Category: Business

  • MIL-OSI Canada: Federal and provincial governments invest in remediation of the Montague Mines site

    Source: Government of Canada News

    Montague Gold Mines, Nova Scotia, July 31, 2025 — The site of a former gold mine that operated approximately 100 years ago will be remediated after an investment of more than $33.4 million from the federal and provincial governments.

    An environmental site assessment confirmed the soil at Montague Mines, which was mined for gold from 1865 to 1940, is contaminated with mercury and arsenic. The contamination is primarily found in an area of approximately 363 acres where mine tailings were disposed. The goal of the project is to return the land and wetlands to a productive habitat similar to what it was before mining activities.

    The cleanup will include excavating contaminated soils to a depth of two metres and placing the soil in impermeable containment cells that will be constructed on site. The estimated volume of material expected to be contained within the cells is 120,000 m3. A treatment system will also be required to collect and treat any leachate from the constructed containment cells. Clean backfill will replace removed soil.

    A low-permeability cover will be placed on areas of the site with lower levels of contamination to keep precipitation from creating contaminated runoff. These areas will also be covered with clean backfill.

    Since 1991, provincial legislation in Nova Scotia requires mining companies to provide funds for reclamation — such as cash or bonds — before mining begins to cover full reclamation costs. This ensures sites can be effectively reclaimed even if a company defaults, preventing an abandoned or contaminated site. 

    MIL OSI Canada News

  • MIL-OSI: Applied Releases Commercial Lines Premium Rate Index Findings for Q2 2025

    Source: GlobeNewswire (MIL-OSI)

    Toronto, ON, July 31, 2025 (GLOBE NEWSWIRE) — Applied Systems® today announced the second quarter 2025 results of the Applied Commercial Index™, the Canadian insurance industry’s premium rate index. Overall, the magnitude of rate increases was down across all lines relative to average premium renewals in the same quarter last year with 3.63% in Q2 2025 down from 5.83% in Q2 2024. All lines of business saw decreases compared to the same quarter last year.
    Quarter over quarter, Q2 2025 results showed average renewal rate change decreased across many lines of the most commonly placed Commercial Lines categories, including Real Estate Property, Business and Professional Services, and Construction. Hospitality Services and Retail Services experienced an increase in average renewal rate change.
    Significant findings include:

    • Business and Professional Services: Q2 2025 premium renewal rate change average was 3.00%, down from the Q1 2025 average of 3.99%.
    • Construction, Erection, and Installation Services: Premium renewal rate change average was 3.56% for the quarter, down from the Q1 2025 average of 3.85%.
    • Hospitality Services: Q2 2025 premium renewal rate change average was 4.53%, up from the Q1 2025 average of 3.08%.
    • Real Estate Property: Premium renewal rate change average was 3.38% for the quarter, down from the Q1 2025 average of 3.58%.
    • Retail Services: Premium renewal rate change averaged 4.62%, up from the Q1 2025 average of 4.57%.

    “This quarter’s average premium renewal rate change continues to decrease across the most commonly placed commercial lines of business, except Hospitality Services which saw a spike,” said Steve Whitelaw, SVP and general manager, Canada, Applied Systems. “As we make our way into the second of the year, the Applied Commercial Index will shine light on how current macro trends such as US tariffs and others will affect rates.”
    Access the complete quarterly report here.                                                            

    # # #

    Applied Commercial Index is a trademark of Applied Systems, Inc. All data is fully anonymized when aggregating and analyzing the Applied Commercial Index.

    About Applied Systems
    Applied Systems is the leading global provider of cloud-based software that powers the business of insurance. Recognized as a pioneer in insurance automation and the innovation leader, Applied is the world’s largest provider of agency and brokerage management systems, serving customers throughout the United States, Canada, the Republic of Ireland, and the United Kingdom. By automating the insurance lifecycle, Applied’s people and products enable millions of people around the world to safeguard and protect what matters most.

    The MIL Network

  • MIL-OSI: Austin Proptech Startup Rent with Clara Announces Launch of “Trust Layer” for the Rental Market

    Source: GlobeNewswire (MIL-OSI)

    Austin, Texas, July 31, 2025 (GLOBE NEWSWIRE) — Rent with Clara, a Proptech platform developed by Clara Technologies, announced today a major rebrand and product repositioning aimed at combating rental fraud through a new infrastructure model it calls the “Trust Layer for the Rental Economy.” The company, accessible at https://www.rentwithclara.com, is introducing the Clara Rental Passport—a renter-controlled “Trust Layer” that combats fraud and accelerates secure, compliant rental applications for both renters and landlords.

    Rent with Clara – Tenant Screening Software

    Founded by real estate expert and tech entrepreneur Taylor Wilson, the platform combines rigorous verification technology with a mission-driven approach rooted in the founder’s own experience as a renter, landlord, and agent. Wilson’s firsthand exposure to the “inequities and inefficiencies” of the rental process inspired the creation of a platform that serves all sides of the transaction fairly—while delivering enterprise-grade fraud prevention for independent landlords and brokers alike.

    “We’re not trying to be the next listing site or property manager-in-a-box,” said Wilson. “This is about infrastructure. Just like Stripe did for payments and Plaid for banking data, Clara is building trust for rentals, fast, secure, and legally compliant.” – Taylor Wilson

    From Renter Frustration to Founder’s Vision

    The idea was born out of Wilson’s frustration navigating rental applications from all sides, first as a renter, then as a listing manager, and finally as an independent landlord. That trifecta gave her unique visibility into how broken the process was: from fraud-prone documents to invisible bias, and a complete lack of standardized, renter-controlled data.

    What emerged is the Clara Rental Passport: a reusable, renter-controlled profile that securely stores verified identity, income, rental history, and more. With one click, applicants can share it with any participating landlord. Meanwhile, landlords receive fully verified reports, delivered in minutes, without the risk of forged pay stubs or liability from non-compliant screening processes.

    An Anti-Fraud Platform Backed by FinTech DNA

    Under the hood, Clara leans on a powerful tech stack:

    • Argyle: real-time income and employment verification directly from payroll systems
    • Veriff: identity validation and secure data transfer
    • TransUnion: standardized credit and criminal background data

    “Fake pay stubs are a billion-dollar problem, and they’re shockingly easy to make,” Wilson said. “With Clara, landlords never have to look at a PDF again.” 

    – Taylor Wilson

    Clara’s compliance-first design is also built for scale, with compliance and transparency baked into every screening flow.

    Business Model Designed for Network Effects

    Unlike most screening platforms, Clara is free for landlords and agents. Renters pay a one-time $49 fee, which can be reused across multiple applications. That go-to-market strategy removes adoption friction and builds a virtuous network: the more landlords accept Clara, the more valuable the passport becomes.

    The company is currently bootstrapped, but Wilson confirmed that Clara Technologies is in early discussions with strategic investors as it ramps platform adoption across Texas and beyond.

    A look inside the application as a Landlord

    About Rent with Clara

    Rent with Clara is a PropTech platform that brings trust, speed, and security to the rental process through fraud-proof tenant screening and renter-controlled data. Built by Clara Technologies in Austin, TX, the platform is designed to serve landlords, agents, and renters with verified information they can rely on—without the friction of outdated paperwork or opaque decision-making. 

    Press inquiries

    Rent with Clara
    https://rentwithclara.com
    Gelo Amonelo
    gelo@rentwithclara.com
    Austin, Texas USA

    The MIL Network

  • MIL-OSI Russia: Deputy Chairman of Delovaya Rossiya Nonna Kagramanyan noted the high scientific and technical capabilities of the State University of Management

    Translation. Region: Russian Federal

    Source: Official website of the State –

    An important disclaimer is at the bottom of this article.

    On July 31, 2025, the State University of Management was visited on a working visit by the Deputy Chairman and Head of the Executive Committee of the All-Russian public organization “Business Russia”, a graduate of the State University of Management, Nonna Kagramanyan.

    At the beginning of the visit, the rector of the State University of Management Vladimir Stroyev and the vice-rector Maria Karelina introduced the guest to the technical capabilities of the Media Center and the developments of the Engineering Project Management Center.

    As a former employee of VGTRK, Nonna Kagramanyan especially highly appreciated the Jalinga studio and noted its wide opportunities for promoting educational programs and any other media projects. The guest also liked the more familiar interior design studio, where materials for the school entrepreneurship Olympiad for the united company Wildberries and Russ are currently being recorded. As Vladimir Stroyev noted, three online master’s courses have already been recorded in the interior design studio during the short time of its operation.

    Vladimir Filatov, Director of the Center for Management of Engineering Projects at the State University of Management, spoke about the main areas of work of the Center, the activities of the inter-university student design bureau, and showed prototypes of unmanned aerial vehicles.

    Vladimir Stroyev paid special attention to the inter-university design bureau, which won the first specialized competition from the Ministry of Education and Science. The rector noted that the current project of the State University of Management surprised the expert committee, which did not expect something like this from a management university, because at the moment this is the only such experience in Russia.

    Vladimir Filatov shared the design bureau’s work scheme, in which young scientists and students perform design work, and GUU also plays the role of integrator of the entire inter-university network. In less than a year, students digitized more than 3,000 drawings ordered by TMH Engineering. The director of the engineering center reported high customer satisfaction from cooperation with GUU, as this allowed them to unload their staff engineers, while the students receive the necessary practical work experience from completing the order.

    Summing up what she saw in a conversation with the rector, GUU graduate Nonna Kagramanyan sincerely rejoiced at the successes of her native university: “You listen – and you are filled with pride. You have a whole world here, a whole world.”

    Moving to a more practical plane, Nonna Sayadovna put forward her proposals. First. Taking into account the high demand of businesses for the services of engineers, Delovaya Rossiya is ready to promote the scheme of work of student design bureaus tested at SUM, as well as manually send information about the finished developments of SUM to its partners. Second. For more systematic work, Delovaya Rossiya expects SUM to provide a list of the capabilities of the student design bureau in the form of a presentation for distribution to the partners of the organization, with the purpose of concluding agreements between them and SUM. Third. Through its production partner, Delovaya Rossiya will facilitate the start of serial production of the prototypes available at SUM. Fourth. Delovaya Rossiya asks to provide presentation materials and production conditions of the SUM Media Center for the possible resumption of the project of programs “Business Russia” together with the TV channel “Russia 24”.

    In addition, Nonna Kagramanyan discussed with the management of the State University of Management plans to create an Advanced Engineering School, new youth laboratories, additional classes in the Pre-University, as well as methodological opportunities for accelerated training of engineering personnel.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI USA: North Dakota Development Fund Approves $2.16M in Loans for Child Care, Tech and Ag Projects in Q2

    Source: US State of North Dakota

    The North Dakota Department of Commerce announced today that six companies were approved for a total of $2.16 million in loan funds through the North Dakota Development Fund, Inc. (NDDF) during the second quarter of 2025.

    “These investments reflect our commitment to economic growth and meeting community needs across North Dakota,” said Commerce Economic Development & Finance Deputy Director and Head of Investments and Innovation Shayden Akason. “We’re proud to support businesses that are expanding access to child care – an essential service that enables parents to remain in the workforce and strengthens the state’s economic resilience.”

    Loan highlights:

    • Discovery Properties LLC, Mandan – $805,000 to purchase and renovate a building for a new child care facility.
    • Reser LLC dba The Learning Tree, Minot – $100,000 to expand and remodel its existing facility.
    • Transcend Childcare Center, Fargo – $100,000 to acquire an existing child care facility.
    • OmniByte Technology Inc., Fargo – in working capital support.
    • Peace Academy Inc., Fargo – $450,000 to remodel a building and expand child care operations.
    • Dakota Valley Growers, Bathgate – $455,000 to construct a compost facility for its feedlot.

    From East to the West, the NDDF is powering progress – backing projects in Bathgate, Fargo, Minot, and Mandan. Whether it is value-added agriculture, child care, or technology, the NDDF helps bridge regions and industries to build a stronger, more resilient North Dakota

    Established in 1991, the NDDF provides flexible financing for new or expanding businesses. The fund also manages the Child Care Loan Program, which supports providers addressing critical workforce needs.

    For more information about the Development Fund, visit belegendary.link/North-Dakota-Development-Fund.

    MIL OSI USA News

  • MIL-OSI USA: American Leadership in the Digital Finance Revolution

    Source: Securities and Exchange Commission

    Good afternoon. Thank you, Norm, for your kind introduction and the invitation to be here. It gives me great pleasure to be with you all, particularly at what I believe is a defining moment for American leadership in the crypto asset markets. Before I share a few reflections, I want to thank the America First Policy Institute for convening such a timely conversation. And, I must note, in order to keep my compliance folks happy, that the views I express here today are my own and do not necessarily reflect those of the SEC as an institution or of the other Commissioners.

    ***

    Today, I would like to discuss what Commissioner Hester Peirce and I are calling “Project Crypto,” which will be the SEC’s north star in aiding President Trump in his historic efforts to make America the “crypto capital of the world.”[1] But before I discuss our plan for crypto market primacy, let me take a few moments to revisit some inflection points in the history of our financial markets that bear similarities to the one we are at now, so that the future we shape is worthy of the legacy that we inherit.

    Evolution of Capital Markets: From Buttonwood to Blockchain

    The winds of innovation have always swept through our capital markets, often at gale force. In 1792, they rustled the leaves of a buttonwood tree, beneath which two dozen stockbrokers assembled to establish the forerunner to the New York Stock Exchange. That modest agreement—fewer than a hundred words handwritten on a slip of parchment—set in motion an elegant design that would govern the flow of capital for generations.[2]

    In the centuries since, our markets have never stood still. They have expanded, evolved, and reinvented themselves in step with the ideas and technologies of their time. Markets are dynamic because of the people who participate in them. Markets channel human ingenuity toward society’s most intractable problems by rewarding those who develop the most innovative solutions that others value enough to buy. They are the mechanism by which Adam Smith’s invisible hand elevates those who act in the common good—even when pursuing their own.

    The SEC’s role is to safeguard markets that allow the spark of human creativity and skill to benefit society. Over the arc of its history, the agency has both enabled innovation and, regrettably at times, stifled it. Fortunately, progress has a way of prevailing. And when our regulatory posture is calibrated to meet innovation with thoughtfulness rather than fear, America’s leadership position has only grown stronger.

    ***

    In the 1960s—before my time, I am happy to say—Wall Street was riding a bull market. But behind the scenes, our market machinery was straining to keep up. Most clearing and settlement transactions involved a costly and cumbersome process. Rising stacks of paper stock certificates had to be physically delivered by clerks wheeling carts up and down Wall Street and in other financial districts all across America.[3] It was a scene from another century struggling to meet the demands of the modern securities markets.

    Indeed, the paper-based clearance and settlement systems, built for a gentler era, began to buckle under the weight of soaring volumes. Delays at one firm held up the work of another. Securities were lost or stolen. Fails ballooned. And many thinly capitalized broker-dealers were caught by the whiplash of scuttled transactions. In desperation, trading hours were reduced and exchanges eventually closed on Wednesdays to allow firms to process the mountains of certificates.

    The breakdown over an antiquated system was described by the SEC chairman at the time as “the most prolonged and severe crisis in the securities industry in 40 years… Firms failed. Investor confidence plummeted.” And very much to its credit, the SEC was proactive in remedying the so-called “Paperwork Crisis.” The agency helped market participants to develop the Depository Trust and Clearing Corporation, which would transform how securities were held and traded.[4] Instead of shuffling paper certificates from customer to broker, broker to broker, and broker to customer, title to shares could now be transferred through computerized ledger entries.[5] The certificates themselves were immobilized, stored securely in vaults, as ownership moved electronically, laying the foundation for the modern clearing and settlement system that has continued to this day.

    The ticker tape machine—like the one here—was also a breakthrough of its time, revolutionizing how Americans accessed market information, line by line, trade by trade.[6] But breakthroughs don’t belong in the past.

    By the late 1990s, electronic trading systems surged in popularity, unsettling old assumptions about how markets should function. Chairman Arthur Levitt likewise believed it behooved the SEC to provide regulatory flexibility for the electronic markets to innovate.[7] So, Regulation Alternative Trading Systems, or “Reg ATS,” adopted in 1999, allowed for ATSs to be regulated like broker-dealers, rather than like exchanges.[8]

    So, this brings me to today. To a moment that demands American ambition. To a project that can unleash it.

    Our regulatory framework need not be anchored to an analog past—unkind to new frontiers. After all, the future is arriving at full speed—and the world is not waiting. America must do more than just keep pace with the digital asset revolution. We must drive it.

    Forging the Future: America’s Leadership in the Golden Age of Finance

    So today, I would like the world to go on notice that under my leadership, the SEC will not stand idly by and watch innovations develop overseas while our capital markets remain stagnant. To achieve President Trump’s vision of making America the crypto capital of the world, the SEC must holistically consider the potential benefits and risks of moving our markets from an off-chain environment to an on-chain one.

    We are at the threshold of a new era in the history of our markets. As I mentioned earlier, today I am announcing the launch of “Project Crypto”—a Commission-wide initiative to modernize the securities rules and regulations to enable America’s financial markets to move on-chain.

    Just a few weeks ago, President Trump signed the GENIUS Act into law, ensuring that America will continue to lead in global payments with a gold standard stablecoin regulatory framework. Upon signing the GENIUS Act into law, I was pleased that President Trump endorsed Congressional efforts to pass crypto market structure legislation by the end of the year. I commend the House of Representatives for garnering such strong bipartisan support, and I look forward to working with the Senate as they build off the House’s work and craft market structure legislation that future proofs our markets against regulatory mischief, cementing the United States as the crypto capital of the world.

    Yesterday, the President’s Working Group on Digital Asset Markets released the PWG Report with clear recommendations for the SEC and other federal agencies to build a framework to maintain U.S. dominance in crypto asset markets. This report is the blueprint to make America first in blockchain and crypto technology. The President said last week that he wants “the entire world running on the backbone of American technology.”[9] I stand ready to help get that job done.

    That is why I am launching Project Crypto and directing the SEC’s policy divisions to work with the Crypto Task Force, led by Commissioner Peirce, to swiftly develop proposals to implement the PWG’s recommendations. Project Crypto will help ensure that the United States remains the best place in the world to start a business, develop cutting-edge technologies, and participate in capital markets. We will reshore the crypto businesses that fled our country, particularly those that were crippled by the previous administration’s regulation-by-enforcement crusade and “Operation Chokepoint 2.0”[10] Whether an incumbent or a new entrant, the SEC welcomes all market participants who are hungry to innovate.

    In accord with the PWG Report’s recommendations, I have directed the Commission staff to draft clear and simple rules of the road for crypto asset distributions, custody, and trading for public notice and comment. While the Commission staff works to finalize these regulations, the Commission and its staff will in the coming months consider using interpretative, exemptive, and other authorities to make sure that archaic rules and regulations do not smother innovation and entrepreneurship in America. Many of the Commission’s legacy rules and regulations do not make sense in the twenty-first century—let alone for on-chain markets. The Commission must revamp its rulebook so that regulatory moats do not hinder progress and competition—from both new entrants and incumbents—to the detriment of Main Street.[11]

    Onshoring Crypto: A New Day at the SEC

    Now, Project Crypto will involve a broad range of initiatives across the Commission. 

    First, we will work to bring crypto asset distributions back to America. The days of convoluted offshore corporate structures, decentralization theater, and confusion over security status, are over. President Trump has said that America is in its Golden Age—and under our new agenda, our crypto asset economy will be, too.

    In line with the PWG Report, a key priority of mine will be to establish—as swiftly as we can—a regulatory framework for distributions of crypto assets in America. Capital formation is at the heart of the SEC’s mission, yet for too long the SEC ignored market demands for choice and disincentivized crypto-based capital raising.[12] As a result, crypto markets pivoted away from offering crypto assets and deprived investors of the opportunity to use this technology to contribute to productive economic enterprises. The SEC’s head-in-the-sand posture—as well as its shoot first, ask questions later approach—are days of the past.

    Despite what the SEC has said in the past, most crypto assets are not securities. But confusion over the application of the “Howey test” has led some innovators to prophylactically treat all crypto assets as such. American entrepreneurs are harnessing blockchain technology to modernize a broad range of legacy systems and instruments. One such entrepreneur is Senator Bernie Moreno of Ohio, a successful businessman and freshman senator, who before his election to the Senate founded a company that put car titles on the blockchain.[13] He saw a need for efficiency in transferring titles and devised a practical solution with the new technology.  These entrepreneurs need—and deserve—bright-line rules for determining whether the securities laws apply to their businesses.

    I have directed the Commission staff to work to develop clear guidelines that market participants can use to determine whether a crypto asset is a security or subject to an investment contract. Our goal is to help market participants to slot crypto assets into categories, such as digital collectibles, digital commodities, or stablecoins, and assess the economic realities of a transaction. This approach can allow market participants to determine, based upon clear guidelines, whether any outstanding promises or commitments of the issuer cause the crypto asset to be subject to an investment contract.

    In addition, it should not be a scarlet letter to be deemed a security. We need a regulatory framework for crypto asset securities that allows these products to flourish within American markets. Many issuers will prefer the flexibility in product design that the securities laws afford, and investors will benefit from the opportunity to earn distributions, voting rights, and other features typical of securities. Projects should not be forced to establish decentralized autonomous organizations and offshore foundations or decentralize too early if this is not their desired plan of action. I am excited to see new use cases for crypto asset securities in commerce, such as the ability to participate in blockchain network consensus with tokenized equities.

    Thus, for those crypto asset transactions that are subject to the securities laws, I have asked staff to propose purpose-fit disclosures, exemptions, and safe harbors, including for so-called “initial coin offerings,” “airdrops,” and network rewards. Regarding these sorts of transactions, our goal should be that issuers no longer exclude Americans from their distributions to avoid legal complexity and lawsuits,[14] but instead choose to include Americans to enjoy legal certainty and an accommodating regulatory environment. It is my view that a Cambrian explosion in innovation could occur if we stay true to this course.

    Additionally, many firms seek to “tokenize” their common stock, bonds, partnership interests, and other securities, or tokenize the securities of third parties.[15] Much of this innovation is offshore today due to regulatory challenges in the United States. I also hear from our regulatory policy staff that firms—from household names on Wall Street to unicorn tech companies in Silicon Valley—are lined up at our doors with requests to tokenize. I have asked the Commission staff to work with firms seeking to distribute tokenized securities within the United States and to provide relief where appropriate to assure that Americans are not left behind. 

    Enhancing Freedom: Choice Among Custodians and Trading Venues

    Second, to achieve the President’s goals, it is incumbent on the SEC to ensure that market participants have maximum choice when deciding where to custody and trade crypto assets.  As I have said before, the right to have self-custody of one’s private property is a core American value.[16] I believe deeply in the right to use a self-custodial digital wallet to maintain personal crypto assets and participate in on-chain activities like staking. However, some investors will continue to rely on SEC registrants, such as broker-dealers and investment advisers, to hold assets on their behalf, and these firms are subject to additional regulatory requirements when they do so. It will be a priority of my chairmanship to carry out the PWG Report’s recommendation to modernize the SEC’s custody requirements for registered intermediaries.

    The prior Administration’s “special-purpose broker-dealer” framework, SAB 121, and “Operation Chokepoint 2.0,” resulted in a dearth of custodial service provider options in the market today.[17]  The existing custody rules were created without crypto assets in mind. I have directed the staff to consider how best to adapt the existing regime to facilitate the custody of crypto assets, including possible exemptive or other relief, in addition to changes to the rules themselves.

    As the PWG Report recommends, market participants “should be permitted to engage in multiple business lines under the most efficient licensing structure possible.” We should not force market participants to be stretched to fit a Procrustean bed of regulation for regulation’s sake. I am in favor of affording them the freedom to choose the most efficient regulatory framework for their business, provided that the framework adequately protects investors.

    Facilitating Super-Apps: Horizontal Integration of Product Offerings

    Third, a key priority of my chairmanship is to allow market participants to innovate with “super-apps.”[18] I am often asked, “What do you mean by a super-app?” Plain and simple: securities intermediaries should be able to offer a broad range of products and services under one roof with a single license. A broker-dealer with an alternative trading system should be able to offer trading in non-security crypto assets alongside crypto asset securities, traditional securities, and other services, like crypto asset staking and lending, without requiring fifty-plus state licenses or multiple federal licenses. Nothing in the federal securities laws prohibits SEC-registered trading venues from listing non-securities on their platforms today, and I have directed the Commission staff to develop further guidance and proposals ultimately to make this “super-app” vision a reality. Maybe they’ll call it “Reg Super-App.”

    Consistent with the PWG Report, the SEC in concert with other regulators should strive to have the most efficient licensing structure for SEC registrants. They should not be unnecessarily subject to multiple regulators or regulatory regimes. This model has worked well for banks, which are broadly exempted from many duplicative regulatory frameworks, such as broker-dealer and clearing agency registration. Regulators should provide the minimum effective dose of regulation necessary to protect investors while allowing entrepreneurs and businesses to flourish. We should not overburden them with paternalistic regulation that could drive them offshore or make American companies less competitive internationally. Our regulators should unleash the forces of venue and product competition for the benefit of all Americans. We should not artificially constrain business models and impose duplicative regulatory costs on American businesses that favor the largest firms that are better able to bear the regulatory burdens.

    Per the PWG’s recommendations, I have directed the Commission staff to develop a framework that will allow non-security crypto assets and crypto asset securities to be traded side-by-side on SEC-regulated platforms. Additionally, I have asked the staff to evaluate the use of Commission authority to permit non-security crypto assets that are subject to an investment contract to trade on trading venues that are not registered with the Commission. I am keen to pursue such a solution, as it will not only enable state-licensed crypto asset platforms that are not registered with the SEC to list certain crypto assets, but it also clears the way for CFTC-regulated platforms to offer these products with margin capabilities—even without Congress providing the CFTC with any additional authority, unlocking even greater liquidity for these assets.

    Unleashing U.S. Markets: Big Beautiful On-Chain Software Systems

    Fourth, I have directed the Commission staff to update antiquated agency rules and regulations to unleash the potential of on-chain software systems in our securities markets. On-chain software comes in many shapes and sizes—some of these systems are truly decentralized and not operated by any intermediary. Other on-chain software systems have an operator. Both types of on-chain software should have a place within our financial markets. It is essential that any crypto asset regulatory market structure create a path for software developers to unleash on-chain software systems that do not require operation by any central intermediary. Decentralized finance software systems—like automated market makers—facilitate automated, non-intermediated financial market activity. Federal securities laws have always assumed the involvement of intermediaries that require regulation, but this does not mean that we should interpose intermediaries for the sake of forcing intermediation where the markets can function without them.

    We will create space in our markets for both models, by protecting pure publishers of software code, drawing reasonable lines to distinguish intermediated and disintermediated activity, and creating rational and workable rules of the road for intermediaries that seek to operate on-chain software systems. Decentralized finance and other forms of on-chain software systems will be part of our securities markets and not drowned out by duplicative or unnecessary regulation.

    To make this vision a reality, we will need to consider some changes to our rules. For example, accommodating trading of tokenized securities on-chain may require us to explore amendments to Reg NMS, in addition to what we otherwise would do in the normal course to correct market distortions that it engenders. Many of you will remember that I co-authored with Commissioner Cynthia Glassman a lengthy dissent to the adoption of Reg NMS twenty years ago last month.[19] This dissent is even more compelling now that we have had two decades of prescriptive requirements that distort market activity and impede the evolution of our securities markets. Congress clearly intended that “competitive forces, rather than unnecessary regulation, guide the development of the national market system.”[20] I will look for ways to bring us back in line with that intent and thereby promote innovation and competition in our markets.

    Fostering Innovation:  Commercial Viability is Our True North

    Finally, innovation and entrepreneurialism are the engines of the American economy. President Trump has described America as a “nation of builders.”[21] Under my leadership, the Commission will encourage our nation’s builders rather than constrain them with red tape and one-size-fits-all rules. While the Commission is actively considering industry requests that could jumpstart innovative activity, we are also contemplating an innovation exemption that would allow registrants and non-registrants to quickly go to market with new business models and services that do not neatly fit within our existing rules and regulations. The Commission will continue to ensure that market participants adhere to certain conditions and requirements designed to achieve the policy aims of the federal securities laws.

    Under my vision for an innovation exemption, innovators and visionaries will be able to immediately enter the market with new technologies and business models but will not be required to comply with incompatible or burdensome prescriptive regulatory requirements that hinder productive economic activity. Instead, they will be able to comply with certain principles-based conditions designed to achieve the core policy aims of the federal securities laws. These conditions may include, for example, a commitment to make periodic reports to the Commission, incorporate whitelisting or “verified pool” functionality, and restrict tokenized securities that do not adhere to a token standard that incorporates compliance features, such as ERC3643.[22] I encourage market participants and SEC staff alike to have an eye towards commercial viability when contemplating what various models could look like.

    ***

    As we advance these priorities, I look forward to working with my counterparts across the Administration to make the United States the crypto capital of the world. This represents more than a regulatory shift—it is a generational opportunity.

    From the leaves of a buttonwood tree to ledgers on a blockchain, the winds of innovation still blow—and it is our task that they carry American leadership forward. After all, ladies and gentlemen, we have never been content to follow. We will not watch from the sidelines. We will lead. We will build. And, we will ensure that the next chapter of financial innovation is written right here in America.

    Thank you very much for your time today. I encourage you to be attentive to our coming announcements and proposals and, as always, I welcome your thoughtful comments and suggestions.


    [2] See The History of NYSE, New York Stock Exchange, https://www.nyse.com/history-of-nyse.

    [3] See Wall Street: The Paperwork Predicament, Time Magazine (June 21, 1968), https://time.com/archive/6636314/wall-street-the-paperwork-predicament/.

    [4] See A Short History of the Depository Trust Company, Securities and Exchange Commission Historical Society (1999), https://www.sechistorical.org/collection/papers/1990/1999_0101_DTCHistory.pdf.

    [6] Danny Lewis, The Physical Stock Ticker Is a Relic, But Its Influence Reverberates Loudly Today, Smithsonian Magazine (Nov. 15, 2016), https://www.smithsonianmag.com/smart-news/the-physical-stock-ticker-is-a-relic-but-its-influence-reverberates-loudly-today-180961092/.

    [7] Transformation & Regulation: Equities Market Structure, 1934 to 2018: Reg ATS, Securities and Exchange Commission Historical Society, https://www.sechistorical.org/museum/galleries/msr/msr04c_reg_ats.php.

    [10] See, e.g., David H. Thompson et al., Operation Choke Point 2.0: The Federal Bank Regulators Come For Crypto, Cooper & Kirk (Mar. 24, 2023),  https://www.cooperkirk.com/wp-content/uploads/2023/03/Operation-Choke-Point-2.0.pdf; Testimony of Paul Grewal, Chief Legal Officer, Coinbase, Before the U.S. House Committee on Financial Services Subcommittee on Oversight and Investigations (Feb. 6, 2025), https://www.congress.gov/119/meeting/house/117858/witnesses/HHRG-119-BA09-Wstate-GrewalP-20250206.pdf.

    [11] See The White House, Unleashing Prosperity Through Deregulation (Jan. 31, 2025), https://www.whitehouse.gov/presidential-actions/2025/01/unleashing-prosperity-through-deregulation/.

    [12] See e.g., Commissioner Hester Peirce, Hobs and Hobbes: Wharton FinTech Lecture, Securities and Exchange Commission (Nov. 1, 2024), https://www.sec.gov/newsroom/speeches-statements/peirce-remarks-wharton-fintech-110124.

    [13] See e.g., Akash Sriram, California DMV puts 42 million car titles on blockchain to fight fraud, Reuters (July 30, 2024), https://www.reuters.com/technology/california-dmv-puts-42-million-car-titles-blockchain-fight-fraud-2024-07-30/.

    [14] See Danny Nelson, Crypto Airdrops Ban U.S. Users, but Americans Are Claiming Tokens Anyway, CoinDesk (Aug. 21, 2024), https://www.coindesk.com/policy/2024/08/21/crypto-airdrops-ban-us-users-but-americans-are-claiming-tokens-anyway.

    [15] See e.g., CNBC Television, BlackRock CEO Larry Fink: ‘I want the SEC to rapidly approve tokenization of bonds and stocks’, YouTube (Jan. 23, 2025), https://www.youtube.com/watch?v=Mi3q_upPjBM.

    [16] Chairman Paul Atkins, Remarks at Crypto Task Force Roundtable on Decentralized Finance, Securities and Exchange Commission (June 9, 2025), https://www.sec.gov/newsroom/speeches-statements/atkins-remarks-defi-roundtable-060925.

    [17] See Commissioner Hester Peirce, Lava and Lamps: Opening Remarks for Crypto Custody Roundtable, Securities and Exchange Commission (Apr. 25, 2025), https://www.sec.gov/newsroom/speeches-statements/peirce-lava-lamps-opening-remarks-crypto-custody-roundtable-042525.

    [18] Chairman Paul Atkins, Prepared Remarks Before SEC Speaks, Securities and Exchange Commission (May 19, 2025), https://www.sec.gov/newsroom/speeches-statements/atkins-prepared-remarks-sec-speaks-051925.

    [19] Commissioners Cynthia Glassman and Paul Atkins, Dissent of Commissioners Cynthia A. Glassman and Paul S. Atkins to the Adoption of Regulation NMS, Securities and Exchange Commission (June 9, 2005), https://www.sec.gov/files/rules/final/34-51808-dissent.pdf.

    [21] Hendrix, supra note 11.

    [22] For additional  information on the ERC3643 protocol, see Overview of the Protocol: ERC-3643 Permissioned Tokens, ERC3643 Association, https://docs.erc3643.org/erc-3643.

    MIL OSI USA News

  • MIL-OSI Security: CISA Releases Open-Source Eviction Strategies Tool for Cyber Incident Response

    Source: US Department of Homeland Security

    WASHINGTON –Today, the Cybersecurity and Infrastructure Security Agency (CISA) released an Eviction Strategies Tool, a no-cost resource designed to support cyber defenders in their efforts to respond to cyber incidents. CISA contracted with MITRE to develop this tool that enables cyber defenders to create tailored response plans and adversary eviction strategies within minutes. They will also be able to develop customized playbooks aimed at containing and evicting adversaries from compromised systems and networks.

    The tool includes COUN7ER, a database of atomic post-compromise countermeasures mapped to adversary tactics, techniques, and procedures (TTPs), and Cyber Eviction Strategies Playbook NextGen, a web-based application that matches incident findings with countermeasures obtained from COUN7ER. Together, these resources help defenders build systematic eviction plans with distinct countermeasures to thwart and evict unique intrusions.

    “How an organization approaches remediation and eviction of an incident is critically important to a successful response effort. Over the years, we have seen organizations struggle with identifying the right steps to take and the correct sequencing of actions to properly evict advanced adversaries from their enterprises,” said Jermaine Roebuck, Associate Director for Threat Hunting, CISA. “This tool will level the playing field by making it easier for IT staff and cyber defenders to coordinate efforts and achieve a successful eviction. I encourage public and private sector organizations to incorporate this capability into their incident response plans.” 

    Key features of the Eviction Strategies Tool include:

    • Enables cyber defenders to build response plans based on either MITRE ATT&CK® or on free text that describes threat actor activities on compromised assets.
    • Exports defensive measure options in numerous formats, such as JSON, Microsoft Word and Excel, and markdown.
    • Builds on knowledge from other frameworks, including MITRE D3FEND™, as well as MITRE ATT&CK.
    • Contains more than 100 fully developed, researched and curated atomic actions that incident responders can take to contain and evict adversary agency within their networks and assets.

    To encourage collaboration and development, CISA offers Cyber Eviction Strategies Playbook NextGen and COUN7ER to the public under the MIT Open Source License. Cyber defenders are encouraged to review the new tool and provide feedback using CISA’s anonymous product survey.

    For more information on best practices to implement preventative measures and manage cyber risks, visit Cybersecurity Best Practices.

    ###

    About CISA 

    As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

    Visit CISA.gov for more information and follow us on XFacebookLinkedIn, Instagram

    MIL Security OSI

  • MIL-OSI: RCI Banque: ‘’2025 First Half Business Report is now available’’

    Source: GlobeNewswire (MIL-OSI)

    July 31st, 2025

    RCI Banque: ‘’2025 First Half Business Report is now available’’

    The RCI Banque group ‘’2025 First Half Business Report’’ is now available on the Mobilize Financial Services website www.mobilize-fs.com

    Attachment

    The MIL Network

  • MIL-OSI Submissions: Why some underwater earthquakes cause tsunamis – and others, just little ripples

    Source: The Conversation – UK – By Matthew Blackett, Reader in Physical Geography and Natural Hazards, Coventry University

    After a massive earthquake off the coast of Kamchatka, a peninsula in the far east of Russia, on July 30 2025, the world watched as the resultant tsunami spread from the epicentre and across the Pacific Ocean at the speed of a jet plane.

    In some local areas, such as in Russia’s northern Kuril Islands, tsunami waves reached heights of over three metres. However, across the Pacific there was widespread relief in the hours that followed as the feared scenario of large waves striking coastal communities did not materialise. Why was this?

    Not all underwater earthquakes result in tsunamis. For a tsunami to be generated, the Earth’s crust at the earthquake site must be pushed upwards in a movement known as vertical displacement. This typically occurs during reverse faulting, or its shallow-angled form known as thrust faulting, where one block of the Earth’s crust is forced up and over another, along what is called a fault plane.

    It is no coincidence that this type of faulting movement occurred at a subduction zone on “the Pacific ring of fire”, where the dense oceanic Pacific plate is being forced beneath the less dense Eurasian continental plate.

    These zones are known for generating powerful earthquakes and tsunamis because they are sites of intense compression, which leads to thrust faulting and the sudden vertical movement of the seafloor. Indeed, it was the ring of fire that was also responsible for the two most significant tsunami-generating earthquakes of recent times: the 2004 Indonesian Boxing Day and March 2011 Tohoku earthquakes.

    Why did the Indonesian and Japanese earthquakes generate waves over 30 metres high, but the recent magnitude 8.8 earthquake off Kamchatka (one of the strongest ever recorded) didn’t? The answer lies in the geology involved in these events.

    In the case of the 2004 Indonesian tsunami, the sea floor was measured to have risen by up to five metres within a rupture zone of 750,000 sq km.

    For the tsunami that struck Japan in March 2011, estimates indicate the seafloor was thrust upwards by nearly three metres within a rupture zone of 90,000 sq km.

    Preliminary data from the recent Kamchatka event has been processed into what geologists call a finite fault model. Rather than representing the earthquake as a single point, these models show where and how the crust ruptured, including the length of that rupture in Earth’s crust, its depth and what direction it followed.

    The model results show that the two sides of the fault slipped by up to ten metres along a fault plane of 18°, resulting in about three metres of vertical uplift. Think of it like walking ten metres up an 18° slope: you don’t rise ten metres into the air, you only rise about three metres, because most of your movement is forward rather than upward.

    However, since much of this occurred at depths greater than 20km (over an area of 70,000 sq km) the seabed displacement would probably have been reduced as the overlying rock layers absorbed and diffused the motion before it reached the surface.

    For comparison, the associated slippage for the Tohoku and Indonesian events was as shallow as 5km in places.

    An added complication

    So, while the size of sea floor uplift is key to determining how much energy a tsunami begins with, it is the processes that follow – as the wave travels and interacts with the coastline – that can transform an insignificant tsunami into a devastating wall of water at the shore.

    As a tsunami travels across the open ocean it is often barely noticeable – a long, low ripple spread over tens of kilometres. But as it nears land, the front of the wave slows down due to friction with the seabed, while the back continues at speed, causing the wave to rise in height. This effect is strongest in places where the sea floor gets shallow quickly near the coast.

    The shape of the coastline is also important. Bays, inlets and estuaries can act like funnels that further amplify the wave as it reaches shore. Crescent City in California is a prime example. Fortunately however, when the wave arrived in Crescent City on July 30 2025, it reached a height of just 1.22 metres – still the highest recorded in the continental US.

    So, not every powerful undersea earthquake leads to a devastating tsunami — it depends not just on the magnitude, but on how much the sea floor is lifted and whether that vertical movement reaches the ocean surface.

    In the case of the recent Russian quake, although the slip was substantial, much of it occurred at depth, meaning the energy wasn’t transferred effectively to the water above. All of this shows that while earthquake size is important, it’s the precise characteristics of the rupture that truly decide whether a tsunami becomes destructive or remains largely insignificant.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.

    Matthew Blackett does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Why some underwater earthquakes cause tsunamis – and others, just little ripples – https://theconversation.com/why-some-underwater-earthquakes-cause-tsunamis-and-others-just-little-ripples-262352

    MIL OSI

  • MIL-OSI Submissions: Your dog can read your mind – sort of

    Source: The Conversation – UK – By Laura Elin Pigott, Senior Lecturer in Neurosciences and Neurorehabilitation, Course Leader in the College of Health and Life Sciences, London South Bank University

    Dmytro Zinkevych/Shutterstock.com

    Your dog tilts its head when you cry, paces when you’re stressed, and somehow appears at your side during your worst moments. Coincidence? Not even close.

    Thousands of years of co-evolution have given dogs special ways to tune in to our voices, faces and even brain chemistry. From brain regions devoted to processing our speech to the “love hormone” or oxytocin that surges when we lock eyes, your dog’s mind is hardwired to pick up on what you’re feeling.

    The evidence for this extraordinary emotional intelligence begins in the brain itself. Dogs’ brains have dedicated areas that are sensitive to voice, similar to those in humans. In a brain imaging study, researchers found that dogs possess voice-processing regions in their temporal cortex that light up in response to vocal sounds.

    Dogs respond not just to any sound, but to the emotional tone of your voice. Brain scans reveal that emotionally charged sounds – a laugh, a cry, an angry shout – activate dogs’ auditory cortex and the amygdala – a part of the brain involved in processing emotions.

    Dogs are also skilled face readers. When shown images of human faces, dogs exhibit increased brain activity. One study found that seeing a familiar human face activates a dog’s reward centres and emotional centres – meaning your dog’s brain is processing your expressions, perhaps not in words but in feelings.

    Dogs don’t just observe your emotions; they can “catch” them too. Researchers call this emotional contagion, a basic form of empathy where one individual mirrors another’s emotional state. A 2019 study found that some dog-human pairs had synchronised cardiac patterns during stressful times, with their heartbeats mirroring each other.

    This emotional contagion doesn’t require complex reasoning – it’s more of an automatic empathy arising from close bonding. Your dog’s empathetic yawns or whines are probably due to learned association and emotional attunement rather than literal mind-mirroring.

    The oxytocin effect

    The most remarkable discovery in canine-human bonding may be the chemical connection we share. When dogs and humans make gentle eye contact, both partners experience a surge of oxytocin, often dubbed the “love hormone”.

    In one study, owners who held long mutual gazes with their dogs had significantly higher oxytocin levels afterwards, and so did their dogs.

    This oxytocin feedback loop reinforces bonding, much like the gaze between a parent and infant. Astonishingly, this effect is unique to domesticated dogs: hand-raised wolves did not respond the same way to human eye contact. As dogs became domesticated, they evolved this interspecies oxytocin loop as a way to glue them emotionally to their humans. Those soulful eyes your pup gives you are chemically binding you two together.

    Beyond eye contact, dogs are surprisingly skilled at reading human body language and facial expressions. Experiments demonstrate that pet dogs can distinguish a smiling face from an angry face, even in photos.

    Dogs show a subtle right-hemisphere bias when processing emotional cues, tending to gaze toward the left side of a human’s face when assessing expressions – a pattern also seen in humans and primates.

    When dogs and humans make eye contact, both experience a surge of oxytocin.
    Dmytro Zinkevych/Shutterstock.com

    Dogs rely on multiple senses to discern how you’re feeling. A cheerful, high-pitched “Good boy!” with a relaxed posture sends a very different message than a stern shout with rigid body language. Remarkably, they can even sniff out emotions. In a 2018 study, dogs exposed to sweat from scared people exhibited more stress than dogs that smelled “happy” sweat. In essence, your anxiety smells unpleasant to your dog, whereas your relaxed happiness can put them at ease.

    Bred for friendship

    How did dogs become so remarkably attuned to human emotions? The answer lies in their evolutionary journey alongside us. Dogs have smaller brains than their wild wolf ancestors, but in the process of domestication, their brains may have rewired to enhance social and emotional intelligence.

    Clues come from a Russian fox domestication experiment. Foxes bred for tameness showed increased grey matter in regions related to emotion and reward. These results challenge the assumption that domestication makes animals less intelligent. Instead, breeding animals to be friendly and social can enhance the brain pathways that help them form bonds.

    In dogs, thousands of years living as our companions have fine-tuned brain pathways for reading human social signals. While your dog’s brain may be smaller than a wolf’s, it may be uniquely optimised to love and understand humans.

    Dogs probably aren’t pondering why you’re upset or realising that you have distinct thoughts and intentions. Instead, they excel at picking up on what you’re projecting and respond accordingly.

    So dogs may not be able to read our minds, but by reading our behaviour and feelings, they meet us emotionally in a way few other animals can. In our hectic modern world, that cross-species empathy is not just endearing; it’s evolutionary and socially meaningful, reminding us that the language of friendship sometimes transcends words entirely.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.

    Laura Elin Pigott does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Your dog can read your mind – sort of – https://theconversation.com/your-dog-can-read-your-mind-sort-of-261720

    MIL OSI

  • MIL-OSI Submissions: By building the world’s biggest dam, China hopes to control more than just its water supply

    Source: The Conversation – UK – By Tom Harper, Lecturer in International Relations, University of East London

    China’s already vast infrastructure programme has entered a new phase as building work starts on the Motuo hydropower project.

    The dam will consist of five cascade hydropower stations arranged from upstream to downstream and, once completed, will be the world’s largest source of hydroelectric power. It will be four times larger than China’s previous signature hydropower project, the Three Gorges Dam, which spans the Yangtse river in central China.

    The Chinese premier, Li Qiang, has described the proposed mega dam as the “project of the century”. In several ways, Li’s description is apt. The vast scale of the project is a reflection of China’s geopolitical status and ambitions.

    Possibly the most controversial aspect of the dam is its location. The site is on the lower reaches of the Yarlung Zangbo river on the eastern rim of the Tibetan plateau. This is connected to the Brahmaputra river which flows into the Indian border state of Arunachal Pradesh as well as Bangladesh. It is an important source of water for Bangladesh and India.

    Both nations have voiced concerns over the dam, particularly since it can potentially affect their water supplies. The tension with India over the dam is compounded by the fact that Arunachal Pradesh has been a focal point of Sino-Indian tensions. China claims the region, which it refers to as Zangnan, saying it is part of what it calls South Tibet.

    At the same time, the dam presents Beijing with a potentially formidable geopolitical tool in its dealings with the Indian government. The location of the dam means that it is possible for Beijing to restrict India’s water supply.

    This potential to control downstream water supply to another country has been demonstrated by the effects that earlier dam projects in the region have had on the nations of the Mekong river delta in 2019. As a result, this gives Beijing a significant degree of leverage over its neighbours.

    One country restricting water supply to put pressure on another is by no means unprecedented. In fact in April 2025, following a terror attack by Pakistan-based The Resistance Front in Kashmir, which killed 26 people (mainly tourists), India suspended the Indus waters treaty, restricting water supplies to Pakistani farmers in the region. So the potential for China’s dam to disrupt water flows will further compound the already tense geopolitics of southern Asia.

    Concrete titans

    The Motuo mega dam is an advertisement of China’s prowess when it comes to large-scale infrastructure projects. China’s expertise with massive infrastructure projects is a big part of modern Chinese diplomacy through its massive belt and road initiative.

    This involves joint ventures with many developing nations to build large-scale infrastructure, such as ports, rail systems and the like. It has caused much consternation in Washington and Brussels, which view these initiatives as a wider effort to build Chinese influence at their expense.

    The completion of the dam will will bring Beijing significant symbolic capital as a demonstration of China’s power and prosperity – an integral feature of the image of China that Beijing is very keen to promote. It can also be seen as a manifestation of both China’s aspiration and its longstanding fears.

    Harnessing the rivers

    The Motuo hydropower project also represents the latest chapter of China’s long battle for control of its rivers, a key story in the development of Chinese civilisation.

    Rivers such as the Yangtze have been at the heart of the prosperity of several Chinese dynasties (the Yangtse is still a major economic driver in modern China) and has devastated others. The massive Yangtse flood of 1441 threatened the stability of the Ming dynasty, while an estimated 2 million people died when the river flooded in 1931.

    France 24 report on the construction of the mega dam project.

    Such struggles have been embodied in Chinese mythology in the form of the Gun-Yu myth. This tells the story of the way floods displaced the population of ancient China, probably based on an actual flooding at Jishi Gorge on the Yellow River in what is now Qinghai province in 1920BC.

    This has led to the common motif of rivers needing human control to abate natural disaster, a theme present in much classical Chinese culture and poetry.

    The pursuit of controlling China’s rivers has also been one of the primary influences on the formation of the Chinese state, as characterised by the concept of zhishui 治水 (controlling the rivers). Efforts to control the Yangtze have shaped the centralised system of governance that has characterised China throughout its history. In this sense, the Motuo hydropower project represents the latest chapter in China’s quest to harness the power of its rivers.

    Such a quest remains imperative for China and its importance has been further underlined by the challenges of climate change, which has seen natural resources such as water becoming increasingly limited. The Ganges river has already been identified as one of the world’s water scarcity hotspots.

    As well as sustaining China’s population, the hydropower provided by the dam is another part of China’s wider push towards self-sufficiency. It’s estimated that the dam could generate 300 billion kilowatt-hours of electricity every year – about the same about produced by the whole UK. While this will meet the needs of the local population, it also further entrenches China’s ability to produce cheap electricity – something that has enabled China to become and remain a manufacturing superpower.

    Construction has only just begun, but Motuo hydropower project has already become a microcosm of China’s wider push towards development. It’s also a gamechanger in the geopolitics of Asia, giving China the potential to exert greater control in shaping the region’s water supplies. This in turn will give it greater power to shape the geopolitics of the region.

    At the same time, it is also the latest chapter of China’s longstanding quest to harness its waterways, which now has regional implications beyond anything China’s previous dynasties could imagine.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.

    Tom Harper does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. By building the world’s biggest dam, China hopes to control more than just its water supply – https://theconversation.com/by-building-the-worlds-biggest-dam-china-hopes-to-control-more-than-just-its-water-supply-261984

    MIL OSI

  • MIL-OSI USA: Ezell, Kiggans, Malliotakis Introduce Port Crane Tax Credit of 2025 to Boost National Security and Domestic Manufacturing

    Source: United States House of Representatives – Congressman Mike Ezell (Mississippi 4th District)

    U.S. Representatives Mike Ezell (MS-04), Jen Kiggans (VA-02), and Nicole Malliotakis (NY-11) introduced the Port Crane Tax Credit of 2025, legislation to amend the Internal Revenue Code of 1986 to establish tax credits that incentivize the domestic production of port cranes, a critical step toward strengthening U.S. supply chain security and revitalizing American manufacturing.

    The bill comes in response to growing bipartisan concerns over foreign-made port infrastructure—particularly cranes manufactured in adversarial nations—being installed at key U.S. shipping terminals. The proposed tax credit would reduce the financial burden for companies investing in American-made cranes and components, encouraging domestic production and reducing U.S. reliance on foreign suppliers for critical port equipment.

    “Our ports are essential to our economy—and our national security,” Ezell said. “They serve as the gateways for trade, driving billions of dollars in commerce and supporting millions of jobs across the country. But more than that, they are critical infrastructure, and their vulnerability can pose real risks to our national safety. From cybersecurity threats to supply chain disruptions, foreign control over critical components—like ship-to-shore cranes—creates unacceptable exposure to espionage, sabotage, and logistical choke points. The Port Crane Tax Credit of 2025 is about putting American workers and American safety first. It will incentivize the production and deployment of domestically manufactured cranes, reduce our dependence on adversarial nations, and stimulate investment in American manufacturing and innovation. This isn’t just an economic policy—it’s a national security imperative. I’m proud to introduce this legislation to strengthen our ports, empower our workforce, and reinforce the foundation of American resilience.”

    “Port security is vital, not just to our economy, but to our national defense. And yet many of these ports don’t get the security they so desperately need. The threat of cyber intrusions and espionage from the Chinese Communist Party is real. We must do everything in our power to protect our critical infrastructure, and that includes securing the cranes that operate at our ports,” Kiggans said. “I’m deeply concerned that so many of our ports are forced to use cranes manufactured by Shanghai Zhenhua Heavy Industries (ZPMC), a Chinese state-owned company. It makes no sense to let our top adversary build and maintain the very equipment that powers our supply chains. I’m proud to support the Port Crane Tax Credit Act introduced by my colleague Rep. Ezell, which will empower our port operators to use American-made cranes. Port security is national security. The work our ports do is imperative—we cannot afford to leave that in the hands of the Chinese Communist Party.”

    “Our bipartisan legislation delivers strong incentives to produce port cranes and expand domestic manufacturing right here in the United States, advancing our America First agenda to rebuild domestic industry and protect our national security,” Malliotakis said. “For maritime communities like ours, that means more good-paying jobs, a stronger local economy, and greater independence from foreign supply chains.”

    “Without safe, reliable and affordable cranes, America’s ports would not be able to move the goods that sustain our economy and support the daily lives of American consumers,” Cary S. Davis, AAPA President and CEO said. “Instead of levying unfair taxes on port development, the Port Cranes Tax Credit Act is a tangible first step on the supply side towards incentivizing the reshoring of key CHE in the coming years since there are currently no domestic STS crane manufacturers. We thank lead sponsors Representatives Ezell and Malliotakis, alongside original cosponsors, Representatives Weber and Kiggans, for recognizing the need for supply side incentives – not punishments on the demand side through taxes – and encourage others concerned about the future of the port industry and our nation’s supply chains to support this bill and quickly get it to President Trump’s desk.”

    “Congressman Mike Ezell’s leadership on the Port Crane Tax Credit Act of 2025 is exactly the kind of forward-thinking support Gulf Coast ports like ours need to stay competitive and meet the demands of a modern, American-made supply chain,” Bo Ethridge, Port Director, Port Pascagoula.Port Pascagoula plays a critical role in the regional economy, and as manufacturing continues to return to U.S. shores, our port is experiencing increased demand and new growth opportunities. Yet we remain the only major Gulf Coast port without cargo cranes, which is an infrastructure gap that limits our ability to diversify commodities. This legislation is a vital step toward closing that gap. With federal support, including incentives like this tax credit, we can move forward with the acquisition of two mobile harbor cranes that will significantly enhance our operational capabilities and position us to serve a broader range of industries and cargo types. We’re proud to work alongside Congressman Ezell to strengthen America’s ports and power the future of domestic manufacturing.”

    “Congressman Ezell’s Port Crane Tax Credit Act will help ensure America supports critical infrastructure by growing domestic crane manufacturing capacity,” Jon Nass, CEO and Executive Director, Port of Gulfport.It creates a path to bring new skilled jobs to Mississippi and reinforces our ability to compete globally while supporting our maritime and port industries. We appreciate Congressman Ezell’s leadership on this important legislation.”

    “Strengthening and securing our nation’s supply chain resiliency depends on U.S.-built and manufactured port cranes.  This bill addresses urgent national security concerns, and our nation’s ports greatly benefit from this proposed legislation to create tax incentives to support domestic production of port infrastructure equipment,” explained Paul Anderson, Port Tampa Bay President and CEO.

    “Modern cargo handling equipment is a major capital expense for Port operations. As the largest inland public port and logistic hub in Upstate New York, the Port of Albany couldn’t function without key equipment – from our mobile harbor cranes to our front loaders and forklifts. We have to keep the supply chain moving. If we have to wait six months, a year, even two years for a piece of equipment to be delivered, that should be unacceptable, but it’s become the norm due to market conditions,” Richard J. Hendrick Sr., Port of Albany CEO and AAPA Board of Directors Vice Chair said. “The Port’s been operating for almost one hundred years, and the numbers don’t lie – our overall economic impact on New York State is annually more than $813 million with approximately 4,500 related jobs. Vessel calls have increased 41% during the past year due to Heavy Lift work and breakbulk cargo. I’m proud of those numbers, and the people who make those numbers possible, year after year, but they need to have the right equipment. We need to support onshoring manufacturing and good manufacturing jobs, and to make sure that our U.S. ports are equipped to continue to get the job done. I applaud Representatives Malliotakis and Ezell, and original cosponsors Representatives Weber and Kiggans, for taking decisive action to move the 2025 Port Cranes Tax Credit Act forward.”

    The legislation aligns with broader efforts in Congress to protect critical infrastructure and bolster domestic supply chains in the face of growing economic and geopolitical threats.

    The Port Crane Tax Credit of 2025 is expected to draw bipartisan support and will be referred to the House Committee on Ways and Means for further consideration.

    ###

    MIL OSI USA News

  • MIL-OSI USA: Ahead of Confirmation Hearing, Warren Presses HHS Nominee on Dangerous Anti-Vax, Anti-Abortion View

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren

    July 31, 2025

    As HHS General Counsel, Michael Stuart would serve as chief legal representative and advisor to RFK Jr., entire agency

    “I am concerned that…you will greenlight Trump Administration policies that will endanger public health, strip Americans of their abortion rights, and cause millions of Americans to lose their health insurance.”

    Text of Letter (PDF)

    Washington, D.C. – U.S. Senator Elizabeth Warren (D-Mass.) pressed Michael Stuart, nominee for General Counsel of the Department of Health and Human Services (HHS), on his dangerous anti-vaccine views, staunch anti-abortion advocacy, and more. Ahead of his confirmation hearing in front of the Senate Finance Committee later today — at which Senator Warren will question Stuart — Senator Warren sent Stuart a letter outlining her key concerns with his nomination.

    “Given your ideological views, zealous advocacy for restrictions on abortion, and record of anti-vaccine skepticism, I am concerned that, rather than faithfully following the law, you will greenlight Trump Administration policies that will endanger public health, strip Americans of their abortion rights, and cause millions of Americans to lose their health insurance,” wrote Senator Warren.

    As HHS General Counsel, Stuart would serve as the chief legal representative and advisor to Secretary Robert F. Kennedy Jr. and the entire agency. Stuart’s interpretation of the law would play a key role in ensuring HHS is actually achieving its goal of protecting Americans’ health.

    Stuart’s history of anti-vaccine views threaten to endanger Americans — especially given all that Secretary Kennedy has already done to roll back vaccine access. As a West Virginia state senator, Stuart was a key proponent of Secretary Kennedy’s “Make America Healthy Again” campaign and appears to espouse the same anti-vaccine beliefs. As HHS GC, Stuart would advise Secretary Kennedy on critical vaccine-related decisions, including legal standards related to the Centers for Disease Control and Prevention’s (CDC’s) Advisory Committee on Immunization Practices (ACIP).

    Senator Warren posed a series of questions about Stuart’s plan to advise HHS on issues related to vaccines, including whether he believes Secretary Kennedy’s decision to fire the entire ACIP panel was done lawfully and whether Secretary Kennedy has the statutory authority to unilaterally change vaccines covered by the Vaccine Injury Compensation Program program.

    Senator Warren also pressed Stuart on HHS’s massive cuts to National Institutes of Health (NIH) funding, which totaled $2.7 billion in just the first three months of this year.

    “These cuts are under continuing legal scrutiny, and if confirmed, you would be responsible for advising HHS on navigating this legal landscape so as to remain in compliance with the law,” wrote Senator Warren.

    Senator Warren highlighted Stuart’s staunch anti-abortion views, including his track record of advancing harmful misinformation about reproductive rights and supporting extremist pieces of anti-abortion legislation as a West Virginia state senator. As HHS General Counsel, Stuart would be responsible for providing legal guidance on reproductive health policies and regulations

    “President Trump has frozen millions of dollars in family planning funding, issued executive directives to undermine abortion access, amplified misinformation and sowed confusion about the safety of mifepristone, rolled back protections to shield patients and providers from violence, revoked EMTALA guidance that protected women with medical emergencies, eliminated leave and travel benefits for servicemembers, and more,” wrote Senator Warren. “It is crucial that the person serving in this position be capable of interpreting and enforcing laws and regulations concerning women’s access to reproductive health care with a neutral and health-focused lens.”

    Senator Warren also raised concerns about how Stuart will approach Secretary Kennedy’s mass firings at HHS, crack down on abusive tactics in Medicare Advantage, protect Head Start from drastic cuts, and implement Donald Trump’s “Big Beautiful Bill,” which is set to slash health care for millions of Americans.

    “HHS carries an enormous responsibility as its services and programming touch millions of American lives every day…The chief legal adviser to the Secretary of HHS must be able to, without bias,

    effectively advise the Secretary to ensure that all actions by HHS are in accordance with the law,” wrote Senator Warren. “I ask that you provide answers to my questions so that the Senate and the American people can better understand how you plan to carry out this role.”

    MIL OSI USA News

  • Trump’s envoy meets Netanyahu for Gaza aid, ceasefire push

    Source: Government of India

    Source: Government of India (4)

    U.S. special envoy Steve Witkoff met Israeli Prime Minister Benjamin Netanyahu on Thursday in a bid to salvage Gaza truce talks and tackle a humanitarian crisis in the enclave, where a global hunger monitor has warned that famine is unfolding.

    Shortly after Witkoff’s arrival, President Donald Trump posted on his Truth Social network: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Indirect ceasefire talks between Israel and Palestinian Islamist group Hamas in Doha ended in deadlock last week with the sides trading blame for the impasse and gaps lingering over issues including the extent of an Israeli military withdrawal.

    Witkoff arrived with Israel facing mounting international pressure over the widespread destruction of Gaza and constraints on aid in the territory, with Canada the latest Western power to say it will recognise a Palestinian state.

    Israel on Wednesday sent a response to Hamas’ latest amendments to a U.S. proposal that would see a 60-day ceasefire and the release of some hostages in exchange for Palestinian prisoners, a source familiar with the details said.

    There was no immediate comment from Hamas. Israeli officials have in recent days said Israel might declare that it would annex parts of Gaza if the stalemate continues.

    Gaza medical officials said at least 23 people were reported killed by Israeli fire across the enclave, including 12 people among crowds who had gathered to receive aid around the Netzarim corridor, an area held by Israeli troops in central Gaza.

    The Israeli military said that its troops had fired warning shots to disperse crowds that were endangering them with no casualties identified.

    Since the war began, the Gaza health ministry has recorded 156 deaths from starvation and malnutrition, most of them in recent weeks, including at least 90 children.

    Israel’s Public Broadcaster Kan said Witkoff would also visit an aid distribution site in Gaza.

    Confronted by rising international outrage over images of starving children, Israel said on Sunday it would halt military operations for 10 hours a day in parts of Gaza and designate secure routes for convoys delivering food and medicine.

    CALLS ON HAMAS TO DISARM

    The U.N. Office for the Coordination of Humanitarian Affairs said on Wednesday the United Nations and its partners had been able to bring more food into Gaza in the first two days of pauses, but the volume was “still far from enough”.

    Even with more aid running through Gaza, residents face peril from Israeli forces and Palestinian looters when trying to reach the supplies.

    “I have tried several times to grab a sack of flour. The only time I managed to do so, someone with a knife froze me in the street and took it away, threatening to stab me,” one man from Deir Al-Balah told Reuters, asking not to be identified.

    With the number of Palestinians killed in almost two years of war passing 60,000 this week, pressure has been mounting in Gaza on Hamas to reach a ceasefire deal with Israel.

    “We can save thousands of lives and maybe the war wouldn’t resume,” Rami from Gaza City told Reuters via a chat app.

    Mothers of hostages led a protest outside Netanyahu’s office, calling on the government to end the war.

    “End this nightmare,” said Yael Engel-Lichi, whose nephew had been taken hostage and released in a previous ceasefire. Twenty of the 50 hostages still held by militants in Gaza are believed to still be alive.

    Netanyahu, whose ruling coalition includes two far-right parties who want to conquer Gaza and re-establish Jewish settlements there, has said he will not end the war until Hamas no longer rules the enclave and lays down its arms.

    Hamas has rejected calls to disarm.

    Qatar and Egypt, who are mediating the ceasefire efforts, backed a declaration on Tuesday by France and Saudi Arabia which outlined steps for a two-state solution to the Israeli-Palestinian conflict.

    The declaration says Hamas “must end its rule in Gaza and hand over its weapons to the Palestinian Authority”, which is led by its rivals and exercises limited self-rule in parts of the Israeli-occupied West Bank.

    Israel has ruled out the Palestinian Authority gaining control of Gaza and on Thursday Defence Minister Israel Katz and Justice Minister Yariv Levin voiced support for annexing the West Bank – territory which the Palestinians seek for a state.

    Israel has denounced declarations by France, Britain and Canada since last week that they may recognise a Palestinian state, which Israel says amounts to rewarding Hamas for its October 7, 2023 assault on Israeli territory.

    That attack, when fighters killed 1,200 people and took 251 hostages back to Gaza, precipitated the war.

    German Foreign Minister Johann Wadephul, embarking on a visit to Israel, said negotiations for a two-state solution must begin but that for Germany, the recognition of a Palestinian state would come at the end of that process.

    (Reuters)

  • MIL-OSI: Introducing Rippling Travel: For Faster Bookings, Smarter Spending, and Better Travel

    Source: GlobeNewswire (MIL-OSI)

    SAN FRANCISCO, July 31, 2025 (GLOBE NEWSWIRE) — Rippling, a leading business software company, today announced the launch of Rippling Travel, allowing companies to save more time and money on business travel. Rippling Travel unifies expense management, corporate cards, bill pay, payroll, and travel booking all within a single, integrated system – making it faster, easier, and cheaper than ever to book and manage corporate travel.

    “At Rippling, our focus has always been to free people to work on hard problems by automating away repetitive admin work so they can focus on strategic work,” said Matt Epstein, General Manager, Rippling Spend.

    That’s why we launched Rippling Travel. It makes it insanely easy for employees to book flights, hotels, and cars without having to worry about what is (and isn’t) in-policy. And for companies to automatically control every penny their employees spend on business travel, from in-flight seat upgrades to reimbursements on the road.

    Corporate travel has historically been a headache. For employees, it takes time and causes stress. For employers, it requires endless administrative tasks and back-and-forths on approvals. In fact, in a recent Rippling survey, 80% of companies said business travel is critical to revenue generation – but 93% still using legacy travel platforms report budget overruns and administrative inefficiencies.

    Rippling Travel solves these issues, providing an alternative to outdated software and disparate systems with a single system for unified travel and expense management that offers:

    • Seamless and cost conscious booking: Rippling Travel makes it quick and easy for employees to book and manage their travel. We partnered with Duffel to offer options from Expedia Group, Priceline, Booking.com, and direct airline integrations – all from within one intuitive platform.
    • Hyper-custom policies: Rippling Travel allows you to build hyper-custom policies around flights, hotels, and car rentals in just a few clicks. Rippling Travel’s deep integration with other business systems means policies automatically adapt to internal organizational changes (such as promotions or procedural updates).
    • Comprehensive reporting and analytics: Integrated into the Spend suite, Rippling Travel empowers employers with real-time, comprehensive data and analytics reports on all travel and spend related matters across the business.

    Ready to consolidate all spend management with Rippling – including Travel? Learn more and sign up for a demo today.

    About Rippling
    Rippling gives businesses one place to run HR, IT, and Spend – globally. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system. Based in San Francisco, CA, Rippling has raised $1.8B from the world’s top investors – including Kleiner Perkins, Founders Fund, Sequoia, and Bedrock.

    The MIL Network

  • MIL-OSI Russia: China looks forward to further deepening dialogue and consultations with the US — Chinese Ministry of Commerce

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 31 (Xinhua) — China hopes to further deepen dialogue and consultations with the United States to achieve new mutually beneficial results, Chinese Ministry of Commerce spokesperson He Yadong said Thursday.

    The spokesman made the remarks at a regular departmental press briefing in response to a question about the recent trade talks between China and the United States held in Stockholm, Sweden.

    He Yadong said the two sides had a frank, in-depth and constructive exchange of views on China-US economic and trade relations, macroeconomic policies and other issues of common interest. He said the two sides also reviewed and approved the progress in implementing the consensus reached in Geneva and the framework agreements reached in London.

    Based on the consensus reached at the Stockholm talks, both sides will continue to promote a 90-day extension of the suspension of the U.S.’s 24 percent mirror tariffs and China’s countermeasures, He Yadong said.

    According to him, the consensus reached in Stockholm is expected to contribute to the further stabilization of Chinese-American trade and economic ties and bring more confidence to the development and stability of the global economy.

    China hopes to work with the United States in accordance with the important agreements reached by the two heads of state during their telephone conversation to make the most effective use of the role of the bilateral economic and trade consultation mechanism, the official representative of the Chinese Ministry of Commerce added. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI: Presentation Reveals Details on Potential Starlink “Super-IPO” Announcement Predicted August 13

    Source: GlobeNewswire (MIL-OSI)

    Baltimore, MD, July 31, 2025 (GLOBE NEWSWIRE) — A released presentation suggests Elon Musk’s Starlink could be preparing for what some are calling a “Super-IPO” with an announcement expected as soon as August 13, 2025.

    In the presentation, tech entrepreneur James Altucher outlines what he describes as “a trillion-dollar technological revolution” that he believes “could have a far bigger impact on the world than any other technology [Elon Musk] has created before.”

    Three “Smoking Guns” Point to A Potential Announcement

    According to the presentation, Altucher highlights three pieces of evidence that Starlink is preparing for a public announcement:

    • Elon Musk Statement:
      In a previous public comment, Musk confirmed plans to take Starlink public when its cash flow became predictable. Altucher notes that the company has “officially crossed that milestone”
    • Financial Motivation:
      “What Musk really needs is another publicly traded company that would allow him to unlock some of his wealth and take the pressure off Tesla,” the presentation states, citing Barron’s coverage
    • Corporate Spinoff:
      Bloomberg reported that “SpaceX is discussing an initial public offering for its fast-growing Starlink satellite business as soon as late 2024… in a bid to capitalize on robust demand for communications via space”

    Altucher argues these moves combined with “a major industry conference scheduled for August 13, 2025” make the date a likely venue for what he calls a “historic announcement”

    The Technology Behind the Headlines

    The presentation describes Starlink as a radical reinvention of internet access, delivering “fast, reliable, unlimited internet through the air… directly to your device.” .Altucher claims the technology “could cripple the trillion-dollar telecom industry over time” while connecting “billions of previously un-connected people” to the web.

    Why This Matters

    “Fifty years from now, people may remember it as one of the greatest innovations of the 21st century,” Altucher says in the presentation. “An innovation which could be bigger than Tesla or anything else Elon has done before.”

    About James Altucher

    James Altucher is a tech entrepreneur, venture capitalist, and Wall Street Journal bestselling author. He has been recognized as “one of the best venture capitalists, angel investors, and tech entrepreneurs in the world.” Altucher has built a career spotting transformative technology trends early and has been featured in publications such as CNBC. He is the founder of Altucher’s Investment Network and host of The James Altucher Show podcast, which has been downloaded more than 40 million times.

    The MIL Network

  • MIL-OSI: Immunefi Adds Onchain Monitoring to Protect $180B+ in Digital assets as 2025 Crypto Hacks Top $3.1B

    Source: GlobeNewswire (MIL-OSI)

    Immunefi’s Magnus platform becomes first unified system to monitor smart contracts, social engineering, and reputational threats in real-time, bringing together Fuzzland and Failsafe to catch smart contract exploits, social engineering attacks, and brand threats in real-time.

    AUSTIN, Texas – July 31, – With crypto hacks surpassing $3.1 billion in 2025 and access-control flaws still the industry’s biggest security gap, Immunefi – the leading onchain security platform protecting $180 billion in user funds – is launching onchain monitoring capabilities across protocols like Arbitrum, zkSync, and Curve Finance via its unified platform, Magnus.

    Immunefi now integrates with Fuzzland and FailSafe to bring smart contract monitoring and alerts into their Magnus platform. 

    The launch comes as the industry faces an evolution in attack vectors that shows a significant shift from code-based exploits to operational security failures, with social engineering and compromised keys becoming the dominant threat vectors.

    Take Arbitrum, which now secures over $3.4 billion in stablecoins including PayPal’s PYUSD, or zkSync, which has quickly become the second-largest network for tokenized real-world assets behind Ethereum, with $2.4 billion in value. These aren’t just DeFi platforms anymore, they’re becoming financial infrastructure. And with that shift, real-time threat detection and brand protection are no longer nice-to-haves, they’re essential.

    Magnus unifies monitoring to detect and neutralize these threats in minutes instead of hours. Trusted by leading networks like Ethereum, BNB, and Arbitrum, it gives teams the response speed today’s onchain economy demands.

    At the core of the Magnus is Codexa, the most comprehensive dataset of blockchain vulnerabilities in the industry by orders of magnitude. Codexa powers Magnus, leveling up its security models and ensures Magnus continuously evolves alongside emerging threats, giving protocols intelligence fast enough to intervene before funds disappear. With Codexa, Immunefi moves beyond static monitoring tools toward adaptive, AI-native security infrastructure.

    Although crypto hackers can drain millions in seconds, security teams currently waste precious hours jumping between disconnected tools trying to piece together threats and respond to potential security incidents. Magnus’s onchain monitoring enables teams to receive unified alerts through their preferred channels (Slack, PagerDuty, etc.) and access all threat details in one consolidated view so they can act on threats immediately rather than spending time on manual correlation.

    “When every second counts during an active exploit, having all your security intelligence in one place is the difference between a close call and a catastrophe,” said Mitchell Amador, CEO and Founder of Immunefi. “Unlike platforms that lock you into proprietary tools, Magnus lets you leverage best-in-class monitoring providers while maintaining unified operations.”

    The integration brings together complementary monitoring capabilities across the broadest range of blockchains in the industry. Fuzzland contributes both monitoring alerts and 24/7 automated penetration testing findings via API, scanning thousands of transactions per second and having already prevented over 110 attacks and rescued $33.4 million in assets. FailSafe brings continuous security signal coverage across leading chains, with advanced tools for regulatory-focused use cases such as stablecoin compliance under MiCA and DORA.

    Together, these partners are integrating their monitoring capabilities directly into the Magnus platform, beginning with support for Ethereum, BNB Smart Chain, Arbitrum, Polygon, Base, and Avalanche. Additional chains will be added over time.

    Magnus has already attracted adoption from major protocols, including Babylon Labs and Lombard Finance, which together secure $8 billion in Bitcoin DeFi assets. By unifying partner monitoring within a single interface, Magnus enables these institutions to maintain proactive, transparent security operations that meet the expectations of regulators and institutional counterparties.

    Magnus’s monitoring capabilities alert teams to unusual patterns, behaviors, and incidents in real-time to enable rapid response to potential threats. When threats are detected, teams receive immediate notifications with full context that reduces the time from detection to action.

    “Security fragmentation has been the Achilles’ heel ” of protocols trying to scale to institutional standards,” said Aneirin, cofounder of FailSafe. “With Magnus, we unify cross-chain monitoring, threat detection, and policy enforcement into a single command center, giving security teams real-time visibility and compliance-grade coverage that used to require a patchwork of tools.”

    The monitoring integration is available immediately in beta release for Magnus early access partners.

    -ends-

    For more information please contact:
    immunefi@clpr.agency

    About ImmunefiImmunefi is the leading onchain security platform, working with groundbreaking protocols such as Ethereum Foundation, Chainlink, Optimism, Arbitrum, and many more. The company’s latest product, Magnus, bridges the gap between security solutions by creating a unified platform for security operations. The platform’s growing community of over 60,000 security researchers protects $180B in user funds and has prevented over $25B in hacks across 500+ protocols. Learn more at immunefi.com

    The MIL Network

  • MIL-OSI: Viridien: 2025 Interim Financial Report available

    Source: GlobeNewswire (MIL-OSI)

    Viridien

    Société Anonyme with a share capital of €7,180,449
    Registered office: 27 avenue Carnot, 91300 Massy
    No.: 969 202 241 – RCS Evry

    2025 Interim Financial Report available

    Paris, France – July 31, 2025

    Viridien announced that its interim financial report as at June 30, 2025 was filed today with the Autorité des Marchés Financiers (AMF).

    This document is available on the Company’s website: https://www.viridiengroup.com/ under the Investors section (both in “Regulated information” and “Results and Publications”).

    About Viridien:

    Viridien (www.viridiengroup.com) is an advanced technology, digital and Earth data company that pushes the boundaries of science for a more prosperous and sustainable future. With our ingenuity, drive and deep curiosity we discover new insights, innovations, and solutions that efficiently and responsibly resolve complex natural resource, digital, energy transition and infrastructure challenges. Viridien employs around 3,400 people worldwide and is listed as VIRI on the Euronext Paris SA (ISIN: FR001400PVN6).

    Contact: Legal Department, 27 avenue Carnot, 91300 Massy

    Attachment

    The MIL Network

  • MIL-OSI USA: IAM District 4 Wins Voluntary Recognition for Maryland Veterans Home Nurses

    Source: US GOIAM Union

    In a significant development for healthcare workers at Charlotte Hall Veterans Home in Maryland, PruittHealth, the management company that runs the Home, has voluntarily recognized IAM District 4 as the official bargaining representative for approximately 80 Registered Nurses (RNs) and Licensed Practical Nurses (LPNs) employed at the facility.

    The decision came on July 9, 2025, just days before a union election was scheduled to take place. 

    IAM District 4 Organizer Kevin Gallegher had been in the process of bringing the group to a vote before IAM Eastern Territory International Representative Andrew Hounshell and the company’s legal counsel cordially agreed that PruittHealth would forgo a union election process. The company would instead voluntarily recognize IAM Union representation of the nurses based on a majority showing of support for the union through signed authorization cards.

    The bargaining unit includes all full-time and regular part-time RNs and LPNs at the veterans home, excluding managerial and certain supervisory roles. 

    IAM District 4 already represents multiple groups of workers at Charlotte Hall Veterans Home, including non-professional and service-related staff. Initial IAM representation at the facility started with maintenance staff, but the successful relationship between IAM Union and Charlotte Hall Veterans Home allowed for the IAM’s representation to grow to cover the entire facility’s non-managerial employees.

    “I’m very excited to see my home shop become completely unionized,” said IAM District 4 Business Representative Bonna McCarthy, who previously won voluntary recognition of drivers and the laundry and housekeeping staff with the company. “I’ve always believed we’re stronger together than divided like we have been for the past eight years. I look forward to preparing for negotiations and getting a fair contract so that the nurses’ voices can be heard.”

    Because of its strong presence at Charlotte Hall and its commitment to uplifting and supporting veterans, the IAM Union has put significant effort into bettering the veterans home to benefit all: In 2022, the IAM installed a new entry sign at the home after completely renovating and upgrading the communal courtyard space, all made possible with funds raised by the 2021 IAM International President’s Capital Classic Golf Tournament

    Additionally, IAM Veterans Services conducted collections of household and comfort items at IAM headquarters for Charlotte Hall veterans during the holiday season, and the IAM’s Winpisinger Center staff, which includes Local 4 members, host veterans from the home for lunch multiple times a year.

    “The recognition demonstrates a cooperative approach by PruittHealth to respect workers’ choices and avoid prolonged labor disputes,” said IAM District 4 Directing Business Representative Jay Wadleigh. “We’re proud to represent the staff at Charlotte Hall Veterans Home. We’re proud of the work they do, and we’re proud of the mutually beneficial relationship we have with management that ultimately leads to happy staff and well-cared-for veterans.”

    IAM District 4 now looks forward to entering negotiations with McCarthy at the helm to secure a first contract that reflects the needs and priorities of these dedicated nurses and new union members.

    “IAM District 4 is a strong force for good in Southern Maryland,” said IAM Eastern Territory General Vice President David Sullivan. “Their solidarity and union pride is strong, and we are pleased to welcome the rest of Charlotte Hall Veterans Home staff into our union. These are caregivers of our veterans, and we intend to make all of their lives better through the IAM.”

    The post IAM District 4 Wins Voluntary Recognition for Maryland Veterans Home Nurses appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Security: Greater strategic alignment key to facing Europe’s crime threats

    Source: Interpol (news and events)

    Police leaders throughout the region look to strengthen cooperation against terrorism, illicit trafficking and other crimes

    OHRID, North Macedonia – Three days of discussions between senior police officers from 53 countries in Europe and the wider INTERPOL membership have led to a call for greater coordination to effectively combat the region’s most pressing security threats.

    INTERPOL’s 50th European Regional Conference saw delegates adopt recommendations to more closely align international efforts in a range of strategic areas, including counterterrorism, illicit trafficking and the sharing of police data.

    The meeting took place as Europe faces a historic peak in the production of illegal narcotics, which has strengthened organized crime groups and led to an accompanying rise in violent crime across the region.

    “The globalized nature of crime means that our respective borders are only as strong as our weakest links,” said Stephen Kavanagh, INTERPOL Executive Director of Police Services.

    “The data contributed to INTERPOL is a contribution not just to national or regional security, but to global security,” Mr Kavanagh added.

    No alternative

    A panel featuring leaders from European Union law enforcement bodies Europol and Frontex focused on the need for greater alignment between INTERPOL and regional policing bodies, to build a global model for a police data-sharing architecture and ensure Global Policing Goals are aligned with the United Nations Sustainable Development Goals.

    “The most important part of international police cooperation is information exchange,” said Peter De Buysscher, INTERPOL Vice President for Europe, who chaired the conference. “We need a global data-sharing framework. There is no alternative.”

    The volume of data in policing has increased dramatically in recent years, opening up new investigative opportunities but also posing data management challenges. At the international level, there is a crucial need to minimize duplication and increase alignment so that investigators or frontline officers have access to the right information when they need it.

    Joint initiatives such as FIELDS, which brings together capabilities from INTERPOL and Frontex into a unified system that helps border officials spot fraudulent travel and identity documents, was highlighted as a concrete example of successful alignment.

    What drug traffickers fear

    European police leaders also discussed the rapidly evolving state of play with regards to drug trafficking and the organized crime groups behind the illicit trade.

    The adaptability of networks was identified as a key challenge to enforcement, with groups often working across national and regional lines to secure ever-greater profits. To effectively combat such networks, police must be just as adaptive and even more collaborative.

    Recent successes in INTERPOL initiatives such as the I-CAN project targeting the ‘Ndrangheta mafia group, closely involved in bringing cocaine from Latin America into Europe, were highlighted as examples of innovative international police cooperation.

    Launched in 2020, I-CAN has already produced results that have “exceeded expectations”, according to  one conference speaker, with more than 40 high-profile arrests and tens of thousands of pieces of intelligence exchanged.

    “This is what drug traffickers fear,” said one closing speaker. “All of us in the same room, working together, exchanging information and breaking down walls.”

    MIL Security OSI

  • MIL-OSI: NDT Global Announces Strategic Addition of Entegra®

    Source: GlobeNewswire (MIL-OSI)

    QUÉBEC CITY, July 31, 2025 (GLOBE NEWSWIRE) — NDT Global, a leading provider of advanced diagnostic inspection and integrity solutions for the energy sector, is proud to announce the acquisition of Entegra, a premium technology company specializing in Ultra-High-Resolution Magnetic Flux Leakage (UHR MFL) in-line inspection services.

    This strategic union brings together two market-leading technology providers significantly enhancing NDT Global’s service portfolio, strengthening its growing position in the gas pipeline market, and reinforcing its continued commitment to delivering the best data driven insights and high-performance integrity solutions. Together, NDT Global and Entegra are affirming their stance in redefining the future of pipeline integrity. By harnessing the power of technology, the complimentary services will act as an enabler for safer, more cost-effective pipeline operations, empowering customers with the insights needed to make smarter, faster decisions for their assets.

    The combination of NDT ILI, Dynamic Risk, and now Entegra brings together highly complementary technology platforms in ultrasonic testing (UT), Acoustic Resonance (ART), UHR MFL, and data management solutions, creating a unique set of solutions for pipeline operators seeking best-in-class data-driven inspection, diagnostic, and integrity services across a diverse asset base.

    “This is a pivotal moment for NDT Global,” said Martin Thériault, CEO and Chairman of NDT Global. “Entegra’s entrepreneurial spirit, technical leadership and excellence, and deep market knowledge make them an ideal fit for our joint vision going forward. The company will work on accelerating the development of next-generation inspection technologies and, in return, deliver an even greater value to customers through enhanced service offerings and global reach.”

    Paul Cooper, President of NDT Global, highlights “The addition of Entegra’s market-leading capabilities to our portfolio allows us to offer a broader, more integrated suite of solutions to our clients. It also helps us to better serve the growing needs of the gas pipeline sector, where Entegra has built a strong reputation for innovation and reliability. All in all, the merged entities will accelerate our joint growth journey based on technology and innovation. It’s a bold step forward in our mission to deepen partnerships and lead the industry with innovation that protects what matters most.”

    “I can’t thank Amberjack Capital enough for their direction and support the past 10 years, and I’m really excited about what we’re going to achieve in the next phase of our growth story as we bring together the two best brands in in-line-inspection” said Mark Olson, Chairman and CEO, Entegra. “Our purpose, our ‘Why’ if you will, is to make better every pipeline with which we interact, and this deal accelerates that quest by several years.”

    The combined entity will benefit from expanded international reach and the ability to deliver joint UT and MFL scopes, axial and now circumferential, to valued clients. This move also supports NDT Global’s and Entegra’s long-term vision of becoming the most trusted partner in pipeline integrity management.

    The transaction was made possible through the continued support of Novacap, the majority shareholder of NDT Global, alongside La Caisse (formerly CDPQ), and NDT Global as well as Entegra founders and executives. Before today’s announcement, Entegra was owned by Amberjack Capital Partners as well as a group of co-founders led by Mark Olson, who played a pivotal role in building the company’s reputation for innovation and excellence in the MFL space. As part of the transaction, the NDT Global and Entegra founders and key management will remain shareholders of the combined company.

    “We are thrilled to unite two leading innovators in the ILI industry, combining world-class technology platforms and talented teams. This partnership enhances NDT’s ability to serve customers and uphold the integrity of critical infrastructure globally. We are proud to continue our partnership with Martin, Paul and the NDT team, and we warmly welcome Mark and the entire Entegra family as we work together to build a stronger, more impactful business together” added David Lewin, Lead Senior Partner Novacap.

    “NDT Global has distinguished itself through its ability to innovate and develop state-of-the-art solutions, becoming a global reference in the integrity and inspection services industry,” adds Kim Thomassin, Executive Vice-President and Head of Québec at La Caisse. “With this investment, La Caisse is strengthening NDT Global’s ambitious growth strategy through both equity and debt financing — building on our recent support to unlock the company’s full potential.”

    Jason Turowsky, Managing Partner of Amberjack Capital Partners, said “Amberjack is proud to have supported Entegra’s exceptional growth, driven by its talented team and commitment to innovation. We are confident the combination with NDT Global will propel further advancements in pipeline integrity solutions, benefiting clients globally. We congratulate Mark and the Entegra team and look forward to their continued success.”

    McCarthy Tétrault LLP and Willkie Farr & Gallagher LLP acted as legal advisors to NDT Global, while Jefferies LLC acted as exclusive financial advisor to NDT Global.

    Sidley Austin LLP acted as legal advisor to Entegra, while Baird acted as its exclusive financial advisor.

    ABOUT NDT GLOBAL

    NDT Global is the leading provider of in-line diagnostic solutions, integrity management and subsea robotics solutions, offering advanced data insights and services that ensure the safety and longevity of energy-sector infrastructure assets. Recognized as the forerunner in ultrasonic inspection innovations—including Pulse Echo, Pitch-and-Catch, Phased Array, and Acoustic Resonance (ART Scan) technologies — the company continues to push technological advancement and the introduction of revolutionary new inspection technologies, including gas pipelines, to ensure the safety of its customers’ critical assets. NDT Global employs approximately 880 people. Learn more at www.ndt-global.com.

    ABOUT ENTEGRA

    Recognized as the industry-leading, trusted supplier of in-line inspection services for corrosion, 3rd party damage, pipe grade classification, hard spot assessment, and for assessing the effectiveness of cathodic protection systems for oil and gas pipelines, Entegra provides the most thorough, clear, and nuanced knowledge about the condition of pipelines inspected. The Company offers ultra-high resolution axial MFL, circumferential MFL, Caliper, low-field, GPS mapping, and cathodic protection current mapping services for critical energy infrastructure. Learn more at www.entegrasolutions.com.

    ABOUT NOVACAP

    Novacap is a leading North American private equity investor and one of Canada’s most experienced private equity firms. Founded in 1981 to partner with visionary entrepreneurs, Novacap focuses on middle market and lower-middle market companies in four core sectors: Technologies, Digital Infrastructure, Industries and Financial Services. Novacap combines deep sector specific expertise and strategic and operational excellence to partner with entrepreneurs and management teams. Since its inception, the firm has made primary and add-on investments in more than 250 companies. With over C$11 billion in assets under management and a presence across offices in Montreal, Toronto, and New York, Novacap accelerates value creation through strategic growth initiatives and a strong focus on execution. For more information, please visit: https://novacapcorp.com.

    ABOUT LA CAISSE

    At La Caisse, formerly CDPQ, we have invested for 60 years with a dual mandate: generate optimal long-term returns for our 48 depositors, who represent over 6 million Quebecers, and contribute to Québec’s economic development.

    As a global investment group, we are active in the major financial markets, private equity, infrastructure, real estate and private credit. As at December 31, 2024, La Caisse’s net assets totaled CAD 473 billion. For more information, visit lacaisse.com or consult our LinkedIn or Instagram pages.

    La Caisse is a registered trademark of Caisse de dépôt et placement du Québec that is protected in Canada and other jurisdictions and licensed for use by its subsidiaries.

    ABOUT AMBERJACK CAPITAL PARTNERS

    Amberjack Capital is a private equity firm that invests in and partners with entrepreneurs and business owners to build market leaders serving the industrial, infrastructure and environmental services end markets. Often the first institutional investor in founder-led companies, Amberjack has a particular focus on supporting high performing companies undertaking strategic or transformative initiatives. Headquartered in Houston, TX, the firm has raised $2.1 billion of committed capital since its inception in 2006 and has invested in over 50 companies.

    For more information:

    Tracey Murray
    Director, Marketing
    NDT Global
    Tel.: (403) 819-9351
    tmurray@ndt-global.com

    The MIL Network

  • MIL-OSI USA: Kaine, Curtis, And Merkley Introduce Bipartisan Bill to Address Crimes in Brazilian Amazon and Strengthen Regional Stability

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine

    WASHINGTON, D.C. – Today, U.S. Senators Tim Kaine (D-VA), John Curtis (R-UT), and Jeff Merkley (D-OR), senior members of the Senate Foreign Relations Subcommittee on the Western Hemisphere, introduced the Strengthening the Rule of Law in the Brazilian Amazon Act. The bipartisan legislation addresses crimes committed by transnational criminal organizations and drug trafficking groups, which are devastating communities in and around the Brazilian Amazon, upending the rule of law, and accelerating environmental degradation and deforestation. Violent deaths in the Brazilian Amazon are significantly higher than in other parts of the country. The bill would provide the U.S. government with more tools to support U.S.-Brazil efforts to address these crimes and prioritize identifying investment opportunities for U.S. companies in the Brazilian Amazon.

    “Addressing cartel violence and deforestation in the Brazilian Amazon is important to protecting our national security, promoting stability in the Western Hemisphere, and preserving the environment,” said Kaine, Ranking Member of the SFRC Subcommittee on the Western Hemisphere. “I’m proud to join with Senators Curtis and Merkley to introduce this bipartisan legislation to expand the United States’ role in cracking down on violence, forced displacement, and environmental degradation in the Amazon.”

    “Criminal networks thrive where the rule of law is weak—and when they do, both people and the planet suffer,” said Curtis, Chair of the SFRC Subcommittee on the Western Hemisphere. “This bill helps us partner with Brazil to crack down on lawlessness in the Amazon and support a model of conservation that is also rooted in economic opportunity.“

    “The Amazon provides sanctuary for countless wildlife, and the trees of this tropical forest support not only Brazil’s environment, but also the lungs of the planet,” said Merkley, a senior member of the Senate Foreign Relations Committee.?“As the impacts of climate chaos become deadlier and more frequent—threatening our health, planet, and future—the U.S. must support Brazil’s efforts to stand against the criminal and often violent efforts driving deforestation and environmental degradation in the Brazilian Amazon.”

    Specifically, the bipartisan Strengthening the Rule of Law in the Brazilian Amazon would:

    • Direct the U.S. Secretary of State, in coordination with other U.S. federal agencies, to prioritize supporting Brazil’s efforts to identify and disrupt transnational criminal networks committing environmental crimes.
    • Direct support to local communities and vulnerable areas in the Brazilian Amazon.
    • Recommend the U.S. International Development Finance Corporation (DFC) place an individual in Brazil responsible for identifying sustainable economic opportunities for U.S. businesses in the Brazilian Amazon.
    • Require the Secretary of State to submit a report to Congress regarding drivers of deforestation and environmental degradation in the Brazilian Amazon.
    • Advise the United States to encourage international financial institutions to prioritize promoting sustainable development in the Amazon and oppose loans or programs that would exacerbate environmental crimes in the region.

    Full text of the bill is available here.

    MIL OSI USA News

  • Judges question whether Trump tariffs are authorized by emergency powers

    Source: Government of India

    Source: Government of India (4)

    U.S. appeals court judges sharply questioned on Thursday whether President Donald Trump’s tariffs were justified by the president’s emergency powers, after a lower court said he exceeded his authority with sweeping levies on imported goods.

    The U.S. Court of Appeals for the Federal Circuit in Washington, D.C., is considering the legality of “reciprocal” tariffs that Trump imposed on a broad range of U.S. trading partners in April, as well as tariffs imposed in February against China, Canada and Mexico.

    In hearing arguments in two cases brought by five small U.S. businesses and 12 Democratic-led U.S. states, judges pressed government lawyer Brett Shumate to explain how the International Emergency Economic Powers Act (IEEPA), a 1977 law historically used for sanctioning enemies or freezing their assets, gave Trump the power to impose tariffs.

    Trump is the first president to use IEEPA to impose tariffs.

    The judges frequently interrupted Shumate, peppering him with a flurry of challenges to his arguments.

    “IEEPA doesn’t even say tariffs, doesn’t even mention them,” one of the judges said.

    Shumate said that the law allows for “extraordinary” authority in an emergency, including the ability to stop imports completely. He said IEEPA authorizes tariffs because it allows a president to “regulate” imports in a crisis.

    The states and businesses challenging the tariffs argued that they are not permissible under IEEPA and that the U.S. Constitution grants Congress, and not the president, authority over tariffs and other taxes.

    Neal Katyal, a lawyer for the businesses, said the government’s argument that the word “regulate” includes the power to tax would be a vast expansion of presidential power, Katyal said.

    The arguments – one day before Trump plans to increase tariff rates on imported goods from nearly all U.S. trading partners – mark the first test before a U.S. appeals court of the scope of his tariff authority. The president has made tariffs a central instrument of his foreign policy, wielding them aggressively in his second term as leverage in trade negotiations and to push back against what he has called unfair practices.

    Trump has said the April tariffs were a response to persistent U.S. trade imbalances and declining U.S. manufacturing power.

    He said the tariffs against China, Canada and Mexico were appropriate because those countries were not doing enough to stop illegal fentanyl from crossing U.S. borders. The countries have denied that claim.

    Shumate cited a 1975 appeals court decision that authorized President Richard Nixon’s across-the board surcharge of 10% on imported merchandise to slow inflation. But that decision added that the president did not have authority to impose “whatever tariff rates he deems desirable.”

    Shumate also said that courts cannot review a president’s actions under IEEPA or impose additional limits that are not included in the law. Several judges said that the argument would essentially allow one law, IEEPA, to overwrite all other U.S. laws related to tariffs and imports.

    Katyal said the Trump administration’s argument ignored the more limited nature of Nixon’s tariffs and changes to the law since the 1970s.

    “No trade law in 200 years has been interpreted to give the president this power,” Katyal said.

    The case is being heard by a panel of all of the court’s active judges, eight appointed by Democratic presidents and three appointed by former Republican presidents. The timing of the court’s decision is uncertain, and the losing side will likely appeal quickly to the U.S. Supreme Court.

    TRADE NEGOTIATIONS

    Tariffs are starting to build into a significant revenue source for the federal government, with customs duties in June quadrupling to about $27 billion, a record, and through June have topped $100 billion for the current fiscal year. That income could be crucial to offset lost revenue from Trump’s tax bill passed into law earlier this month.

    But economists say the duties threaten to raise prices for U.S. consumers and reduce corporate profits. Trump’s on-again, off-again tariff threats have roiled financial markets and disrupted U.S. companies’ ability to manage supply chains, production, staffing and prices.

    On May 28, a three-judge panel of the U.S. Court of International Trade sided with the Democratic states and small businesses that challenged Trump. It said that the IEEPA did not authorize tariffs related to longstanding trade deficits.

    The Federal Circuit has allowed the tariffs to remain in place while it considers the administration’s appeal.

    The case will have no impact on tariffs levied under more traditional legal authority, such as duties on steel and aluminum imports.

    The president recently announced trade deals that set tariff rates on goods from the European Union and Japan, following smaller trade agreements with Britain, Indonesia and Vietnam. Trump’s Department of Justice has argued that limiting the president’s tariff authority could undermine ongoing trade negotiations, while other Trump officials have said that negotiations have continued with little change after the initial setback in court.

    Trump has set an August 1 date for higher tariffs on countries that don’t negotiate new trade deals.

    There are at least seven other lawsuits challenging Trump’s invocation of IEEPA, including cases brought by other small businesses and California.

    A federal judge in Washington, D.C., ruled against Trump in one of those cases, and no judge has yet backed Trump’s claim of unlimited emergency tariff authority.

    (Reuters)

  • MIL-OSI USA: Attorney General Bonta Issues Consumer Alert Amid Increase in Reported Scams Targeting the Military Community

    Source: US State of California

    Thursday, July 31, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    Does an offer seem too good to be true? Take a tactical pause to evaluate  

    OAKLAND — In recognition of Military Consumer Month, Attorney General Rob Bonta today issued a consumer alert to help protect California service members, veterans, and their family members from targeted common scams and fraud. The military community and their families are often targets for predatory scammers: According to the Federal Trade Commission, military consumers nationwide reported over 99,400 fraud complaints last year — an increase from 2023’s approximately 93,000 complaints — including 44,587 imposter scams that reportedly cost them and their families over $199 million.  

    “More and more often, service members, veterans, and their families are targets for predatory scammers promising everything from home loans to jobs, and continuing education. This is absolutely unacceptable. As part of our commitment to protect those who protect us, my office will continue to bring the full force of the law against those who seek to exploit California’s military community,” said Attorney General Bonta. “If you have fallen victim to a scam or suspect fraudulent activity, get help and share your story so that we can help your fellow service members. You can report fraud to your local military or civilian law enforcement agency, or to the California Department of Justice at oag.ca.gov/report.”

    Why is the Military Community Targeted? 

    Military service members, veterans, and their families are frequently targeted by scammers who want access to their pay and benefits, and who know that military members will often pay even fraudulent or over-stated debts to avoid security clearance issues or other disruptions to their military careers. In addition, the camaraderie that unites the military community is often exploited by impostors who claim to be veterans in attempts to perpetrate scams or access personal information for fraudulent purposes.   

    Common Scams Targeting the Military Community:

    Scammers use a variety of tactics to gain trust. Protect yourself by staying up to date on common military- and veteran-targeted scams. Beware of the following: 

    • Charity Scams: Just because a charity includes the word “veteran” in its name doesn’t mean that veterans are members of the group, or that veterans or their families will benefit from a donation. Scammers will use names that sound legitimate or those that mimic the names of well-known charities to create confusion. Take the time to make an informed decision and be wary of aggressive solicitations. Go to oag.ca.gov/charities, under the Resources & Tools section, and click on Registry Verification Search. If a charity is not listed, it should not be soliciting funds in California. If it is listed, you can view its financial reports, including the IRS Form 990 that the charity is required to file with DOJ’s Registry of Charitable Trusts.
    • Predatory Schools: The GI Bill and other military education programs offer you the chance to attend school and plan for your future, but for-profit schools sometimes target service members and veterans with false promises. Slow down and take the time you need to make the right decision. Predatory schools often use high-pressure sales tactics to try to get you to sign up. It’s important to ask for information about the programs, such as graduation rates, job placement, and graduate salary information. Offers that seem too good to be true generally are. Further, don’t forget that educational opportunities at the California Community Colleges, California State University, and University of California may be available to you. 
    • Home Loan Scams: Be aware of scammers that — through phone calls or fraudulent mailers — claim to be affiliated with the government, the Department of Veterans Affairs, or your home loan servicer. These fraudsters may attempt to convince you to agree to loan modifications, refinance your home, or make payments on your loans. Be cautious of any individual or lender that contacts you and asks you to pay fees upfront before receiving any services; tells you to cancel your mortgage payment and resend the funds elsewhere; tells you to make payments to someone other than your current loan servicer; or pressures you to sign papers you haven’t had a chance to read thoroughly or that you don’t understand — including asking you to sign over the title to your property. 
    • Identity Theft and Fraud: Some scammers will pretend to be from the Department of Defense, Department of Veterans Affairs, or other official organizations in order to get your personal information so that they can commit identity theft or fraud. Before you provide any information, always make sure a request is coming from an official organization by doing a quick search on the internet or consulting a trusted source to get the organization’s real contact information. Never trust the contact information given by the person that is asking for your personal information, as scammers often give out fake contact information. Be wary of letters and emails that have misspellings, look unprofessional, or send you to a non-government website for information or action, as these are almost always fake. Lastly, never give out your Social Security number to receive military or veteran discounts. Scammers often promise military or veteran discounts in order to obtain personal information. 
    • Job Scams: Service members looking for new career opportunities after leaving service are a target for scammers posting fictitious job listings with the goal of stealing their personal information and finances. Avoid becoming a victim of job scams by conducting thorough research on the company. Additionally, stick to well-known job search platforms and government career websites when looking for job opportunities. Remember, legitimate employers will never require you to pay fees for applications, interviews, or background checks. You should also look out for fake check scams, which occur when a scammer posing as an employer sends you a counterfeit check to deposit into your account. The scammer will then ask you to send a portion of the funds back to them or a third party, while letting you keep some as payment. Eventually, the bank reverses the fake check, leaving you stuck paying the money back to the bank. If something feels off or suspicious during the job search, trust your instincts and end communication immediately.
    • Pension Scams: Veterans ages 65 and over are targeted by scam financial advisers who try to persuade senior veterans to buy costly annuities or transfer their assets into trusts, or pay unnecessary and illegal fees for help with a veterans pension application. These “advisers” claim to help veterans qualify for Aid and Attendance or other veterans benefits, but may cause you to lose eligibility or access to pension, disability, or healthcare benefits. If you are interested in Aid and Attendance or other veterans benefits, you can get free help from your County Veterans Service Office here.
    • Affinity Fraud: Affinity scams target members of identifiable groups, including the military. The perpetrators are — or pretend to be — members of the targeted group, and use sales pitches that rely on group trust and loyalty. In the military community, this includes exploiting the trust that service members have for their fellow service members, and for veterans who previously served. Don’t make a significant purchase, or an investment decision, based on the salesperson’s supposed military service, or the claim that a business is military-friendly or endorsed by the Armed Forces. Take a tactical pause, and shop around for the best deal.
    • Debt Collection and Illegal Threats: Debt collectors may try to trick or scare service members into making payments on debts. It is illegal for debt collectors to do any of the following: revoke your security clearance; contact your command in order to collect a debt (unless they have your consent, given after the debt came due, to do so); discipline or demote you; or garnish your pay. If a debt collector is trying to collect a debt that you do not owe or have already paid, dispute the debt in writing. Tell the debt collector why you do not owe the debt, include copies of any evidence you have, and mail this dispute to the debt collector using registered mail so that you have proof that the collector received it — and make sure to keep copies of everything for yourself. If you dispute the debt within 30 days after the collector first contacted you, the collector must stop collection until it shows you written proof of the debt.
    • Rental Housing Scams: These scams target military personnel looking for housing near a base, especially prevalent during the Permanent Change of Station season. Scammers pretend to be real estate agents and post fake ads for rental properties on websites, sometimes promising military discounts and other incentives in order to get service members to send them money for fees and deposits upfront. If someone insists on receiving money or other payments before a property has been seen, it is likely a rental scam. Avoid wiring money to reserve apartments, and use your installation housing office or established property management companies to locate potential housing. 
    • Predatory Auto Sales and Financing: Car dealers located near military bases may try to lure service members with promises of special deals for military personnel. Often, these so-called deals conceal the terms of purchase for the vehicle and result in the service member drastically overpaying for both the vehicle and the cost of financing. For example, dealers may insist that military personnel will not qualify for financing unless they purchase overpriced and unnecessary add-ons. Other times, the dealer may tell a service member who just purchased a car that the initial financing fell through and insist on renegotiating for worse terms. You should not rely on oral promises, nor feel pressured to enter into any purchase, without first reading and understanding the contract. If you are looking to purchase a car, you should explore all of your options for financing — including by contacting your bank or credit union — before making a purchase.  

    Protect Yourself from Scams:  

    • Bring a battle buddy when making big decisions, and take a tactical pause: Take your time with big decisions and get advice. A business that pressures you to make a quick decision or to not talk with your family, friends, a military financial counselor, or an officer or NCO that you trust may be out to scam you.
    • Take advantage of free annual credit reports: You are entitled to one free credit report every year from each of the three national credit bureaus: Equifax, Experian and TransUnion. Your credit history contains information from financial institutions, utilities, landlords, insurers, and others. By checking your credit reports at least once a year, you can identify signs of identity theft, as well errors in your report that could be raising the cost of your credit. Order your free annual credit reports by phone, toll-free, at 1-877-322-8228, or online at www.annualcreditreport.com.
    • Place a Fraud Alert: If your identity is stolen, put a fraud alert on your credit report by contacting the three main credit reporting agencies: Equifax, Experian, and TransUnion. Also, consider requesting a credit freeze, which will restrict access to your credit file, making it difficult for identity thieves to open new accounts in your name. Report identity theft right away and get a recovery plan at identitytheft.gov. Additionally, file a police report with your local sheriff or police department and keep a copy for your records.
    • Report Suspicious Activity: Never give out personal information to a lender or servicer that contacts you out of the blue. If you are feeling unsure, hang up and call your loan servicer directly at the number that is listed on your mortgage statement. Report suspicious activity to the Office of the Attorney General at oag.ca.gov/report and file a complaint with the FTC at reportfraud.ftc.gov.
    • Protect your online information and accounts with strong passwords: Protect yourself by using different, unique passwords for each of your online accounts. Make sure that the passwords you use are at least eight characters, including a mix of letters, numbers, and symbols.
    • Check your credit card bills and bank statements often: Look for unauthorized charges, withdrawals, or unexpected bills, and report irregular activity to your bank as soon as you see it. If you notice that a bill didn’t arrive on time, it may mean that someone has changed the contact information on your account in order to hide fraudulent charges. Don’t share personal information: Be careful about what personal information you share, such as your address or financial information.
    • Sign up for the Enhanced Homeowner Notification Program: If you reside in Los Angeles County, you may sign up to receive mailed copies of documents recorded against your home, allowing you to review recorded real estate documents so you are aware of actions taken against your property.

    If you believe you have been the victim or target of a scam, immediately contact your local police department or reach out to your base legal office. For the legal office’s contact information, ask your command or visit to legalassistance.law.af.mil/. California National Guard personnel can also obtain legal help at calguard.ca.gov. You may also file a complaint with the Office of the Attorney General at oag.ca.gov/report. For additional information on military-targeted scams, visit our website at oag.ca.gov/consumers/general/military.

    # # #

    MIL OSI USA News

  • MIL-OSI Analysis: European gloom over the Trump deal is misplaced. It’s probably the best the EU could have achieved

    Source: The Conversation – UK – By Maha Rafi Atal, Adam Smith Senior Lecturer in Political Economy, School of Social and Political Sciences, University of Glasgow

    The trade deal between the US and the European Union, squeezed in days before the re-introduction of Donald Trump’s “liberation day” tariffs, is reflective of the new politics of global trade. Faced with the threat of 30% baseline tariffs from Washington, as well as additional levies on specific sectors, the EU has secured a partial reprieve of a flat 15% tariff on all goods.

    Was this the best the bloc could have achieved? In the time available, it may well have been. The 15% rate is higher than the UK secured earlier this year, but it’s significantly below the level applied to China and Mexico, and on par with Japan.

    The EU has also managed a “zero-for-zero” tariffs deal on some hi-tech goods, notably semiconductors vital for products like phones and laptops. This is something the UK did not push for or secure in its own framework agreed with the US president.




    Read more:
    Donald Trump has reduced tariffs on British metals and cars, but how important is this trade deal? Experts react


    What’s more, EU leaders have argued that agreeing to the deal has security benefits in protecting dwindling US support for European defence. The urgency of Europe’s security concerns in Ukraine made these talks different from trade negotiations in the first Trump administration, when Europe could afford to be more aggressive.

    The biggest winners in this deal are Europe’s carmakers. The US has collapsed various sector-specific duties on goods like aircraft, cars and automotive parts into the 15% ceiling. This effectively reduces tariffs on EU-made cars (from 27.5%).

    American automakers, meanwhile, rely heavily on parts from Mexico and China – still subject to higher tariffs at the time of writing. This makes EU vehicles more competitive for US consumers than “American” cars that rely on overseas parts.

    Most importantly however, like the UK deal before it, the new EU agreement is a statement of understanding between the White House and the European Commission, rather than a formal treaty. A treaty would be subject to parliamentary ratification on both sides.

    But the semi-formal nature of this agreement allows both Trump and European leaders to portray the deal as a “win” by playing fast and loose with what’s actually in it.

    For example, the Trump administration will celebrate an EU commitment to buy US$250 billion (£189 billion) in US energy imports annually. Yet the concession holds no legal weight in the EU. The European Commission, which negotiated with Trump, does not buy any energy nor does it manage the power grid inside its 27 member states.

    The commission can encourage, but cannot compel, those states to buy American. (Indeed, it might want to do so anyway, since it helps it to pivot away from Russian gas). But ultimately, member states and businesses decide where their energy supply comes from, and they are not direct parties to the deal. Only a formal treaty ratified by the European parliament would compel them.

    No guarantees from Trump

    The informal nature of this agreement also allows EU member states to protest against what they see as capitulation to Trump’s demands without real consequence. After all, there is not yet a treaty text they would be required to vote on or implement.

    The Trump administration similarly imposed its sweeping tariff threats in early spring without a vote from Congress, and has been making ad hoc changes to the rates in the same way.

    On the one hand, this means European countries may not ultimately be required to implement some of the deal’s less savoury elements such as the energy purchases or lowering the bloc’s own tariffs on US goods.

    On the other hand, this means the Trump administration – notorious for abrupt changes of turn – can also renege at any time. In reality, there is little the EU can do about this. The question of leverage looms large. Trump’s longstanding antipathy towards the EU – seeing it less as an ally and more as a rival – meant that Brussels was never negotiating from a position of strength.

    The fact that the EU avoided the worst-case scenario, protected key sectors and secured other sector-specific advantages suggests a deal shaped not by triumph, but by containment of Trump. Since the deal was announced, the picture emerging from many European leaders has been one of gloom. True, the EU didn’t win – but it survived. And that, for now, is probably enough.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.

    Maha Rafi Atal does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. European gloom over the Trump deal is misplaced. It’s probably the best the EU could have achieved – https://theconversation.com/european-gloom-over-the-trump-deal-is-misplaced-its-probably-the-best-the-eu-could-have-achieved-262369

    MIL OSI Analysis

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI: LYNO Launches Early Bird Presale Phase with 16 Million Tokens at $0.050

    Source: GlobeNewswire (MIL-OSI)

    ROAD TOWN, British Virgin Islands, July 31, 2025 (GLOBE NEWSWIRE) — LYNO, a decentralized cross-chain arbitrage protocol powered by artificial intelligence (AI), has officially launched the Early Bird phase of its token presale. This initial phase is offering 16 million $LYNO tokens at the price of $0.050 per token. Once this allocation is sold out, the next phase will see the token price increase to $0.055. This announcement marks the beginning of LYNO’s public sale process as it aims to distribute 28% of its total token supply through a seven-phase community presale.

    This milestone represents a significant step forward in LYNO’s roadmap as it prepares for its official platform deployment. The project’s token sale structure is designed to progressively increase the token price at each stage, incentivizing early participation and distributing value to early supporters.

    Purpose-Built Arbitrage Protocol for DeFi

    LYNO is engineered to automate cross-chain arbitrage opportunities across fragmented decentralized finance (DeFi) markets. Its infrastructure enables users to benefit from price inefficiencies across different blockchain networks, executing profitable trades without requiring any manual intervention. The platform supports over 15 EVM-compatible chains, maximizing market coverage and arbitrage scope.

    The protocol operates on a four-layer architectural model: DataAIExecution, and Settlement. This layered system allows LYNO to constantly monitor real-time price feeds, apply machine learning algorithms to identify profitable opportunities, and execute trades using smart contracts and flash loans. This approach aims to deliver high-speed execution and accuracy, setting the stage for a more efficient decentralized trading environment.

    Integration with Leading Blockchain Bridges

    LYNO’s design includes compatibility with several of the leading cross-chain messaging and liquidity bridges. This includes integration with LayerZeroAxelarWormhole, and others, which ensures seamless capital movement across networks. By using these bridges, LYNO can minimize slippage, reduce latency, and increase transaction success rates in arbitrage operations. These integrations are essential for real-time cross-chain trading, enabling LYNO to maintain its operational speed and accuracy across diverse DeFi markets.

    Utility and Tokenomics

    The $LYNO token is central to the protocol’s operation. It will serve multiple functions within the LYNO ecosystem, including:

    • Governance participation: Token holders can vote on protocol upgrades, fee structures, and future proposals.
    • Staking: Users can stake tokens to receive a share of the protocol’s profits.
    • Tool access: Holders can unlock AI-based real-time analytics and arbitrage monitoring tools.

    LYNO has implemented a multi-layered tokenomic model designed to align user incentives with the long-term success of the platform. Key features include:

    • Buyback and burn mechanisms to support price stability and reduce circulating supply.
    • Liquidity mining incentives for early liquidity providers.
    • Revenue sharing model distributing up to 60% of platform fees to stakers and participants.

    These mechanisms are intended to increase transparency, support decentralization, and maintain consistent user engagement. The project has been audited by Cyberscope, further enhancing its credibility and focus on smart contract security.

    How to Participate in the Presale

    Investors who wish to take part in the Early Bird presale can do so by connecting their wallets—such as MetaMask, Trust Wallet, or any WalletConnect-compatible wallet—to the LYNO presale platform at https://lyno.ai/#presale. The supported payment options for purchasing $LYNO tokens include ETHUSDC, and USDT. Tokens purchased during the presale will be claimable after the conclusion of all presale phases.

    This Early Bird phase is time-sensitive and available on a first-come, first-served basis. After the initial 16 million tokens are sold, the token price will increase from $0.050 to $0.055 in the next stage. This price progression will continue through the subsequent rounds, designed to reward early contributors before the token listing on exchanges.

    Building a Transparent and Automated DeFi Future

    LYNO is part of a new wave of DeFi protocols aiming to reduce inefficiencies and human error in the arbitrage trading process. By leveraging artificial intelligence, cross-chain compatibility, and fully automated systems, LYNO introduces an alternative to manual DeFi trading strategies.

    With increasing fragmentation in liquidity across blockchains and growing interest in interoperable DeFi solutions, LYNO’s protocol arrives at a time when seamless arbitrage execution is becoming increasingly important. The LYNO platform aims to help users unlock value from market inefficiencies while offering governance and income opportunities via staking and community engagement.

    About LYNO

    LYNO is an AI-powered, decentralized cross-chain arbitrage protocol built to automate real-time profitable trades across multiple EVM-compatible chains. The protocol is designed to optimize DeFi trading by offering speed, transparency, and efficiency while leveraging powerful AI technologies and smart contract automation. LYNO’s infrastructure is compatible with top bridge solutions, making it a versatile and forward-looking solution for decentralized arbitrage.

    For More Information, Please Visit:

    Contact:
    LYNO AI
    Email: contact@lyno.ai

    Disclaimer: This content is provided by LYNO. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility.Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7f1c0f27-b1f5-4966-b736-ef6709c13738

    https://www.globenewswire.com/NewsRoom/AttachmentNg/88ca5dde-10a7-4491-b8c2-fd5abf715a3a

    The MIL Network

  • MIL-OSI USA: Lee Introduces Protecting American Jobs Act

    US Senate News:

    Source: United States Senator for Utah Mike Lee

    WASHINGTON – U.S. Senator Mike Lee (R-UT) introduced legislation today to ensure unbiased due process for American workers and businesses in labor practice complaints. The Protecting American Jobs Act blocks the National Labor Relations Board (NLRB) from prosecuting and adjudicating cases – returning adjudicatory power to the U.S. Courts where it belongs and eliminating biased court decisions.

    “Business disputes should be given a fair trial – not biased decisions from federal bureaucrats cosplaying as judges,” said Senator Mike Lee. “The NLRB should never be allowed to adjudicate the very cases it is prosecuting. My legislation will restore the right to a fair trial for workers and businesses as outlined by the Constitution, providing them due process and protection from biased bureaucrats.” 

    Background:

    The National Labor Relations Board (NLRB) currently investigates and adjudicates union representation disputes, unfair labor practice complaints, and contract disputes with federal court review only allowed in limited circumstances. This means that the NLRB acts as investigator, prosecutor, and judge with an unelected and unaccountable membership that turns over every few years – a structure poorly suited to ensure due process for either employees or employers. This bureaucratic and political mess results in delayed complaint resolutions, a damaged economy, and stalled business decisions which in turn stunt job growth.

    Congress should return the adjudicatory functions of the NLRB to the U.S. Courts as designed by the Constitution and revoke the Board’s power to prosecute unfair labor practice charges. Under this system, victims of unfair labor practices could still bring forth complaints for the NLRB to investigate, but the power to hear and adjudicate complaint cases would remain with the U.S. Court system, as in the adjudication of all other disputes between private parties. 

    Removing the influence of a politically charged federal agency would remove the “thumb on the scale” in these proceedings, providing both workers and businesses with a simplified and unbiased method for resolving disputes and a consistent set of regulations to follow.

    The Protecting American Jobs Act:

    • Removes the NLRB General Counsel’s power to issue complaints related to unfair labor practices.
    • Limits the Board’s rulemaking authority to rules concerning the internal functions of the Board.
    • Removes the Board’s power to bring charges of unfair labor practices and to adjudicate those charges and instead provides the Board with the authority to investigate unfair labor practices.
    • Moves relief of unfair labor practices to the courts where an aggrieved party may bring a civil action.
    • Requires the NLRB to review and revise its regulations to comply with these changes.

    MIL OSI USA News

  • MIL-OSI Russia: Tatyana Golikova held a meeting on the national project “Personnel”.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Deputy Prime Minister Tatyana Golikova held a meeting of the project committee for the national project “Personnel”. The meeting was attended by Minister of Labor and Social Protection Anton Kotyakov, head of the State Council commission on “Personnel”, Governor of the Kaluga Region Vladislav Shapsha, representatives of the Ministry of Education and Science, the Ministry of Education, the Ministry of Finance, the Federal Agency for Youth Affairs and others. The meeting participants discussed the results of the national project implementation in the first half of 2025, as well as the federal projects included in it.

    As noted by Tatyana Golikova, four federal projects are being implemented within the framework of the national project “Personnel”: “Labor Market Management”, “Active Measures to Promote Employment”, “Education for the Labor Market” and “The Labor Person”. Federal projects include measures to actively involve graduates of educational institutions in employment, synchronization of modern qualification requirements in the spheres of labor and education, which will allow for more efficient and high-quality training of personnel for the needs of the economy. In addition, vocational training and additional vocational education are provided for people experiencing difficulties in finding a job, as well as increasing the labor mobility of citizens and the popularity of blue-collar jobs.

    As part of the “Labor Market Management” project, employment centers are being modernized into modern “Work of Russia” personnel centers. They are becoming full-fledged partners of employers in building teams and personal consultants for those wishing to build a career. In total, over 480 centers are planned to be modernized this year; the modernization of the center in Omsk Oblast has already been completed. By the end of 2028, the entire employment service system in the country will be updated. Over 2.5 thousand employees of the employment service have been trained; in total, about 6 thousand employees will be trained this year.

    All regions have approved regional plans to combat illegal employment for the period 2025–2027.

    As part of the implementation of the federal project “Education for the Labor Market”, national rankings of universities and colleges for graduate employment were published on June 15. Since the beginning of the year, a pilot test of methodological recommendations for organizing a system of professional orientation and routing of students and graduates has been conducted in 11 regions. The pilot experience will be replicated throughout the country.

    Preparatory work is underway to modernize career centers. In total, 162 career centers aimed at facilitating graduate employment are planned to be modernized in 2025.

    Under the federal project “Active measures to promote employment” within the framework of the implementation of the vocational training program for certain categories of citizens, 44.2 thousand applications were approved, and 20.7 thousand people were sent for training.

    Within the framework of the federal project “Working Man”, events are planned for the competition “Best in Profession”, the All-Russian Employment Fair, and the All-Russian Competition of Best Practices in Youth Employment.

    On June 27, the federal stage of the All-Russian Job Fair took place. 454 thousand people took part in it. In total, over 529 thousand vacancies were presented by almost 23 thousand employers.

    The regional stages of the “Best in Profession” competition are coming to an end in the regions – a total of 210 regional stages are planned in 73 regions, 183 stages have already been held. The award ceremony will take place in Moscow in early December.

    From June 23 to August 31, the application submission stage for the All-Russian competition of best youth employment practices is underway.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News