Category: DJF

  • MIL-OSI United Nations: Economic and Social Council Continues High-Level Segment

    Source: United Nations General Assembly and Security Council

    2025 Session,

    25th Meeting (PM)

    ECOSOC/7215

    The Economic and Social Council continues the general debate of its annual high-level segment, including the three-day ministerial segment of the High-level Political Forum under the theme “Advancing sustainable, inclusive, science- and evidence-based solutions for the 2030 Agenda and its SDGs for leaving no one behind”.

    The segment, which began 21 July, will run through 24 July.

    Member States will make statements this afternoon under the theme “UN@80:  Catalyzing Change for Sustainable Development”. 

    Also in the afternoon, the Council will continue its voluntary national reviews with Germany, Kazakhstan, Seychelles, Japan, Gambia, Indonesia and Suriname.  Council President Bob Rae and Vice President Lok Bahadur Thapa will chair the reviews.

    For information media. Not an official record.

    MIL OSI United Nations News

  • MIL-OSI USA: Chairman Mast Welcomes Rep. Fine to the House Foreign Affairs Committee

    Source: US House Committee on Foreign Affairs

    Media Contact 202-321-9747

    WASHINGTON, D.C. – Today, House Foreign Affairs Committee Chairman Brian Mast issued the following statement upon Rep. Randy Fine (R-FL) being named as a member of the panel.

    “Randy is a battle-tested conservative and a fierce defender of America’s interests. The Foreign Affairs Committee is stronger with him on board. Proud to welcome my fellow Floridian to the fight.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: Chairman Mast Welcomes Rep. Fine to the House Foreign Affairs Committee

    Source: US House Committee on Foreign Affairs

    Media Contact 202-321-9747

    WASHINGTON, D.C. – Today, House Foreign Affairs Committee Chairman Brian Mast issued the following statement upon Rep. Randy Fine (R-FL) being named as a member of the panel.

    “Randy is a battle-tested conservative and a fierce defender of America’s interests. The Foreign Affairs Committee is stronger with him on board. Proud to welcome my fellow Floridian to the fight.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: HHS, FDA Praise Consumer Brands Association’s Vow to Remove Artificial Colors from America’s Food Supply

    Source: US Department of Health and Human Services – 3

    For Immediate Release:
    July 22, 2025

    WASHINGTON – Today the leadership of the U.S. Department of Health and Human Services (HHS) praised the Consumer Brands Association for its pledge on behalf of the makers of the nation’s food and beverage products to remove certified Food, Drug & Cosmetic (FD&C) petroleum-based colors from America’s food supply. With support from the Trump Administration, this pledge urges member companies to stop manufacturing with FD&C colors by December 31, 2027.
    President Trump, Health and Human Services Secretary Robert F. Kennedy, Jr. and U.S. Food and Drug Administration Commissioner Dr. Marty Makary have made the removal of artificial colors a priority. This pledge is another example of the Trump Administration and industry working together to bring results quickly to the American people.
    “America is entering a new era of nutrition,” said Secretary Kennedy. “In just a few months, the nation’s leading food and beverage producers have taken bold steps to clean up products loved by children and families. Replacing synthetic food dyes with natural colors marks another major victory in our mission to Make America Healthy Again.”
    “Promises made, promises kept,” said FDA Commissioner Makary. “We’ve worked hard with industry over the past three months to meet our goal to phase out all petroleum-based dyes from the nation’s food supply. During this time, the FDA also approved four new natural color additives. Today is a win for America’s kids.”
    Consumer Brands Association recently announced a voluntary commitment to remove FD&C colors from foods served in schools nationwide by the start of the 2026-2027 school year. Through today’s voluntary commitment they are agreeing to eliminate the use of FD&C Blue No. 1, Blue No. 2, Green No. 3, Red No. 40, Yellow No. 5, and Yellow No. 6 from their product portfolios.

    Consumer:888-INFO-FDA

    ###

    Boilerplate

    The FDA, an agency within the U.S. Department of Health and Human Services, protects the public health by assuring the safety, effectiveness, and security of human and veterinary drugs, vaccines and other biological products for human use, and medical devices. The agency also is responsible for the safety and security of our nation’s food supply, cosmetics, dietary supplements, radiation-emitting electronic products, and for regulating tobacco products.

    Content current as of:
    07/22/2025

    Follow FDA

    MIL OSI USA News

  • MIL-OSI USA: Understanding Thai Names: Law and Culture

    Source: US Global Legal Monitor

    The following is a guest post by foreign law intern, Yuri Rattanaboonsen. Yuri works with Foreign Law Specialist, Sayuri Umeda, in the Global Legal Research Directorate in the Law Library of Congress. 

    In Thailand, surnames are generally unique to family lines, and more often than not, we rarely meet a stranger who has the same surname if he or she is not a distant relative.

    Before the enactment of the Thai Nationality Act in 1913, which is also known as the Surname Act, surnames were uncommon for the general public. This law required all Thai citizens and permanent residents to register a family surname for the first time. As a result, many families had to create a new surname. One important feature of the law was that each family’s surname had to be unique. (Thai Nationality Act sec.12(5).) If a name was already registered, the family would have to register a different one.

    Currently, the Person’s Name Act B.E. 2505 (1962), as amended by the Person’s Name Act (No. 3), B.E. 2548 (2005), governs the rules for personal names in Thailand. It still states “[t]he surname shall not repeat … a registered surname.” (sec. 8(3).)

    Thai Surnames

    Originally, Thai surnames often reflected a person’s ancestry, place of origin, or occupation, and usually consisted of two to three syllables. They can relate to information about religion, social class, or even links to royalty or heritage.

    Thai immigrant families’ surnames are often long. For example, because many Chinese families’ surnames were the same and were already in use, many immigrant families had to modify or expand them to register unique surnames under the 1913 law. Some families chose Thai words that sounded similar to their original Chinese surname. Others created longer surnames by adding extra syllables or translating the original name’s meaning into Thai. As a result, many names and surnames today are long and complex.

    The Person’s Name Act limits the length of a surname. It states “[t]he surname shall … not be comprised of more than 10 alphabetical letters….” (Id. sec. 8(5).) This only applies to the Thai alphabet. Therefore, a romanized Thai surname often has more than 10 Roman characters.

    It is rare, but some overlap of Thai surnames exists because technology was not advanced enough to detect all registered surnames nationwide at the time the registry was created. The Department of Provincial Administration’s system, which can check the population registration going back to 1984, came online to link data nationwide in 1993. It was then discovered that many people are not relatives but have the same last names.

    Name Change

    When a surname is changed to a new one, it often becomes quite long. In Thailand, people can change their names for any reason. (Id. sec. 17) Many individuals choose to change their names for personal, cultural, or spiritual reasons.

    Some people change names based on astrological beliefs, selecting letters that are thought to be compatible with the individual’s birthday. In these naming calculations, each letter and vowel has a specific meaning. People try to make the total value of their name and surname lucky or strong. To do this, they often need to use more letters, which results in longer names and surnames. However, many people who do not hold these beliefs still have short surnames.

    Permission to Use Another Person’s Surname

    A Thai person who is not a spouse or relative of another person and who has a different surname can have the person’s surname upon permission of the person who registered the surname. The act states that the permission “can be made by filing an application to the local Registrar in the area where he or she has his or her name on the household registry …The permission … shall be valid only upon the local Registrar’s issuance of a letter showing the permission to use such surname to” a particular person. (Id. sec. 11.)

    Romanization of surnames

    The same Thai names might be spelled differently in Roman characters on passports or national identity cards due to the different practices in different registrars’ offices. In addition, the registrar’s consideration and opinion affected the registration process. (Id. sec. 18.)

    In July 2023, Bangkok Metropolitan sent a letter to the Department of Provincial Administration to discuss the practice of using Roman characters for first and last names on national identity cards. The Department of Provincial Administration responded by stating that a person’s name must be romanized through transliteration based on phonetic principles, as written in the Prime Minister’s Office Announcement of English transliteration criteria on August 26, 1989, and the Royal Institute criteria for transliteration of Thai into Roman letters by phonetic means on January 11, 1999. The Department of Provincial Administration also forwarded this response to all provincial governors to study and practice in the same way. No other specific regulation was made apart from what the Person’s Name Act B.E. 2505 (1962) provides.

    Nickname of Thai People

    Although it is not officially registered or recognized under Thai law, nicknames are widely used in everyday life. Most Thai individuals receive a nickname at birth. Thai people do not usually change their nicknames; some do, but fewer compared to changes in their first names and surnames.  Thais’ nicknames have changed over time. In the past, most nicknames were in Thai, which were short and simple. usually named after animals, fruits, colors, and nature, such as Khao (Rice), Kai (Chicken), Fah (Sky/Blue), and Ploy (Gemstone). Nowadays, the number of syllables increases, and the use of foreign languages in nicknames has increased. Nicknames can be random English words, such as Donut, Golf, or New Year, brand names, such as Porsche, Benz, or Pepsi, or even be an alphabet letter, such as A, B, S, or X.

    A person may go by their nickname socially and professionally for their entire life, but only their official given name will appear in legal contracts, government records, and academic certifications. In daily life, individuals are more commonly known by their nickname than their full legal name.

    Further Reading

    If you would like to know how other countries regulate names, do not forget to check out our other blog posts on that topic, among them, Jenny’s post on naming laws in Germany, Kelly’s post on banning baby names in New Zealand, Laney’s on how many times you can change a name in Taiwan, or Elin’s post on Icelandic name laws.


    Subscribe to In Custodia Legis – it’s free! – to receive interesting posts drawn from the Law Library of Congress’s vast collections and our staff’s expertise in U.S., foreign, and international law.

    MIL OSI USA News

  • MIL-OSI USA: IAM Union Joins Allies in East Palestine to Continue Fight for Rail Safety

    Source: US GOIAM Union

    IAM Rail Division representatives, public safety experts and members of the community met near East Palestine, Ohio, the site of a devastating train derailment in 2023, for a town hall discussion on rail safety. Attendees also met with two bipartisan members of U.S. Congress to discuss the urgent need for passage of the Railway Safety Act. A major concern among attendees is the rail industry’s desire to reduce human visual track inspections, and other inspections that are crucial in preventing derailments.

    The post IAM Union Joins Allies in East Palestine to Continue Fight for Rail Safety appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Economics: Windows 11 is the home for AI on the PC, with more experiences available today

    Source: Microsoft

    Headline: Windows 11 is the home for AI on the PC, with more experiences available today

    AI is changing the way we use our PCs. According to a new consumer AI report commissioned by Microsoft, nearly 60% of people report using generative AI for work and business purposes in the past year. Even more (64%) report using AI for hobbies and personal interests like art, music and DIY projects.

    As the world adapts to this new era of AI infused with daily life, Windows is here to meet you where you are, with intuitive experiences built in to make what you already do on your PC even easier.

    Windows 11 is the home for AI, offering the most expansive and capable AI experiences for consumers today on Copilot+ PCs—with exclusive AI superpowers like Recall (preview), Click to Do (preview) and improved Windows search, as well as groundbreaking new ways to interact with your PC, like Copilot Vision on Windows, all available now.

    Today, we continue to make new experiences generally available for Windows 11 and Copilot+ PC users that make Windows more intuitive, more accessible and ultimately more useful.

    Read on to discover what’s available and how to get started using these experiences today.

    Changing Windows Settings has never been easier, with Windows’ first agent

    It’s never been easier to adjust your settings in Windows. Now on Copilot+ PCs, you can use your own words in the settings search box to describe something you’d like to change, and instantly get recommendations, including actions to adjust the relevant setting with one click.

    This is made possible through the new agent in Settings, Windows’ first agent optimized for Copilot+ PCs.

    Hundreds of settings across displays, connectivity, accessibility and much more are now customizable through the agent in Settings, with the ability to enable or undo any setting you change.

    To use the agent in Settings:

    1. Open Settings from the Taskbar or Start Menu
    2. Type in the Settings search box what you want to change using your own words, such as “I want to enable quiet hours” or “connect Bluetooth device.” For some settings, you can even make specific requests, such “change my resolution to 1920×1080.”
    3. If the agent can make the change, it will offer an option to complete the action to change the setting, as well as an option to undo any setting you change.
    4. When settings are unable to be adjusted by the agent, improved Windows search will surface relevant settings to help you get closer to what you’re looking for, faster.

    The agent in Settings begins to become available starting today for Windows customers using English on Snapdragon-powered Copilot+ PCs, with availability on Intel and AMD devices coming at a later datei.

    Learn more about how you can use Settings agent and other Windows features like Copilot Vision on Windows to troubleshoot your PC.

    Do even more with Click to Do (preview)

    Click to Do keeps you in the flow to get things done faster, providing contextual actions to text and images on your screen.

    After invoking Click to Do, relevant text or visual actions will appear that include the ability to prompt Copilot, search the web, create bulleted lists, start a draft of a document or email, or even schedule a Teams meeting—all without leaving your current window.

    New actions available starting today includeii:

    • Practice in Reading Coachiii is a new Click to Do text action that helps you improve reading fluency and pronunciation. Select text on your screen, choose Practice in Reading Coach, and read the text aloud. Reading Coach gives you feedback and shows where to improve.
    • Read with Immersive Reader is a new text action in Click to Do that displays text in a focused, distraction-free environment. It helps improve reading and writing for all skill levels and abilities. You can adjust text size, spacing, font and background theme, have text read aloud, break words into syllables and highlight parts of speech. The picture dictionary shows images for unfamiliar words.
    • Draft with Copilot in Wordiv is a new text action enabling you to quickly turn any recognized text into a full draft. Whether it’s a sentence in an email or a snippet on your screen, press Win + Click on the recognized text, then select Draft with Copilot in Word. No more blank pages. No more writer’s block. Just momentum.
    • Click to Do now supports actions through Microsoft Teams. When you select an email address recognized by Click to Do on your screen, you can choose to send a Teams message or schedule a Teams meeting. These options make it easy to ask a question or set up time to talk without interrupting your workflow.

    To get started with Click to Do:

    1. Press the Windows key + mouse click, Windows key + Q, or access through the Start menu and Snipping Tool.
    2. Click to Do also supports hardware-specific options like double clicking your pen on your pen-capable device or swiping from the right with your pen or finger on your touch screen.
    3. Learn more about all the ways you can use Click to Do to get more done on your Copilot+ PC.

    Photos relight brings professional lighting controls to your pictures

    Relight in the Photos app brings professional lighting controls to your snapshots. Open any image in Photos, select Edit > Relight, and then click to place up to three virtual light sources around your subject.

    Adjust each light’s intensity, color and position with simple sliders, or choose from built-in presets like “Studio Portrait” and “Cinematic Glow.”

    To use relight in Photos:

    1. Open the Photos app and select the image you want to relight.
    2. Select Edit, then select Relight from the available options.
    3. Choose one of the lighting presets, and optionally customize each light’s location, brightness, softness or color, and the overall intensity of the effect.

    Learn more about tips to get the most out of your photos.

    This feature is available now on Copilot+ PCs with Snapdragon X Series processors, with support for Copilot+ PCs powered by Intel and AMD coming soon.

    Paint adds even more creative capabilities with sticker generator and object select

    In May, we introduced multiple enhancements to elevate your creative experience, now available on Copilot+ PCs.

    Sticker generatorv is a new AI-powered feature in Paint that lets you create custom stickers by simply typing a prompt. To get started, click on the Sticker generator button in the Copilot menu. From there, you can type in a description of the sticker you want to create, like “a cat wearing sunglasses,” and hit the Generate button.

    Paint will then generate a set of unique stickers based on your prompt. Once the stickers are generated, you can click on any one of them to instantly apply it to your canvas, copy the sticker for use in other applications, or save it for later. To access your recently generated stickers, click on the new Stickers option in the Paint toolbar.

    We’re also releasing object select, a smart selection tool that uses AI to help you isolate and edit individual elements in your image. To get started, click on the Object select tool in the toolbar and simply pinpoint specific elements on the canvas to select and make edits instantly.

    To use the new updates in Paint:

    1. Open the Paint app.
    2. Explore the new welcome experience to learn more about features like Cocreator, generative erase, sticker generator, object select and Layers.
    3. Try out the new sticker generator and object select features.

    Be more productive with Snipping Tool perfect screenshot and color picker

    Snipping Tool’s screen capture and perfect screenshot capturing a specific area of the screen.

    We’ve also added two new features to Snipping Tool—perfect screenshot and color picker.

    Perfect screenshot is a new AI-powered feature exclusive to Copilot+ PCs that allows you to precisely capture content on your screen with the Snipping Tool app without the need to crop or resize it post-capture.

    To try Snipping Tool perfect screenshot:

    1. Invoke the Snipping Tool capture toolbar from within the app or by using the Print Screen keyboard shortcut.
    2. Select the Perfect screenshot button from the toolbar when in rectangle mode and start selecting a region of your screen.
    3. Once activated, perfect screenshot will intelligently resize based on the content in your selection. You can also quickly enable perfect screenshot by holding the Ctrl keyboard shortcut after invoking Snipping Tool while selecting a region of your screen.
    4. Move or edit the area before confirming your capture, ensuring you get the perfect screenshot every time!

    For all Windows 11 PCs, we have also added the ability to easily identify and capture colors seen on your screen through the introduction of color picker. Color picker is great for anyone who might need to quickly match a color you see on your screen as part of a project—whether that be designers, developers or everyday color aficionados.

    Snipping Tool’s color picker tool selecting a color on the screen to inspect.

    To try color picker in Snipping Tool:

    1. Invoke the Snipping Tool capture toolbar from within the app or by using the Print Screen keyboard shortcut.
    2. Select Color picker from the toolbar and then inspect or select a color code on your screen, choosing from HEX, RGB or HSL values. Need to be more precise? You can zoom by scrolling in on your pointer or using by using the Ctrl +/- keyboard shortcuts.

    Do more with Microsoft Copilot and Edge on Windows 11

    Copilot Vision on Windows, now available in the U.S., is a new way to engage with your Windows 11 PC. When you enable it, it can see what you see on your device and talk to you about it in real time.

    It acts as your second set of eyes, able to analyze content, help when you’re lost, provide insights and answer your questions as you go. Whether you’re browsing, working or deep in a project, Copilot Vision offers instant insights and answers.

    And with Highlights, you can go a step further and ask Copilot “show me how” for a specific task and it will show you within the app you’re in where to click and what to do. On Windows, Copilot can help you navigate multiple apps at once, including your full desktop, serving as a true companion to help you accomplish any task.

    To get started with Copilot Vision on Windows:

    1. Open the Copilot app and click the glasses icon in your composer.
    2. Select which browser window or app you want to share.
    3. Ask Copilot to help with whatever you’re working on. To stop sharing, press ‘Stop’ or ‘X’ in the composer. It’s a fully opt-in experience that always puts you at the controls.

    Microsoft Edge is also the only browser built for Windows, offering the most seamless PC browsing experience with AI-powered tools, productivity features, and built-in performance and security features that help you browse quickly and safely.

    With features like Edge Game Assist, now available on Windows 11vi, you can get tips and guides for many of the top PC games, easy access to essential sites like Discord, Spotify, and Twitch, and more — all right in your game.

    To use Edge Game Assist, simply press Win+G to open Game Bar and start using Microsoft Edge for a seamless and immersive gaming experience.

    Learn more about how you can get the most out of Edge on Windows.

    Making the unexpected easier with faster recovery 

    Unexpected restarts are frustrating, that’s why starting today, people will begin to experience several improvements that make this experience quicker and more user friendly so you can pick up right where you left off.

    With quick machine recovery, a new recovery mechanism for Windows 11 PCs, your PC will automatically detect and fix widespread issues during an unexpected restart using the Windows Recovery Environment (WinRE).

    We’ve also streamlined the unexpected restart experience, reducing the time users spend on the screen from 40 seconds to just 2 seconds for most consumer devices on Windows 11, version 24H2.vii

    As part of these changes, we also made an update to how our interface appears during an unexpected restart, introducing a simplified user interface (UI) that pairs with the shortened experience to display a more readable layout while keeping the technical details visible.

    Learn more about the changes to the unexpected restart experience here.

    Move forward with Windows 11

    From modern security to faster performance and the latest features and experiences, Windows 11 is built to help you work, play and create with ease. With support for Windows 10 ending on Oct. 14, 2025, we’re here to ensure your transition is smooth, secure and up to date.

    We understand that moving to a new PC can take time, and we’re here to support you throughout the process. The Windows 10 Extended Security Updates (ESU) program is designed to keep your current Windows 10 PC protected after support ends—helping you stay secure during the transition.

    Starting today, individuals will begin to see an enrollment wizard through notifications and in Settings, making it simple to select the best option for you and enroll in ESU directly from your personal Windows 10 PC.

    Learn more about Windows 10 end of support and explore the tools and resources available to help you transition with confidence.

    How to get these updates

    Over the next month, we will be gradually rolling out several of these features via controlled feature rollout (CFR) to consumers. Some of these experiences are available today via this month’s Windows non-security preview update, as well as updates available in the Microsoft Store.

    Consumers who would like to be among the first to experience new enhancements can simply go to Settings > Windows Update and turn on Get the latest updates as soon as they’re available.” Then select “Check for updates” to download and install the most recent non-security preview release.

    Ensure that Microsoft Paint, Photos and Copilot applications are updated to the latest versions available.

    For a full list of features available via today’s Windows Update, learn more here.

    End notes:

    i Available now in most global markets on Copilot+ PCs with Snapdragon® X Series. Limited initially to English-language inputs. See aka.ms/copilotpluspcs processors.

    ii These Click to Do actions are not available in the European Economic Area.

    iii To use this feature, install the free Microsoft Reading Coach app from the Microsoft Store.

    iv For “Draft with Copilot in Word” – a Microsoft 365 Copilot subscription is required.

    v Optimized for English text prompts and requires a Microsoft account and internet connection to access cloud services that help ensure the responsible use of AI.

    vi Game Assist is available where Edge is available. Enhanced game content is available English-only at this time. Game Assist experience may also vary depending on game and geography.

    vii Source: Internal testing of Windows 11 memory dump write speed, October 2022.

    MIL OSI Economics

  • MIL-OSI Economics: Introducing Surface Laptop 5G: Seamless connectivity, built for business

    Source: Microsoft

    Headline: Introducing Surface Laptop 5G: Seamless connectivity, built for business

    We’re excited to announce the expansion of our Surface Copilot+ PC portfolio for business customers. The new Surface Laptop 5G, 13.8-inch powered by Intel Core Ultra (Series 2) processors, will begin shipping Aug. 26, and the new Surface Laptop, 13-inch and Surface Pro, 12-inch are available starting today.[1]

    AI is every organization’s competitive edge—but only when it’s accessible the moment it’s needed. Surface Laptop 5G delivers that advantage with a 40+ trillion operations per second (TOPS) Neural Processing Unit (NPU) that powers fast, on-device intelligence, making everyday workflows more intuitive and efficient. Whether it’s staying focused in meetings, finding and acting on information faster, or reducing routine tasks, AI accelerates what matters most. With an integrated 5G modem, users stay continuously connected to Microsoft 365 Copilot[2] and other cloud tools, enabling deeper insights and real-time collaboration.

    Adding 5G to Surface Laptop has been one of the most requested features from our business customers. But the ask was never just about adding a modem—it reflected a deeper need to eliminate friction, with the ability to connect instantly, securely and reliably without worrying about signal strength or searching for a hotspot.

    Meeting that need was the driving force behind the design of Surface Laptop 5G. We set out to build the best 5G-connected laptop—one where connectivity fades into the background. Whether you’re a consultant joining a Teams call on a train, a field engineer uploading site data from the field or a sales leader finishing a proposal in a hotel lobby, Surface Laptop 5G keeps business moving wherever work happens.

    Surface Laptop 5G represents Microsoft’s end-to-end innovation in action. Hardware, software and cloud services come together to deliver intelligent, secure and connected experiences for today’s mobile workforce. The Surface for Business portfolio offers a complete solution for every user scenario, from tablet-first flexibility to high-performance laptops, all supported by Microsoft’s modern management and industry-leading security.

    Engineered for seamless 5G performance

    Adding 5G to Surface Laptop required more than just dropping in a modem. Every layer of Surface Laptop 5G was reengineered to deliver a seamless, reliable and secure experience, while preserving the design, performance and portability our customers expect.

    Dynamic antenna system

    At the heart of Surface Laptop 5G is a dynamic antenna system that continuously adapts to its environment. With six strategically placed antennas, the device automatically adjusts signal paths and power based on how it’s being held or used, ensuring strong, reliable connectivity exactly when and where it’s needed.[4] As users move between environments, the device seamlessly transitions between 5G and Wi-Fi networks, keeping a steady and secure connection to cloud-based apps, updates, and corporate resources. This innovative antenna design also enables Surface Laptop 5G to act as a mobile hotspot, securely sharing its 5G connection with other devices when Wi-Fi isn’t available.[3]

    Thoughtfully designed hardware

    Many laptops place antennas near the base, where signals are more likely to be blocked by objects or the user’s legs. Surface Laptop 5G was designed differently, with antennas strategically positioned higher on the device to reduce interference and maintain a strong, reliable and consistent connection.

    This design required a new material, one that allows radio signals to pass through without impacting performance, while still delivering the durability, premium feel and lightness our customers are looking for. We developed a custom multi-layered laminate that meets all of these needs, enabling reliable 5G performance without compromising portability or design.

    Surface Laptop 5G also includes both NanoSIM and eSIM options, integrated to preserve its slim profile while enabling global connectivity.[4] Weighing under 3 pounds, it is light and easy to carry across campuses, through airports or from meeting to meeting.

    Tested for the real world

    In Surface we don’t just simulate real-world use, we build for it. Surface Laptop 5G was tested in homes, apartments and active office environments replicating everyday scenarios. Moving between rooms, switching networks, multitasking and working from laps helped us fine-tune antenna placement, thermal performance and connectivity behavior to reflect how people actually work.

    To ensure global performance, the 5G hardware was field-tested with over 100 mobile operators across more than 50 countries. The result is reliable 5G connectivity that travels with your workforce around the world.[5]

    Secure and connected for smarter management

    With support for 5G built-in, Surface Laptop devices stay continuously connected, enabling IT to deliver security updates, enforce policies and access real-time insights, from almost anywhere. This integration is possible because Surface is engineered in partnership with Windows and Intune, combining hardware, software and cloud-based management into a unified Microsoft solution.

    IT can remotely deploy and manage eSIM profiles, allowing cellular connectivity to be preconfigured and pushed to enrolled Surface devices.6 Paired with Windows Autopilot, it enables a true zero-touch deployment experience where devices arrive fully configured, secured and ready to use.

    The Surface Management Portal within the Intune Admin Center provides centralized visibility into device health, compliance and usage across the Surface fleet. Now with Security Copilot integrated, IT can act faster with AI-powered tools to detect issues, assess risk and respond with greater confidence.

    For an extra layer of protection, the PanzerGlass Privacy Screen Protector helps safeguard on-screen information and can reduce the risk of visual data exposure when working in public spaces.[6]

    Surface is where Microsoft’s hardware, software and cloud come together to deliver an experience that’s easy to manage, safe to deploy and ready for AI from day one.

    A connected future, built for business

    Surface offers powerful protection that safeguards your data and privacy while enabling your employees to achieve more.

    Surface Laptop 5G joins a growing portfolio of Copilot+ PCs designed to meet the evolving needs of today’s workforce. With the Surface Pro for Business, 12-inch and Surface Laptop for Business, 13-inch now shipping, and Surface Laptop 5G arriving on Aug. 26, organizations have more choice than ever to modernize their device fleets with powerful, secure and AI-ready tools.

    When paired with Verizon’s secure, reliable 5G network, Surface devices unlock even greater productivity. The combination of Surface Copilot+ PCs, Microsoft 365 Copilot and high-speed mobile connectivity enables a seamless experience that helps businesses work easier and efficiently, in the office or out in the field. In the U.S., Surface for Business devices are available through a broad network of partners, including Verizon Business, with selected Verizon stores rolling out in the coming months.

    With support ending for Windows 10 PCs on Oct. 14, 2025, now is the time to begin the transition to a modern Windows experience—one that’s optimized for AI, secured by design and built for mobility.

    To learn more about the new Surface Laptop 5G, Surface Pro, 12-inch and Surface Laptop, 13-inch visit Surface.com/Business to find an authorized reseller, or visit the Microsoft Store. When you shop at Microsoft.com, you’ll get free shipping and an extended 60-day price protection and return window. For a deeper technical dive, see the Surface IT Pro Blog.

    [1] 5G will be available later in 2025 and only on specific SKUs of Surface Laptop for Business 13.8-inch | Intel, but not in all areas; compatibility and performance depends on carrier network, plan and other factors. See carrier for details and pricing.

    [2] Per user license sold separately; also requires eligible Microsoft 365 plan.

    [3] Mobile hotspot support may vary by country and/or carrier; additional fees may apply.

    [4] eSIM support and availability may vary by carrier and country.

    [5] Service availability and performance subject to service provider’s network. Contact your service provider for details, compatibility, pricing, SIM card and activation. See all specs and frequencies at surface.com. Availability of data plans for eSIM varies by market and by carrier.

    [6] Sold separately.

    MIL OSI Economics

  • MIL-OSI USA: Sens. Hagerty, Tim Scott, Lummis, Moreno Release Market Structure Discussion Draft, Issue Request for Information From Stakeholders

    US Senate News:

    Source: United States Senator for Tennessee Bill Hagerty
    The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support
    WASHINGTON—Today,United States Senator Bill Hagerty (R-TN), a member of the Senate Banking Committee, joined Senators Tim Scott (R-SC), Chairman of the Senate Banking Committee, Cythia Lummis (R-WY), Chairwoman of the Senate Banking Subcommittee on Digital Assets, and Bernie Moreno (R-OH), in releasing an initial discussion draft of digital asset market structure legislation covering issues under the Banking Committee’s jurisdiction. The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support. Along with the discussion draft, the Senators are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions.
    “For too long, outdated laws and regulatory uncertainty around digital asset market structure have hindered American innovation and left consumers without adequate protections,” said Senator Hagerty. “This discussion draft demonstrates a strong commitment to unlocking the full potential of the digital asset economy by delivering responsible legislation that reflects input from stakeholders, fosters innovation, establishes consistent guardrails, and ensures the United States remains a global leader in digital assets.”
    “My colleagues and I in the House and Senate share the same goal: to provide clear rules of the road for digital assets that protect investors, foster innovation, and keep the future of digital finance anchored in America,” said Chairman Scott. “I’m grateful for the hard work of our House counterparts to craft smart, bipartisan legislation, and I look forward to building on their work here in the Senate. Working with President Trump, we can deliver a comprehensive, bipartisan regulatory framework for digital assets.”
    “The time for regulatory uncertainty in the digital asset space has come to an end,” said Senator Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”
    “The GENIUS Act was a critical stride toward ensuring the United States is a leader in Digital Assets,” said Senator Moreno. “This draft represents the next step in putting a bipartisan regulatory framework on President Trump’s desk and I look forward to continuing our important work to encourage innovation, protect consumers, and strengthen national security and US dollar dominance.”
    The discussion draft takes important steps to:
    Define Ancillary Assets – The discussion draft clearly defines an “ancillary asset” to clarify which digital assets are not securities.
    Create Disclosure Requirements – The discussion draft creates disclosure requirements that are tailored for offers, sales, or distributions of ancillary assets.
    Promulgate New Rules – The discussion draft requires the Securities and Exchange Commission (SEC) to promulgate new rules:
    Regulation DA: To exempt certain offers or sales of ancillary assets from SEC registration, including offers of sales that do not exceed $75 million in gross proceeds per year over four years.
    Investment Contracts: To more clearly define what constitutes an investment contract.

    Modernize Securities Regulations – The discussion draft directs the SEC to tailor existing requirements to digital asset activity, so that regulations are no longer outdated, unnecessary, or unduly burdensome in light of the unique technological characteristics of digital assets.
    Prevent Illicit Finance – The discussion draft requires the creation of examination standards for digital assets and encourages private sector entities to partner with federal law enforcement, to detect and deter illicit finance.
    Promote Responsible Banking Innovation – The discussion draft ensures financial holding companies can use a digital asset or distributed ledger system to perform, provide, or deliver any activity, function, product, or service that banks are otherwise authorized by law to perform, provide, or deliver.
    Full text of the discussion draft can be found here.
    In addition to the discussion draft, the Senators are calling on stakeholders to submit their feedback on a wide range of questions around: 
    Regulatory Clarity and Tailoring
    Investor Protection
    Trading Venues and Market Infrastructure
    Custody
    Illicit Finance
    Banking
    Innovation
    Preemption
    To participate in the Request for Information (RFI), please submit your feedback to MarketStructure_RFI@banking.senate.gov.

    MIL OSI USA News

  • MIL-OSI USA: Sen. Baldwin, Rep. Wied Introduce Bill to Honor Veterans of Operation End Sweep with the Vietnam Service Medal

    US Senate News:

    Source: United States Senator for Wisconsin Tammy Baldwin
    WASHINGTON, D.C. – Today, U.S. Senator Tammy Baldwin (D-WI) and Congressman Tony Wied (R-WI-08) introduced a bipartisan bill to honor veterans who participated in Operation End Sweep with the Vietnam Service Medal. Currently, participants in Operation End Sweep, a mission to clear dangerous mines from Haiphong harbor and surrounding waters in North Vietnam after the war concluded, are ineligible for this service medal because their service took place after the United States had officially withdrawn from Vietnam in January 1973. The Honoring Operation End Sweep Veterans Act is inspired by Retired Navy Commander Michael Cosgrove of Sturgeon Bay, Wisconsin, who served in Operation End Sweep but was not properly honored for his service.
    “The sailors who spent months sweeping for mines in North Vietnam risked their lives to clean up the legacies of the Vietnam War, save lives, and make good on the United States’ commitment to international law,” said Senator Baldwin. “Their service and sacrifice deserve to be honored and recognized alongside the millions of Americans who served their country during the Vietnam War. I’m proud to work with Representative Wied to honor these sailors.”
    “Operation End Sweep marked the end of the Vietnam War and serves as a powerful example of the dedication and bravery of our Vietnam veterans, like Retired Navy Commander Michael Cosgrove of Sturgeon Bay, who risked their lives to clean up naval mines left behind in the war’s aftermath,” said Congressman Wied. “I’m proud to stand with Senator Baldwin in introducing this bipartisan bill to ensure their service is honored equally alongside that of every other Vietnam veteran.”
    “I am a retired commander in the Navy. As a lieutenant, I was Executive Officer of an ocean-going minesweeper. In 1973, we sailed from Hawaii to Haiphong Harbor as part of Operation End Sweep, sweeping the mines we had placed in Haiphong Harbor,” said Retired Navy Commander Michael Cosgrove of Sturgeon Bay, WI. “We spent 5 months in and out of North Vietnamese waters after Congress had declared the war ended. We received virtually no credit for our efforts. Most have no idea the operation even occurred. I would like to see this bill passed so that those of us who participated in End Sweep receive some recognition for our service.”
    The signing of the Paris Peace Accords on January 27, 1973, officially ended direct U.S. involvement in the Vietnam War and the subsequent withdrawal of U.S. forces from Vietnam. Under the Hague Convention of 1907, the U.S. was required to eliminate the mine threat it had created after the end of hostilities.
    For this reason, the U.S. Navy and Marine Corps conducted Operation End Sweep to remove naval mines from Haiphong harbor and other coastal and inland waterways in North Vietnam between February and July 1973. Since Operation End Sweep occurred after the official end of the Vietnam War, servicemembers who participated in the operation are not eligible for the Vietnam Service Medal.
    The Honoring Operation End Sweep Veterans Act would direct the Department of Defense to award veterans who participated in Operation End Sweep with the Vietnam Service Medal to recognize their service and sacrifice.
    Senator Baldwin has long advocated for addressing the legacies of war and honoring those that do this important and dangerous work. She leads bipartisan legislation with Senator Jerry Moran (R-KS) to honor members of the Southeast Asian Diasporas who supported and defended the U.S. during the Vietnam War. The bill also would authorize funding for the removal of landmines and unexploded ordnances and victim support programs for those injured by landmines and other legacies of war in Vietnam.
    A one-pager on this bill is available here. Full bill text is available here.

    MIL OSI USA News

  • MIL-OSI USA: MEDIA ADVISORY: Sanders to Hold Town Hall on Teacher Pay Crisis with Hundreds of Educators from Across the Country

    US Senate News:

    Source: United States Senator for Vermont – Bernie Sanders
    WASHINGTON, July 22 — Sen. Bernie Sanders (I-Vt.), Ranking Member of the Senate Committee on Health, Education, Labor, and Pensions (HELP), will hold a town hall on Thursday with more than 100 teachers and educational leaders at the U.S. Capitol to discuss the teacher pay crisis impacting schools, students and communities.
    Joining Sanders at the town hall will be Sen. Ed Markey (D-Mass.); Randi Weingarten, president of the American Federation of Teachers (AFT); Princess Moss, vice president of the National Education Association (NEA); and educators from across the country.
    “It is simply unacceptable that, in the richest country in the history of the world, 40% of teachers have to work extra jobs just to make ends meet. The situation has become so absurd that four hedge fund managers on Wall Street make more money in a single year than every kindergarten teacher in America combined — nearly 120,000 teachers,” Sanders said. “We need the best education system in the world, and that means we need the best teachers. To get the best teachers, we need to pay them what they deserve.”
    Today in America, nearly one in eight teaching jobs is vacant or filled by a teacher who is not fully certified. Approximately one-third of all public school teachers make less than $60,000 a year — including more than 90% of starting teachers. Hundreds of thousands of teachers have to work two or three jobs during the school year to make ends meet. Meanwhile, the average weekly wage for public school teachers has decreased by 5% over the past 30 years, adjusted for inflation. Today, 44% of public school teachers quit the profession within five years.
    “Wages for public school teachers are so low that in 36 states, the average public school teacher with a family of four qualifies for food stamps, public housing and other government assistance programs. We have got to do better than that,” Sanders continued. “No teacher in America should make less than $60,000 a year. If we are going to have the best public school system in the world, we have got to radically change our attitude toward education and make sure that every teacher in America receives the compensation that they deserve for the enormously important and difficult work that they do.”
    At the town hall, Sanders will hear directly from educators about how low wages, burnout and disinvestment are affecting both teacher morale and the quality of public education.
    Details
    What: Save Public Education: Pay Teachers What They Deserve
    Who:
    Sen. Bernie Sanders
    Sen. Ed Markey
    AFT President Randi Weingarten
    NEA Vice President Princess Moss
    More than 100 teachers from across the U.S.
    When: Thursday, July 24, 12:30 p.m.
    Where: Washington, D.C. Location available upon RSVP. The event will also be livestreamed on Sanders’ social media.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich, Bennet, Hickenlooper Introduce Legislation to Expand and Improve Access to Clean Water for Tribal Families

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Half of households on Native American reservations lack access to reliable water sources, clean drinking water, or adequate sanitation

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.), along with U.S. Senators Michael Bennet (D-Colo.) and John Hickenlooper (D-Colo.), introduced the Tribal Access to Clean Water Act to dramatically expand access to clean water for Tribal families by investing in water infrastructure. This bill would increase funding through the Indian Health Service, the U.S. Department of Agriculture (USDA), and the Bureau of Reclamation to support water infrastructure projects in Tribal communities and help provide clean water to Native American households that currently lack access.

    “Nearly half of Native American households lack access to clean and reliable water supplies. That is completely unacceptable,” said Heinrich. “By addressing a significant backlog of infrastructure projects and removing barriers to federal programs that provide technical and financial assistance to Tribes, this legislation is an important step toward delivering clean drinking water to all families in Indian Country.”

    “Too many Tribal communities in Colorado and across the country cannot access clean, safe water,” said Bennet. “This legislation builds on our efforts to improve access for Tribes in the Bipartisan Infrastructure Law. It fulfills the federal government’s promise to provide these communities with the clean water they deserve.”

    “Clean drinking water is a basic necessity. Yet, so many of our Tribal communities have been left without the infrastructure. It’s unacceptable,” said Hickenlooper. “Let’s cut red tape and invest in modern resources to finally deliver safe, accessible water to every Tribe.”

    Lack of access to clean drinking water is a significant barrier for many Native American communities. According to data from the U.S. Department of Health and Human Services (HHS), Native American households are 19 times more likely than white households to lack indoor plumbing.

    The Tribal Access to Clean Water Act will:

    • Authorize the USDA to make grants and loans for technical and financial assistance, as well as for construction;
    • Increase funding authorizations for USDA’s Rural Development Community Facilities Grant and Loan Program by $100 million per year for five years, provide $30 million per year specifically for technical assistance, and ensure that Native communities are treated equitably and appropriately when considered for grants and loans;
    • Increase funding authorizations for existing programs of the Indian Health Service for water and sanitation facilities construction over a five-year period, including for community facilities ($2.5 billion), technical assistance ($150 million), and operation and maintenance assistance ($500 million); and
    • Authorize $90 million over five years for the Bureau of Reclamation’s existing Native American Affairs Technical Assistance Program.

    “Water is a sacred resource given to us to protect. It is of the utmost importance that Tribes have access to clean water not only for personal consumption and economic development but also for cultural purposes. Many tribes in the Southwest rely on access to clean water to carry on our culture and traditions. We thank U.S. Senators Martin Heinrich and Michael Bennet for reintroducing the Tribal Access to Clean Water Act,” said Myron Armijo, Santa Ana Pueblo Governor.

    “It is far past time to ensure that Native people have the same level of basic water service most Americans take for granted,” said Manuel Heart, Chairman of the Ute Mountain Ute Tribe. “This bill’s recognition of the need for technical support and operation and maintenance assistance for Tribal water supply facilities is not only essential to realizing the benefit of investment in water infrastructure, but also a critical step toward increasing Tribal independence and governance capabilities.”

    “Some of the starkest examples of the public health impacts from not having clean, running water in the home are right in our backyards,” said Anne Castle, co-founder of the initiative on Universal Access to Clean Water for Tribal Communities. “Higher incidence of respiratory disease, gastrointestinal infections, diabetes, and cancer are all linked to ‘water poverty’ – the lack of access to secure and healthy household water – which is particularly acute for Native American households. With targeted resources and Federal agency coordination, we have the ability to solve this longstanding inequity in Indian country.”

    “For far too long, many indigenous Americans – American Indians, Alaska Natives, and Native Hawaiians – have gone without access to a clean and safe drinking water supply,” said John Echohawk, Executive Director and Co-Founder of the Native American Rights Fund and member of the Pawnee Nation. “These are not isolated or regional deficiencies, but rather a nationwide disparity in access to a basic ingredient of life. This bill will help to address gaps in current support for Tribal drinking water access and help to fulfill the Federal government’s treaty and trust responsibility to Native American Tribes.”

    “Every American is entitled to access to clean drinking water,” said Ken Norton, Chairman of the National Tribal Water Council. “But this undeniable truth simply does not hold for far too many Tribal households. It is well past time to bring the necessary resources to bear that will allow all Tribal families to enjoy the same basic services most Americans take for granted.”

    “Water is a basic human right and this bill fulfills the government’s trust obligation to Tribes and Indigenous communities to ensure all Native populations have access to clean drinking water,” said Garrit Voggesser, Senior Director of Tribal Partnerships and Policy, National Wildlife Federation. “For far too long more than half of the country’s Indigenous peoples haven’t had access to clean drinking water. Water must be accessible to not only support public health, but also meet historical, cultural, ecological, and rights-based needs.”

    Heinrich initially introduced this legislation with Bennet in 2021. He also successfully fought to include funding to improve Tribal access to clean water in the Infrastructure Law. The law included $3.5 billion for the Indian Health Service Sanitation Facilities Construction program to address needs for tribal sanitation facilities and services, $1 billion for the Bureau of Reclamation to support legacy rural water supply projects, which will benefit Tribes, and increased funding for the Environmental Protection Agency’s Clean Water Act and Safe Drinking Water Act State Revolving Funds.

    In addition to Heinrich, Bennet, and Hickenlooper, this bill is co-sponsored by U.S. Senators Bernie Sanders (I-Vt.), Ron Wyden (D-Ore.), Elizabeth Warren (D-Mass.), and Alex Padilla (D-Calif.).

    The text of the bill is available here.

    A summary of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich Announces Committee Passage of Over $205 Million for New Mexico’s Military Installations and Significant Wins for Veterans

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Investments Heinrich championed include childcare assistance, improved telehealth & rural health services, & expanded homelessness prevention programs

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.) announced the bipartisan Senate Appropriations Committee passage of the Fiscal Year 2026 (FY26) Military Construction, Veterans Affairs, and Related Agencies Appropriations Bill. With Committee passage of this bill, Heinrich secured support for over $205 million for New Mexico’s military installations and significant wins for New Mexico’s veterans, including over $32 million in Congressionally Directed Spending for five local projects.

    “For our nation’s veterans and military families, this bill keeps our promise: that when they come home, they will receive the recognition, education, housing, and health care that they have earned through their service. It also strengthens New Mexico’s role as a leader in national security and bolsters our local economies,” said Heinrich, a member of the Senate Appropriations Committee. “This bill will also ensure that our service members are best equipped with state-of-the-art technology and resources to defend freedom at home and abroad. As a member of the Senate Appropriations Committee, I am committed to doing everything I can to support the heroic Americans who sacrifice so much to keep us safe.”

    Heinrich is a member of the Senate Appropriations Committee and the former Chair of the Appropriations Subcommittee on Military Construction, Veterans Affairs, and Related Agencies.

    New Mexico Military Construction

    Heinrich secured Committee support of investments in seven New Mexico projects.

    Heinrich successfully included funds for the following projects:

    • $90,000,000 for the construction of a 192-bed dormitory for airmen at Cannon Air Force Base.
    • $83,000,000 for the construction of a new Space Rapid Capabilities Office Headquarters on Kirtland Air Force Base.
    • $18,250,000 to construct a new Explosive Operations Building at Kirtland Air Force Base, which is essential for the safe and efficient handling, inspection, and storage of munitions in alignment with Air Force operational requirements.
    • $3,200,000 to construct a Child Development Center (CDC) on Kirtland Air Force Base that supports the growing childcare needs of Kirtland Air Force Base personnel.

    Heinrich also secured language addressing the ongoing energy infrastructure needs at White Sands Missile Range, ensuring troop readiness and training is prioritized.

    Heinrich and U.S. Senator Ben Ray Luján (D-N.M.) also successfully included funding for the following projects:

    • $8,100,000 to renovate and construct a training facility for Security Forces at Cannon Air Force Base. This will help support the continued growth of this Security Force unit.
    • $2,000,000 to restore and improve antiterrorism technology at the Wyoming Gateat Kirtland Air Force Base.
    • $700,000 to finish the design of a new High Speed Test Track at Holloman Air Force Base.

    Support for Veterans

    Heinrich secured Committee support for key veteran programs.

    Suicide Prevention

    Heinrich successfully secured $18,866,195,000 for mental health treatment, including $697,760,000 for suicide prevention outreach. Heinrich also secured language encouraging the VA to use predictive modeling and analytics for veteran suicide prevention in the Recovery Engagement and Coordination for Health-Veterans Enhanced Treatment (REACH VET) program. This innovative solution would identify veterans with evidence-based risk factors for suicidal ideation in order to get help to veterans before a potential mental health crisis.

    In 2020, Heinrich voted in favor of the Commander John Scott Hannon Veterans Mental Health Care Improvement Act of 2019 (P.L. 116-171), which supported and authorized the REACH VET program.

    Rural Health

    Heinrich successfully secured $342,455,000 for the VA’s Office of Rural Health and its Rural Health Initiative to continue supporting veterans with services like transportation to appointments for highly rural veterans, utilization of innovative transportation service technologies, and outreach to highly rural veterans.

    An estimated 2.7 million rural and highly rural veterans are enrolled in the Veterans Health Administration (VHA). Many rural veterans enrolled in the VA health care system are at an advanced age, with approximately 54 percent aged 65 or older. With the aging veteran population growing increasingly medically complex and more likely to be diagnosed with chronic conditions like diabetes, obesity, high blood pressure, and heart disease, each requiring more frequent, ongoing, and costly care, these funds would help close the gap and get highly rural veterans the care they need.

    Telehealth Services

    Heinrich successfully secured $6,356,035,000 to sustain and increase telehealth capacity and expand the reach of VA medical providers to veterans in highly rural areas through the use of in-home telehealth and remote patient monitoring services. The bill also supports the Veterans Health Administration’s (VHA) rulemaking to eliminate copays for all virtual medical appointments of any type and especially for primary and preventative care appointments.

    Preventing Veteran Homelessness

    Heinrich successfully secured $3,459,121,000 to prevent veteran homelessness, including $702,821,000 to bolster the Supportive Services for Veteran Families Program, which would meet the needs of veterans including help with the rising costs of household goods; $670,900,000 for case management and administration of Housing and Urban Development – Veterans Affairs Supportive Housing vouchers; $323,100,000 for the Grant and Per Diem Program, which would support transitional housing and assist veterans in achieving housing stability; and, $139,843,000 for Veterans Justice Outreach and Legal Services for Veterans grants to award community-based organizations with funds to assist veterans with legal issues like accessing benefits, navigating family law, and securing safe and stable housing.

    Veterans Affairs Service Purchasing (VASP) Program

    Heinrich successfully secured report language directing the VA to explain why it abruptly ended the Veterans Affairs Service Purchasing program, a critical program that would keep veterans who were unable to pay their mortgage in their homes. At least 130 New Mexico veterans could be impacted by this administration’s shortsighted decision to end the Veterans Affairs Service Purchasing program without loss mitigation policies.

    Access to Medications for Substance Use Disorder

    Heinrich successfully secured $709,573,000 for the Opioid Prevention and Treatment programs at the VA, including $454,086,000 for treatment programs and $254,487,000 to continue implementation of the Jason Simcakoski Memorial and Promise Act. Heinrich voted in favor of this bill’s authorizing legislation, the Comprehensive Addiction and Recovery Act, in 2016 (P.L. 114-198).

    Veteran Family Resource Program

    Heinrich successfully secured language to require a status report on the Veteran Family Resource Program rollout, including authorities and funding needed to ensure a successful, continued rollout that reduces rates of child abuse and neglect among families with veterans. Services would include interventions like case management assistance to address evidence-based risk factors like housing and food insecurity in veteran families.

    Childcare Assistance

    Heinrich successfully secured an additional $3,000,000 in the VA’s overall budget to support the expansion of childcare centers at VA medical facilities through a pilot program. Heinrich originally voted in favor of the Caregivers and Veterans Omnibus Health Services Act of 2010 (P.L. 111-163) while Congressman for New Mexico’s 1stCongressional district. This bill led to the VA’s initial childcare pilot program to assess feasibility and advisability of providing childcare services to veterans receiving mental health and intensive health care services.

    As a result, in 2016, the VA launched a childcare pilot program to implement three (3) free, drop-in childcare service centers across three locations in the states of New York and Washington. Survey data indicate nearly a third of veterans are interested in childcare services and approximately 10 percent have had to cancel or reschedule medical appointments due to lack of childcare.

    Grants for Construction of State Extended Care Facilities

    Heinrich successfully secured $171,000,000 in construction funds for state extended care facilities. In New Mexico, there is only one VA long-term care facility, despite demand for additional capacity and facilities. These facilities are particularly important to ensure aging and disabled veterans receive the appropriate level of care.

    Medical and Prosthetics Research

    Heinrich successfully secured $943,000,000 to fund medical, rehabilitative, and health services research and support basic and clinical studies that advance knowledge leading to improvements in the prevention, diagnosis, and treatment of diseases and disabilities. Medical and prosthetic research at the Department of Veterans Affairs includes the fields of prosthetics, orthotics, adaptive equipment for vehicles, sensory aids, and related areas.

    VA Court of Appeals

    Heinrich successful secured language requiring the VA to improve transparency surrounding the large back log of cases at the VA Court of Appeals. According to last year’s Annual Report, there is a backlog of 200,805 cases.

    MIL OSI USA News

  • MIL-OSI USA: Schatz, Banks Introduce Bipartisan Bill To Build More Affordable Housing, Address America’s Growing Housing Crisis

    US Senate News:

    Source: United States Senator for Hawaii Brian Schatz

    WASHINGTON – U.S. Senators Brian Schatz (D-Hawai‘i) and Jim Banks (R-Ind.) today introduced the Build More Housing Near Transit Act. The bipartisan legislation continues Senator Schatz’s efforts to address America’s housing shortage by offering federal benefits and encouraging local governments to build more housing near transit-oriented urban and suburban spaces, where options are especially lacking.

    “The clearest way out of our national housing shortage is by building more housing,” said Senator Schatz. “Our bipartisan bill incentivizes cities and towns to build housing when they expand or redevelop their public transit systems. This will help put more families in homes, grow local economies, and cut carbon pollution. It’s a win for everyone.”

    “This bill makes it easier for communities to build homes for working families by cutting red tape and giving them the freedom to create strong, family-friendly neighborhoods near public transit,” said Senator Banks.

    Specifically, the legislation directs the Secretary of Transportation to provide a scoring boost to the competitive grant applications of public transit projects that include regulatory reforms that legalize new housing near stations, including removing expensive parking mandates, streamlining approval for new housing, allowing houses on smaller lots, raising height limits, and other pro-housing policies.

    Currently, 47 percent of renter households are cost-burdened, and lack of housing options in transit-friendly areas is a major contributor to this. In addition, transportation costs are often a household’s second-largest expenditure behind housing, meaning more housing in transit areas would have a two-fold benefit.

    By offering easier access to transit centers, the Build More Housing Near Transit Act will connect more employees with jobs and boost economic output, as well as reduce greenhouse gas emissions through increased public transit ridership. It will also make federal transportation projects more efficient and ensure federal dollars are used most effectively.

    “America is experiencing a severe housing shortage that affects every aspect of American lives and the economy,” said Mike Kingsella, CEO of Up for Growth Action. “The Build More Housing Near Transit Act addresses the critical link between transportation and housing and would create greater access to affordable commutes and abundant housing. We applaud the lead sponsors for introducing this bill, serving as an example of how the federal government can use its leverage to ensure the right types of housing are available in the places people want to live.”

    “For decades, the federal government has funded mass transit projects in cities whose growth control laws do not allow people to live near and ride on transit. The Build More Housing Near Transit Act finally corrects this. It protects transit riders and the federal taxpayer from spending scarce transit capital on projects doomed by rigid zoning regulations to low housing growth and low future ridership, while uplifting projects in localities that welcome housing & transit ridership growth. This bill is the essential first step in restoring bipartisan confidence in America’s mass transit investments for taxpayers and transit riders alike,” said Alex Armlovich, Senior Housing Policy Analyst for the Niskanen Center.

    The full text of the bill is available here.

    MIL OSI USA News

  • MIL-OSI Russia: World Fencing Championships Start in Tbilisi

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    TBILISI, July 22 (Xinhua) — The World Fencing Championships kicked off in Georgia’s capital Tbilisi on Tuesday. The country is hosting a competition of this scale for the first time and has fielded a team of 25 strongest athletes, the Georgian Fencing Federation said.

    The competition will last until July 30. According to the organizers, about 1,200 athletes from 135 countries and regions of the world are taking part in the tournament. 12 sets of awards will be contested in fencing with epees, foils and sabres in individual and team disciplines among men and women.

    President of the Georgian Fencing Federation Merab Bazadze expressed confidence that holding the championship will be an important step in the development of fencing in the country. “A lot of people will come, and I am glad that this elite sport will become a priority in Georgia,” he told reporters.

    At the previous World Championship, held in 2023 in Milan /Italy/, the Georgian team won one award – a silver medal, which was won by sabre fencer Sandro Bazadze. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Air India plane’s auxiliary power unit catches fire after landing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    NEW DELHI, July 22 (Xinhua) — An Air India passenger plane, flight AI-315, operating from Hong Kong to Delhi, caught fire in its auxiliary power unit shortly after landing at Indira Gandhi International Airport in New Delhi, the Indian capital, on Tuesday, officials said.

    The fire was discovered as passengers were preparing to exit the plane.

    Air India said no passengers or crew were injured, but the fire caused some damage to the aircraft itself.

    Another Air India flight from Cochin to Mumbai skidded off the runway while landing on Monday, causing damage to both the plane and the road surface, according to media reports. Last month, an Air India flight to London crashed shortly after takeoff in the city of Ahmedabad, killing all 241 people on board. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI United Nations: Amid ‘Horror Show in Gaza’, Humanitarian System Denied Space to Deliver, Multilateral Problem-Solving Needed More than Ever, Secretary-General Tells Security Council

    Source: United Nations General Assembly and Security Council

    Following are UN Secretary-General António Guterres’ remarks to the Security Council on multilateralism and peaceful settlement of disputes, in New York today:

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.  The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.  The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate, when unresolved disputes fuel the flames of conflict and when States lose trust in each other.

    The Charter lays out a number of important tools to forge peace.  Article 2.3 of the UN Charter is clear:  “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice”.  Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.  This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts.  And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.  Malnourishment is soaring.  Starvation is knocking on every door.

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.  That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.  With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck — among them facilities of the UN Office for Project Services and the World Health Organization (WHO), including WHO’s main warehouse.  This is despite all parties having been informed of the locations of these UN facilities.  These premises are inviolable and must be protected under international humanitarian law — without exception.

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.  And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.  But it still holds the power to stop them.  Peace is a choice.  And the world expects the UN Security Council to help countries make this choice.  This Council is at the centre of the global architecture for peace and security.  Its creation reflected a central truth.

    Competition between States is a geopolitical reality.  But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.  Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year.

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.  Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.  The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the cold war, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.  One that successfully deployed a range of peacekeeping missions.  One that opened the door for vital humanitarian aid to flow to people in need.  And one that helped prevent a third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.  This Council should be made more representative of today’s geopolitical realities.  And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.  I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.  The landmark adoption of Security Council resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and rebuild regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of States.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.  The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its eightieth anniversary next year.

    As we mark the eightieth anniversary of our Organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.  I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    MIL OSI United Nations News

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: Curiosity Blog, Sols 4604-4606: Taking a Deep Breath of Martian Air

    Source: NASA

    Written by Lauren Edgar, Planetary Geologist at USGS Astrogeology Science Center
    Earth planning date: Friday, July 18, 2025
    Curiosity has started to investigate the main exposure of the boxwork structures! What was once a distant target is now on our doorstep, and Curiosity is beginning to explore the ridges and hollows that make up this terrain, to better understand their chemistry, morphology, and sedimentary structures.
    I was on shift as Long Term Planner during this three-sol weekend plan, and the team put together a very full set of activities to thoroughly investigate this site — from the sky to the sand. The plan starts with Navcam and Mastcam observations to assess the amount of dust in the atmosphere, followed by a large Mastcam mosaic to characterize the resistant ridge on which the rover is parked. ChemCam will also acquire a LIBS observation on a target named “Vicuna” to assess the chemistry of a well-exposed vein. The team chose this parking location to characterize the chemistry and textures of this topographic ridge (to compare with topographic lows), so the next part of the plan involves contact science using APXS and MAHLI to look at different parts of the nodular bedrock in our workspace, at targets named “Totoral” and “Sillar.” There’s also a MAHLI observation of the same vein that ChemCam targeted.
    The second sol involves more Mastcam imaging to look at different parts of this prominent ridge, along with a ChemCam LIBS observation on top of the ridge, and a ChemCam RMI mosaic to document the sedimentary structures in a distant boxwork feature. Navcam will also be used to look for dust devils. Then Curiosity will take a short drive of about 5 meters (about 16 feet) to explore the adjacent hollow (seen as the low point in the foreground of the above Navcam image). After the drive we’ll take more images for context, and to prepare for targeting in Monday’s plan.
    After all of this work it’s time to pause and take a deep breath… of Martian atmosphere. The weekend plan involves an exciting campaign to look for variations in atmospheric chemistry between night and day. So Curiosity will take an overnight APXS atmospheric observation at the same time that two instruments within SAM assess its chemical and isotopic abundance.
    On the third sol Curiosity will acquire a ChemCam passive sky observation, leading to a great set of atmospheric data. These measurements will be compared to even more atmospheric activities in Monday’s plan to get the full picture. As you can imagine, this plan requires a lot of power, but it’s worth it for all of the exciting science that we can accomplish here.
    The road ahead has many highs and lows (literally), but I can’t wait to see what Curiosity will accomplish. The distant buttes remind us that there’s so much more to explore, and I look forward to continuing to see where Curiosity will take us.

    MIL OSI USA News

  • MIL-OSI USA: NASA Invites Media to Senegal Artemis Accords Signing Ceremony

    Source: NASA

    Senegal will sign the Artemis Accords during a ceremony at 2 p.m. EDT on Thursday, July 24, at NASA Headquarters in Washington.
    Brian Hughes, NASA chief of staff, will host Maram Kairé, director general of the Senegalese space agency (ASES), and Abdoul Wahab Haidara, ambassador of Senegal to the United States, along with other officials from Senegal and the U.S. Department of State.
    This event is in-person only. Media interested in attending must RSVP no later than 10 a.m. on Thursday, July 24, to: hq-media@mail.nasa.gov. NASA’s media accreditation policy is online.
    The signing ceremony will take place at the James E. Webb Memorial Auditorium at NASA Headquarters in the Mary W. Jackson building, 300 E. Street SW in Washington.
    In 2020, during the first Trump Administration, the United States, led by NASA and the State Department, joined with seven other founding nations to establish the Artemis Accords, responding to the growing interest in lunar activities by both governments and private companies. The accords introduced the first set of practical principles aimed at enhancing the safety, transparency, and coordination of civil space exploration on the Moon, Mars, and beyond. Senegal is the 56th country to sign the Artemis Accords since their inception.
    The Artemis Accords are grounded in international law and represent the best practices and norms of responsible behavior that NASA and its partners have supported, including the public release of scientific data.
    Learn more about the Artemis Accords at:
    https://www.nasa.gov/artemis-accords
    -end-
    Bethany Stevens / Elizabeth ShawHeadquarters, Washington202-358-1600bethany.c.stevens@nasa.gov / elizabeth.a.shaw@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: CISA Releases Nine Industrial Control Systems Advisories

    News In Brief – Source: US Computer Emergency Readiness Team

    CISA released nine Industrial Control Systems (ICS) advisories on July 22, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

    CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    MIL OSI USA News

  • MIL-OSI USA: NASA’s X-59 Makes a Move

    Source: NASA

    NASA’s X-59 quiet supersonic research aircraft completed its first low-speed taxi test at U.S. Air Force Plant 42 in Palmdale, California, on July 10, 2025. This marked the first time the one-of-a-kind experimental aircraft has ever moved under its own power. 
    During the test, engineers and flight crews monitored the X-59 as it moved across the runway, working to validate critical systems like steering and braking. The taxiing represents the start of the X-59’s final series of ground tests before first flight. 
    The X-59 is the centerpiece of NASA’s Quesst mission, which aims to demonstrate quiet supersonic flight by reducing the loud sonic boom to a quieter “thump.”
    Image Credit: NASA/Carla Thomas

    MIL OSI USA News

  • MIL-OSI USA: Last Day to Apply for Federal Assistance for April Storms

    Source: US Federal Emergency Management Agency 2

    strong>LITTLE ROCK, Ark. – Homeowners and business owners who had damage from the destructive storms, tornadoes and flooding in Arkansas in April have until 11:59 p.m. Tuesday, July 22, to apply for federal disaster assistance.
    Residents including homeowners, renters and business owners may apply for assistance if your home or business is in Clark, Clay, Craighead, Crittenden, Desha, Fulton, Greene, Hot Spring, Jackson, Miller, Ouachita, Pulaski, Randolph, St. Francis, Saline, Sharp or White County.
    In planning your recovery from the April 2-22 storms, give yourself the widest possible set of options. If you applied for damage or losses after the storms in March, you may apply again for FEMA assistance for uninsured property losses from the April storms. Previous FEMA aid does not affect eligibility for assistance. 
    Loans from the U.S. Small Business Administration also hold many benefits for survivors. SBA loans are not just for businesses. They are the largest source of federal disaster recovery funds for survivors. In a presidentially declared disaster, these long-term, low-interest loans are available to homeowners, renters, businesses of all sizes and nonprofit organizations including houses of worship.
    FEMA has many types of assistance available. FEMA may be able to help with basic home repair costs, personal property loss, and temporary housing while you are unable to live in your home. Repair or replacement assistance may be available for a primary vehicle, a computer damaged in the disaster, or books and other items required for school. 
    To apply for FEMA assistance, go to DisasterAssistance.gov, use the FEMA App for mobile devices or call the FEMA Helpline at 800-621-3362. Lines are open daily from 6 a.m. to 10 p.m. CT and specialists speak many languages. If you use a relay service, captioned telephone or other service, you can give FEMA your number for that service. To view an accessible video on how to apply, visit Three Ways to Apply for FEMA Disaster Assistance – YouTube.
    To apply or to download an SBA application, go to SBA.gov/disaster. You may also call SBA’s Customer Service Center at 800-659-2955 or email DisasterCustomerService@sba.gov.
    Survivors can also submit documents and speak to someone about their FEMA or SBA applications at several sites. To find locations and hours, visit fema.gov/disaster/4873, scroll to the bottom of the page and click the link under “In-person Survivor Assistance.”
    For the latest information about Arkansas’ recovery, visit fema.gov/disaster/4873. Follow FEMA Region 6 on social media at x.com/FEMARegion6 and at facebook.com/FEMARegion6

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI USA: CISA Adds One Known Exploited Vulnerability, CVE-2025-53770 “ToolShell,” to Catalog

    News In Brief – Source: US Computer Emergency Readiness Team

    CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. See CISA’s Alert Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability (CVE-2025-53770) for more information and to apply the recommended mitigations. 

    • CVE-2025-53770: Microsoft SharePoint Server Remote Code Execution Vulnerability

    These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

    Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

    MIL OSI USA News

  • MIL-OSI USA: NASA Tests New Heat Source Fuel for Deep Space Exploration

    Source: NASA

    To explore the unknown in deep space, millions of miles away from Earth, it’s crucial for spacecraft to have ample power. NASA’s radioisotope power systems (RPS) are a viable option for these missions and have been used for over 60 years, including for the agency’s Voyager spacecraft and Perseverance Mars rover. These nuclear batteries provide long-term electrical power for spacecraft and science instruments using heat produced by the natural radioactive decay of radioisotopes. Now, NASA is testing a new type of RPS heat source fuel that could become an additional option for future long-duration journeys to extreme environments.
    Historically, the radioisotope plutonium-238 (plutonium oxide) has been NASA’s RPS heat source fuel of choice, but americium-241 has been a source of interest for the past two decades in Europe. In January, the Thermal Energy Conversion Branch at NASA’s Glenn Research Center in Cleveland and the University of Leicester, based in the United Kingdom, partnered through an agreement to put this new option to the test.
    One method to generate electricity from radioisotope heat sources is the free-piston Stirling convertor. This is a heat engine that converts thermal energy into electrical energy. However, instead of a crankshaft to extract power, pistons float freely within the engine. It could operate for decades continuously without wear, as it does not have piston rings or rotating bearings that will eventually wear out. Thus, a Stirling convertor could generate more energy, allowing more time for exploration in deep space. Researchers from the University of Leicester — who have been leaders in the development of americium RPS and heater units for more than 15 years — and NASA worked to test the capabilities of a Stirling generator testbed powered by two electrically heated americium-241 heat source simulators.
    “The concept started as just a design, and we took it all the way to the prototype level: something close to a flight version of the generator,” said Salvatore Oriti, mechanical engineer at Glenn. “The more impressive part is how quickly and inexpensively we got it done, only made possible by a great synergy between the NASA and University of Leicester teams. We were on the same wavelength and shared the same mindset.”

    The university provided the heat source simulators and generator housing. The heat source simulator is the exact size and shape of their real americium-241 heat source, but it uses embedded electric heaters to create an equivalent amount of heat to simulate the decay of americium fuel and therefore drive generator operation. The Stirling Research Lab at Glenn provided the test station, Stirling convertor hardware, and support equipment.
    “A particular highlight of this (testbed) design is that it is capable of withstanding a failed Stirling convertor without a loss of electrical power,” said Hannah Sargeant, research fellow at the University of Leicester. “This feature was demonstrated successfully in the test campaign and highlights the robustness and reliability of an Americium-Radioisotope Stirling Generator for potential future spaceflight missions, including long-duration missions that could operate for many decades.”
    The test proved the viability of an americium-fueled Stirling RPS, and performance and efficiency targets were successfully met. As for what’s next, the Glenn team is pursuing the next version of the testbed that will be lower mass, higher fidelity, and undergo further environmental testing.
    “I was very pleased with how smoothly everything went,” Oriti said of the test results. “Usually in my experience, you don’t accomplish everything you set out to, but we did that and more. We plan to continue that level of success in the future.”
    For more information on NASA’s RPS programs, visit:https://science.nasa.gov/rps

    MIL OSI USA News

  • MIL-OSI USA: NASA Tests New Heat Source Fuel for Deep Space Exploration

    Source: NASA

    To explore the unknown in deep space, millions of miles away from Earth, it’s crucial for spacecraft to have ample power. NASA’s radioisotope power systems (RPS) are a viable option for these missions and have been used for over 60 years, including for the agency’s Voyager spacecraft and Perseverance Mars rover. These nuclear batteries provide long-term electrical power for spacecraft and science instruments using heat produced by the natural radioactive decay of radioisotopes. Now, NASA is testing a new type of RPS heat source fuel that could become an additional option for future long-duration journeys to extreme environments.
    Historically, the radioisotope plutonium-238 (plutonium oxide) has been NASA’s RPS heat source fuel of choice, but americium-241 has been a source of interest for the past two decades in Europe. In January, the Thermal Energy Conversion Branch at NASA’s Glenn Research Center in Cleveland and the University of Leicester, based in the United Kingdom, partnered through an agreement to put this new option to the test.
    One method to generate electricity from radioisotope heat sources is the free-piston Stirling convertor. This is a heat engine that converts thermal energy into electrical energy. However, instead of a crankshaft to extract power, pistons float freely within the engine. It could operate for decades continuously without wear, as it does not have piston rings or rotating bearings that will eventually wear out. Thus, a Stirling convertor could generate more energy, allowing more time for exploration in deep space. Researchers from the University of Leicester — who have been leaders in the development of americium RPS and heater units for more than 15 years — and NASA worked to test the capabilities of a Stirling generator testbed powered by two electrically heated americium-241 heat source simulators.
    “The concept started as just a design, and we took it all the way to the prototype level: something close to a flight version of the generator,” said Salvatore Oriti, mechanical engineer at Glenn. “The more impressive part is how quickly and inexpensively we got it done, only made possible by a great synergy between the NASA and University of Leicester teams. We were on the same wavelength and shared the same mindset.”

    The university provided the heat source simulators and generator housing. The heat source simulator is the exact size and shape of their real americium-241 heat source, but it uses embedded electric heaters to create an equivalent amount of heat to simulate the decay of americium fuel and therefore drive generator operation. The Stirling Research Lab at Glenn provided the test station, Stirling convertor hardware, and support equipment.
    “A particular highlight of this (testbed) design is that it is capable of withstanding a failed Stirling convertor without a loss of electrical power,” said Hannah Sargeant, research fellow at the University of Leicester. “This feature was demonstrated successfully in the test campaign and highlights the robustness and reliability of an Americium-Radioisotope Stirling Generator for potential future spaceflight missions, including long-duration missions that could operate for many decades.”
    The test proved the viability of an americium-fueled Stirling RPS, and performance and efficiency targets were successfully met. As for what’s next, the Glenn team is pursuing the next version of the testbed that will be lower mass, higher fidelity, and undergo further environmental testing.
    “I was very pleased with how smoothly everything went,” Oriti said of the test results. “Usually in my experience, you don’t accomplish everything you set out to, but we did that and more. We plan to continue that level of success in the future.”
    For more information on NASA’s RPS programs, visit:https://science.nasa.gov/rps

    MIL OSI USA News

  • MIL-OSI USA: News Release: Jud Virden, Ph.D., Appointed Laboratory Director at NREL

    Source: US National Renewable Energy Laboratory


    Jud Virden, Ph.D.

    The Alliance for Sustainable Energy (Alliance) today announced the appointment of Jud Virden, Ph.D., as director of NREL and president of the Alliance, which manages the laboratory for the Department of Energy (DOE). Dr. Virden will officially join NREL in this role on Oct. 1, 2025. Virden was selected following a competitive national search.

    Virden joins NREL from Pacific Northwest National Laboratory (PNNL), where he has served as associate laboratory director for the Energy and Environment Directorate since 2011. In that role, he led approximately 1,700 scientists, engineers, and staff advancing DOE’s applied energy priorities—ranging from power grid modernization and energy technologies to nuclear and environmental management.

    “Jud’s leadership in driving transformative energy solutions makes him an outstanding fit for NREL,” said Alliance Board co-chairs Ian Colrain, president and CEO of MRIGlobal, and Juan Alvarez, executive vice president of laboratory operations at Battelle. “He brings a rare combination of scientific rigor, strategic vision, and a collaborative spirit—paired with a deep understanding of DOE priorities and the national lab system. His ability to translate innovation into impact makes him ideally suited to lead NREL into its next chapter.”

    “It’s a privilege to step into this role at such a pivotal time,” Dr. Virden said. “I am eager to build on NREL’s reputation for scientific excellence and drive meaningful, lasting transformation. I look forward to growing collaborations within DOE, industry, academia, and the national labs—working together to accelerate energy innovation and impact.”

    Dr. Virden earned both his Bachelor of Science and doctorate in chemical engineering from the University of Washington and has been with PNNL since 1991. His career is marked by a strong record in forging public-private partnerships and advancing grid resilience and energy technologies.

    Dr. Virden will succeed Dr. Martin Keller, who has served as NREL’s laboratory director since 2015. Under Dr. Keller’s leadership, NREL has experienced record growth in funding, talent, and impact—cementing its role as a global leader in energy research and innovation. He will continue at the laboratory as a strategic advisor through early November to ensure a smooth transition. Dr. Keller will then leave the laboratory for his new role as president of the Helmholtz Association in Berlin, Germany. 

    “Martin led with vision, thoughtfulness, and unwavering integrity,” Colrain and Alvarez said. “His leadership left an enduring mark on NREL’s legacy and future. We thank him for his extraordinary service and look forward to seeing the continued impact of his work in the global research community.”

    NREL—the National Renewable Energy Laboratory—is the U.S. Department of Energy’s primary national laboratory for energy systems research, development, and integration. NREL is managed and operated for the U.S. Department of Energy by a partnership led by MRIGlobal and Battelle.

    MIL OSI USA News

  • MIL-OSI USA: MBA’s Michael Bozzi Named Honorary Commander of Air National Guard Unit

    Source: US State of Connecticut

    Michael Bozzi, an adjunct faculty member in the MBA program and the Director of the MBA Office of Student Services, has been selected as the Honorary Commander for the Connecticut Air National Guard’s 103rd Maintenance Group.

    He is the first civilian to receive the appointment. During his three-year tenure, he will share his leadership knowledge and expertise with the 250-member maintenance group, attend many of their social functions, and go on a training flight to learn more about their work.

    “This is truly the honor of a lifetime,’’ Bozzi said. “We have so many UConn alumni and students who are in the Guard. I’m happy to share my knowledge with them on topics that will be helpful.’’

    “In exchange, I will certainly develop a broader view of leadership, a deeper understanding of how the military works, and I will be better equipped to engage our students who are veterans or currently serving in the military,’’ he said.

    Bozzi Nominated by Air National Guard Colonel

    Above, Bozzi sits in the pilot’s seat of a military aircraft for the first time, as he develops a sense of what the Air Force service members experience. (Contributed Photo)

    Bozzi was nominated for the honorary commander position by Col. Paul Fiasconaro, who took the professor’s Managing Organizations (MENT5138) course in the spring. Fiasconaro, who commands the 103rd Maintenance Group, dubbed the Flying Yankees, found the coursework extremely beneficial.

    “His teaching style and discussions resonated with me. They were interesting and engaging. He makes you want to learn more,’’ said Fiasconaro, who has two master’s degrees from other institutions and is completing a project management certificate at UConn. He described Bozzi as among the best educators he’s met.

    Bozzi was sworn in on June 8 in front of 700 people at the unit’s Family Day, which gave him a chance to meet the servicemembers and their families. The civilian-military partnership is designed to build stronger community connections and give leaders the opportunity to engage more deeply with the service men and women.

    Bozzi recently delivered a presentation on leadership to the servicemembers, whose backgrounds range from corporate executives to recent high school graduates.

    He spoke about the five basic principles of leadership and how it is relevant to all of them.

    “In the Guard, everyone is a leader,’’ Bozzi said. “Certainly there is a chain of command, but every person must be progressive and forward thinking.’’

    The presentation offered something for service members at all levels, Fiasconaro said, and centered around the need to always keep in mind the problem that you’re trying to solve. Many service members stayed to talk with Bozzi and mentioned how much they enjoyed the program.

    Some members of the unit are preparing to deploy to Africa, and Bozzi will teach them about anxiety and stress mitigation prior to their departure.

    ‘Who We Are and What We Do’

    Fiasconaro said the Guard is eager to increase knowledge of “who we are and what we do,’’ among the civilian community. “This type of connection brings in a second look from the outside and a partnership that is mutually beneficial,’’ he said.

    Fiasconaro, who will soon be retiring from the military and returning to civilian work, said there are many parallels between the two entities.

    “The similarities between the military and business are significant,’’ he said. “Both operate within structured hierarchies, rely heavily on strong leadership, and demand strategic thinking to achieve their objectives.’’

    MIL OSI USA News

  • MIL-OSI Europe: Written question – Need for clear exemptions for military personnel under the Working Time Directive – E-002871/2025

    Source: European Parliament

    Question for written answer  E-002871/2025
    to the Commission
    Rule 144
    Alice Teodorescu Måwe (PPE), Rasa Juknevičienė (PPE), Wouter Beke (PPE), Petras Auštrevičius (Renew), Matej Tonin (PPE)

    Directive 2003/88/EC[1] (Working Time Directive) sets minimum standards for rest and working hours across the EU. While Article 17 allows derogations for specific sectors, including the armed forces, the scope and application of these exemptions remain legally unclear. This ambiguity has led to inconsistent national practices and legal uncertainty for Member States.

    Some countries (e.g. Sweden, Germany and Ireland) have introduced structured systems to balance soldiers’ right to rest with operational demands. The Commission has expressed support for Ireland’s recent reforms, while other models – such as Sweden’s use of collective agreements – have faced criticism. This variation highlights the need for a clearer and more harmonised legal basis for flexibility under the directive.

    In the light of evolving security threats and the Commission’s emphasis on ensuring interoperability and readiness of national armed forces within a common EU framework, we ask:

    is the Commission willing to consider or propose amendments to the Working Time Directive to establish a more explicit, harmonised exemption framework for military personnel – particularly concerning activities such as deployment, emergency response and training?

    Submitted: 14.7.2025

    • [1] Directive 2003/88/EC of the European Parliament and of the Council of 4 November 2003 concerning certain aspects of the organisation of working time, OJ L 299, 18.11.2003, p. 9, ELI: http://data.europa.eu/eli/dir/2003/88/oj.
    Last updated: 22 July 2025

    MIL OSI Europe News