Category: DJF

  • MIL-OSI Analysis: Learning statistics through story: students get creative with numbers

    Source: The Conversation – Africa – By Johan Ferreira, Professor, University of the Witwatersrand

    Photo by Markus Krisetya via Unsplash

    Statistics professor Johan Ferreira was feeling overwhelmed by the amount of “screen time” involved in online learning in 2021. He imagined students must be feeling the same way, and wondered what he could do to inspire them and make his subject matter more appealing.

    One of the topics in statistics is time series analysis: statistical methods to understand trend behaviour in data which is measured over time. There are lots of examples in daily life, from rainfall records to changes in commodity prices, import or exports, or temperature.

    Ferreira asked his students to write a short, fictional “bedtime” story using “characters” from time series analysis. The results were collected into a book that is freely available. He tells us more about it.


    Why use storytelling to learn about statistics?

    I’m fortunate to be something of a creative myself, being a professional oboe player with the Johannesburg Philharmonic Orchestra. It’s a valuable outlet for self-expression. I reflected on what other activity could inspire creativity without compromising the essence of statistical thinking that was required in this particular course I was teaching.

    I invited my third-year science and commerce students at the University of Pretoria to take part in a voluntary storytelling exercise, using key concepts in time series analysis as characters. Students got some guidelines but were free to be creative. My colleague and co-editor, Dr Seite Makgai, and I then read, commented on and edited the stories and put them together into an anthology.

    Students gave their consent that their stories could be used for research purposes and might be published. Out of a class of over 200 students, over 30 contributions were received; 23 students permitted their work to be included in this volume.

    We curated submissions into two sections (Part I: Fables and Fairy Tales and Part II: Fantasy and Sci-Fi) based on the general style and gist of the work.

    The project aimed to develop a new teaching resource, inspire students to take ownership of their learning in a creative way, and support them through informal, project-based peer learning.

    This collection is written by students, for students. They used personal and cultural contexts relevant to their background and environment to create content that has a solid background in their direct academic interests. And the stories are available without a paywall!

    What are some of the characters and stories?

    Student Lebogang Malebati wrote Stationaryville and the Two Brothers, a tale about AR(1) and AR(2). In statistics, AR refers to processes in which numerical values are based on past values. The brothers “were both born with special powers, powers that could make them stationary…” and could trick an evil wizard.

    David Dodkins wrote Zt and the Shadow-spawn. In this story, Zt (common notation in time series analysis) has a magic amulet that reveals his character growth through a sequence of models and shows the hero’s victory in the face of adversity. He is a function of those that came before him (through an AR process).

    Then there’s Nelis Daniels’ story about a shepherd plagued by a wolf called Arma (autoregressive moving average) which kept making sheep disappear.

    And Dikelede Rose Motseleng’s modern fable about the love-hate relationship between AR(1) (“more of a linear guy” with a bad habit of predicting the future based on the past) and MA(1), “the type of girl who would always provide you with stationarity (stability).”

    What was the impact of the project?

    It was a deeply enriching experience for us to see how students see statistics in a context beyond that of the classroom, especially in cases where students reformulated their stories within their own cultural identities or niche interests.

    Three particular main impacts stand out for us:

    • students have a new additional reference and learning resource for the course content

    • new students can refer to the experiences and contextualisation of this content of former students, leading to informal peer learning

    • students engage in a cognitive skill (higher-order and creative thinking) that is not frequently considered and included in this field and at this level.

    In 2024, shortly after the book was published, we asked students in the time series analysis course of that year to read any one of four stories (related to concepts that were already covered in the course material at that point in time). We asked them to complete a short and informal survey to gauge their experience and insights regarding the potential of this book as a learning resource for them.

    The 53 responses we got indicated that most students saw the book as a useful contribution to their learning experience in time series analysis.

    One positive comment from a student was:

    I will always remember that the Random Walk is indeed not stationary but White Noise is. I already knew it, but now I won’t forget it.

    Will you build on this in future?

    It is definitely valuable to consider similar projects in other branches of statistics, but also, in other disciplines entirely, to develop content by students, for students.

    At this stage, we’re having the stories and book translated into languages beyond English. In large classes that are essential to data science (such as statistics and mathematics), many different home languages may be spoken. Students often have to learn in their second, third, or even fourth language. So, this project is proving valuable in making advanced statistical concepts tactile and “at home” via translations.

    Our publisher recently let us know that the Setswana translation is complete, with the Sepedi and Afrikaans translations following soon. To our knowledge, it’ll be the first such project not only in the discipline of statistics, but in four of the official languages in South Africa.

    Johan Ferreira receives funding from the Centre of Excellence in Mathematical and Statistical Sciences, based at the University of the Witwatersrand, towards this Scholarship of Learning and Teaching project.

    ref. Learning statistics through story: students get creative with numbers – https://theconversation.com/learning-statistics-through-story-students-get-creative-with-numbers-261198

    MIL OSI Analysis

  • MIL-OSI United Kingdom: Animal Sentience Committee letter regarding food labelling policy

    Source: United Kingdom – Executive Government & Departments

    Correspondence

    Animal Sentience Committee letter regarding food labelling policy

    Letter from the Animal Sentience Committee to the Environment, Food and Rural Affairs (EFRA) Committee regarding a food labelling policy.

    Documents

    Details

    The Animal Sentience Committee sent this letter to the Environment, Food and Rural Affairs Committee (EFRA) committee on 21 July 2025. It outlines the committee’s view on the consideration of impacts on animal welfare in food labelling policy.

    Updates to this page

    Published 22 July 2025

    Sign up for emails or print this page

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: UK Biobank’s whole body imaging project scans 100,000 volunteers

    Source: United Kingdom – Executive Government & Departments

    UK Biobank has reached its target of scanning 100,000 volunteers as part of a landmark project to provide for scientific research the most detailed look inside the human body. This is now the world’s largest whole-body imaging project – scanning the brains, hearts, abdomens, blood vessels, bones and joints of volunteers to give researchers a new layer of detail to explore what happens in people’s bodies as they age and how and why we become ill as we age.

    One billion images have now been generated from these scans, and tens of thousands of researchers around the world have been using these (as it has been released in batches since the project began) along with UK Biobank’s information on lifestyle, medical history, genetics and blood proteins from the same volunteers, to do research into ill health.

    Findings from the 1,300 peer-reviewed papers using this data so far include better brain scanning for patients with dementia symptoms in NHS memory clinics, faster analysis of heart scans in over 90 countries, and developments in understanding biological age of organs versus chronological age.

    Soon, approved researchers will have access to the full set of imaging data from all 100,000 volunteers to help develop new diagnostics, preventative medicines and treatments.

    Journalists came to this press briefing to ask your questions and to hear from those running the project discuss:

    – What’s so special about this data and why are researchers so excited by it?

    – How is this project helping the UK and the NHS right now?

    – What scientific findings have the imaging data already led to?

    – Why is the focus now switching to repeating scans of people, rather than scanning more people?

    – Who can use this data and what can they use it for?

    Speakers included:

    Prof Sir Rory Collins, Principal Investigator and Chief Executive, UK Biobank

    Prof Naomi Allen, Chief Scientist, UK Biobank

    Prof Paul Matthews, Chair of the UK Biobank Imaging Working Group; and Edmond and Lily Safra Professor of Translational Neuroscience and Therapeutics, Imperial College London; and Director, The Rosalind Franklin Institute

    Prof Louise Thomas, Professor of Metabolic Imaging, University of Westminster

    Prof Rachel McKendry, Executive Director, Discovery, Wellcome

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Community efforts lead to Green Flags for Perth park’s gardens

    Source: Scotland – City of Perth

    In the run up to the national Love Parks Week (26 July to 3 August 2025) which highlights the vital role green spaces play in boosting the health and wellbeing of residents and communities, local ‘in bloom’ charity Beautiful Perth and Perth and Kinross Council will be marking the achievement of two Green Flag Community Awards* from Keep Scotland Beautiful (KSB) for the Heather Garden and Compassionate Friends Garden, both in Bellwood Riverside Park on the banks of the River Tay in Perth.  

    The Heather Garden has been a real partnership project between Beautiful Perth and the Council, with discussions beginning in 2011 and work getting underway on site in 2012 to transform and refresh a previously overgrown and less appealing area of the park. The garden now comprises 15 beds containing 600 varieties and over 16,000 heather plants, all maintained and managed by Beautiful Perth, providing year-round colour for visitors and a haven for insect pollinators. The charity was also in 2022 awarded the National Collection of Erica carnea heathers by Plant Heritage.  This follows on from the unique achievement of Riverside Park winning Best Park in the UK in the RHS Britain in Bloom Awards in both 2018 and 2019.  

    The Compassionate Friends Garden was developed to create a picturesque, peaceful garden for reflection and contemplation following a request from the Compassionate Friends UK, a charity that supports bereaved parents, siblings and grandparents. In 2012 remedial work done by the Council and Beautiful Perth uncovered a small round turreted stone building dating back to the 1800’s on site. The building forms the focal point of the garden, with further work uncovering a waterway and wells. The space was then transformed with sustainable pollinator plants for all year colour and interest by Beautiful Perth volunteers as well as the planting of rowan and snakeskin maple trees with marker stones and a sculpture of a robin. In 2018, Compassionate Friends held their annual gathering in Perth and unveiled a new bench for visitors and at the entrance to the garden, a beautiful carved commemorative stone.  

    Vice-Convener of Climate Change and Sustainability, Councillor Liz Barrett said: “As we head towards Love Parks Week, the fantastic achievement of Green Flag Awards for these two very different but equally beautiful gardens reflects how vital parks and open spaces are for our health and wellbeing as places to relax, exercise, appreciate the outdoors and nature and much more. 

    “I’d like to thank Beautiful Perth, and volunteer groups in other parts of Perth and Kinross, for their key role in maintaining and developing green spaces that benefit us all and contribute to improving our environment and biodiversity. Everyone can help, whether by volunteering locally or simply taking a few minutes to feedback to our Community Greenspace team about biodiversity in your local park.” 

    Chair of Beautiful Perth, Gordon Lindsay commented: “Our volunteers over many years have taken a genuine pride in cultivating and maintaining the Compassionate Friends and Heather Gardens to a high standard.  

    “Both gardens exhibit a unique horticultural skill level appreciated by the many visitors and tourists to Riverside Park and importantly provide an ideal haven for bees, butterflies and other wildlife. 

    “The Green Flag Awards are the “icing on the cake” for the ‘Beautiful Perth’ volunteers acknowledging their tireless work and efforts in a special corner of Perth.  We would also like to acknowledge and thank our supporters, Perth and Kinross Council, The Gannochy Trust, the Heather Society and Kilmac.” 

    Jamie Ormiston, Training and Accreditation Coordinator at Keep Scotland Beautiful, said: “Parks across Scotland are vital spaces for people of all ages to reconnect with nature and I’m delighted we once again have Green Flag Award winners all over the country – including plenty of new areas – for people to enjoy during the summer months. 

    “The Heather Garden and Compassionate Friends Garden are two of our new Community Award winners and their awards show the dedication, care and commitment of all involved in maintaining and improving Riverside Park. 

    “Our stalwart winners have a brilliant history of commitment to environmental excellence and a desire to offer visitors a safe and enjoyable place to visit.  

    “Our new winners have shown a similar desire and their journey is only just beginning but I look forward to many more wins in the future.” 

    *The Green Flag Awards are awarded to parks and green spaces that can demonstrate excellent management and environmental standards. Further information on the Awards can be found at Keep Scotland Beautiful’s website.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Government secures label-led measures to boost earnings for UK artists

    Source: United Kingdom – Executive Government & Departments

    Press release

    Government secures label-led measures to boost earnings for UK artists

    Major boost for UK music creators as government drives industry to produce new measures to support legacy artists, songwriters and session musicians

    *Changes estimated by labels to deliver tens of millions of pounds in new investment to support musicians by 2030, rewarding artists for their work and driving growth through Plan for Change *Agreement backed by UK arms of major labels Universal Music Group, Sony Music Entertainment and Warner Music Group

    UK music creators are set to benefit from a boost to their earnings thanks to the Government driving forward a new label-led agreement on streaming pay agreed today (Tuesday 22nd July).

    The Creator Remuneration Working Group (CRWG), chaired by Creative Industries Minister Sir Chris Bryant, has been meeting regularly since 2024 to explore industry-led action – driving growth in the creative industries as part of the Government’s Plan for Change.

    This process has delivered a set of measures designed to boost the earnings of legacy artists, songwriters and session musicians and marks a further step towards ensuring the music streaming market works for everyone, on top of existing industry programmes.

    The principles include a new framework for the renegotiation of contracts by artists who signed record deals before streaming became commonplace, in addition to support for the digitisation of their back catalogues so that it can be made available online. This aims to help legacy artists to increase their streaming earnings for their existing body of work. 

    Support for songwriters and composers includes a commitment to the payment of per diems and expenses for recording sessions, to ensure they are not left out of pocket.

    The British Phonographic Industry (BPI) and Musicians’ Union also agreed to an uplift in session musician fees of up to 40% for pop sessions and 15% for classical to ensure they are more fairly paid for their work. 

    The agreed principles have been adopted by the BPI and Association of Independent Music (AIM) and recommended to their UK members. The UK divisions of Universal Music Group, Sony Music Entertainment and Warner Music Group, the world’s three largest labels, have also committed to delivering them.

    Culture Secretary Lisa Nandy said:

    Streaming has totally revolutionised how audiences discover and enjoy music, and how artists connect with their fans across the globe.

    But we have heard loud and clear from creators that more needs to be done to ensure they are fairly compensated when their work is used on streaming platforms.

    That is why I am delighted that the industry has agreed these new measures, which will go a long way to making sure our talented artists and creators are properly rewarded for their hard work, while driving growth through our Plan for Change.

    Creative Industries Minister Sir Chris Bryant said:

    Everyone loves music and it’s about time we really valued the people who create it. Millions of us use music streaming platforms who provide a fantastic service to their customers, connecting users with a wealth of music from around the world. 

    But many musicians and songwriters are really struggling and artists simply don’t  think they receive their fair share of the profit generated by their work on these platforms. These new measures, which apply specifically in the UK, are an important step in ensuring creators are fairly paid for their work.

    I would like to thank the sector for coming together to drive this positive progress, which will benefit the music industry as a whole.

    Roberto Neri, CEO of Ivors Academy, said:

    We welcome and wish to thank Minister Bryant for the introduction of per diems for songwriters and his support in securing this agreement. There is no music industry without songwriters and these payments will ensure that songwriters are not out of pocket when turning up to work. We look forward to working together over the next 12 months to assess how this package benefits music makers and ensuring that all creators share in the success of streaming remuneration.

    The Government will support industry to deliver these measures in full, in order to improve conditions for UK music makers. The impact of the measures will be monitored and reviewed in a year’s time, working closely with members of the group to understand the extent to which they are improving creator earnings as intended. 

    The Government will then assess the need for further intervention, to ensure this package delivers on its objective to bring about real change for creators. 

    Labels estimate these changes will deliver tens of millions of pounds in new investment to support creators by 2030, which will help drive growth in the creative industries as part of the Government’s Plan for Change.

    The Government has also committed to continuing to look at the issue of streaming pay for session musicians and has convened a meeting in September with key organisations from the music industry to take this forward.

    Further quotes

    The Council Of Music Makers said: 

    We greatly appreciate the efforts of the Government in seeking to improve the streaming economy for music-makers. Minister Chris Bryant has dedicated a great deal of time and resources trying to agree creator-friendly terms with the BPI and major labels, in an attempt to address unfair remuneration. Over the next year, we will work in good faith to support music-makers to test these initiatives and whether they can deliver meaningful change. 

    We will work closely with the Government during the one year monitoring of these measures. In 2021 Parliament’s Culture, Media & Sport Select Committee raised several fundamental issues regarding the streaming business model, calling for ‘a complete reset’. The Council Of Music Makers remains committed to achieving this objective and reaching a fairer settlement for all music-makers and we will now collectively pursue additional legislative measures to achieve positive change for those that create the work our industry is built on.

    Sophie Jones, Chief Strategy Officer at the BPI, said: 

    After five years of detailed scrutiny and analysis, we are pleased to put in place these creator remuneration principles for UK labels in response to specific concerns identified in the UK’s streaming debate. Many more artists are succeeding in the era of streaming than before – and we are confident that these targeted measures will lead to positive and sustainable outcomes and support for legacy artists, songwriters and session musicians, ensuring that our members’ significant ongoing investment into the development of British talent and the growth of our world leading UK music industry will be to the benefit of all. This has been a collaborative process and we are grateful to our members and fellow trade organisations for their expertise and to Minister Chris Bryant and the DCMS officials for their stewardship of this process.

    Baron Brennan of Canton, former Chair of the DCMS Select Committee which launched the inquiry into the Economics of Music Streaming, said: 

    Protecting the dignity of British songwriters by putting money in their pockets for writing sessions is a real first, and greater transparency over artist renegotiation is most welcome. I commend Minister Bryant for all his efforts. Further progress is needed on streaming but I’m encouraged by the Minister’s commitment to pursue progress through further talks this autumn on session musician income from streaming.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Multilateralism remains the best tool we have to meet the shared challenges of the 21st century: UK statement at the UN Security Council

    Source: United Kingdom – Executive Government & Departments

    Speech

    Multilateralism remains the best tool we have to meet the shared challenges of the 21st century: UK statement at the UN Security Council

    Statement by Lord Collins of Highbury, Minister for Africa and the UN, at the UN Security Council debate on peace and security.

    Mr President, the United Kingdom thanks Pakistan for convening this timely debate at a time when multilateralism faces unprecedented strain.

    As the Secretary-General has said, the world is witnessing more conflict than at any time since the founding of the United Nations.

    From Russia’s illegal invasion of Ukraine to the protracted crisis in Gaza, the international community is being tested.

    Our response must strive for peace and be guided by the principles of the UN Charter.
    Multilateralism remains the best tool we have to meet the shared challenges of the 21st century.

    And this Council, as the UN organ with the primary responsibility for international peace and security, should play a central role.

    That includes through a collective commitment to the rule of law, including international humanitarian law, and to the peaceful settlement of disputes.

    These are not abstract ideals.

    They are principles by which we could collectively prevent and resolve conflict.

    That is why the United Kingdom has kept these principles at the heart of its foreign policy.
    But as we mark the UN’s 80th anniversary, we must seize this moment to revitalise the peace and security architecture, champion human rights, and strengthen the UN development system and humanitarian architecture to ensure all three pillars are collectively fit for purpose.

    We should make full use of the UN’s mediation and conflict prevention capabilities.
    In Sudan, we continue to urge the warring parties to engage meaningfully with existing diplomatic initiatives, including the United Nations’ mediation efforts to achieve a lasting national ceasefire and political solution.

    Here and elsewhere, we need the UN to help address the root causes of conflict.
    Peace operations should be more adaptable, politically attuned and better coordinated with other UN and regional actors, leveraging new technologies and local expertise.
    We must focus not only on brokering peace but on sustaining it.

    The UN’s efforts to verify the implementation of the Peace Agreement in Colombia is a good example of this work in the field.

    And here in New York, we can make better use of the UN Peacebuilding Architecture to support national efforts to sustain peace.

    Underscoring this, we must recall that crucially, sustainable peace can only be achieved through inclusive peace processes, with the full, equal, meaningful and safe participation of women.

    Mr President, the UN Charter is our shared foundation.

    In this moment of global uncertainty, we must recommit to multilateralism, not as a slogan, but as a strategy.

    The United Kingdom stands ready to work with all Member States to this end, including to uphold peace, security, and the rule of law.

    Thank you.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: UN’s Guterres declares fossil fuel era fading; presses nations for new climate plans before COP30 summit

    Source: United Nations 2

    In a special address at UN Headquarters in New York, Mr. Guterres cited surging clean energy investment and plunging solar and wind costs that now outcompete fossil fuels.

    The energy transition is unstoppable, but the transition is not yet fast enough or fair enough,” he said.

    The speech, A Moment of Opportunity: Supercharging the Clean Energy Age – a follow‑up to last year’s Moment of Truth – was delivered alongside a new UN technical report drawing on global energy and finance bodies.

    “Just follow the money,” Mr. Guterres said, noting that $2 trillion flowed into clean energy last year, $800 billion more than fossil fuels and up almost 70 per cent in a decade.

    Key points from the address

    • Point of no return – The world has irreversibly shifted towards renewables, with fossil fuels entering their decline
    • Clean energy surge – $2 trillion invested in clean energy last year, $800 billion more than fossil fuels
    • Cost revolution – Solar now 41 per cent cheaper and offshore wind 53 per cent cheaper than fossil fuel alternatives.
    • Global challenge – Calls on G20 nations to align new national climate plans with the 1.5°C target of the Paris Agreement
    • Energy security – Renewables ensure “real energy sovereignty”
    • Six opportunity areas – Climate plan ambition, modern grids, sustainable demand, just transition, trade reform, and finance for emerging markets.

    A shift in possibility

    He noted new data from the International Renewable Energy Agency (IRENA) showing solar, once four times costlier, is now 41 per cent cheaper than fossil fuels.

    Similarly, offshore wind is 53 per cent cheaper, with more than 90 per cent of new renewables worldwide beating the cheapest new fossil alternative.

    This is not just a shift in power. It is a shift in possibility,” he said.

    Renewables nearly match fossil fuels in global installed power capacity, and “almost all the new power capacity built” last year came from renewables, he said, noting that every continent added more clean power than fossil fuels.

    Clean energy is unstoppable

    Mr. Guterres underscored that a clean energy future “is no longer a promise, it is a fact”. No government, no industry and no special interest can stop it.

    Of course, the fossil fuel lobby will try, and we know the lengths to which they will go. But, I have never been more confident that they will fail because we have passed the point of no return.

    He urged countries to lock ambition into the next round of national climate plans, or NDCs, due within months. Mr. Guterres called on the G20 countries, which are responsible for 80 per cent of emissions, to submit new plans aligned with the 1.5°C limit and present them at a high‑level event in September.

    Targets, he added, must “double energy efficiency and triple renewables capacity by 2030” while accelerating “the transition away from fossil fuels”.

    Real energy sovereignty

    The Secretary-General also highlighted the geopolitical risks of fossil fuel dependence.

    “The greatest threat to energy security today is fossil fuels,” he said, citing price shocks after Russia’s invasion of Ukraine.

    There are no price spikes for sunlight, no embargoes on wind. Renewables mean real energy security, real energy sovereignty and real freedom from fossil-fuel volatility.

    Six opportunity areas

    Mr. Guterres mapped six “opportunity areas” to speed the transition: ambitious NDCs, modern grids and storage, meeting soaring demand sustainably, a just transition for workers and communities, trade reforms to broaden clean‑tech supply chains, and mobilising finance to emerging markets.

    Financing, however, is the choke point. Africa, home to 60 per cent of the world’s best solar resources, received just 2 per cent of global clean energy investment last year, he said.

    Only one in five clean energy dollars over the past decade went to emerging and developing economies outside China. Flows must rise more than five-fold by 2030 to keep the 1.5-degree limit alive and deliver universal access.

    Mr. Guterres urged reform of global finance, stronger multilateral development banks and debt relief, including debt‑for‑climate swaps.

    The fossil fuel age is flailing and failing. We are in the dawn of a new energy era,” he said in closing.

    That world is within reach, but it won’t happen on its own. Not fast enough. Not fair enough. It is up to us. This is our moment of opportunity.

    MIL OSI United Nations News

  • MIL-OSI United Nations: SECURITY COUNCIL LIVE: High-level debate on peaceful settlements of dispute

    Source: United Nations 2

    The UN Security Council meets today for a high-level open debate on Promoting International Peace and Security through Multilateralism and Peaceful Settlement of Disputes, chaired by Pakistan’s Deputy Prime Minister and Foreign Minister Mohammad Ishaq Dar. UN Secretary-General António Guterres is expected to brief as over 80 Member States join discussions on strengthening diplomacy and mechanisms for conflict prevention. UN News, in coordination with UN Meetings Coverage, brings you live updates. UN News App users can follow here.

    MIL OSI United Nations News

  • MIL-OSI Canada: CBSA seizes 187.5 kg of cocaine at the Ambassador Bridge leading to criminal charges by the RCMP

    Source: Government of Canada News (2)

    July 22, 2025    Windsor, Ontario    Canada Border Services Agency 

    On May 23, 2025, Canada Border Services Agency (CBSA) border services officers at the Ambassador Bridge port of entry intercepted 187.5 kg of suspected cocaine concealed in the trailer of a commercial truck coming into Canada from the United States. 

    During a secondary examination of the trailer, CBSA officers discovered 2 suitcases and 5 garbage bags containing 161 bricks of suspected cocaine. The approximate value of the cocaine is $23.4 million.  

    CBSA officers seized the drugs and arrested the driver, Kambiz Karandish, 55, of Richmond Hill, Ontario, and transferred him and the suspected cocaine to the custody of the Royal Canadian Mounted Police (RCMP). Karandish has been charged by the RCMP with Importation of Cocaine, and Possession of Cocaine for the Purpose of Trafficking under the Controlled Drugs and Substances Act.

    The CBSA and the RCMP are committed to protecting our communities from harmful contraband and organized crime. 

    The investigation is ongoing. 

    MIL OSI Canada News

  • MIL-OSI Canada: Saskatchewan, Ontario and Alberta to Advance Pipelines, Critical Minerals and Energy Export Infrastructure

    Source: Government of Canada regional news

    Released on July 22, 2025

    Provinces sign agreement to secure markets, support investment and strengthen supply chains.

    Today, Saskatchewan Premier Scott Moe, Ontario Premier Doug Ford and Alberta Premier Danielle Smith signed a Memorandum of Understanding (MOU) to coordinate the safe transportation and export of Western Canadian oil, natural gas and critical minerals to refineries, seaports and storage facilities across Canada and beyond.  

    “We are sending a clear signal that Canada’s energy future will be built by Canadians, for Canadians,” Moe said. “This agreement commits our provinces to work together to unlock new markets, shore up our supply chains from mine to port and advocate for the federal reforms our industry needs. By advancing pipelines, rail connections and critical-mineral processing capacity, we are safeguarding thousands of jobs, strengthening our energy security and fostering sustainable growth.”

    The MOU establishes a collaborative framework to explore multiple pipeline and rail corridors, and expansion of processing hubs for critical minerals. All of this will create new and critical avenues to reach domestic and international markets.

    “As the world grapples with President Trump’s unfair tariffs, it is more important than ever to build a resilient and self-reliant economy here at home,” Ford said. “This agreement sends a clear message: Ontario, Alberta and Saskatchewan are ready to get shovels in the ground and move forward on projects that will secure our long-term prosperity.”  

    The agreement will help strengthen interprovincial trade by linking Saskatchewan, Ontario and Alberta through shared infrastructure development and coordinated market strategies.  

    “We are taking action to grow our economy, build real infrastructure and get major projects moving,” Smith said. “Alberta is proud to lead the way in uniting with provinces that share a vision for responsible development, economic freedom and common sense. We are standing up for our oil and gas sector and making sure our world-class resources reach the markets that need them. Together, Alberta, Ontario and Saskatchewan are showing what is possible when provinces step up. This agreement is about building a stronger, more connected Canada, one project at a time.”

    The Government of Saskatchewan is proud to be a leader and advocate for free and fair trade. Last week, Saskatchewan called on all provinces and territories to join Canada’s largest barrier-free interprovincial market, the New West Partnership Trade Agreement. This economic region of over 11 million Canadians has a combined GDP exceeding $818 billion.

    The province also continues to take part in the Committee on Internal Trade (CIT), which includes enhancing the Canadian Free Trade Agreement (CFTA), reducing regulatory and administrative burdens to interprovincial trade, and facilitating labour mobility.

    On July 8, CIT announced significant progress, including:

    • Reducing party-specific exceptions under the CFTA by a further 30 per cent.
    • Concluding negotiations of the financial services chapter.
    • Advancing mutual recognition through a pilot project in the trucking sector and negotiating towards a mutual recognition agreement on the sale of goods.  
    • Cross-Canada commitment to a 30-day service standard for processing labour mobility applications.
    • A Memorandum of Understanding on direct-to-consumer alcohol sales, co-led by Saskatchewan and Ontario, involving ten jurisdictions across Canada to support consumers being able to order their favourite Canadian wine, spirit, beer or other alcoholic beverage, directly from the producer, for personal consumption.

    -30-

    For more information, contact:

    MIL OSI Canada News

  • MIL-OSI Asia-Pac: Hongkong Post cyberattack probed

    Source: Hong Kong Information Services

    Hongkong Post said today that Police have initiated investigation into an incident involving an unauthorised party cyberattacking the EC-Ship system with countless attempts at midnight on July 20 and the following day to access and retrieve information through the system’s address book function.

    Hongkong Post has notified all affected account holders by email, reminding them to remain vigilant and immediately inform people in their address books of the incident.

    The services concerned have resumed normal and account holders can continue to use the services, it added.

    For enquiries, call 2921 2222.

    MIL OSI Asia Pacific News

  • MIL-OSI USA: TCU/IAM K-9 Classic Motorcycle Ride Raises More Than $122,000 for Guide Dogs

    Source: US GOIAM Union

    TCU/IAM recently hosted a three-day charity motorcycle ride event from their Rockville, Md., national office for the very first time. The event included motorcycle rides through Pennsylvania and a visit to Washington D.C.’s monuments. The ride raised funds for the IAM’s favorite charity, Guide Dogs of America and Tender Loving Canines (GDA | TLC).

    Watch the video here.

    More than 100 participants expressed enthusiasm for the IAM’s favorite charity of choice, highlighting the importance of supporting individuals through GDA | TLC’s work. 

    TCU/IAM National President Artie Maratea was very pleased to announce that approximately $122,000 had already been raised when the event began. He emphasized the community spirit, good food, and a charity banquet with prizes, all dedicated to benefiting GDA | TLC.

    The post TCU/IAM K-9 Classic Motorcycle Ride Raises More Than $122,000 for Guide Dogs appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Australia: Stronger security for ATO online services (myGov and ATO app)

    Source: New places to play in Gungahlin

    3 steps to secure

    We encourage you to be proactive and secure your ATO online services access (through myGov) to protect against fraud. Read the following steps to check you have the strongest security possible for your circumstances.

    Step 1: make your myID as strong as possible

    We recommend using myID, the Australian Government’s Digital ID app, as your sign in option to access ATO online services (through myGov).

    myID requires you to verify your ID in the app making it harder for fraudsters to impersonate you.

    Download the myID app from the App Store or Google Play. Set up your myID to a Strong or Standard identity strengthExternal Link. For the highest security, set up your myID to Strong if you can.

     

    Step 2: use your myID to access or link to ATO online services

    Using your myID to link to or access ATO online services through myGov:

    • helps protect you from fraudsters trying to impersonate you or access your account
    • gives you a flexible sign in option – your myID isn’t locked to a specific mobile number or device, and can be set up again using only an internet connection if you get a new phone
    • sets your ‘online access strength’ – this means you must always use your myID to access ATO online services through myGov because it’s the most secure access method.

    If you’re already linked to ATO online services, use your myID to sign in to myGovExternal Link and access ATO online services to secure your account.

    If you don’t have a myGov account or aren’t linked to ATO online services, find out how to get started. To secure your access, use your myID to create or sign in to your myGov account and then link to the ATO.

    Step 3: get the ATO app and allow push notifications

    The ATO app is a simple and easy way you can access and manage your tax and super on the go. The ATO app is free to download and use.

    The ATO app’s year-round security benefits include:

    • real time security messages alerting you when key changes are made to your ATO account
    • the ability to lock your account to help keep you safe.

    Even if you don’t use the app to manage your tax, it provides an additional level of security.

    Download the ATO app from the App Store or Google Play. Once installed, make sure to enable push notifications so you’re instantly alerted to changes in your account.

     

    More information

    For more information about protecting your identity, see How to stay scam safe.

    MIL OSI News

  • MIL-OSI Video: Fisheries Subsidies: Argentina’s acceptance

    Source: World Trade Organization – WTO (video statements)

    Argentina deposited its instrument of acceptance of the Agreement on Fisheries Subsidies on 22 July. Ambassador Gustavo Lunazzi presented Argentina’s instrument of acceptance to Director-General Ngozi Okonjo-Iweala. Just five more acceptances are needed for the Agreement to enter into force.

    Download this video from the WTO website:
    https://www.wto.org/english/res_e/webcas_e/webcas_e.htm

    https://www.youtube.com/watch?v=52yloDuboOU

    MIL OSI Video

  • MIL-OSI Europe: Eurojust helps catch alleged author of threatening emails to schools in Czechia, Slovakia and Latvia

    Source: European Union 2

    Eurojust has assisted the authorities in the Czech Republic, Slovakia and Latvia with the apprehension of the alleged perpetrator who was responsible for sending thousands of emails in September last year threatening schools with explosions. The mass threats, which were also sent to other educational institutions and leisure centres, caused major public concern and led to the suspension of classes at the beginning of the school year.

    Eurojust supported the national authorities involved by setting up a joint investigation team (JIT) dedicated to the case, as well as providing additional cross-border judicial support.

    The alleged perpetrator also used the social network Telegram to spread his threats. He was apprehended in the Ukrainian city of Dnipro last week but was released pending potential further steps to be taken by the authorities.

    © Dnipropetrovsk Regional Prosecutor’s Office

    Given the mass scale of the threats at the same time across three countries, the police authorities involved coordinated their investigations, assisted by the setting up of the JIT. The joint investigative efforts, using the cybercrime expertise of the police, led to the identification of an alleged perpetrator, operating from the Ukrainian city of Dnipro.

    With the participation of Czech and Slovak police officers, a joint action took place in Dnipro last week, during which the alleged perpetrator was apprehended and one individual was questioned. Furthermore, two locations were searched, which led to the seizure of computer equipment.

    Thanks to the good and close cooperation of all the authorities concerned, the operation was successfully carried out under extremely difficult circumstances, very close to the frontline of the war in Ukraine, with Ukrainian, Czech and Slovak officers exposed to heavy risks.

    Eurojust offered support not only through the establishment of the JIT but also by organising a coordination meeting to prepare for the joint action day in Ukraine. The operation was carried out at the request of and by the following authorities:

    • Czech Republic: High Public Prosecutor’s Office in Prague; National Counterterrorism, Extremism and Cybercrime Agency (NCTEKK)
    • Latvia: Rīga Pārdaugava Prosecution Office; 1st Unit of Cybercrime Enforcement Department of the Central Criminal Police Department of the State Police
    • Slovakia: General Prosecutor´s Office of the Slovak Republic; Police Department West, Anti-Crime Unit, Bureau for Combating Organized Crime of the Presidium of the Police Corps (Police ACU); Counter Terrorism Centre, Presidium of the Police Corps
    • Ukraine: Dnipropetrovsk regional Prosecutor’s Office; Main Department of National Police in Dnipropetrovsk region; Division for Combating Cybercrime in Dnipropetrovsk region of the Cyber Police Department of National Police of Ukraine

    MIL OSI Europe News

  • MIL-OSI Europe: World Brain Day: EU projects helping to protect brain health

    Source: European Union 2

    On World Brain Day, we highlight the need for targeted interventions to promote and protect brain health at every stage of life. Around 165 million Europeans live with brain disorders. Discover what EU-funded projects are doing to understand, prevent and address neurological disorders.

    MIL OSI Europe News

  • MIL-OSI Europe: Galileo launches first worldwide authentication service

    Source: European Union 2

    EUSPA today announced the forthcoming official launch of the Galileo Open Service – Navigation Message Authentication (OSNMA), a new authentication mechanism that lets OS users verify the authenticity of the data used for the GNSS positioning and timing on 24 July.

    Coming at a time when attacks on GNSS signals, such as spoofing, are on the rise, OSNMA provides a critical layer of protection. Spoofing involves the transmission of counterfeit satellite signals that deceive GNSS receivers, potentially resulting in false and unreliable positioning. These events can affect critical applications in transportation, finance, telecommunications, information technology, energy, utilities, manufacturing, health services, emergency services and law enforcement, in which GNSS, and in particular Galileo, is used. In sectors such as aviation or maritime, this can lead to serious safety risks.

    The Galileo OSNMA mitigates these threats by allowing users to confirm that the data they receive is genuinely from Galileo and has not been tampered with. It works by embedding cryptographic data, or a digital signature, into the navigation message (I/NAV) broadcast on the E1-B signal.
    Because the OSNMA is transmitted in the Galileo Open Service signal, which is already used in most devices, receivers only need to implement the protocol and download the certified public keys from the European GNSS Service Centre (GSC) website. OSNMA service relies as well on the implementation of dedicated logic on the receiver side to guarantee the end-to-end authentication process. The service does not require the storage and management of secret keys on the user side, which facilitates the adoption in different communities. Importantly, the OSNMA mechanism does not alter Galileo’s existing signal structure, ensuring that Open Service navigation performance remains unaffected.

    While OSNMA does not prevent spoofing or jamming, it makes spoofing significantly harder by authenticating the data and making the Galileo signal unpredictable and harder to replicate. It also enhances the system’s resilience, giving users an important tool in detecting and responding to threats.

    “Stakeholders have clearly articulated a need for more robust GNSS services. The Galileo OSNMA delivers this robustness and, in doing so, provides enhanced security in positioning and timing solutions.“ Rodrigo DA COSTA, EUSPA Executive Director

    “The OSNMA Initial Service declaration has been authorised by the EU Space SAB following independent security checks and cooperation with the Programme to define risk mitigation measures. The cooperation between the SAB, the Commission and EUSPA was instrumental to getting through this very important milestone.” Philippe BERTRAND, EU Space Security Accreditation Chair

    The launch of Galileo OSNMA marks another milestone in the EU’s commitment to secure and reliable space-based services.

    The OSNMA declaration of service follows an extensive testing phase in which GNSS manufacturers, integrators, and application developers assessed the service across diverse scenarios using the Signal in Space (SiS). With this launch, Galileo becomes the first GNSS in the world to offer authentication globally as part of its Open Service — a major step in reinforcing Europe’s leadership in secure satellite navigation.

    The OSNMA is provided by EUSPA, the operational service provider for Galileo.

    MIL OSI Europe News

  • MIL-OSI United Kingdom: Schools in Westminster to receive up to £8K to boost pupils’ health and wellbeing | Westminster City Council

    Source: City of Westminster

    Twenty-five schools in Westminster have received up to £8,000 in grant funding to improve pupils’ health and wellbeing.

    The school health and wellbeing survey, a Westminster City Council initiative administered by the Schools Health Education Unit (SHEU), was implemented in 25 schools across the city in 2024. The survey, covering topics such as emotional health and wellbeing, safety, food and diet and physical activity, collected responses from 1,357 pupils.

    The survey results have helped the council understand what children need to improve their health and wellbeing and it has given schools a valuable insight into their pupils’ lives. 

    Following the survey, each school has received their confidential report and a grant to act on the findings relevant to their pupils – £5,000 for primaries and £8,000 for secondaries and special schools.

    Gabby Woolf, Vice Principal of King Solomon Academy, said:

    “King Solomon Academy is very grateful to have received a grant from Westminster after participating in the school health and wellbeing survey, which is especially crucial in these times of scarcity. Our findings have shown supporting pupils’ emotional health and wellbeing is important for their health and education. The grant has allowed us to better fund our therapeutic counselling provision, which is run by Place 2 Be and has been a huge support for pupils’ emotional wellbeing and mental health.”

    Cllr Nafsika Butler-Thalassis, Cabinet Member for Adult Social Care, Public Health and Voluntary Sector, said:

    “The voices of children and young people are crucial for designing comprehensive health and wellbeing programmes that answer to their needs. This survey and funding will give schools the knowledge and resources needed to act on the issues that matter most to their pupils, whether that is online safety, mental wellbeing or physical health. It reflects our continued commitment to building a healthier and fairer community for our children in Westminster.”

    The council currently leads on a range of health and wellbeing services and initiatives for children and young people:

    • The School Health Service has been enhanced with a wider emotional and mental health offer. It has been delivering asthma training (as part of the Asthma Friendly School initiative) and developing school partnership agreements.
    • The funding for the Mental Health Youth Worker service has been extended for two years to support the emotional wellbeing and mental health of children and young people attending Youth Hubs in Westminster.
    • The Edward Wilson Primary School Superzone has been created to help school children play safely, breathe clean air, be active, enjoy a healthy diet and thrive.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: A new chapter for young adults with learning disabilities in Portsmouth

    Source: City of Portsmouth

    Portsmouth City Council secured funding to purchase a vacant building and transform it into a home for seven young people with complex support needs, some of whom have been living out of area for their education.

    The project was born from a shared ambition: to bring these young people back to Portsmouth for their move into adulthood, closer to their families and communities, and to provide them with a safe, supportive environment where they can live independently.

    The home features six ensuite rooms with communal living spaces and one self-contained flat. The new tenants will benefit from 24-hour support provided by a registered care provider, with the council acting as landlord.

    The young adults will also have access to a wide range of local health and social care services, including day opportunities and sporting activities tailored to adults with learning disabilities.

    Their new home was opened with a celebration to mark the occasion, thanking the many teams and individuals who have made this vision a reality and, importantly, to give the new tenants and their families the chance to look around their new home ahead of their move.

    Michelle (pictured with the Lord Mayor and Lady Mayoress), is the Mum of one of the new tenants, and is delighted with her son’s new home. She said:

    “For me, this is going to have a positive impact in terms of feeling there is a future for my son – and we haven’t had to make a choice under pressure or take something we weren’t 100% comfortable with. I love the setting – it doesn’t feel like a residential care facility; it feels like a student house. I love the fact that he’s going to be with people of similar age and needs. He has a lot of energy, so he’ll adore the garden, looking out onto trees – it’ll be amazing for him.”

    Cllr Steve Pitt, Leader of the Council with responsibility for Culture, Regeneration & Economic Development said:

    “This project shows the dedication and commitment of multiple teams across the council – showcasing “one council” working.

    From identifying the building and overseeing its refurbishment, to coordinating care and support services, every step has been guided by a shared vision and provides a place for these young adults to live independently.”

    From left to right: Leila Ferguson (Portsmouth Lady Mayoress), Michelle (Mum of new tenant) and Cllr Gerald Vernon-Jackson (Portsmouth Lord Mayor) at an open morning for the new accommodation.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Modernised aid budget will focus on impact, value for money and transparency

    Source: United Kingdom – Executive Government & Departments 3

    Press release

    Modernised aid budget will focus on impact, value for money and transparency

    New aid funding figures published today show how the international aid budget will deliver value for money for the British taxpayer – and maximum impact for the most vulnerable overseas.

    • New figures released today (Tuesday, 22 July) set out how the government will spend the aid budget in 2025/2026, prioritising areas where Britain can make the biggest difference. 

    • The new approach means the UK will prioritise spending through the most impactful multilateral organisations like the World Bank and Gavi, the vaccine alliance, while working to drive reform of these institutions. 

    • Development Minister Baroness Chapman today confirms UK support for the World Bank’s International Development Association – with the fund expected to benefit 1.9 billion people in next three years.

    New aid funding figures published today (Tuesday, 22 July 2025) show how the international aid budget will deliver value for money for the British taxpayer – and maximum impact for the most vulnerable overseas. The cut in the aid budget to 0.3% of Gross National Income from 2027 means every penny must count if the UK is to make progress on its biggest development priorities: to tackle humanitarian, health and climate crises.

    Today’s aid figures, published in the FCDO’s annual report and the first to be released since the cut was announced in February, give an indication of the new approach the Development Minister Baroness Chapman will take. They follow a comprehensive line-by-line strategic review of aid conducted by the Minister, which focused on prioritisation, efficiency, protecting planned humanitarian support and live contracts while ensuring responsible exit from programming where necessary. 

    The pivot will see global organisations with a proven track record of impact, like the World Bank and Gavi, prioritised to deliver better results for the UK taxpayer and the world’s poorest people.  

    The UK will also continue to play a key humanitarian role supporting those in crisis, including in Gaza, Ukraine and Sudan, and will hold a reserve fund to respond to future crises at pace.

    However, underperforming multilateral organisations will face funding cuts in future, and as the UK moves to spend less on aid, bilateral support to some countries is also dropping.  

    While bilateral support for some countries will drop, the UK will instead increasingly share expertise, like that of our world leading scientists and financial sector. It will focus on tackling the climate crisis, health threats and humanitarian emergencies, creating stability and growth to help deliver the Plan for Change at home. The National Security Strategy published earlier this year said British interests are best served through effective multilateral cooperation.

    As part of its growing support for impactful multilateral organisations, the UK today confirmed it will honour a pledge to the International Development Association (IDA) – the World Bank’s fund for the poorest countries – having agreed a new way to make payments that reduces costs to UK taxpayers and provides the same value to the Bank. IDA is expected to benefit 1.9 billion people in the next three years.

    Minister for Development Baroness Chapman said: 

    We are modernising our approach to international development. Every pound must work harder for UK taxpayers and the people we help around the world and these figures show how we are starting to do just that through having a clear focus and priorities. 

    The UK is moving towards a new relationship with developing countries, becoming partners and investors, rather than acting as a traditional aid donor. We want to work with countries and share our expertise – from world leading science to the City of London – to help them become no longer dependent on aid, and organisations like the World Bank and Gavi are central to how we can work with others to solve some of the biggest challenges of our time: humanitarian disasters, pandemics and the climate crisis.

    The UK’s support for the multilateral system will come with a renewed push for its reform to maximise efficiency and impact for people on the ground.  It follows UK funding announced for another multilateral organisation Gavi, the vaccine alliance, last month, which will help save up to 8 million lives. 

    The World Bank support was originally announced last November, but all UK aid funding was subsequently reviewed following the 0.3% announcement in February this year. Every £1 the UK invests in the World Bank’s IDA fund, enables £4 of finance for developing countries. The IDA fund is expected to benefit 1.9 billion people in next three years.

    The World Bank President Ajay Banga today welcomed the UK’s funding commitment. He said:

    We are grateful to the United Kingdom for honouring its pledge to IDA. In a time of tight budgets and growing global risks, this is not just generosity – it’s strategy. Every taxpayer pound is multiplied many times over through the Bank’s ability to mobilise capital and partner with the private sector.

    These resources help create jobs in developing countries – jobs that build self-reliant economies, reduce the drivers of instability, crime, and migration, and grow the middle class. In turn, they create future consumers of UK products and investment opportunities that strengthen the UK economy over the long term.

    The UK’s new approach aligns with recent calls from Global South leaders for a move away from traditional aid to a focus on investment and partnerships, including from the African Development Bank, and the former Kenyan President. 

    Alongside the figures released today, the government has also published an Equality Impact Assessment which found plans to reduce the aid budget will “protect against disproportionate impacts on equalities” overall.

    The government will publish indicative multi-year allocations for 2026-2029 in the autumn, providing an even clearer picture of the UK’s future direction in international development. 

    Background:

    1. The full ODA spending allocations were published in the FCDO’s Annual Report and Accounts on GOV.UK on Tuesday, July 22, 2025. See here for further details: FCDO Annual Report and Accounts 2024 to 2025- GOV.UK
    2. The Equality Impact Assessment was published alongside the Annual Report and Accounts: FCDO Official Development Assistance programme allocations 2025 to 2026: equality impact assessment – GOV.UK
    3. The UK announced last November it would pledge £1.98 billion to the World Bank’s IDA21 – from July 2025 to June 2028. All UK aid funding was subsequently reviewed following the decision to reduce the aid budget in February. We have now agreed to accelerate our payments to the Bank, reducing their need to borrow from markets. This means that while the UK will provide the Bank with around 10% less cash in total, the Bank will regard our contribution as equivalent to our original pledge. A number of other donors accelerate their payments to provide early support to the Bank and to increase the value of their funding in the same way. 
    4. The Foreign Secretary announced new humanitarian support for Gaza on Monday, July 21, 20225. See here for further details: UK pledges lifesaving aid for Gaza – GOV.UK

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Email the FCDO Newsdesk (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: UK Carrier Strike Group contributes to Exercise Talisman Sabre

    Source: United Kingdom – Executive Government & Departments 3

    News story

    UK Carrier Strike Group contributes to Exercise Talisman Sabre

    The UK Carrier Strike Group has led a major British contribution to the large multinational exercise in Australia.

    Crown copyright

    More than 3,000 British forces are taking part in the largest military exercise Australia has ever hosted, as the UK’s Carrier Strike Group (CSG25) demonstrates Britain’s unwavering commitment to Indo-Pacific security. 

    The Carrier Strike Group is in Australia as part of Operation Highmast, the major global deployment that demonstrates Britain’s strategic commitment to the Indo-Pacific. 

    From British Gurkhas to US Marines to Australian Defence Force amphibious specialists, Exercise Talisman Sabre 25 serves as one of the deployment’s key moments, bringing together multinational forces to strengthen and test how nations can work together to safeguard global trade routes and maintain regional stability. 

    Spanning across a vast area in Western Australia, the Northern Territory, Queensland, and New South Wales, the Australian-US led biennial exercise is bigger than ever, involving over 35,000 military personnel from 19 nations – making Talisman Sabre the largest exercise of the CSG’s deployment and one of the largest military exercises in the world this year. For the first time, offshore activities will also be conducted in Papua New Guinea.    

    Defence Secretary John Healey said:  

    The historic bonds between Britain and Australia run deep, and through AUKUS and exercises like Talisman Sabre we are strengthening these ties for the challenges of tomorrow.  

    Our commitment to the Indo-Pacific is unwavering, as this huge military exercise demonstrates. The unprecedented scale showcases the growing importance of cooperation in addressing shared challenges. We will continue to work alongside our closest allies to maintain the security and stability that underpins global prosperity. 

    Commodore James Blackmore said:  

    This is a real demonstration of the UK and our partners’ warfighting capabilities.   

    As the first UK-led multinational Carrier Strike Group to Talisman Sabre this is a powerful demonstration of our commitment to the Indo-Pacific region.  

    Exercise Talisman Sabre is also an opportunity for the UK to develop new levels of integration between systems and capabilities with the US, Australia, and other partners, enhancing our interoperability even further and to unprecedented levels.

     All three branches of the UK Armed Forces are engaged, with the Royal Marines playing a central role throughout the exercise alongside a Ranger Battalion from the Army and RAF Voyager aircraft. 

    The exercise strengthens operational cooperation with international partners, ensuring our collective ability to maintain the rules-based international order that underpins global trade and security.  

    The Royal Navy, alongside its AUKUS partners, is testing cutting-edge sub-sea and seabed warfare capabilities, showcasing interoperability across our navies. Additionally, for the first time, AUKUS nations will demonstrate the ability to remotely control Extra Large Uncrewed Underwater Vehicles (XL-UUVs) from a remote operating centre. 

    Through DSTL via the Resilience Autonomy and AI Technology collaboration, nations tested autonomy-enabled systems able to find and strike an advancing adversary. This experimentation provided a realistic combat environment for AUKUS to operate as an AI-enabled, integrated force, exploiting cutting-edge technology to ensure strategic advantage against a range of simulated adversaries. 
     
    The CSG25 deployment reinforces the government’s Plan for Change by strengthening international partnerships that underpin economic growth and national security, keeping Britain secure at home and strong abroad. Operation Highmast occurs against the backdrop of the government’s landmark commitment to increasing defence spending to 2.6% of GDP. 

    This historic investment underpins the government’s mission-led approach to securing Britain’s future, providing the economic stability necessary for growth whilst ensuring the UK maintains cutting-edge capabilities such as the Carrier Strike Group to meet emerging global threats.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: New Forensic Science Regulator appointed for England and Wales

    Source: United Kingdom – Government Statements

    News story

    New Forensic Science Regulator appointed for England and Wales

    The regulator ensures that the highest standards in forensic science are met across the criminal justice system.

    Dr Marc Bailey has been appointed as the Forensic Science Regulator for England and Wales.

    Dr Bailey is a scientist who has significant regulatory experience. He has held multiple roles within the Medicines and Healthcare products Regulatory Agency (MHRA) and led international research in quality systems and standardisation, including whilst working at the National Physical Laboratory.

    The Forensic Science Regulator is responsible for ensuring that the provision of forensic science services across England and Wales meet the highest standards of quality and integrity. This includes assessing compliance, providing advice to ministers, setting quality standards and ensuring that all forensic science providers adhere to these standards.

    Dr Bailey will work closely with the police, forensic science providers and the legal profession to ensure that forensic science in England and Wales remains at the forefront of innovation and reliability.

    Dr Bailey will officially assume his duties after Gary Pugh’s term concludes on 25 July 2025.

    Crime and Policing Minister Dame Diana Johnson said:

    Dr Bailey is going to bring a wealth of experience and expertise as the new Forensic Science Regulator.

    This pivotal role is essential in ensuring the highest standards of forensic science are upheld.

    By setting rigorous standards and providing robust oversight, the Forensic Science Regulator will continue to ensure that forensic science supports the work of the police, allowing them to investigate crimes and bring justice for victims.

    I’d like to thank Gary Pugh for his previous work in this role.

    Dr Bailey said:

    I am delighted to be appointed to the post of Forensic Science Regulator.

    I look forward to enacting and developing the regulation of Forensic Science and working with the team that support my role to ensure that the criminal justice system has full confidence in forensic science evidence.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: Secretary-General’s remarks to the Security Council – on Multilateralism and Peaceful Settlement of Disputes [bilingual as delivered; scroll down for all-English and all-French versions]

    Source: United Nations secretary general

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation. 

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.  

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.

    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.
    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    [all-English]

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.    

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  
    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.
    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the  sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of states.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.

    The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its 80th anniversary next year.

    Mr. President,    

    As we mark the 80th anniversary of our organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.

    I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    Thank you.

    [all-French]

    Monsieur le Président, Excellences,

    Je tiens à remercier le Vice-Premier Ministre et Ministre des affaires étrangères Ishaq Dar et le Pakistan d’avoir organisé le débat public de ce jour.

    Le thème de ce débat met en lumière le lien évident qui existe entre la paix internationale et le multilatéralisme.

    Il y a 80 ans, l’Organisation des Nations Unies a été fondée dans le but premier de préserver l’humanité du fléau de la guerre.

    Les architectes de la Charte des Nations Unies ont considéré que le règlement pacifique des différends était la seule issue possible lorsque les tensions géopolitiques s’intensifiaient, lorsque des différends non résolus attisaient les conflits et lorsque les États perdaient confiance les uns dans les autres.

    La Charte renferme un certain nombre d’outils majeurs destinés à forger la paix.

    Son Article 2.3 est clair :

    « Les Membres de l’Organisation règlent leurs différends internationaux par des moyens pacifiques, de telle manière que la paix et la sécurité internationales ainsi que la justice ne soient pas mises en danger ».

    Son Chapitre VI est tout aussi clair en ce qui concerne les responsabilités confiées au Conseil de sécurité, qui doit contribuer à assurer le règlement pacifique des différends « par voie de négociation, d’enquête, de médiation, de conciliation, d’arbitrage, de règlement judiciaire, de recours aux organismes ou accords régionaux, ou par d’autres moyens pacifiques » du choix des parties.

    La mesure 16 du Pacte pour l’avenir appelle les États Membres à démontrer leur attachement à la diplomatie préventive et au règlement pacifique des différends en recourant davantage à tous les mécanismes existants en la matière.

    Je félicite le Pakistan d’avoir mis à profit sa présidence pour présenter une résolution exhortant tous les États Membres à utiliser pleinement les outils en question dans le cadre de notre quête collective de la paix dans le monde.

    Nous en avons besoin plus que jamais.

    Partout dans le monde, nous observons un mépris total pour le droit international – voire des violations pures et simples de ce droit, notamment du droit international des droits humains, du droit international des réfugiés, du droit international humanitaire et de la Charte des Nations Unies elle-même –, sans que la responsabilité de quiconque ne soit engagée.

    Ces manquements aux obligations internationales surviennent à un moment où les divisions et les conflits géopolitiques s’aggravent.

    Et le coût – en vies humaines, en communautés brisées et en avenirs perdus – est accablant.

    Il suffit de regarder l’horreur qui se déroule à Gaza, avec un niveau de mort et de destruction sans équivalent dans l’histoire récente.

    La malnutrition explose.  La famine frappe à toutes les portes. 

    Et maintenant, nous assistons à l’agonie d’un système humanitaire fondé sur des principes humanitaires.

    Ce système se voit refuser les conditions nécessaires à son fonctionnement.  On lui refuse l’espace nécessaire pour agir.  On lui refuse la sécurité nécessaire pour sauver des vies.

    Alors que les opérations militaires israéliennes s’intensifient et que de nouveaux ordres de déplacement sont émis à Deir al-Balah, la dévastation s’ajoute à la dévastation.

    Je suis consterné que des locaux de l’ONU aient été touchés, notamment ceux du Bureau des Nations Unies pour les services d’appui aux projets et de l’Organisation mondiale de la Santé, y compris son entrepôt principal.

    Ceci alors que toutes les parties ont été informées de l’emplacement de ces installations de l’ONU.

    Ces locaux sont inviolables et doivent être protégés par le droit international humanitaire, sans exception.

    De Gaza à l’Ukraine, du Sahel au Soudan, de Haïti au Myanmar, et dans bien d’autres régions du monde, les conflits font rage, le droit international est bafoué, et la faim et les déplacements atteignent des niveaux record.

    Et le terrorisme, l’extrémisme violent et la criminalité transnationale restent des fléaux tenaces qui rendent la sécurité encore plus inaccessible.

    La diplomatie ne permet pas toujours de prévenir les conflits, la violence et l’instabilité.

    Mais elle a toujours le pouvoir de les arrêter.

    Monsieur le Président,

    La paix est un choix.

    Et le monde attend du Conseil de sécurité de l’Organisation qu’il aide les pays à faire ce choix.

    Ce Conseil est au cœur de l’architecture mondiale pour la paix et la sécurité.

    Sa création reposait sur une vérité fondamentale.

    La rivalité entre les États est une réalité géopolitique.

    Mais la coopération – ancrée dans des intérêts partagés et le bien commun – représente la voie durable vers la paix.

    Nous observons trop fréquemment que les divisions, les positions tranchées et la surenchère verbale bloquent la mise en place de solutions et sape l’efficacité de ce Conseil.

    Mais nous avons également observé des exemples admirables de cas où il a été possible de trouver un terrain d’entente et des solutions aux problèmes mondiaux.

    Ainsi, nous marquons aujourd’hui le troisième anniversaire de la signature de l’Initiative de la mer Noire et du mémorandum d’accord avec la Fédération de Russie – des mesures qui montrent ce que nous pouvons accomplir grâce à la médiation et aux bons offices de l’ONU, y compris dans les moments les plus difficiles.

    Et plus récemment, nous avons été témoins de bien d’autres exemples.

    De la Conférence de Séville sur le financement du développement à la Conférence de Nice sur l’océan, en passant par l’Accord sur la diversité biologique marine des zones ne relevant pas de la juridiction nationale, la Convention sur la cybercriminalité et le Pacte pour l’avenir, adopté l’année dernière.

    Le Pacte, en particulier, témoigne d’une claire volonté du monde de s’engager de nouveau à renforcer le système de sécurité collective des Nations Unies.

    Inspiré du Nouvel Agenda pour la paix, il donne la priorité à la diplomatie préventive et à la médiation, autant de domaines dans lesquels le Conseil peut jouer un rôle essentiel.

    En ce qui concerne le thème du débat qui nous réunit aujourd’hui, il y a selon moi trois domaines dans lesquels nous pouvons nous montrer à la hauteur de l’appel, contenu dans le Pacte, à renouveler notre engagement – et la confiance du monde – envers l’architecture multilatérale dont nous disposons pour régler les problèmes.

    Premièrement, les membres de ce Conseil, en particulier les membres permanents, doivent continuer à s’efforcer de surmonter les dissensions.

    La majorité des situations inscrites à l’ordre du jour du Conseil de sécurité sont complexes et ne se prêtent pas à des solutions rapides.

    Mais même dans les jours les plus sombres de la guerre froide, le dialogue et la prise de décision collective au sein de ce Conseil ont permis de maintenir un système de la sécurité mondiale commun et efficace.

    Un système qui a déployé avec succès toute une série de missions de maintien de la paix.

    Un système qui a ouvert la voie à l’acheminement d’une aide humanitaire vitale aux personnes dans le besoin.

    Et un système qui a permis d’éviter une troisième guerre mondiale.

    Je vous exhorte à adopter le même état d’esprit en maintenant la communication, en continuant d’écouter de bonne foi, en vous employant à surmonter les divergences et à rechercher le consensus.

    Nous devons également veiller à ce que ce Conseil soit à l’image du monde d’aujourd’hui, et non de celui d’il y a 80 ans.

    Ce Conseil devrait être plus représentatif des réalités géopolitiques actuelles.

    Et nous devons continuer de perfectionner ses méthodes de travail afin de le rendre plus inclusif, plus transparent, plus efficace, et plus responsable.

    Je vous demande instamment de continuer d’œuvrer à la recherche du consensus pour faire avancer les négociations intergouvernementales.

    Deuxièmement, ce Conseil doit continuer de renforcer la coopération avec les partenaires régionaux et sous-régionaux.

    L’adoption historique de la résolution 2719 du Conseil de sécurité, visant à financer les opérations d’appui à la paix menées par l’Union africaine au moyen de contributions statutaires, est un bon exemple de la manière dont nous pouvons unir nos forces à celles des organisations régionales pour favoriser la mise en place de mesures plus efficaces.

    Je salue également les mesures prises par ce Conseil pour renforcer et rebâtir les cadres de sécurité régionaux afin d’encourager le dialogue et de favoriser le règlement pacifique des différends.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    MIL OSI United Nations News

  • MIL-OSI USA: Read More (Rep. Steube and Sen. Hawley Introduce Federal Tort for Pediatric Gender Clinics)

    Source: United States House of Representatives – Congressman Greg Steube (FL-17)

    July 22, 2025 | Press ReleasesWASHINGTON — U.S. Representative Greg Steube (R-Fla.) joined with Senator Josh Hawley (R-Ind.) today in introducing the Jamie Reed Protecting Our Kids from Child Abuse Act, legislation that establishes a federal tort for individuals harmed by gender-transition procedures as minors. This bill honors the Trump administration’s request for legislation providing a private right of action for damages caused by chemical and surgical mutilation on children.
    “Thousands of families have been defrauded by the Left’s gender ideology lie: that mutilation is somehow medicine,” said Rep. Steube. “Sex reassignment surgery and puberty blockers for minors are nothing more than child abuse in service to a depraved political agenda. Senator Hawley and I are committed to ensuring America’s children finally get justice for one of the worst crimes ever committed against our young people.”
    Representative Mary Miller (R-Ill.), Chair of the Congressional Family Caucus, is a cosponsor of the bill.
    “Irreversible gender-mutilation procedures have permanently harmed children across America under the false guise of health care,” said Rep. Mary Miller. “Every clinic, doctor, and institution involved in these abusive procedures must be held accountable. We will end the flow of taxpayer dollars to gender clinics, stop the medical exploitation of children, and give victims the legal power to seek justice.”
    The Jamie Reed Protecting Our Kids from Child Abuse Act is the House companion to legislation introduced by U.S. Senator Josh Hawley.
     “Our children should no longer suffer from irreversible and dangerous child mutilation procedures, which the Biden administration enabled and promoted,” said Senator Hawley. “I welcome President Trump’s strong action to reverse this child abuse and look forward to working with his administration to advance legislation that protects our kids.”
    Background: The bill establishes a private right of action against individuals and entities responsible for inflicting harm on minors via gender-transition procedures. It also bans federal funding to any hospital, university, gender clinic, or organization affiliated with a gender clinic that provides gender-transition procedures to minors. 
    Read the full bill text here.

    MIL OSI USA News

  • MIL-OSI Asia-Pac: Prisoner visits explained

    Source: Hong Kong Information Services

    The Correctional Services Department said that in accordance with the law, it declined a visitor who is not on the declared visitors list of a person in custody (PIC) for a visit this morning.

    According to the established mechanism, visitors must be declared on the PIC’s declared visitors list.

    The Prison (Amendment) Rules 2025 came into effect last Friday. The department has not invoked Rule 48 of the Prison Rules to prohibit any person from conducting visits, nor has it imposed restrictions or conditions on any visits.

    MIL OSI Asia Pacific News

  • MIL-OSI USA: General Guetlein to Lead the Office of Golden Dome for America

    Source: United States Department of Defense

    Golden Dome is President Donald J. Trump’s vision to build a layered defense of the homeland to provide for the common defense of the American people against ballistic, hypersonic, advanced cruise missiles and other next-generation aerial attacks from near-peer and rogue nations.  

    MIL OSI USA News

  • MIL-OSI USA: IAM Union: Stop the Privatization of the Tennessee Valley Authority (TVA)

    Source: US GOIAM Union

    The IAM Union is calling on all members, allies, and community supporters to mobilize now and push back against renewed efforts to privatize the Tennessee Valley Authority (TVA)—a public institution that for more than a century has provided reliable, affordable energy to millions and supported thousands of good union jobs for decades.

    This is no hypothetical threat. Citing sources, The Atlantic is reporting that some members of the Trump administration are advancing an agenda to sell off the TVA to the highest bidder. The TVA board – now with only three members instead of its usual nine – has been told by the Trump administration to fire its CEO or risk being replaced.

    So far, the board has declined to do so, noting it had no cause and that the TVA has followed the Trump administration’s instructions of “unleashing American energy and achieving American energy dominance.”

    Privatizing TVA would:

    1. Destroy good-paying IAM union jobs and harm working families
    2. Increase electricity rates for communities across the region
    3. Eliminate oversight and public accountability
    4. Open the door to more attacks on other public utilities nationwide

    “Privatizing TVA would be a disaster for our members and for working people across the South,” said IAM Union Southern Territory General Vice President Craig Martin. “It’s a direct attack on union jobs, on affordable power, and on the idea that public resources should serve the public—not billion-dollar corporations. We will not sit back while they try to sell out our future.”

    “TVA was built by working people, for working people,” said IAM Union International President Brian Bryant. “The IAM is ready to fight tooth and nail to make sure it stays that way.”

    HERE’S WHAT YOU CAN DO:

    Send an email message to your Senators and Representative, telling them to protect TVA and union jobs.

    Call your Senators and Representative at 202-224-3121: Tell them to oppose any attempt to privatize TVA or weaken public oversight.

    The IAM has stood strong for working people for generations—and we’re not backing down now. Help us protect what’s ours. Help us protect the future.

    The post IAM Union: Stop the Privatization of the Tennessee Valley Authority (TVA) appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: Finders/Seekers: Exemption Features

    Source: Securities and Exchange Commission

    Thank you to the Committee members for your continued service and to today’s speakers. In this morning’s follow-up discussion on Regulation A, please continue to provide your candid views about what changes could make Regulation A a more effective capital-raising tool. The discussion at the last meeting, as you thought through different aspects of Regulation A, already has helped to inform my thinking. I am looking forward to seeing your recommendations on the topic.

    Later this morning, the Committee will be thinking about a common marketplace question that frustrates founders and investors alike: “where is what I’m looking for?” A founder with a product is looking for an angel investor or venture capitalist with a compatible investment philosophy. Simultaneously, an investor with capital to allocate is looking for a company with a vision that resonates with her. Time spent looking for one another is a mutually incurred transaction cost that hampers the growth of individual businesses and the broader economy. One part of the Commission’s three-part mission is to ensure fair, orderly, and efficient markets. Ensuring efficient markets means creating a regulatory environment that facilitates, rather than impedes, the coming together of entrepreneurs and investors.

    Finders play a crucial role, particularly for small businesses, by connecting entrepreneurs and investors. Finders often are engaged just as much in social behavior as they are in economic behavior. As a result, well-intentioned friends, colleagues, and industry acquaintances may find themselves unwittingly acting as broker-dealers and therefore subject to an onerous regulatory framework ill-suited for the connections and introductions these individuals facilitate. Companies, on the other hand, also face uncertainty in knowing when they can engage a finder that is not registered as a broker-dealer to help locate investors. Despite these consequences, the Commission has failed to provide clarity in this area, which has forced finders and companies to rely on highly fact-specific no-action letters from Commission staff. This lack of clarity has persisted for so long it transcends committees; this Committee’s predecessor, the Advisory Committee on Small and Emerging Companies, lamented that, “[t]here is significant uncertainty in the marketplace about what activities require broker-dealer registration.”[1] And this Committee too has asked for years for the Commission to adopt a framework to permit finders to engage in limited capital raising activities involving accredited investors.[2]

    Finally, in October 2020 the Commission proposed an exemptive order which would have permitted natural persons to engage in certain limited activities on behalf of issuers without registering as brokers (the “2020 Proposal”).[3] A month later, this Committee provided helpful feedback.[4] Commenters caused me to question the proposed approach, which involved two tiers of finders. As one commenter explained with respect to proposed Tier 1 finders, “limiting them to one transaction annually and prohibiting them from having any contact with an investor makes the category virtually useless.”[5] Though the 2020 Proposal was never adopted, as you consider the staff’s overview of the 2020 Proposal and discuss issues surrounding finders more generally, please consider the following questions:

    1. Is the 2020 Proposal a good starting point for exemptive relief, or would a different approach be more effective? Have market practices changed since 2020 in a way that would warrant changes to the 2020 Proposal?
    2. Would the 2020 Proposal, or any action related to providing clarity for finders, benefit from a full rulemaking process, as some commenters suggested in 2020?[6]
    3. Is the Committee still supportive of a blanket exemption for finders for offerings under a certain size?[7]
    4. Should any exemption for finders cover activities related to secondary offerings?
    5. In 2020 commenters were divided on whether an exemption should be provided only to natural persons.[8] Does this committee favor one approach over the other?

    I look forward to hearing how today’s discussion builds on the previous work of the Committee.


    [2] See, Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Jay Clayton, Chairman, U.S. Sec, & Exch. Comm’n (May 28, 2020), https://www.sec.gov/spotlight/sbcfac/capital-formation-proposal-recommendation-2020-05-08.pdf; Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Jay Clayton, Chairman, U.S. Sec, & Exch. Comm’n (Nov. 13, 2020), https://www.sec.gov/spotlight/sbcfac/finders-recommendation.pdf; Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Gary Gensler, Chair, U.S. Sec, & Exch. Comm’n (Nov. 16, 2022), https://www.sec.gov/spotlight/sbcfac/entrepreneurial-ecosystems-recommendation-101322.pdf; Letter from the Small Bus. Cap. Formation Advisory Comm., U.S. Sec, & Exch. Comm’n, to Gary Gensler, Chair, U.S. Sec, & Exch. Comm’n (Feb. 28, 2023), https://www.sec.gov/files/committee-perspectives-letter-022823.pdf.

    [3] U.S. Securities and Exchange Commission, Notice of Proposed Exemptive Order Granting Conditional Exemption from the Broker Registration Requirements of Section 15(a) of the Securities Exchange Act of 1934 for Certain Activities of Finders, Exchange Act Release No. 34-90112, File No. S7-13-20 (Oct. 7, 2020), https://www.sec.gov/files/rules/exorders/2020/34-90112.pdf.

    [4] Letter from the Small Bus. Cap. Formation Advisory Comm., (Nov. 13, 2020), supra note 2.

    [6] Securities Industry and Financial Markets Association, Letter to Vanessa A. Countryman, Re: S7-13-20 (Nov. 12, 2020), at 6-7, https://www.sec.gov/comments/s7-13-20/s71320-8011715-225372.pdf; CompliGlobe Ltd., Letter to Vanessa A. Countryman, Re: S7-13-20 (Nov. 13, 2020), at 3, 6, https://www.sec.gov/comments/s7-13-20/s71320-8048443-225747.pdf.

    [7] Letter from the Small Bus. Cap. Formation Advisory Comm., (Nov. 13, 2020), supra note 2.

    [8] Compare, e.g., CrowdCheck, Inc., Letter to Vanessa A. Countryman, Re: S7-13-20 (Nov. 30, 2020), at 2, s71320-8065248-225954.pdf; with CompliGlobe Ltd., Letter, supra note 6, at 4.

    MIL OSI USA News

  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI

  • MIL-OSI Africa: Food lifeline fading for millions in South Sudan hit by conflict and climate shocks

    Source: APO

    South Sudan’s dramatic hunger crisis is worsening and millions of people there could miss out on food aid because of the worsening global humanitarian funding crisis, the UN World Food Programme (WFP) said on Tuesday.

    Earlier this month, the UN agency began airdropping emergency food assistance in Upper Nile State after surging conflict forced families from their homes and pushed communities to the brink of famine.

    Nationwide, the picture is just as alarming, with half the country’s population – more than 7.7 million people – officially classified as food insecure by UN partner the IPC platform. This includes more than 83,000 face “catastrophic” levels of food insecurity.

    “The scale of suffering here does not make headlines but millions of mothers, fathers, and children are spending each day fighting hunger to survive,” said WFP Deputy Executive Director Carl Skau, following a visit to South Sudan last week. 

    The worst-hit areas include Upper Nile State, where fighting has displaced thousands and relief access is restricted. Two counties are at risk of tipping into famine: Nasir and Ulang.

    South Sudan, the world’s youngest country, gained independence in 2011. This gave way to a brutal and devastating civil war which ended in 2018 thanks to a peace agreement between political rivals which has largely held.

    However, recent political tensions and increased violent attacks – especially in the Upper Nile State – threaten to unravel the peace agreement and return the nation to conflict.

    The humanitarian emergency crisis has been exacerbated by the war in neighbouring Sudan. 

    Since April 2023, nearly 1.2 million people have crossed the border into South Sudan, many of them hungry, traumatised, and without support. WFP says that 2.3 million children across the country are now at risk of malnutrition.

    Crucial, yet fragile gains

    Despite these challenges, the UN agency has delivered emergency food aid to more than two million people this year. In Uror County, Jonglei State, where access has been consistent, all known pockets of catastrophic hunger have been eliminated. Additionally, 10 counties where conflict has eased have seen improved harvests and better food security, as people were able to return to their land.

    To reach those in the hardest-hit and most remote areas, WFP has carried out airdrops delivering 430 metric tons of food to 40,000 people in Greater Upper Nile. River convoys have resumed as the most efficient way to transport aid in a country with limited infrastructure. These included a 16 July shipment of 1,380 metric tons of food and relief supplies. WFP’s humanitarian air service also continues flights to seven Upper Nile destinations.

    At the same time, a cholera outbreak in Upper Nile has placed additional pressure on the humanitarian response. Since March, WFP’s logistics cluster has airlifted 109 metric tons of cholera-related supplies to affected areas in Upper Nile and Unity states.

    However, the UN agency says it can currently support only 2.5 million people – and often with just half-rations. Without an urgent injection of $274 million, deeper cuts to aid will begin as soon as September.

    “WFP has the tools and capacity to deliver,” said Mr. Skau. “But without funding – and without peace – our hands are tied.” 

    Distributed by APO Group on behalf of UN News.

    Media files

    .

    MIL OSI Africa