laptop 5G joins a growing portfolio of Copilot+ PCs designed to meet the evolving needs of today’s workforce. With the Surface Pro for Business, 12-inch and Surface Laptop for Business, 13-inch now shipping, and Surface Laptop 5G arriving on Aug. 26, organizations have more choice than ever to modernize their device fleets with powerful, secure and AI-ready tools.

    When paired with Verizon’s secure, reliable 5G network, Surface devices unlock even greater productivity. The combination of Surface Copilot+ PCs, Microsoft 365 Copilot and high-speed mobile connectivity enables a seamless experience that helps businesses work easier and efficiently, in the office or out in the field. In the U.S., Surface for Business devices are available through a broad network of partners, including Verizon Business, with selected Verizon stores rolling out in the coming months.

    With support ending for Windows 10 PCs on Oct. 14, 2025, now is the time to begin the transition to a modern Windows experience—one that’s optimized for AI, secured by design and built for mobility.

    To learn more about the new Surface Laptop 5G, Surface Pro, 12-inch and Surface Laptop, 13-inch visit Surface.com/Business to find an authorized reseller, or visit the Microsoft Store. When you shop at Microsoft.com, you’ll get free shipping and an extended 60-day price protection and return window. For a deeper technical dive, see the Surface IT Pro Blog.

    [1] 5G will be available later in 2025 and only on specific SKUs of Surface Laptop for Business 13.8-inch | Intel, but not in all areas; compatibility and performance depends on carrier network, plan and other factors. See carrier for details and pricing.

    [2] Per user license sold separately; also requires eligible Microsoft 365 plan.

    [3] Mobile hotspot support may vary by country and/or carrier; additional fees may apply.

    [4] eSIM support and availability may vary by carrier and country.

    [5] Service availability and performance subject to service provider’s network. Contact your service provider for details, compatibility, pricing, SIM card and activation. See all specs and frequencies at surface.com. Availability of data plans for eSIM varies by market and by carrier.

    [6] Sold separately.

    MIL OSI Economics

  • MIL-OSI USA: Sens. Hagerty, Tim Scott, Lummis, Moreno Release Market Structure Discussion Draft, Issue Request for Information From Stakeholders

    US Senate News:

    Source: United States Senator for Tennessee Bill Hagerty
    The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support
    WASHINGTON—Today,United States Senator Bill Hagerty (R-TN), a member of the Senate Banking Committee, joined Senators Tim Scott (R-SC), Chairman of the Senate Banking Committee, Cythia Lummis (R-WY), Chairwoman of the Senate Banking Subcommittee on Digital Assets, and Bernie Moreno (R-OH), in releasing an initial discussion draft of digital asset market structure legislation covering issues under the Banking Committee’s jurisdiction. The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support. Along with the discussion draft, the Senators are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions.
    “For too long, outdated laws and regulatory uncertainty around digital asset market structure have hindered American innovation and left consumers without adequate protections,” said Senator Hagerty. “This discussion draft demonstrates a strong commitment to unlocking the full potential of the digital asset economy by delivering responsible legislation that reflects input from stakeholders, fosters innovation, establishes consistent guardrails, and ensures the United States remains a global leader in digital assets.”
    “My colleagues and I in the House and Senate share the same goal: to provide clear rules of the road for digital assets that protect investors, foster innovation, and keep the future of digital finance anchored in America,” said Chairman Scott. “I’m grateful for the hard work of our House counterparts to craft smart, bipartisan legislation, and I look forward to building on their work here in the Senate. Working with President Trump, we can deliver a comprehensive, bipartisan regulatory framework for digital assets.”
    “The time for regulatory uncertainty in the digital asset space has come to an end,” said Senator Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”
    “The GENIUS Act was a critical stride toward ensuring the United States is a leader in Digital Assets,” said Senator Moreno. “This draft represents the next step in putting a bipartisan regulatory framework on President Trump’s desk and I look forward to continuing our important work to encourage innovation, protect consumers, and strengthen national security and US dollar dominance.”
    The discussion draft takes important steps to:
    Define Ancillary Assets – The discussion draft clearly defines an “ancillary asset” to clarify which digital assets are not securities.
    Create Disclosure Requirements – The discussion draft creates disclosure requirements that are tailored for offers, sales, or distributions of ancillary assets.
    Promulgate New Rules – The discussion draft requires the Securities and Exchange Commission (SEC) to promulgate new rules:
    Regulation DA: To exempt certain offers or sales of ancillary assets from SEC registration, including offers of sales that do not exceed $75 million in gross proceeds per year over four years.
    Investment Contracts: To more clearly define what constitutes an investment contract.

    Modernize Securities Regulations – The discussion draft directs the SEC to tailor existing requirements to digital asset activity, so that regulations are no longer outdated, unnecessary, or unduly burdensome in light of the unique technological characteristics of digital assets.
    Prevent Illicit Finance – The discussion draft requires the creation of examination standards for digital assets and encourages private sector entities to partner with federal law enforcement, to detect and deter illicit finance.
    Promote Responsible Banking Innovation – The discussion draft ensures financial holding companies can use a digital asset or distributed ledger system to perform, provide, or deliver any activity, function, product, or service that banks are otherwise authorized by law to perform, provide, or deliver.
    Full text of the discussion draft can be found here.
    In addition to the discussion draft, the Senators are calling on stakeholders to submit their feedback on a wide range of questions around: 
    Regulatory Clarity and Tailoring
    Investor Protection
    Trading Venues and Market Infrastructure
    Custody
    Illicit Finance
    Banking
    Innovation
    Preemption
    To participate in the Request for Information (RFI), please submit your feedback to MarketStructure_RFI@banking.senate.gov.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich Announces Committee Passage of Over $205 Million for New Mexico’s Military Installations and Significant Wins for Veterans

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Investments Heinrich championed include childcare assistance, improved telehealth & rural health services, & expanded homelessness prevention programs

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.) announced the bipartisan Senate Appropriations Committee passage of the Fiscal Year 2026 (FY26) Military Construction, Veterans Affairs, and Related Agencies Appropriations Bill. With Committee passage of this bill, Heinrich secured support for over $205 million for New Mexico’s military installations and significant wins for New Mexico’s veterans, including over $32 million in Congressionally Directed Spending for five local projects.

    “For our nation’s veterans and military families, this bill keeps our promise: that when they come home, they will receive the recognition, education, housing, and health care that they have earned through their service. It also strengthens New Mexico’s role as a leader in national security and bolsters our local economies,” said Heinrich, a member of the Senate Appropriations Committee. “This bill will also ensure that our service members are best equipped with state-of-the-art technology and resources to defend freedom at home and abroad. As a member of the Senate Appropriations Committee, I am committed to doing everything I can to support the heroic Americans who sacrifice so much to keep us safe.”

    Heinrich is a member of the Senate Appropriations Committee and the former Chair of the Appropriations Subcommittee on Military Construction, Veterans Affairs, and Related Agencies.

    New Mexico Military Construction

    Heinrich secured Committee support of investments in seven New Mexico projects.

    Heinrich successfully included funds for the following projects:

    • $90,000,000 for the construction of a 192-bed dormitory for airmen at Cannon Air Force Base.
    • $83,000,000 for the construction of a new Space Rapid Capabilities Office Headquarters on Kirtland Air Force Base.
    • $18,250,000 to construct a new Explosive Operations Building at Kirtland Air Force Base, which is essential for the safe and efficient handling, inspection, and storage of munitions in alignment with Air Force operational requirements.
    • $3,200,000 to construct a Child Development Center (CDC) on Kirtland Air Force Base that supports the growing childcare needs of Kirtland Air Force Base personnel.

    Heinrich also secured language addressing the ongoing energy infrastructure needs at White Sands Missile Range, ensuring troop readiness and training is prioritized.

    Heinrich and U.S. Senator Ben Ray Luján (D-N.M.) also successfully included funding for the following projects:

    • $8,100,000 to renovate and construct a training facility for Security Forces at Cannon Air Force Base. This will help support the continued growth of this Security Force unit.
    • $2,000,000 to restore and improve antiterrorism technology at the Wyoming Gateat Kirtland Air Force Base.
    • $700,000 to finish the design of a new High Speed Test Track at Holloman Air Force Base.

    Support for Veterans

    Heinrich secured Committee support for key veteran programs.

    Suicide Prevention

    Heinrich successfully secured $18,866,195,000 for mental health treatment, including $697,760,000 for suicide prevention outreach. Heinrich also secured language encouraging the VA to use predictive modeling and analytics for veteran suicide prevention in the Recovery Engagement and Coordination for Health-Veterans Enhanced Treatment (REACH VET) program. This innovative solution would identify veterans with evidence-based risk factors for suicidal ideation in order to get help to veterans before a potential mental health crisis.

    In 2020, Heinrich voted in favor of the Commander John Scott Hannon Veterans Mental Health Care Improvement Act of 2019 (P.L. 116-171), which supported and authorized the REACH VET program.

    Rural Health

    Heinrich successfully secured $342,455,000 for the VA’s Office of Rural Health and its Rural Health Initiative to continue supporting veterans with services like transportation to appointments for highly rural veterans, utilization of innovative transportation service technologies, and outreach to highly rural veterans.

    An estimated 2.7 million rural and highly rural veterans are enrolled in the Veterans Health Administration (VHA). Many rural veterans enrolled in the VA health care system are at an advanced age, with approximately 54 percent aged 65 or older. With the aging veteran population growing increasingly medically complex and more likely to be diagnosed with chronic conditions like diabetes, obesity, high blood pressure, and heart disease, each requiring more frequent, ongoing, and costly care, these funds would help close the gap and get highly rural veterans the care they need.

    Telehealth Services

    Heinrich successfully secured $6,356,035,000 to sustain and increase telehealth capacity and expand the reach of VA medical providers to veterans in highly rural areas through the use of in-home telehealth and remote patient monitoring services. The bill also supports the Veterans Health Administration’s (VHA) rulemaking to eliminate copays for all virtual medical appointments of any type and especially for primary and preventative care appointments.

    Preventing Veteran Homelessness

    Heinrich successfully secured $3,459,121,000 to prevent veteran homelessness, including $702,821,000 to bolster the Supportive Services for Veteran Families Program, which would meet the needs of veterans including help with the rising costs of household goods; $670,900,000 for case management and administration of Housing and Urban Development – Veterans Affairs Supportive Housing vouchers; $323,100,000 for the Grant and Per Diem Program, which would support transitional housing and assist veterans in achieving housing stability; and, $139,843,000 for Veterans Justice Outreach and Legal Services for Veterans grants to award community-based organizations with funds to assist veterans with legal issues like accessing benefits, navigating family law, and securing safe and stable housing.

    Veterans Affairs Service Purchasing (VASP) Program

    Heinrich successfully secured report language directing the VA to explain why it abruptly ended the Veterans Affairs Service Purchasing program, a critical program that would keep veterans who were unable to pay their mortgage in their homes. At least 130 New Mexico veterans could be impacted by this administration’s shortsighted decision to end the Veterans Affairs Service Purchasing program without loss mitigation policies.

    Access to Medications for Substance Use Disorder

    Heinrich successfully secured $709,573,000 for the Opioid Prevention and Treatment programs at the VA, including $454,086,000 for treatment programs and $254,487,000 to continue implementation of the Jason Simcakoski Memorial and Promise Act. Heinrich voted in favor of this bill’s authorizing legislation, the Comprehensive Addiction and Recovery Act, in 2016 (P.L. 114-198).

    Veteran Family Resource Program

    Heinrich successfully secured language to require a status report on the Veteran Family Resource Program rollout, including authorities and funding needed to ensure a successful, continued rollout that reduces rates of child abuse and neglect among families with veterans. Services would include interventions like case management assistance to address evidence-based risk factors like housing and food insecurity in veteran families.

    Childcare Assistance

    Heinrich successfully secured an additional $3,000,000 in the VA’s overall budget to support the expansion of childcare centers at VA medical facilities through a pilot program. Heinrich originally voted in favor of the Caregivers and Veterans Omnibus Health Services Act of 2010 (P.L. 111-163) while Congressman for New Mexico’s 1stCongressional district. This bill led to the VA’s initial childcare pilot program to assess feasibility and advisability of providing childcare services to veterans receiving mental health and intensive health care services.

    As a result, in 2016, the VA launched a childcare pilot program to implement three (3) free, drop-in childcare service centers across three locations in the states of New York and Washington. Survey data indicate nearly a third of veterans are interested in childcare services and approximately 10 percent have had to cancel or reschedule medical appointments due to lack of childcare.

    Grants for Construction of State Extended Care Facilities

    Heinrich successfully secured $171,000,000 in construction funds for state extended care facilities. In New Mexico, there is only one VA long-term care facility, despite demand for additional capacity and facilities. These facilities are particularly important to ensure aging and disabled veterans receive the appropriate level of care.

    Medical and Prosthetics Research

    Heinrich successfully secured $943,000,000 to fund medical, rehabilitative, and health services research and support basic and clinical studies that advance knowledge leading to improvements in the prevention, diagnosis, and treatment of diseases and disabilities. Medical and prosthetic research at the Department of Veterans Affairs includes the fields of prosthetics, orthotics, adaptive equipment for vehicles, sensory aids, and related areas.

    VA Court of Appeals

    Heinrich successful secured language requiring the VA to improve transparency surrounding the large back log of cases at the VA Court of Appeals. According to last year’s Annual Report, there is a backlog of 200,805 cases.

    MIL OSI USA News

  • MIL-OSI USA: Schatz, Banks Introduce Bipartisan Bill To Build More Affordable Housing, Address America’s Growing Housing Crisis

    US Senate News:

    Source: United States Senator for Hawaii Brian Schatz

    WASHINGTON – U.S. Senators Brian Schatz (D-Hawai‘i) and Jim Banks (R-Ind.) today introduced the Build More Housing Near Transit Act. The bipartisan legislation continues Senator Schatz’s efforts to address America’s housing shortage by offering federal benefits and encouraging local governments to build more housing near transit-oriented urban and suburban spaces, where options are especially lacking.

    “The clearest way out of our national housing shortage is by building more housing,” said Senator Schatz. “Our bipartisan bill incentivizes cities and towns to build housing when they expand or redevelop their public transit systems. This will help put more families in homes, grow local economies, and cut carbon pollution. It’s a win for everyone.”

    “This bill makes it easier for communities to build homes for working families by cutting red tape and giving them the freedom to create strong, family-friendly neighborhoods near public transit,” said Senator Banks.

    Specifically, the legislation directs the Secretary of Transportation to provide a scoring boost to the competitive grant applications of public transit projects that include regulatory reforms that legalize new housing near stations, including removing expensive parking mandates, streamlining approval for new housing, allowing houses on smaller lots, raising height limits, and other pro-housing policies.

    Currently, 47 percent of renter households are cost-burdened, and lack of housing options in transit-friendly areas is a major contributor to this. In addition, transportation costs are often a household’s second-largest expenditure behind housing, meaning more housing in transit areas would have a two-fold benefit.

    By offering easier access to transit centers, the Build More Housing Near Transit Act will connect more employees with jobs and boost economic output, as well as reduce greenhouse gas emissions through increased public transit ridership. It will also make federal transportation projects more efficient and ensure federal dollars are used most effectively.

    “America is experiencing a severe housing shortage that affects every aspect of American lives and the economy,” said Mike Kingsella, CEO of Up for Growth Action. “The Build More Housing Near Transit Act addresses the critical link between transportation and housing and would create greater access to affordable commutes and abundant housing. We applaud the lead sponsors for introducing this bill, serving as an example of how the federal government can use its leverage to ensure the right types of housing are available in the places people want to live.”

    “For decades, the federal government has funded mass transit projects in cities whose growth control laws do not allow people to live near and ride on transit. The Build More Housing Near Transit Act finally corrects this. It protects transit riders and the federal taxpayer from spending scarce transit capital on projects doomed by rigid zoning regulations to low housing growth and low future ridership, while uplifting projects in localities that welcome housing & transit ridership growth. This bill is the essential first step in restoring bipartisan confidence in America’s mass transit investments for taxpayers and transit riders alike,” said Alex Armlovich, Senior Housing Policy Analyst for the Niskanen Center.

    The full text of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: NASA Invites Media to Senegal Artemis Accords Signing Ceremony

    Source: NASA

    Senegal will sign the Artemis Accords during a ceremony at 2 p.m. EDT on Thursday, July 24, at NASA Headquarters in Washington.
    Brian Hughes, NASA chief of staff, will host Maram Kairé, director general of the Senegalese space agency (ASES), and Abdoul Wahab Haidara, ambassador of Senegal to the United States, along with other officials from Senegal and the U.S. Department of State.
    This event is in-person only. Media interested in attending must RSVP no later than 10 a.m. on Thursday, July 24, to: hq-media@mail.nasa.gov. NASA’s media accreditation policy is online.
    The signing ceremony will take place at the James E. Webb Memorial Auditorium at NASA Headquarters in the Mary W. Jackson building, 300 E. Street SW in Washington.
    In 2020, during the first Trump Administration, the United States, led by NASA and the State Department, joined with seven other founding nations to establish the Artemis Accords, responding to the growing interest in lunar activities by both governments and private companies. The accords introduced the first set of practical principles aimed at enhancing the safety, transparency, and coordination of civil space exploration on the Moon, Mars, and beyond. Senegal is the 56th country to sign the Artemis Accords since their inception.
    The Artemis Accords are grounded in international law and represent the best practices and norms of responsible behavior that NASA and its partners have supported, including the public release of scientific data.
    Learn more about the Artemis Accords at:
    https://www.nasa.gov/artemis-accords
    -end-
    Bethany Stevens / Elizabeth ShawHeadquarters, Washington202-358-1600bethany.c.stevens@nasa.gov / elizabeth.a.shaw@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: Last Day to Apply for Federal Assistance for April Storms

    Source: US Federal Emergency Management Agency 2

    strong>LITTLE ROCK, Ark. – Homeowners and business owners who had damage from the destructive storms, tornadoes and flooding in Arkansas in April have until 11:59 p.m. Tuesday, July 22, to apply for federal disaster assistance.
    Residents including homeowners, renters and business owners may apply for assistance if your home or business is in Clark, Clay, Craighead, Crittenden, Desha, Fulton, Greene, Hot Spring, Jackson, Miller, Ouachita, Pulaski, Randolph, St. Francis, Saline, Sharp or White County.
    In planning your recovery from the April 2-22 storms, give yourself the widest possible set of options. If you applied for damage or losses after the storms in March, you may apply again for FEMA assistance for uninsured property losses from the April storms. Previous FEMA aid does not affect eligibility for assistance. 
    Loans from the U.S. Small Business Administration also hold many benefits for survivors. SBA loans are not just for businesses. They are the largest source of federal disaster recovery funds for survivors. In a presidentially declared disaster, these long-term, low-interest loans are available to homeowners, renters, businesses of all sizes and nonprofit organizations including houses of worship.
    FEMA has many types of assistance available. FEMA may be able to help with basic home repair costs, personal property loss, and temporary housing while you are unable to live in your home. Repair or replacement assistance may be available for a primary vehicle, a computer damaged in the disaster, or books and other items required for school. 
    To apply for FEMA assistance, go to DisasterAssistance.gov, use the FEMA App for mobile devices or call the FEMA Helpline at 800-621-3362. Lines are open daily from 6 a.m. to 10 p.m. CT and specialists speak many languages. If you use a relay service, captioned telephone or other service, you can give FEMA your number for that service. To view an accessible video on how to apply, visit Three Ways to Apply for FEMA Disaster Assistance – YouTube.
    To apply or to download an SBA application, go to SBA.gov/disaster. You may also call SBA’s Customer Service Center at 800-659-2955 or email DisasterCustomerService@sba.gov.
    Survivors can also submit documents and speak to someone about their FEMA or SBA applications at several sites. To find locations and hours, visit fema.gov/disaster/4873, scroll to the bottom of the page and click the link under “In-person Survivor Assistance.”
    For the latest information about Arkansas’ recovery, visit fema.gov/disaster/4873. Follow FEMA Region 6 on social media at x.com/FEMARegion6 and at facebook.com/FEMARegion6

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI Europe: Karl Nehammer appointed new Vice-President of the European Investment Bank

    Source: European Investment Bank

    Nidetzky

    • Former Chancellor of Austria will join the EIB Management Committee.
    • Vice-President Nehammer will start on 1 September, succeeding Swedish Vice-President Thomas Ostros.

    The European Investment Bank (EIB) is pleased to announce the appointment of Karl Nehammer as a new Vice-President and Member of its Management Committee, following a decision by the 27 EU Finance Ministers, representing the EIB’s shareholders, the EU Member States.

    Mr. Nehammer, an Austrian national, has been nominated by Austria and is set to take up his duties on 1 September 2025, succeeding current Vice-President Thomas Östros.

    Karl Nehammer joins the EIB with a wealth of experience from his distinguished career in Austrian politics. He served as the Federal Chancellor of Austria from 2021 to 2025. Prior to this, he was Minister of the Interior from 2020 to 2021, and he was a member of the National Council from 2017 to 2020 as well as Secretary-General of the People’s Party.

    EIB Group President Nadia Calviño welcomed the appointment, stating, “I am pleased to welcome Karl Nehammer to the EIB Management Committee. His profound experience in European politics will be an important asset for our Group and for delivering on key EU policy goals.”

    Upon his appointment, Karl Nehammer remarked, “I am thrilled to join the European Investment Bank, an institution vital to the economic well-being and strategic autonomy of the European Union. The EIB plays a key role in backing priority investment across Europe and worldwide, and I look forward to working with President Calviño, my fellow Management Committee members, EIB Group staff and stakeholders to advance the Bank’s critical mission”.

    The EIB Group has operated in Austria since 1973 and since then the EIB  has provided more than EUR 34 billion for public and private investment across the country. The last Austrian Vice-President of the EIB was Wilhelm Molterer who served from 2011 to 2015.

    Background information  

    The EIB’s Management Committee is the Bank’s permanent collegiate executive body, composed of a President and eight Vice-Presidents. Its members are appointed by the EIB’s Board of Governors, which consists of the economy and finance ministers of the 28 EU Member States.

    The Committee collectively oversees the day-to-day running of the EIB and is responsible for preparing and ensuring the implementation of the Board of Directors’ decisions, particularly concerning borrowing and lending operations.

    The European Investment Bank (ElB) is the long-term lending institution of the European Union, owned by its Member States. Built around eight core priorities, we finance investments that contribute to EU policy objectives by bolstering climate action and the environment, digitalisation and technological innovation, security and defence, cohesion, agriculture and bioeconomy, social infrastructure, the capital markets union, and a stronger Europe in a more peaceful and prosperous world. 

    The EIB Group, which also includes the European Investment Fund (EIF), signed nearly €89 billion in new financing for over 900 high-impact projects in 2024, boosting Europe’s competitiveness and security.   

    All projects financed by the EIB Group are in line with the Paris Climate Agreement, as pledged in our Climate Bank Roadmap. Almost 60% of the EIB Group’s annual financing supports projects directly contributing to climate change mitigation, adaptation, and a healthier environment.   

    Fostering market integration and mobilising investment, the Group supported a record of over €100 billion in new investment for Europe’s energy security in 2024 and mobilised €110 billion in growth capital for startups, scale-ups and European pioneers.Approximately half of the EIB’s financing within the European Union is directed towards cohesion regions, where per capita income is lower than the EU average. 

    High-quality, up-to-date photos of our headquarters for media use are available here.

    MIL OSI Europe News

  • MIL-OSI Security: U.S. commences civil action to forfeit $7.1 million in cryptocurrency tied to oil and gas storage fraud scheme

    Source: Office of United States Attorneys

    Seattle – The U.S. Attorney’s Office, Western District of Washington today filed a civil action seeking the forfeiture of cryptocurrency valued at approximately $7.1 million seized in the investigation of an oil and gas related investment fraud scheme, announced Acting U.S. Attorney Teal Luthy Miller. The funds, part of some $97 million taken in by the coconspirators between June 2022 and July 2024, was seized by Homeland Security Investigations in December 2024.

    “The co-schemers in this fraud moved their ill-gotten gain through various cryptocurrency accounts to try to launder the money stolen from victims,” said Acting U.S. Attorney Miller. “Federal investigators and prosecutors in our office moved as quickly as possible to trace and seize the cryptocurrency so that some of the losses can be returned to victims.”

    According to the forfeiture filing and other records in the case, from at least August 2022 through August 2024, the co-schemers convinced victims to send money to what was represented as escrow accounts to purchase oil tank storage in either Rotterdam, Netherlands, or Houston. The schemers indicated that the investors could make significant profits by renting the oil tank storage they obtained to others. The victims sent money to accounts linked to these entities: Sea Forest International LLC; Apex Oil and Gas Trading LLC; Navigator Energy Logistics LLC; Terminal Energy International Escrow Service LLC; Energo Horizons Logistics (EA) LLC; Legacy Energy Logistics Transport Group LLC; Green Tree Gateway LLC. However once victims sent their money, they were not sent any further information on their investment and co-schemers simply stopped responding.

    Newcastle, Washington resident Geoffrey K. Auyeung, 47, was indicted in August 2024 as the coconspirator in the U.S. who is charged with receiving much of the fraud proceeds generated by the fraud scheme. The money was quickly moved to one or more of at least 81 different accounts at financial institutions, moved offshore, or moved to one or more of at least 19 different cryptocurrency accounts, where it was used for the purchase of cryptocurrencies, including Bitcoin, Tether, USD Coin, and Ethereum. Much of the cryptocurrency was further transferred to accounts at the cryptocurrency exchange Binance.

    According to the forfeiture filing, the cryptocurrency accounts that were seized were linked to individuals in Russia and Nigeria. Some of the cryptocurrency purchased with victims’ funds was also sent to cryptocurrency exchanges in Russia and Nigeria, at least one of which is alleged to have facilitated money laundering for transnational criminal organizations – including terrorist organizations and organizations that violate international trade sanctions.

    At the time of Auyeung’s arrest and indictment, some $2.3 million was seized from his bank accounts. The $7.1 million in cryptocurrency the government is seeking to forfeit is in addition to the $2.3 million.

    Should the court approve the forfeiture the money will be distributed to victims in the case. Currently. Investigators have identified dozens of victims who were defrauded out of approximately $17.9 million. Investigators believe those numbers will continue to grow as more victims are identified and verified.

    The case is being investigated by HSI.

    The case is being prosecuted by Assistant United States Attorneys Jehiel Baer and Yunah Chung.

    MIL Security OSI

  • MIL-OSI USA: Hawley, Blumenthal Unveil Bipartisan Bill Empowering Working Americans to Sue Big Tech, AI Companies for Stealing Creative Works

    US Senate News:

    Source: United States Senator Josh Hawley (R-Mo)

    Monday, July 21, 2025

    Today, U.S. Senators Josh Hawley (R-Mo.) and Richard Blumenthal (D-Conn.) introduced bipartisan legislation to protect consumers’ data rights and hold Big Tech companies accountable for illegally pirating creators’ copyrighted works to train their artificial intelligence (AI) models.

    Senator Hawley’s legislation follows his recent Senate Judiciary Subcommittee hearing where he sounded the alarm on AI companies’ willful engagement in “the largest intellectual property theft in American history.”

    “AI companies are robbing the American people blind while leaving artists, writers, and other creators with zero recourse. It’s time for Congress to give the American worker their day in court to protect their personal data and creative works. My bipartisan legislation would finally empower working Americans who now find their livelihoods in the crosshairs of Big Tech’s lawlessness,” said Senator Hawley.

    “This bill embodies a bipartisan consensus that AI safeguards are urgent—because the technology is moving at accelerating speed, and so are dangers to privacy. Enforceable rules can put consumers back in control of their data, and help bar abuses. Tech companies must be held accountable—and liable legally—when they breach consumer privacy, collecting, monetizing or sharing personal information without express consent. Consumers must be given rights and remedies—and legal tools to make them real—not relying on government enforcement alone,” Senator Blumenthal said.

    Senators Hawley and Blumenthal have previously teamed up to put power back in the hands of users when it comes to Big Tech. Last Congress, they introduced a bipartisan framework to implement guardrails for AI that would protect consumers.

    The AI Accountability and Personal Data Protection Act will: 

    • Bar AI companies from stealing and training on copyright works. The bill safeguards individuals’ copyrighted materials from being used in AI training or AI-generated content without permission. 
    • Create a federal tort for data misuse. The legislation allows individuals to sue any person or company that appropriates, uses, sells, or exploits their personal data or copyrighted works without clear, affirmative consent. 
    • Provide transparency for creators. The bill requires companies to clearly disclose every third party that will access an individual’s data at the time consent is sought. 
    • Ensure robust remedies. The legislation provides for stiff financial penalties, injunctive relief, and protects the ability of individuals to sue in court and join class actions. 

    Read the full bill text here.

    MIL OSI USA News

  • MIL-OSI USA: Lummis Releases Discussion Draft for Comprehensive Digital Asset Market Structure Legislation

    US Senate News:

    Source: United States Senator for Wyoming Cynthia Lummis

    Washington, D.C. –  U.S. Senator Cynthia Lummis (R-WY) joined Senate Banking Committee Chairman Tim Scott (R-SC) and U.S. Senators Bernie Moreno (R-OH) and Bill Hagerty (R-TN) in releasing a discussion draft of the Banking Committee provisions of comprehensive digital asset market structure legislation, building on principles developed in collaboration with Chairman Scott to establish a clear regulatory framework for the digital asset industry.

    The time for regulatory uncertainty in the digital asset space has come to an end,” said Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”

    The discussion draft incorporates key principles designed to:

    • Establish Clear Legal Definitions: Create statutory distinctions between digital asset securities and commodities, providing regulatory certainty and predictability for market participants
    • Allocate Regulatory Authority: Clearly delineates jurisdiction between Federal agencies, ensuring appropriate oversight without regulatory overlap or gaps
    • Modernize Federal Law: Updates securities regulations to account for the unique characteristics of digital assets and distributed ledger technology
    • Protect Consumers and Market Participants: Implements appropriate registration and risk management requirements for centralized digital asset intermediaries while preserving self-custody rights
    • Target Illicit Finance Measures: Include focused provisions to prevent money laundering and sanctions evasion while supporting innovation
    • Foster Responsible Innovation: Encourage federal regulators to provide clear guidance and utilize tools like no-action letters and regulatory sandboxes

    The discussion draft recognizes the different risk profiles of centralized firms versus decentralized protocols and acknowledges that distributed ledger technology extends beyond financial applications. It also emphasizes that tokenization represents an evolution of financial infrastructure that enhances efficiency and transparency.

    Senator Lummis and Chairman Scott are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions. To participate in the RFI, please submit your feedback to MarketStructure_RFI@banking.senate.gov. 

    A copy of the discussion draft can be found here.

    MIL OSI USA News

  • MIL-OSI Security: Forty-Eighth Conviction in Feeding Our Future Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Asad Mohamed Abshir has pleaded guilty to one count of money laundering for his role in the Feeding Our Future fraud scheme, announced Acting U.S. Attorney Joseph H. Thomspon.  He is the 48th defendant to be convicted in this massive fraud scheme.

    “This guilty plea is another step in exposing the staggering levels of fraud that have been hiding in plain sight across Minnesota,” said Acting U.S. Attorney Joseph H. Thompson. “This defendant laundered money meant to feed children and funneled it into a web of shell companies and luxury spending. As FBI Director Kah Patel recently said, this case stands as one of the most egregious abuses of public trust in recent memory. The people of Minnesota deserve better.”

    In fall of 2020, the defendant, Asad Mohamed Abshir, 34, assisted his brother and co-defendant, Abdinasir Abshir, in the operations of non-profit called Stigma Free International. Under the sponsorship of Feeding Our Future, the Abshir brothers claimed to operate, through Stigma Free, a food distribution site in Mankato, Minneosta. At the same time, Abdinasir Abshir claimed to provide food for the Mankato site through an entity he controlled called Horseed Management LLC. But the Abshirs did not provide the food they claimed to, and they were not entitled to the taxpayer dollars they received for their claims.

    Over the course of 2020 to 2021, the Abshirs fraudulently claimed to have provided 1.6 million meals to children. For his role in the scheme, Abdinasir personally received about $750,000. The defendant used $77,353 in fraud proceeds to purchase a 2022 GMC Sierra 1500 Denali truck, which has been seized and will be forfeited to the United States. In addition, the Unites States seized $424,762.51 from the bank account for the defedant’s shell company, Santana LLC, all of which will be forfeited.

    “Asad Abshir’s guilty plea underscores a troubling intersection of deception and exploitation within federal assistance programs designed to nourish vulnerable populations,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “Abshir not only undermined the integrity of the Federal Child Nutrition Program, but also abused the resources intended for the nation’s most at-risk children. This case serves as a stark reminder of the critical need for stringent oversight and accountability in the administration of taxpayer dollars.”

    This case is the result of an investigation conducted by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service

    Abshir pleaded guilty yesterday in U.S. District Court before Judge Nancy E. Brasel. A sentencing hearing will be scheduled at a later date.

    Acting U.S. Attorney Joseph H. Thompson and Assistant U.S. Attorneys Matthew S. Ebert, Harry M. Jacobs, and Daniel W. Bobier are prosecuting the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: Forty-Eighth Conviction in Feeding Our Future Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Asad Mohamed Abshir has pleaded guilty to one count of money laundering for his role in the Feeding Our Future fraud scheme, announced Acting U.S. Attorney Joseph H. Thomspon.  He is the 48th defendant to be convicted in this massive fraud scheme.

    “This guilty plea is another step in exposing the staggering levels of fraud that have been hiding in plain sight across Minnesota,” said Acting U.S. Attorney Joseph H. Thompson. “This defendant laundered money meant to feed children and funneled it into a web of shell companies and luxury spending. As FBI Director Kah Patel recently said, this case stands as one of the most egregious abuses of public trust in recent memory. The people of Minnesota deserve better.”

    In fall of 2020, the defendant, Asad Mohamed Abshir, 34, assisted his brother and co-defendant, Abdinasir Abshir, in the operations of non-profit called Stigma Free International. Under the sponsorship of Feeding Our Future, the Abshir brothers claimed to operate, through Stigma Free, a food distribution site in Mankato, Minneosta. At the same time, Abdinasir Abshir claimed to provide food for the Mankato site through an entity he controlled called Horseed Management LLC. But the Abshirs did not provide the food they claimed to, and they were not entitled to the taxpayer dollars they received for their claims.

    Over the course of 2020 to 2021, the Abshirs fraudulently claimed to have provided 1.6 million meals to children. For his role in the scheme, Abdinasir personally received about $750,000. The defendant used $77,353 in fraud proceeds to purchase a 2022 GMC Sierra 1500 Denali truck, which has been seized and will be forfeited to the United States. In addition, the Unites States seized $424,762.51 from the bank account for the defedant’s shell company, Santana LLC, all of which will be forfeited.

    “Asad Abshir’s guilty plea underscores a troubling intersection of deception and exploitation within federal assistance programs designed to nourish vulnerable populations,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “Abshir not only undermined the integrity of the Federal Child Nutrition Program, but also abused the resources intended for the nation’s most at-risk children. This case serves as a stark reminder of the critical need for stringent oversight and accountability in the administration of taxpayer dollars.”

    This case is the result of an investigation conducted by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service

    Abshir pleaded guilty yesterday in U.S. District Court before Judge Nancy E. Brasel. A sentencing hearing will be scheduled at a later date.

    Acting U.S. Attorney Joseph H. Thompson and Assistant U.S. Attorneys Matthew S. Ebert, Harry M. Jacobs, and Daniel W. Bobier are prosecuting the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI USA: Ranking Member Cherfilus-McCormick Releases Statement on Death of Saif Musallet

    Source: United States House of Representatives – Congresswoman Sheila Cherfilus-McCormick (D-Florida 20th district))

    WASHINGTON, D.C. – Today, Congresswoman Sheila Cherfilus-McCormick (D-FL), Ranking Member of the Subcommittee on the Middle East and North Africa, issued the following statement on the killing of Saif Musallet in the West Bank:
     
    “I am heartbroken by the killing of Saif Musallet, a 20-year-old American from Tampa, by Israeli settlers in the West Bank. I call on the Israeli government to fully investigate this incident and combat the increasing settler violence in the West Bank.
     
    “Since the Hamas attacks on October 7th, I have warned repeatedly about the dangers of escalating violence against Palestinian civilians by Israeli settlers. Acts of violence and terror, whether by Hamas or by settlers, are never justified and only push peace further out of reach.
     
    “My thoughts are with Saif’s family as we continue to push for justice, security, and a peaceful future for all.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: Ranking Member Cherfilus-McCormick Releases Statement on Death of Saif Musallet

    Source: United States House of Representatives – Congresswoman Sheila Cherfilus-McCormick (D-Florida 20th district))

    WASHINGTON, D.C. – Today, Congresswoman Sheila Cherfilus-McCormick (D-FL), Ranking Member of the Subcommittee on the Middle East and North Africa, issued the following statement on the killing of Saif Musallet in the West Bank:
     
    “I am heartbroken by the killing of Saif Musallet, a 20-year-old American from Tampa, by Israeli settlers in the West Bank. I call on the Israeli government to fully investigate this incident and combat the increasing settler violence in the West Bank.
     
    “Since the Hamas attacks on October 7th, I have warned repeatedly about the dangers of escalating violence against Palestinian civilians by Israeli settlers. Acts of violence and terror, whether by Hamas or by settlers, are never justified and only push peace further out of reach.
     
    “My thoughts are with Saif’s family as we continue to push for justice, security, and a peaceful future for all.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: King Cosponsors Bill to Prohibit Sharing of Personal Data of DACA Program Applicants with Immigration Officials

    US Senate News:

    Source: United States Senator for Maine Angus King

    WASHINGTON — U.S. Senator Angus King (I-ME) has joined legislation to prohibit the sharing of sensitive personal data, like taxpayer and health information, with Immigration and Customs Enforcement (ICE). The Protect DREAMer Confidentiality Act would provide a statutory guarantee to current and prospective Deferred Action for Childhood Arrivals (DACA) program applicants, also known as Dreamers, that the private information they provide in their applications will not be used against them. This comes as the Trump Administration increases information sharing to advance its mass deportation agenda.

    The Protect DREAMer Confidentiality Act will prohibit the DHS Secretary from disclosing information included in an individual’s application for the DACA program to law enforcement agencies, including ICE and U.S. Customs and Border Protection (CBP), for any purpose other than the implementation of the DACA program, with limited exceptions.

    “Dreamers are productive, established members of our community woven into the fabric of our lives; neighbors and friends that go to school, work at the local store, and contribute honestly to American society no matter the passport they hold,” Senator King said. “The Protect DREAMer Confidentiality Act would allow thousands of law-abiding Dreamers to continue living their lives and making contributions to society without fear of their personal information being misused by those enforcing the administration’s misguided deportation agenda.”

    Since 2012, more than 825,000 people have received deferred action pursuant to DACA, contributing an estimated $140 billion to the U.S. economy in spending power and paying $40 billion in combined federal, payroll, state, and local taxes. In 2021, a federal district court judge paused the DACA program and prevented USCIS from approving any new DACA applications. In March 2025, however, a Fifth Circuit decision giving United States Citizenship and Immigration Services (USCIS) the authority to start processing initial DACA applications from states other than Texas went into effect.

    Last month, the Trump Administration gave Department of Homeland Security (DHS) personal data, including immigration status, on millions of Medicaid enrollees and announced it would require some undocumented immigrants to register with DHS. The Administration also finalized an agreement giving U.S. Immigration and Customs Enforcement (ICE) access to taxpayer data from the Internal Revenue Service (IRS) for immigration enforcement. Meanwhile, the Administration’s Department of Government Efficiency (DOGE) recently gained access to key immigration databases, including the Executive Office for Immigration Review’s (EOIR) Courts and Appeals System (ECAS), U.S. Citizenship and Immigration Services’ (USCIS) Data Business Intelligence Services, which contains information on noncitizens who have applied for DACA, and the U.S. Department of Health and Human Services’ (HHS) Unaccompanied Alien Children portal.

    Specifically, the Protect DREAMer Confidentiality Act will:

    1. Direct the DHS Secretary to protect the information included in an individual’s application to the DACA program from disclosure to ICE, CBP, and any other law enforcement agency for any purpose other than the implementation of the DACA program;
    2. Prohibit the DHS Secretary from referring anyone with deferred enforcement protections pursuant to the DACA program to ICE, CBP, the Department of Justice (DOJ), and any other law enforcement agency; and
    3. Provide limited exceptions for when an individual’s application information may be shared with national security and law enforcement agencies, namely:
      1. To identify or prevent fraudulent claims;
      2. For particularized national security concerns; and
      3. For the investigation or prosecution of a felony, provided that the felony in question is not related to the applicant’s immigration status.

    In addition to King, this bill is cosponsored by Senators Martin Heinrich (D-NM), Brian Schatz (D-HI), John Fetterman (D-PA), Sheldon Whitehouse (D-RI), Ben Ray Lujan (D-NM), Patty Murray (D-WA), Mazie Hirono (D-HI), Catherine Cortez Masto (D-NV), Bernie Sanders (I-VT), Ed Markey (D-MA), Tammy Duckworth (D-IL), Jacky Rosen (D-NV), Michael Bennet (D-CO), Elizabeth Warren (D-MA), Chris Van Hollen (D-MD), Ron Wyden (D-OR), Andy Kim (D-NJ), Richard Blumenthal (D-CT), Peter Welch (D-VT), Amy Klobuchar (D-MN.), Lisa Blunt Rochester (D-DE), Jack Reed (D-RI), Alex Padilla (D-CA) and Chris Murphy (D-CT).

    Senator King is a strong opponent of the Trump Administration’s continued efforts to repeal protections for DACA recipients. He has repeatedly sought a legislative solution to provide stability for DACA recipients. Most recently, he sent a letter to Acting Director of U.S. Citizenship and Immigration Services (USCIS) Angelica Alfonso-Royals, highlighting the popular support for providing Dreamers a pathway to citizenship and request that the Trump Administration comply with the recent Fifth Circuit Court of Appeals ruling to resume processing applications for DACA. Previously, Senator King joined a group of his Senate colleagues in a letter urging former Senate Majority Leader Mitch McConnell (R-KY) to immediately take up the bipartisan House-passed American Dream and Promise Act, which would establish a path to citizenship for Dreamers and immigrants with Temporary Protected Status (TPS) or Deferred Enforced Departure (DED). In addition, King led a bipartisan proposal with Senator Mike Rounds (R-SD) that would have provided legislative protections for Dreamers.

    A one-page summary of the bill is here.

    The text of the bill is here.

    MIL OSI USA News

  • MIL-OSI Canada: Government of Canada sells Rimouski Armoury for student housing

    Source: Government of Canada News (2)

    July 22, 2025 – Gatineau, Quebec                           

    Everyone deserves a place to call home. However, Canada’s housing crisis is making it increasingly difficult for many people across the country to access housing. Post-secondary students are no exception: in many regions, they are struggling to find affordable housing that meets their needs.

    As part of its plan to build more homes, the Government of Canada is identifying federal properties that have the potential for housing and is making them available through the Canada Public Land Bank.

    Today, the Honourable Joël Lightbound, Minister of Government Transformation, Public Works and Procurement and the Honourable David J. McGuinty, Minister of National Defence, announced that the Rimouski Armoury in Rimouski, Quebec, has been sold to Immeubles Must Urbain Inc., which is planning to build student housing while also preserving the heritage of the existing building.   

    Public Services and Procurement Canada added the former National Defence property to the Canada Public Land Bank in August 2024, as part of the Public Lands for Homes Plan, an ambitious, whole-of-government approach to addressing the housing crisis by building more homes and making it easier to rent or own a home.

    Through the Canada Public Land Bank, we are providing access to federal properties in a transparent way to all stakeholders: large developers, small companies, Indigenous communities and organizations, non-profit organizations, academic institutions, provinces, territories and municipalities, and Canadian citizens. This is allowing us to accelerate the federal government’s established disposal process.

    To date, we have received hundreds of initial inquiries for properties currently listed in the land bank. These inquiries span properties located across most provinces and territories. 

    MIL OSI Canada News

  • MIL-OSI Asia-Pac: 15 nomination forms for Election Committee Subsector By-elections received today

    Source: Hong Kong Government special administrative region – 4

    The nomination period for the 2025 Election Committee (EC) Subsector By-elections runs from today (July 22) until August 4. A total of 12 nomination forms for candidates and three nomination forms from designated bodies were received by the Returning Officers for various subsectors today.

    If there is a contested election for an EC subsector, a poll will be held on September 7.

    The By-elections will fill a total of 93 vacancies in the membership of the EC to be returned by election involving 28 subsectors. The breakdown of nominations by subsectors received today is set out below: 
     

    First Sector
    Subsector No. of nomination forms for candidates received today
    Catering 0
    Commercial (first) 0
    Commercial (second) 0
    Commercial (third) 0
    Employers’ Federation of Hong Kong 0
    Hotel 1
    Import and export 0
    Industrial (first) 0
    Industrial (second) 0
    Real estate and construction 0
    Small and medium enterprises 0
    Tourism 0
    Transport 0
    Second Sector
    Subsector No. of nomination forms for candidates received today
    Architectural, surveying, planning and landscape 0
    Chinese medicine 0
    Education 0
    Legal 0
    Medical and health services 0
    Sports, performing arts, culture and publication 0
    Technology and innovation 0
    Third Sector
    Subsector No. of nomination forms for candidates received today
    Agriculture and fisheries 0
    Associations of Chinese fellow townsmen 1
    Grassroots associations 1
    Labour 1
    Fourth Sector
    Subsector No. of nomination forms for candidates received today
    Heung Yee Kuk 0
    Representatives of members of Area Committees, District Fight Crime Committees, and District Fire Safety Committees of Hong Kong and Kowloon 0
    Representatives of members of Area Committees, District Fight Crime Committees, and District Fire Safety Committees of the New Territories 0
    Fifth Sector
    Subsector No. of nomination forms for candidates received today
    Representatives of Hong Kong members of relevant national organisations 8
       
    Total: 12

    Besides, 10 vacancies involving five subsectors to be returned by nomination will be filled through supplementary nominations by designated bodies. Today, three nomination forms for the relevant subsectors are received, with breakdown as below: 
     

    Accountancy
    Designated body No. of nomination forms received from designated bodies today
    Association of Hong Kong Accounting Advisors Limited 0
     
    Sports, performing arts, culture and publication
    Designated body No. of nomination forms received from designated bodies today
    Sports Federation & Olympic Committee of Hong Kong, China 0
    Hong Kong Publishing Federation Limited 0
     
    Technology and innovation
    Designated body No. of nomination forms received from designated bodies today
    The Greater Bay Area Association of Academicians 0
     
    Religious
    Designated body No. of nomination forms received from designated bodies today
    Catholic Diocese of Hong Kong 0
    Chinese Muslim Cultural and Fraternal Association 1 (1 nominee in total)
    The Hong Kong Taoist Association 1 (2 nominees in total)
     
    Representatives of associations of Hong Kong residents in the Mainland
    Designated body No. of nomination forms received from designated bodies today
    Hong Kong Chamber of Commerce in China—Guangdong 1 (1 nominee in total)
       
    Total: 3 (4 nominees in total)

    Particulars of the nominated persons received today will be uploaded to the election website (www.elections.gov.hk).

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Hongkong Post updates on the information security incident

    Source: Hong Kong Government special administrative region – 4

    Hongkong Post announced today (July 22) on the investigation result so far of the information security incident identified on July 21. According to the investigation, the unauthorised party had cyberattacked the system by making countless attempts at the mid-night of July 20 and the following day to access and retrieve information through the address book function of EC-Ship system. Hongkong Post had activated the blocking mechanism immediately after the abnormal activities being detected by its system and disabled the operation of the EC-Ship account which was involved in the cyberattacks at once. During the above-mentioned blockage and interception of these cyberattacks, the concerned accounts’ address books information, including the senders’ and recipients’ person/company names, addresses, and/or phone numbers, fax numbers, and email addresses, was being accessed and retrieved.

    Hongkong Post has sent emails to inform all affected account holders today and reminded them to remain vigilant, and to immediately inform relevant persons of their address books about this incident and remind them to be vigilant. The Hong Kong Police Force (HKPF) has initiated investigation into the incident and Hongkong Post will fully cooperate with the HKPF in the investigation, and will closely monitor the situation of the involved information.

    Hongkong Post has been following established Government procedures on information and cybersecurity. The Digital Policy Office (DPO) is also in close communication with Hongkong Post on the incident, noting that it has taken immediate actions by promptly blocking the cyberattacks and enhancing the security measures of the system. The services concerned have resumed normal and account holders involved can continue to use the services.

    The spokesman for Hongkong Post said that the global cybersecurity landscape was evolving, with various forms of cyberattacks emerging continuously. Hongkong Post would actively seek advice from the DPO to continuously enhance the cyber resilience level and cybersecurity risk management, to safeguard the information security of users and to prevent similar incidents from happening again.

    Hongkong Post reiterates that it will not send embedded hyperlinks via emails, SMS messages or social media pages for collecting personal information or requesting for payment. Hongkong Post wishes to alert members of the public again to refrain from clicking on any embedded links or providing any personal or financial information such as credit card information, or making any payment to suspicious emails or SMS messages alleged to be sent by Hongkong Post. For enquiries, members of the public may call the Hongkong Post General Enquiry Hotline at 2921 2222.

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: 30 secondary students to depart for Mainland to join Young Astronaut Training Camp (with photos)

    Source: Hong Kong Government special administrative region – 4

         A send-off ceremony for the Young Astronaut Training Camp 2025 was held at the Hong Kong Science Museum today (July 22). Thirty selected secondary students will set off for Beijing, Jiuquan, and Xi’an from July 25 to August 2 for a nine-day training programme.
     
         Addressing the send-off ceremony, the Deputy Chief Secretary for Administration, Mr Cheuk Wing-hing, encouraged the Young Astronauts to seize this precious training opportunity to immerse themselves in the country’s remarkable aerospace endeavours, look up to aerospace heroes as their role model, and become a valuable new force in promoting the nation’s space development.
     
         Other officiating guests included the First-level Inspector of the Department of Educational, Scientific and Technological Affairs of the Liaison Office of the Central People’s Government in the Hong Kong Special Administrative Region, Mr Liu Maozhou; the Chairman of the Chinese General Chamber of Commerce, Dr Jonathan Choi; the Convenor of the Working Group on Patriotic Education under the Constitution and Basic Law Promotion Steering Committee, Legislative Council Member, Dr Starry Lee; the Permanent Secretary for Culture, Sports and Tourism, Ms Vivian Sum; the Director of Leisure and Cultural Services, Ms Manda Chan; the President of the Beijing-Hong Kong Academic Exchange Centre, Mr Hsu Hoi-shan; the Vice-Chairman of the Chinese General Chamber of Commerce, Ms Jennifer Yeung; and the Museum Director of the Hong Kong Science Museum, Mr Patrick Lau.
     
         Launched in 2009, the Young Astronaut Training Camp has entered its 14th edition, with a total of 400 students participating over the years. The recruitment of this year’s training camp started in May and received an overwhelming response. After three rounds of the selection process, which included a quiz on astronomy and space science, a three-day training camp and an interview, 30 students from Secondary Two to Secondary Six were selected as Young Astronauts out of around 120 applicants from more than 80 secondary schools.
     
         The students participating in the nine-day training camp will visit various key astronomy and aerospace facilities, including Beijing Aerospace City and the Jiuquan Satellite Launch Center. This year’s programme also marks the first visit to the Wuqing Station of the National Astronomical Observatories, where they will learn about data reception and deep space communication systems of the Tianwen-1 Mars exploration mission. At the China Astronaut Research and Training Center, they will experience the aerospace medicine project and astronaut training activities, including the donning and doffing of spacesuits and savouring space food.
     
         The training camp is jointly presented by the Leisure and Cultural Services Department and the Chinese General Chamber of Commerce, in association with the Beijing-Hong Kong Academic Exchange Centre. It is organised by the Hong Kong Space Museum and sponsored by the Chinese General Chamber of Commerce. For details of the training camp, please visit the website of the Hong Kong Space Museum at hk.space.museum/en/web/spm/activities/yatc.html.
     
         The training camp is one of the programmes under the Chinese Culture Promotion Series. For more information, please visit www.ccpo.gov.hk.

    MIL OSI Asia Pacific News

  • MIL-OSI USA: Western Territory Staff Conference Highlights People, Power and Change

    Source: US GOIAM Union

    The IAM Western Territory joined together in a powerful show of solidarity, strategy, and celebration at the territory’s 2025 staff conference. Held under the theme, “People, Power, Change,” the conference brought IAM leadership, staff, and allies together to sharpen their organizing focus, reflect on recent victories, and recommit to building a stronger labor movement.

    Western Territory General Vice President Robert “Bobby” Martinez opened the conference with a message of unity and urgency, reminding attendees that organizing is the foundation of the IAM’s mission.

    “This conference isn’t just about celebrating what we’ve done—it’s about preparing for what’s next,” said Martinez. “The power to organize, to fight back, and to lift each other up lives in every one of us.”

    View photos from the Western Territory Staff Conference here.

    IAM International President Brian Bryant delivered a keynote address focused on transformation within the union. He spoke about returning organizing operations to IAM Headquarters to create a consistent, strategic, and coordinated approach across all territories.

    “Workers are looking for allies at a moment like this – and the IAM Union is going to be that ally,” said Bryant. “We must unite like never before to meet the moment and bring more workers into our union.”

    General Secretary-Treasurer Dora Cervantes addressed the IAM’s financial health and growing resources for members, while Resident General Vice President Jody Bennett spoke about the importance of supporting staff and ensuring they have the tools they need to win in today’s labor environment.

    The conference also included a heartfelt tribute to retired Western Territory General Vice President Gary R. Allen, who was honored for his remarkable 45 years of service to the IAM—including 15 years leading the Western Territory on the IAM Executive Council. His legacy of justice, compassion, and fierce dedication to working people was celebrated by all in attendance.

    Other speakers included:

    • Marshall Ganz, Harvard University Professor and Organizer
    • Randy Parraz, Organizing Institute for Democracy
    • Lorena Gonzalez, California Federation of Labor President
    • Carla Siegel, IAM General Counsel
    • Richard Evans, IAM Veterans Services Coordinator, and Bryan Stymacks, IAM Assistant Veterans Services Coordinator
    • Yvette Sheehan, Guide Dogs of America | Tender Loving Canines
    • Jon Holden, IAM District 751 President, and Shana Peschek, Machinists Institute
    • Galen Bullock, Employee Benefit Systems, Inc.

    The conference also featured a powerful question and answer session, facilitated by Western Territory International Representatives Richard Suarez and Melissa Morgan.

    The Western Territory gave out awards to recognize districts, locals, members and staff who have gone above and beyond to call of duty.

    • Top Organizing District: District 725
    • Organizer of the Year: Bob Simoni, Local SC 711
    • Joe Reilly IAM Veterans Remembrance Award: Local 1005 member Franklin Wilson Jr. for his work to support unhoused military veterans.
    • Gary R. Allen Heart of Justice Award – Local 695 President Richard Howard for his leadership supporting a wrongfully detained member.

    The  Western Territory also presented the Hawk Awards, which are nominated by peers and given in recognition of individuals who display exceptional leadership in servicing, organizing, community service and/or political activism.

    • Gary R. Allen, Retired General Vice President
    • Jeff Baird, District 725 Business Representative
    • Larry Bickett, District W24 Business Representative/Organizer
    • Brandon Bryant, District W24 President and Directing Business Representative
    • Zac Collins, District 160 Business Representative
    • Billy Corona, District 947 Business Representative/Organizer
    • Joelle Depue, Western Territory Special Representative
    • John Dyrcz, Local 794 Vice President
    • Jennifer Friesen, District 947 Business Representative/Organizer
    • Cindy Gagliardi, District 190 Business Representative
    • Bailey Hardiman-Borsos, Western Territory Associate Organizer
    • Jason Hardwick, Western Territory International Representative
    • Michael Higley, Local 568 Member
    • Jon Holden, District 751 President and Directing Business Representative
    • Richard Jackson, District 751 Secretary-Treasurer
    • Beth Lacey, District W24 Secretary-Treasurer
    • Scott Lacey, District W24 President
    • Justin Mauldin, District 725 Assistant Directing Business Representative
    • Pedro Mendez, District 190 Area Director
    • Ramon Martinez, Local 2515 President and Directing Business Representative
    • Brandon Nottingham, District 947 Business Representative/Organizer
    • Carla Pulido-Jordan, Local 1930 Recording Secretary
    • Joe Ruth, Local 751C Health and Benefits Representative
    • Cornelius Scott, Local 1125 Secretary-Treasurer
    • Bob Simoni, Local SC 711 Business Representative
    • Christian White, Local 2006 President
    • Doug White, Local 1998 Recording Secretary
    • Darrin Williamson, District 725 Business Representative
    • Steve Van Wie, Western Territory International Representative

    The post Western Territory Staff Conference Highlights People, Power and Change appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI: Buffalo Run Casino & Resort Selects QCI Go to Empower Hosts and Enhance Guest Engagement

    Source: GlobeNewswire (MIL-OSI)

    SAN DIEGO, July 22, 2025 (GLOBE NEWSWIRE) — Buffalo Run Casino & Resort has chosen Quick Custom Intelligence’s (QCI) Go, a native mobile app designed specifically for casino hosts, to elevate host productivity and deliver a superior guest experience.

    QCI Go provides hosts with powerful tools including player card scanning, real-time player lookup, seamless access to QCI Meet and QCI Events, and robust task management features—all in a user-friendly mobile interface. By putting these capabilities directly in the hands of hosts, QCI Go enables faster service, deeper guest relationships, and greater operational efficiency on the casino floor.

    Mary Jewett, Vice President and General Marketing at Buffalo Run Casino & Resort, expressed excitement about the implementation:
    “Bringing QCI Go to Buffalo Run Casino & Resort represents a significant advancement in how we empower our hosts to serve guests. With mobile access to key player information, events, and task management, our team can deliver personalized service in real time, enhancing both the guest experience and host effectiveness.”

    Dr. Ralph Thomas, CEO of QCI, shared his perspective on the partnership:
    “We are thrilled to deploy QCI Go at Buffalo Run Casino & Resort. By providing hosts with mobile access to the QCI platform, we enable them to deliver exceptional, timely service and foster stronger player relationships. This is a great example of how our mobile-first innovations help operators improve team productivity and guest satisfaction.”

    QCI Go is part of Quick Custom Intelligence’s broader commitment to innovation in the gaming industry, providing operators with state-of-the-art tools that support host teams, streamline operations, and drive meaningful guest engagement.

    ABOUT Buffalo Run Casino & Resort
    Owned and operated by the Peoria Tribe of Indians of Oklahoma, Buffalo Run Casino & Resort is future-focused on a gaming entertainment experience that both excites and exceeds guest expectations. Maintaining its reputation for a clean and friendly environment, it empowers team members and continues to elevate hospitality and guest experiences by investing in team member training and career development programs. Consequently, this strategic reinvestment into team members and property has resulted in earning the vote for one of the Best and Brightest Companies in the Nation to work for in 2022.

    Buffalo Run Casino & Resort has over 70,000 square feet of casino floor and features the area’s widest variety of slots and tables games. The resort also includes a non-smoking Hotel, Truckers Lounge with special amenities and offers, the Peoria Showplace in-door event center, the outdoor amphitheater, complimentary entertainment in the Backwoods Bar, an 18-hole championship golf course, two indoor Top Golf® bays, and a smoke-free high-end Player’s Lounge. Additionally, the Buffalo Run Casino & Resort offers three dining experiences including Coal Creek Restaurant with high-end cuisine, the Bistro with hand-tossed brick oven pizza, and the Backwoods Bar & Grill which claims the title for best in-house smoked barbecue in the area.

    Ongoing advancements to the property include the Peoria Showplace remodel, Hotel updates and restaurant remodel with more to come. New technology has been implemented to streamline offer redemption for guests that include self-serve kiosks for dining and promotions, digital core mail pieces, and a mobile app for monthly promotional information. Updates on the casino floor include in-game bonuses and upgraded slots. Innovation and strategic marketing decisions are powered by data driven technology (QCI), empowering the casino to customize the guest experience and increase loyalty in a highly competitive market.

    ABOUT QCI
    Quick Custom Intelligence (QCI) has pioneered the revolutionary QCI Enterprise Platform, an artificial intelligence platform that seamlessly integrates player development, marketing, and gaming operations with powerful, real-time tools designed specifically for the gaming and hospitality industries. Our advanced, highly configurable software is deployed in over 250 casino resorts across North America, Australia, New Zealand, Canada, Latin America, and Europe. The QCI AGI Platform, which manages more than $35 billion in annual gross gaming revenue, stands as a best-in-class solution, whether on-premises, hybrid, or cloud-based, enabling fully coordinated activities across all aspects of gaming or hospitality operations. QCI’s data-driven, AI-powered software propels swift, informed decision-making vital in the ever-changing casino industry, assisting casinos in optimizing resources and profits, crafting effective marketing campaigns, and enhancing customer loyalty. QCI was co-founded by Dr. Ralph Thomas and Mr. Andrew Cardno and is based in San Diego, with additional offices in Las Vegas, St. Louis, Dallas, and Tulsa. Main phone number: (858) 299.5715. Visit us at www.quickcustomintelligence.com.

    ABOUT Dr. Ralph Thomas
    Dr. Ralph Thomas is the Co-Founder and Chief Executive Officer of Quick Custom Intelligence. Ralph is a product visionary in applied analytics and the founder of two companies that deliver solutions in casino gaming, education, and adult learning. As a gaming industry veteran, Dr. Thomas has substantial experience implementing analytics into single and multi-property gaming companies to drive tangible and measurable gains to the bottom line and has built business intelligence tools for multibillion-dollar casinos. Dr. Thomas is co-author of seven books and over 80 articles on applied analytics and data science in gaming, an inventor on dozens of patents, and understands gaming from raw data up through casino operations, giving him a unique, 360-degree view of the industry.

    The MIL Network

  • MIL-OSI: Loveland Living Planet Aquarium Unveils the Mountain America Event Center

    Source: GlobeNewswire (MIL-OSI)

    SANDY, Utah, July 22, 2025 (GLOBE NEWSWIRE) — Mountain America Credit Union is proud to announce its expanded partnership with the Loveland Living Planet Aquarium and celebrate the grand opening of the Mountain America Event Center—an elegant new venue located within the state-of-the-art Sam and Aline Skaggs Science Learning Center.

    A Media Snippet accompanying this announcement is available by clicking on this link.

    Officially unveiled today, the ballroom and pre-function space will serve as a premier destination for a variety of events. This partnership reflects a shared dedication to inspiring curiosity and fostering lifelong learning about the planet’s ecosystems, while also creating a dynamic space that brings the community together in meaningful ways.

    “We are delighted to expand our partnership with Loveland Living Planet Aquarium as the sponsor of the Mountain America Event Center,” said Sterling Nielsen, president and CEO of Mountain America Credit Union. “At Mountain America, supporting and strengthening our communities is central to our mission, and our longstanding relationship with the Aquarium is an important part of fulfilling that commitment.”

    The Mountain America Event Center is part of the Aquarium’s broader efforts to enhance STEM education and experiential learning. This partnership will enable college students to earn hands-on lab experience and college credit, making this the only place in Utah where students can do so in the field of marine biology.

    The Mountain America Event Center represents the Aquarium and Mountain America’s commitment to connecting people with the world around them. Designed with versatility and sophistication in mind, this venue offers flexible configurations for a wide range of private and corporate gatherings. The center provides a comprehensive suite of services, supporting small businesses, event professionals, and community organizations alike.

    “We’re incredibly grateful for our longtime partnership with Mountain America Credit Union, and we are proud to celebrate this next chapter together with the announcement of the Mountain America Event Center. The event center stands as a testament to their unwavering dedication to our community and to our vision for the future. This new space represents not only a shared commitment to education but is also a powerful investment in our community’s future,” says Robert Castellano, vice president of corporate partnerships.

    For more information about Mountain America Credit Union, visit macu.com.

    For more information about the Loveland Living Planet Aquarium and the Mountain America Event Center, visit livingplanetaquarium.org.

    About Mountain America Credit Union
    With more than 1 million members and $20 billion in assets, Mountain America Credit Union helps its members define and achieve their financial dreams. Mountain America provides consumers and businesses with a variety of convenient, flexible products and services, as well as sound, timely advice. Members enjoy access to secure cutting-edge mobile banking technology, over 100 branches across multistate region, and more than 50,000 surcharge-free ATMs. Mountain America—guiding you forward. Learn more at macu.com.

    About Loveland Living Planet Aquarium
    Loveland Living Planet Aquarium (LLPA) is a 501(c)(3) nonprofit organization that inspires people to explore, discover, and learn about Earth’s diverse ecosystems. A world-class facility, the Aquarium provides learning opportunities for all levels, interests, and ages. Since opening its new facility in Draper in March 2014, the Aquarium has welcomed over eight million guests and provided innumerable educational experiences to students. Home to almost 5,000 animals representing 600 plus species and an additional 600 plus plant species the Aquarium showcases ecosystems from around the planet including kelp forests, coral reefs, the deep ocean, Antarctic waters, Asian cloud forests, South American rain forests, and the waterways of our home state of Utah. Loveland Living Planet Aquarium is accredited by the Association of Zoos and Aquariums (AZA).

    The MIL Network

  • MIL-OSI: OZ Studio, a Global Firm with Texas Roots, Showcases Ethical AI Governance Model at the United Nations

    Source: GlobeNewswire (MIL-OSI)

    VIENNA, AUSTRIA , July 22, 2025 (GLOBE NEWSWIRE) — OZ Studio, a global technology firm with offices in Austin, Texas; Geneva, Switzerland; and Monterrey, Mexico, presented a groundbreaking model for municipal governance and ethical artificial intelligence at the United Nations headquarters in Vienna. The presentation marks a significant milestone for the company, which, after 22 years of serving multinational corporations, has pivoted its focus since 2020 toward empowering governments, entrepreneurs, and small businesses with integrated digital platforms.

    Osuna attends sessions at the UN Office on Drugs and Crime that focus on data security and sovereignty.

    The firm, represented by its CEO Daniel Osuna, who also serves on the UN’s AI Council ethics committee, detailed its successful public-private partnerships in the municipalities of Escobedo and Santiago, Mexico. These collaborations showcase a new standard for applying AI ethically at the local government level, a core mission of OZ Studio’s government services division.

    For over two decades, OZ Studio built a reputation for providing high-level services to large multinational companies. However, recognizing a critical gap in the market, the company strategically shifted its focus in 2020. The new mission: to channel its extensive expertise into creating comprehensive digital ecosystems for those who form the backbone of local economies—small and medium-sized enterprises (SMEs) and the public institutions that serve them.

    This new direction is embodied by two of its flagship platforms: LINK360 and the OZZY AI system. LINK360 is a digital empowerment platform that provides local businesses with e-commerce tools and AI-powered marketing, ensuring economic value and data sovereignty remain within the community. OZZY AI is an open-source framework trained for municipal processes, designed with ethical principles like transparency, algorithmic fairness, and cultural adaptation at its core.

    The results of this approach are transformative. Under the leadership of Mayor Andrés Mijes, the city of Escobedo has become a 100% digitized municipality, a remarkable achievement that has streamlined public services and eliminated bureaucratic red tape. In Santiago, Mayor David de la Peña is leveraging the LINK360 program to foster a vibrant local entrepreneurial scene.

    The international community has taken notice. Following the conclusion of the UN activities on Monday, July 22, OZ Studio (https://www.oz.studio) has entered into strategic alliances to explore pilot programs with several nations, including: Spain, Egypt, Georgia, Austria, and Australia. This global interest validates OZ Studio’s model as a scalable solution for governments worldwide seeking to innovate responsibly.

    From its strategic locations in Austin, Geneva, and Monterrey, OZ Studio is now positioned to lead the charge in ethical AI for public service. The company’s evolution from a corporate service provider to a champion for local development demonstrates a powerful vision: leveraging top-tier technology to build self-sustaining, equitable, and prosperous communities from the ground up.

    Presenting the OZZI AI framework and the Public Private Partnership for ethical AI

    About OZ Studio

    At OZ Studio, we are your premier destination for transformative digital solutions, anchored in over two decades of innovation and expertise. We are proud to say that we’ve evolved from pioneering basic email marketing to mastering complex digital strategies and immersive creative experiences. Our comprehensive suite of services spans from state-of-the-art website development to advanced SEO strategies, engaging interactive videos, and cutting-edge AI tools. As true digital architects, we empower our clients by merging top-tier technology with unmatched creative prowess, ensuring every digital interaction is compelling and results-oriented. We revolutionized the traditional digital service model through our productized Creative-as-a-Service (CaaS), which guarantees transparency, efficiency, and scalability. Our subscription-based approach simplifies access to a holistic digital strategy, incorporating a full spectrum of expertly managed creative and technical services. Partner with us at OZ Studio, and let us help elevate your brand to new heights, optimizing every touchpoint in your digital journey for growth and transformation. 

    Press inquiries

    OZ Studio
    https://oz.studio
    Daniel Osuna
    oz@oz.studio
    +12123811969
    5900 Balcones Drive
    Austin, TX 78731

    The MIL Network

  • MIL-OSI Submissions: Yellowknife’s Giant Mine: Canada downplayed arsenic exposure as an Indigenous community was poisoned

    Source: The Conversation – Canada – By Arn Keeling, Professor, Department of Geography, Memorial University of Newfoundland

    Giant Mine, just north of Yellowknife, N.W.T., in September 2011. The gold mine officially opened in 1948 and was operational for over 50 years before it was closed in 2004. (John Sandlos)

    Decades of gold mining at Giant Mine in Yellowknife, Northwest Territories, has left a toxic legacy: 237,000 tonnes of arsenic trioxide dust stored in underground chambers.

    As a multi-billion government remediation effort to clean up the mine site and secure the underground arsenic ramps up, the Canadian government is promising to deal with the mine’s disastrous consequences for local Indigenous communities.

    In March, the minister for Crown-Indigenous relations appointed a ministerial special representative, Murray Rankin, to investigate how historic mining affected the treaty rights of the Yellowknives Dene First Nation.

    We document this history in our forthcoming book, The Price of Gold: Mining, Pollution, and Resistance in Yellowknife, exposing how colonialism, corporate greed and lax regulation led to widespread air and water pollution, particularly affecting Tatsǫ́t’ıné (Yellowknives Dene) communities.

    We also highlight the struggle for pollution controls and public health led by Tatsǫ́t’ıné and their allies, including mine workers.

    Sickness from Giant Mine

    The story begins when prospectors discovered a rich gold ore body at Giant Mine in the 1930s. While mining started at the nearby Con Mine in the late 1930s, Giant’s development was interrupted by the Second World War. Only with new investment and the lifting of wartime labour restrictions in 1948 did Giant Mine start production.

    Mining at Giant was a challenge. Much of the gold was locked within arsenopyrite formations, and to get at it, workers needed to crush, then roast the gold ore at very high temperatures.

    This burned off the arsenic in the ore before using cyanide treatment to extract gold. One byproduct of this process was thousands of tonnes per day of arsenic trioxide, sent up a smokestack into the local environment.

    In addition to being acutely toxic, arsenic trioxide is also linked to lung and skin cancers, though scientific understanding of environmental exposures was inconclusive at the time.

    Archival records show that federal public health officials recommended the roaster be shut down until arsenic emissions could be controlled. But the company and federal mining regulators dragged their feet, fearing the economic impact.

    The result, in 1951, was the poisoning death of at least one Dene child on Latham Island (now Ndilǫ), near the mine; his family was compensated a paltry $750. Many Dene in Ndilǫ relied on snow melt for drinking water, and there were reports of widespread sickness in the community. Local animals, including dairy cattle and sled dogs, also became sick and died.

    Only after this tragedy did the federal government force the company to implement pollution controls. The control system was not terribly effective at first, though as it improved, arsenic emissions dropped dramatically from nearly 12,000 pounds per day to around 115 pounds per day in 1959. Thousands of tonnes of arsenic captured through this process was collected and stored in mined-out chambers underground.

    Fighting back against pollution

    Throughout the 1960s, public health officials continually downplayed concerns about arsenic exposure in Yellowknife, whether via drinking water or on local vegetables.

    By the 1970s, however, latent public health concerns over arsenic exposure in Yellowknife became a major national media story. It began with a CBC Radio As it Happens episode in 1975 that unearthed an unreleased government report documenting widespread, chronic arsenic exposure in the city. Facing accusations of a cover-up, the federal government dismissed health concerns even as it set up a local study group to investigate them.

    Suspicious of government studies and disregard for local health risks, Indigenous communities and workers took matters into their own hands. A remarkable alliance emerged between the Indian Brotherhood of the Northwest Territories and the United Steelworkers of America (the union representing Giant Mine workers) to undertake their own investigations.

    They conducted hair samplings of Dene children and mine workers — the population most exposed to arsenic in the community — and submitted them for laboratory analysis.

    The resulting report accused the federal government of suppressing health information and suggested children and workers were being poisoned. The controversy made national headlines yet again, prompting an independent inquiry by the Canadian Public Health Association.

    The association’s 1978 report somewhat quelled public concern. But environmental and public health advocates in Yellowknife continued their fight for pollution reduction through the 1980s.

    Giant’s toxic afterlife

    As Giant Mine entered the turbulent final decade of its life, including a violent lockout in 1992, public concern mounted over the growing environmental liabilities. Most urgently, people living in and near Yellowknife began to realize that enough arsenic trioxide had been stored underground over the years to poison every human on the planet four times over.

    Without constant pumping of groundwater out of the mine, the highly soluble arsenic could seep into local waterways, including Yellowknife Bay. When the company that owned the mine, Royal Oak Mines, went bankrupt in 1999, it left no clear plan for the remediation of this toxic material, and very little money to deal with it.

    The federal government assumed primary responsibility for the abandoned mine and, in the quarter century since, developed plans to clean up the site and stabilize the arsenic underground by freezing it — an approach that will cost more than $4 billion.

    Public concern and activism by Yellowknives Dene First Nation and other Yellowknifers prompted a highly contested environmental assessment and the creation of an independent oversight body, the Giant Mine Oversight Board in 2015. Under the current remediation strategy, the toxic waste at Giant Mine will require perpetual care, imposing a financial and environmental burden on future generations.

    The long history of historical injustice resulting from mineral development and pollution around Yellowknife remains unaddressed. In support of calls for an apology and compensation, the Yellowknives Dene First Nation recently published reports that include oral testimony and other evidence of impacts on their health and land in their traditional territory.

    Hopefully, the Canadian government’s appointment of the special representative means the colonial legacy of the mine will finally be addressed. Giant Mine serves as a warning about the current push from governments and industry to ram through development projects without environmental assessments or Indigenous consultations.

    Extractive projects may generate short-term wealth, but they also compromise the national interest if they saddle the public with enormous costs and long-term consequences.

    Arn Keeling receives funding from the Social Sciences and Humanities Research Council and National Sciences and Engineering Research Council of Canada.

    John Sandlos receives funding from the Social Sciences and Humanities Research Council of Canada.

    ref. Yellowknife’s Giant Mine: Canada downplayed arsenic exposure as an Indigenous community was poisoned – https://theconversation.com/yellowknifes-giant-mine-canada-downplayed-arsenic-exposure-as-an-indigenous-community-was-poisoned-261002

    MIL OSI

  • MIL-OSI Africa: Ambassador Yin Chengwu attended Liberia Technology Summit 2025

    Source: APO


    .

    On July 21, Ambassador Yin Chengwu attended the Liberia Technology Summit 2025 and delivered a speech. The event was also attended by Hon. Haja Mamaka Bility, Acting Minister of States, Hon. Augustine K. Ngafuan, Minister of Finance and Development Planning, Hon. Sekou M. Kromah, Minister of Post and Telecommunications. Representatives from relevant UN agencies and diplomatic missions in Liberia.

    Yin highlighted the outcomes of the Ministerial Meeting of Coordinators on the Implementation of the Follow-up Actions of the Forum on China-Africa Cooperation and China’s achievements in science and technology. He pointed out that China will establish a global scientific research fund and increase science and technology assistance to developing countries, making technological progress benefits all humanity. He expressed China is willing to strengthen scientific and technological innovation cooperation with Liberia, so as to make it a new engine of China-Liberia strategic partnership.

    Distributed by APO Group on behalf of Embassy of the People’s Republic of China in the Republic of Liberia.

    MIL OSI Africa