Category: Economy

  • MIL-OSI Security: Former Real Estate Podcaster Sentenced to More Than Five Years in Prison for Orchestrating $7 Million Ponzi Scheme

    Source: US FBI

    CLEVELAND – A popular former podcaster was sentenced to 70 months in federal prison for orchestrating a real estate Ponzi scheme that took in over $7.3 million from at least 63 victims from across the United States, involving a wide range of income levels and ages.

    According to court documents, from October 2017 to March 2022, Matthew Motil, 45, of North Olmsted, was a licensed real estate agent in Ohio who owned and operated several companies. He devised a scheme to defraud investors by using his podcast and other marketing tools to position himself as an expert in the field. Branding himself as the “Cash Flow King,” Motil produced and hosted programs which he promoted through social media and his websites. He also authored a book, “Man on Fire,” to further his credibility with investors. Using a combination of marketing tactics, he solicited prospective investors to invest their money with him and his real estate companies as a lucrative way to generate passive income. Motil provided the victim investors with promissory notes he said were secured by mortgages on properties located throughout Northeast Ohio. Unbeknownst to them, he used the same properties over and over to obtain money from one victim after another, each time providing them with a promissory note purportedly secured by a mortgage. Each victim believed that they were the sole mortgage holder of the investment property and that they would be able to recover their investment through foreclosure if Motil failed to make the payments he promised.

    Motil deflected mortgage questions from investors by saying that there were long processing times. As he convinced more people to invest with him, he used those new funds to pay earlier investors to keep the scheme going.

    “These victims were deceived and manipulated into handing over their hard-earned money to a shameless and selfish individual for his own benefit,” said Acting U.S. Attorney Carol M. Skutnik for the Northern District of Ohio.  “Our office will take action to prosecute anyone who preys on the trusting nature of others.” 

    Motil also used the victim investors’ money to fund his lifestyle. He funded personal expenses such as leasing a large home on Lake Erie and securing courtside seats to Cleveland Cavaliers home games. He also used the funds to pay his credit cards and financially sustain his fitness businesses.

    “The 63 victims of this investment/Ponzi scheme are at the forefront of our work, and this conviction reflects our steadfast commitment to justice on their behalf,” said U.S. Secret Service Special Agent in Charge Blaine M. Forschen for the Cleveland Field Office. “Together with our federal, state, and local partners on the Secret Service Money Laundering Task Force, we will continue to protect our communities from those who exploit trust and inflict financial harm.”

    Motil pleaded guilty to securities fraud and wire fraud on Sept. 5, 2024. U.S. District Court Judge Donald C. Nugent imposed the sentence July 18, 2025. Motil was also sentenced to serve three years of supervised release after imprisonment and pay $5,085,247.08 in restitution.

    The investigation was conducted by the United States Secret Service Money Laundering Task Force* with significant assistance from the Cuyahoga County Prosecutor’s Office and the former Major Crime Task Force hosted by the Cuyahoga County Sheriff’s Department.  The Office of the United States Trustee for Region 9 – Cleveland, Ohio, also significantly contributed to the case.

    This case was prosecuted by Assistant United States Attorney Erica D. Barnhill for the Northern District of Ohio.

    *The United Secret Service Task Force consists of the following agencies: Social Security-OIG, US Postal-OIG, US Postal Inspection Service, USDA-OIG, HUD-OIG, FBI, TIGTA-OIG, IRS-CI, Ohio BCI, Westlake PD, Parma PD, Amherst PD, North Olmsted PD, Cuyahoga County Sheriff’s Department, Cuyahoga County Prosecutor’s Office, Ohio Investigative Unit, Lorain County Sheriff’s Department, Stark County Prosecutor’s Office, Geauga County Prosecutor’s Office, Lorain County Prosecutor’s Office, Ohio Casino Commission, Richfield PD and North Ridgeville PD.

    MIL Security OSI

  • MIL-OSI Security: Five Defendants Sentenced in Connection with Operating One of the Largest Illegal Television Show Streaming Services in the United States

    Source: United States Attorneys General

    Yesterday, the final judgments were issued for five Nevada men, including a citizen of Germany, who were sentenced on May 29 and 30 to terms of up to 84 months in prison for running Jetflicks, one of the largest illegal television streaming services in the United States.

    “The defendants operated Jetflicks, an illegal paid streaming service that made available more television episodes than any licensed streaming service on the market,” said Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division. “This scheme generated millions of dollars in criminal profits, and hurt thousands of U.S. companies and individuals who owned the copyrights to these shows but never received a penny in compensation from Jetflicks. The sentences issued in this case demonstrate the Criminal Division’s commitment to protect American creativity and to ensure that large-scale infringers are brought to justice and punished for their crimes.”

    “Digital crimes are not victimless crimes,” said U.S. Attorney Sigal Chattah for the District of Nevada. “The copyright owners lost millions of dollars as a result of the illegal paid streaming service. These sentences underscore our joint commitment with the Computer Crime and Intellectual Property Section and FBI to deter and disrupt intellectual property crime via thorough investigation and prosecution of those who violate federal intellectual property laws.”

    “By building and running one of the largest unauthorized streaming services in the U.S., these individuals not only stole from content creators and legitimate streaming services, they undermined the integrity of our economy and the rule of law,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “These sentencings are a reminder that illegal actions have consequences. The FBI and our partners are unwavering in our commitment to protect intellectual property rights and hold criminals accountable.”

    After a 14-day trial that ended in June 2024, a federal jury in the District of Nevada convicted Kristopher Lee Dallmann, 42; Peter H. Huber, 67; Jared Edward Jaurequi, also known as Jared Edwards, 44; Felipe Garcia, 43; and Douglas M. Courson, 65, all of Las Vegas, of conspiracy to commit copyright infringement. The jury also convicted Dallmann of criminal copyright infringement by distribution, criminal copyright infringement by public performance, and money laundering. Subsequently, the court sentenced Dallmann to 84 months in prison; Huber to 18 months in prison; Jaurequi to time served (almost 5 months in prison), 180 days of home confinement, and 500 hours of community service; Garcia to three years probation with 49 days in prison and 1000 hours of community service; and Courson to three years probation with 48 days in prison.

    According to court documents and evidence presented at trial, the defendants ran a site called Jetflicks, an online subscription-based service headquartered in Las Vegas, that permitted users to stream and at times download copyrighted television programs without the permission of the relevant copyright owners. At one point, Jetflicks claimed to have 183,285 different television episodes, significantly more than Netflix, Hulu, Vudu, Amazon Prime, or any other licensed streaming service. This was the largest internet piracy case — as measured by the estimated total infringement amount and total number of infringements — ever to go to trial as well as the first illegal streaming case ever to go to trial. The defendants’ conduct harmed every major copyright owner of a television program in the United States. Copyright owners lost millions of dollars from the operation.

    Evidence presented at trial showed that the defendants used automated software and computer scripts that ran constantly to scour sites around the world hosting pirated content. The software and scripts would download, process, and store illegal content, and then make it immediately available on servers in the United States and Canada to tens of thousands of paid subscribers located throughout the United States for streaming and/or downloading. The defendants often delivered episodes to subscribers the day after the shows originally aired on television. The service was not only available to subscribers over the internet but specifically designed to work on many different types of devices, platforms, and software.

    Each defendant performed at least one and often multiple roles at Jetflicks including management, computer programming and coding, design of the website, applications, and customer interface, technical assistance, content acquisition, subscriptions and revenue, and customer support.

    Dallmann reaped millions of dollars in profit from the operation. The government conservatively estimated the value of the copyright infringement in the case at $37.5 million. This included the approximate retail value of the defendants’ reproduction of infringing works to create the Jetflicks inventory as well as the approximate retail value of the streams of pirated television episodes that the defendants provided to subscribers.

    The five defendants sentenced were among eight defendants originally indicted in the Eastern District of Virginia in connection with operating Jetflicks. In addition to the defendants just sentenced in Nevada, defendant Darryl Polo previously pleaded guilty in the Eastern District of Virginia to four counts of criminal copyright infringement and one count of money laundering for his involvement with Jetflicks as well as an equally large illegal streaming site he ran called iStreamItAll. Similarly, defendant Luis Villarino also previously pleaded guilty in the Eastern District of Virginia to conspiracy to commit criminal copyright infringement. In May 2021, a judge in the U.S. District Court for the District of Virginia sentenced Polo and Villarino to, respectively, 57 months in prison and 12 months and a day in prison.

    After the case was transferred to the District of Nevada for trial, defendant Yoany Vaillant was tried separately from the other five remaining defendants. In November 2024, after an eight-day trial, a federal jury convicted Vaillant of conspiracy to commit criminal copyright infringement. Vaillant is scheduled to be sentenced on Sept. 4.

    The FBI Washington Field Office investigated the case, with assistance from the FBI Las Vegas Field Office. 

    Senior Counsel Matthew A. Lamberti, Trial Attorney Michael Christin, and Acting Deputy Chief Christopher S. Merriam of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Jessica Oliva and Edward G. Veronda for the District of Nevada are prosecuting the case. The CCIPS Cybercrime Lab, the Justice Department’s Office of International Affairs, and the Royal Canadian Mounted Police in Canada provided significant assistance.

    MIL Security OSI

  • MIL-OSI USA: Warner & Colleagues Demand Answers from Delta on Use of AI to Set Individualized Ticket Prices

    US Senate News:

    Source: United States Senator for Commonwealth of Virginia Mark R Warner

    WASHINGTON – Today, U.S. Sen. Mark R. Warner (D-VA) along with his colleagues Sens. Ruben Gallego (D-AZ) and Richard Blumental (D-CT) led their colleagues in demanding answers from Delta Air Lines CEO Ed Bastian after the company announced that it plans to ramp up its use of Artificial Intelligence to set surveillance-based ticket prices.

    “Individualized pricing, or surveillance-based price setting, eliminates a fixed or static price in favor of prices that are tailored to an individual consumer’s willingness to pay. Delta’s current and planned individualized pricing practices not only present data privacy concerns, but will also likely mean fare price increases up to each individual consumer’s personal “pain point” at a time when American families are already struggling with rising costs,” wrote the senators. “The technology making that determination is trained using “all the data we can get our hands on” according to Fetcherr CEO Roy Cohen, and the company’s website claims that AI adoption and usage could increase aviation industry profits by up to $4.4 trillion annually.”

    “The implications for individual consumer privacy are severe on their own. Surveillance pricing has been shown to utilize extensive personal information obtained through a variety of thirdparty channels, including data about a passenger’s purchase history, web browsing behavior, geolocation, social media activity, biometric data, and financial status,” they continued. “Former FTC Chair Lina Khan has cautioned against a particularly egregious but conceivable example of an airline using AI to charge a higher fare to a passenger ‘because the company knows that they just had a death in the family and need to fly across the country.’” 

    In the letter, the senators demanded answers on the company’s plans to protect Americans from pricing discrimination. They also requested answers to a series of questions around the types and sources of data Delta will use to train this AI system, how many passengers and which routes will be impacted, and what steps the company has taken to ensure compliance will follow all applicable federal and state laws.

    The full text of the letter is available here.

     

    MIL OSI USA News

  • MIL-OSI Africa: Fostering Digital Villages Initiative showcases innovation at agricultural shows in Zimbabwe

    Source: APO

    The Food and Agriculture Organization of the United Nations (FAO) in collaboration with the Mhondoro-Ngezi District Agricultural Show Society, successfully hosted a ‘Digital Fair’ in the Mashonaland West Province in Zimbabwe. The Digital Fair was held under the auspices of the Fostering Digital Villages Initiative (FDiVi).

    This strategic blending of digital innovation with traditional agricultural exhibitions marks a significant step in Zimbabwe’s journey towards agrifood systems transformation as it showcases tools and services that significantly improves the efficiency and effectiveness of agricultural practices.

    The event served as a dynamic platform to introduce digital service providers to rural communities, enabling farmers, youth, and local leaders to explore and evaluate digital tools tailored for agricultural productivity and rural development. The digital fair is part of the broader global FAO Digital Villages Initiative, which aims to transform agrifood systems in rural Malawi, Rwanda, and Zimbabwe using effective digital technologies, including artificial intelligence.

    Digital Fairs are platforms for raising awareness as well as conduits for digital literacy for rural communities on one hand and rural market entry points for digital service providers, innovators and entrepreneurs.

    “Collaborating with Agricultural Show Societies is a step in the right direction. The success of the digital fair in the Mhondoro-Ngezi where we partnered the Mhondoro-Ngezi District Agricultural Society sets the stage for future integration of digital fairs into national and sub-national agricultural shows, amplifying outreach and fostering inclusive access to innovation,” said Patrice Talla, FAO Subregional Coordinator for Southern Africa and Representative to Zimbabwe.

    “This approach aligns with Zimbabwe’s broader goals for sustainable agriculture, youth empowerment, and rural development, and is more sustainable,” added Talla.

    “The Venice Digital Fair has been overwhelmingly welcomed by the Mhondoro-Ngezi farmers, extension staff and stakeholders, with a lot of interest shown on the services that were being exhibited. We wish to continue to synchronize our future agricultural shows with these digital fairs as this has shown a positive impact on attendance, knowledge sharing and exchange.” said Spiwe Goto an extension officer with the Ministry of Lands, Agriculture, Fisheries, Water and Rural Development.

    The digital fair brought together a wide range of stakeholders, including Government officials; digital service providers; local traditional leaders and community members; and youth organizations, rural development groups, and digital champions.

    “I have learnt a lot through being part of this initiative. Digital innovation isn’t just for urban centres. It’s for every farmer, every youth, and every rural entrepreneur ready to grow. We’re building bridges between technology and tradition,” Maria Chinyoka a Digital Champion trained under the FDiVi project who is also the Kushinga farmer group leader.

    The Digital Fair delivered tangible results, reinforcing the value of integrating digital innovation into Zimbabwe’s agrifood systems. The digital fair contributed to increased awareness of digital tools among rural stakeholders, showcasing their potential to drive agricultural productivity and rural transformation. It also strengthened engagement between digital innovators and grassroots communities, fostering collaboration and knowledge exchange.

    “These series of Fairs are a vital bridge between us as digital innovators and grassroot communities that we often overlook in tech-driven agriculture” said Tafadzwa Chikwereti (Co-founder of eAgro).

    “As a financial institution, we witnessed opportunities for our company to penetrate the under-banked community. We will be partnering with local agents to offer our micro-finance services,” Kanukai Madende the Managing Director of Village Finance.

    The digital fair enhanced the visibility of digital solutions within sub-national agricultural platforms, laying the groundwork for broader adoption and policy integration. FAO remains committed to supporting Zimbabwe’s digital transformation journey, ensuring that no community is left behind in the pursuit of modern, resilient, and inclusive agrifood systems.

    Distributed by APO Group on behalf of Food and Agriculture Organization of the United Nations (FAO): Regional Office for Africa.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI Africa: Ethiopia: Ministry of Finance Launches First-Ever Issuance Calendar for Treasury (T)-Bills

    Source: APO


    .

    As part of ongoing efforts to reform and modernize public finance management and to foster market-based deficit financing through domestic-currency Treasury bills and bonds market, the Ministry of Finance has published its first three-month Treasury-bill issuance calendar.

    This milestone supports the government’s “reset, reform, and relaunch” agenda, deepening the domestic debt market and improving transparency. By giving market participants clear visibility of upcoming auctions, the calendar enhances predictability and builds investor confidence. It also underscores the government’s commitment to borrow domestically in ways that limit inflation and safeguard macroeconomic stability.

    The calendar embodies the shift toward a genuinely market-based approach to Treasury-bill issuance. This compliments the opening of the secondary market and the introduction of more competitive retail auctions open to a wider range of investors through the Ethiopian Securities Exchange.

    The Ministry of Finance will continue to build on this momentum by promoting openness, broadening investor participation, and aligning Ethiopia’s debt-management practices with international best practice.

    Distributed by APO Group on behalf of Ministry of Finance, Ethiopia.

    MIL OSI Africa

  • MIL-OSI Russia: US withdrawal from UNESCO contradicts fundamental principles of multilateralism – head of organization

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    PARIS, July 22 (Xinhua) — The US withdrawal from the United Nations Educational, Scientific and Cultural Organization (UNESCO) runs counter to the fundamental principles of multilateralism, UNESCO Director-General Audrey Azoulay said on Tuesday.

    Expressing deep regret over the decision taken by US President Donald Trump, O. Azoulay warned that the country’s withdrawal from the organization would primarily affect UNESCO’s American partners, in particular communities applying for inclusion of sites on the World Heritage List, obtaining the status of “UNESCO Creative City” and the creation of UNESCO Chairs.

    The United States announced on Tuesday that it would withdraw from UNESCO by the end of December 2026, just two years after rejoining, marking the country’s third exit from the organization.

    According to a statement from the US State Department, the decision was made in connection with UNESCO’s policy, which Washington believes “promotes divisive social and cultural initiatives” against the backdrop of the Israeli-Palestinian conflict.

    Commenting on the statement, the UNESCO Director-General expressed regret over the US decision, rejecting the arguments made. She stressed that the organization remains “a rare forum for consensus building through concrete, action-oriented multilateralism.”

    O. Azoulay assured that the US withdrawal from UNESCO in 2026 and the loss of American funding will not affect the normal activities of the organization, since its financial position has been significantly strengthened.

    “We have undertaken major structural reforms and diversified our funding sources. Thanks to the efforts made by the organization since 2018, the decline in US financial contributions has been effectively offset,” the CEO said. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Chairmen of NPC Standing Committee, CPPCC National Committee Meet with Madagascar Senate President

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 22 (Xinhua) — Zhao Leji, chairman of the Standing Committee of the National People’s Congress (NPC), and Wang Huning, chairman of the National Committee of the Chinese People’s Political Consultative Conference (CPPCC), held separate meetings with Richard Ravalomanana, president of the Senate (upper house) of Madagascar, in Beijing on Tuesday.

    As Zhao Leji pointed out, China hopes to work with Madagascar to implement the important consensus reached by the heads of state of the two countries and the results of the Beijing Summit of the Forum on China-Africa Cooperation, strive for new achievements in friendly cooperation between the two countries, and contribute to building an all-weather China-Africa community with a shared future in the new era.

    The NPC Standing Committee chairman called on the legislative bodies of the two countries to strengthen exchanges and cooperation and promote the continuous development of the China-Madagascar comprehensive strategic cooperative partnership.

    R. Ravalomanana, for his part, noted that relations between the two countries are based on mutual benefit and common gain, the heads of the two states maintain close exchanges, setting the vector for the development of Madagascar-Chinese relations.

    The Senate of Madagascar, he said, is willing to work with the Chinese side to strengthen exchanges between legislative bodies and play an active role in promoting cooperation in areas such as economics, trade, investment and interregional relations.

    Wang Huning stated that China and Madagascar are companions and true friends on the path of modernization. According to him, China hopes to work with Madagascar to implement the important consensus reached by the heads of state of the two countries, achieving new results of practical cooperation for the benefit of the peoples of the two countries.

    Wang Huning assured that the CPPCC National Committee is willing to strengthen friendly exchanges with the Senate of Madagascar and promote the development of China-Madagascar comprehensive strategic cooperative partnership.

    R. Ravalomanana, in turn, stated that Madagascar pays special attention to the development of relations with China, admires China’s achievements in the field of development, intends to learn from China’s experience and promote bilateral cooperation in various fields for the benefit of the peoples of both countries.

    The Senate of Madagascar is ready to intensify the exchange of experience in public administration with the CPPCC National Committee to promote the in-depth development of interstate relations, R. Ravalomanana added. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI USA News: Joint Statement on Framework for United States-Indonesia Agreement on Reciprocal Trade

    Source: US Whitehouse

    Today, the United States of America (the United States) and the Republic of Indonesia (Indonesia) agreed to a Framework for negotiating an Agreement on Reciprocal Trade to strengthen our bilateral economic relationship, which will provide both countries’ exporters unprecedented access to each other’s markets.  The Agreement on Reciprocal Trade will build upon our longstanding economic relationship, including the U.S.-Indonesia Trade and Investment Framework Agreement, signed on July 16, 1996.

    Key terms of the Agreement on Reciprocal Trade between the United States and Indonesia will include:

    • Indonesia will eliminate approximately 99 percent of tariff barriers for a full range of U.S. industrial and U.S. food and agricultural products exported to Indonesia.
    • The United States will reduce to 19 percent the reciprocal tariffs, as set forth in Executive Order 14257 of April 2, 2025, on originating goods of Indonesia, and may also identify certain commodities that are not naturally available or domestically produced in the United States for a further reduction in the reciprocal tariff rate.
    • The United States and Indonesia will negotiate facilitative rules of origin that ensure that the benefits of the agreement accrue primarily to the United States and Indonesia.
    • The United States and Indonesia will work together to address Indonesia’s non-tariff barriers that affect bilateral trade and investment in priority areas, including exempting U.S. companies and originating goods from local content requirements; accepting vehicles built to U.S. federal motor vehicle safety and emissions standards; accepting FDA certificates and prior marketing authorizations for medical devices and pharmaceuticals; removing certain labeling requirements; exempting U.S. exports of cosmetics, medical devices, and other manufactured goods from certain requirements; taking steps to resolve many long-standing intellectual property issues identified in USTR’s Special 301 Report; and addressing U.S. concerns with conformity assessment procedures.  Indonesia will work to address barriers for U.S. exports, including through the removal of import restrictions or licensing requirements on U.S. remanufactured goods or their parts; the elimination of pre-shipment inspection or verification requirements on imports of U.S. goods; and the adoption and implementation of good regulatory practices.
    • The United States and Indonesia have also committed to address and prevent barriers to U.S. food and agricultural products in the Indonesian market, including exempting U.S. food and agricultural products from all import licensing regimes, including commodity balance requirements; ensuring transparency and fairness with respect to geographical indications; providing permanent Fresh Food of Plant Origin (FFPO) designation for all applicable U.S. plant products; and recognizing U.S. regulatory oversight, including listing of all U.S. meat, poultry, and dairy facilities and accepting certificates issued by U.S. regulatory authorities. 
    • Indonesia has committed to address barriers impacting digital trade, services, and investment.  Indonesia will provide certainty regarding the ability to transfer personal data out of its territory to the United States.  Indonesia has committed to eliminate existing HTS tariff lines on “intangible products” and suspend related requirements on import declarations; to support a permanent moratorium on customs duties on electronic transmissions at the WTO immediately and without conditions; and to take effective actions to implement the Joint Initiative on Services Domestic Regulation, including submitting its revised Specific Commitments for certification by the World Trade Organization (WTO).
    • Indonesia commits to join the Global Forum on Steel Excess Capacity and take effective actions to address global excess capacity in the steel sector and its impacts.
    • Indonesia commits to protecting internationally recognized labor rights.  Indonesia will, among other commitments, adopt and implement a prohibition on the importation of goods produced by forced or compulsory labor; amend its labor laws to ensure that workers’ rights to freedom of association and collective bargaining are fully protected; and strengthen enforcement of its labor laws.
    • Indonesia commits to adopt and maintain high levels of environmental protection and to effectively enforce its environmental laws, including by taking measures to improve forest sector governance and combat trade in illegally harvested forest products; encourage a more resource efficient economy; accept and fully implement the WTO Agreement on Fisheries Subsidies; and combat illegal, unreported, and unregulated fishing and illegal wildlife trade.
    • Indonesia will remove restrictions on exports to the United States of industrial commodities, including critical minerals.
    • The United States and Indonesia are committed to strengthening economic and national security cooperation to enhance supply chain resilience and innovation through complementary actions to address unfair trade practices of other countries, and through cooperation on export controls, investment security, and combatting duty evasion.
    • In addition, the United States and Indonesia take note of the following forthcoming commercial deals between U.S. and Indonesian companies:
      • Procurement of aircraft currently valued at 3.2 billion USD.
      • Purchase of agriculture products, including soybeans, soybeans meal, wheat, and cotton with an estimated total value of 4.5 billion USD.
      • Purchases of energy products, including liquefied petroleum gas, crude oil, and gasoline, with an estimated value of 15 billion USD.

    In the coming weeks, the United States and Indonesia will negotiate and finalize the Agreement on Reciprocal Trade, prepare the Agreement for signature, and undertake domestic formalities in advance of the Agreement entering into force.  

    MIL OSI USA News

  • MIL-OSI Canada: Prime Minister Carney meets with premiers to remove barriers and advance major projects

    Source: Government of Canada – Prime Minister

    Today, the Prime Minister, Mark Carney, met with provincial and territorial premiers in Huntsville, Ontario.

    The Prime Minister updated the premiers on trade negotiations with the United States. He emphasized that the federal government remains focused on getting the best deal for Canadians. First Ministers are united on this. The Prime Minister also underscored recent federal measures to restrict and reduce steel imports into Canada, protect Canadian steel workers, catalyze domestic steel production, and prioritize the procurement of Canadian steel in government projects.

    First Ministers discussed their ongoing work to get major projects built across the country, strengthening Canada’s economic resilience. To that end, the Prime Minister shared that the Major Federal Projects Office and the Indigenous Advisory Council will be operational by Labour Day – acting as the point of contact for governments, proponents, and communities to submit their proposals. The Prime Minister will continue meeting with key stakeholders over the coming weeks to ensure big projects are built in full partnership with First Nations, Inuit, and Métis, and to build one Canadian economy.

    First Ministers also discussed the wildfire situation across Canada, and the Prime Minister emphasized the federal government’s readiness to mobilize additional resources to protect and support Canadians.

    MIL OSI Canada News

  • MIL-OSI USA: Supporting Water Infrastructure Security and Resilience

    Source: US State of New York

    overnor Kathy Hochul today announced a key milestone to safeguard New York’s water infrastructure by developing nation-leading cybersecurity regulations for water and wastewater systems alongside a new cyber grant program and technical assistance to bolster the security and resilience of water and wastewater systems. Following a collaborative multi-agency development process directed by her 2025 State of the State, the New York State Department of Health (DOH) and New York State Department of Environmental Conservation (DEC) released proposed cyber regulations for water and wastewater systems for public comment. In coordination, the Department of Public Service (DPS) also released proposed cyber regulations across water-works corporations, other public utilities, and cable television companies for public comment. The Environmental Facilities Corporation (EFC) is also establishing a new cyber grant program and technical assistance for the water and wastewater systems sector. These threat-informed, risk-centric, and cost-balanced minimum standards and accompanying funding and technical assistance will strengthen the cybersecurity posture of water utilities and protect them from increasingly sophisticated and dangerous cyber attacks.

    “Cyber attacks on critical infrastructure can have devastating impacts on communities, and we must act now to defend our water and wastewater systems with the same urgency and rigor we bring to other critical sectors,” Governor Hochul said. “These new regulations and grant programs reflect our commitment to protecting public health and safety while helping under-resourced entities modernize for a digital age.”

    The agencies worked together to closely align definitions and provisions within each agency’s regulatory and operational requirements, worked to minimize duplicative or conflicting requirements, and streamlined processes. They also aligned regulations with guidance issued by the U.S. Environmental Protection Agency and the Cybersecurity and Infrastructure Security Agency for securing information technology and operational technology environments.

    Regulated water and wastewater systems will be required to evaluate risks, deploy cybersecurity controls, and implement network monitoring and logging for the largest systems. Regulated entities will also be required to develop and maintain response and recovery plans to support continuity of operations in the event of cyber attacks and to report cybersecurity incidents.

    Governor Hochul secured another $500 million for clean water infrastructure in this year’s budget, bringing the state’s total investment to $6 billion since 2017. In addition to these investments, $2.5 million in the FY26 Budget funds a new cyber grant program, Strengthening Essential Cybersecurity for Utilities and Resiliency Enhancements (SECURE), dedicated to the water and wastewater sector. This new grant program will provide competitive grants to support cybersecurity risk assessments and hardening efforts focused on and aligned with the new proposed regulatory requirements. The grant opportunities assist water systems by providing them with the needed resources to strengthen their cybersecurity posture, enhance resiliency, and ensure reliable delivery of clean water for New Yorkers.

    Governor Hochul is again expanding the Community Assistance Teams to provide free, expert guidance and tools to help water systems implement cybersecurity best practices in a way that is cost-effective and sustainable. Communities can continue to request a one-on-one consultation with the Teams about their water infrastructure needs, now including cybersecurity. A new Cybersecurity Hub is now available on the EFC’S website to help communities immediately start fortifying their systems. The hub provides training opportunities, recommended actions, and additional resources. This hub will be regularly updated. Communities can continue to request consultations about their water infrastructure needs on the EFC’s website.

    The public release by DOH, DEC, and PSC of the proposed regulations marks the latest step in strengthening the reliability and resilience of New York’s water and wastewater systems. DEC will accept public comments until September 3, 2025; DOH until September 14, 2025; and PSC until September 14, 2025. Once adopted, regulated entities will have until January 1, 2027 to comply with DEC and DOH regulations focused on operational technology and until January 1, 2026 to comply with PSC regulations focused on information technology.

    New York State Chief Cyber Officer Colin Ahern said, “As cyber threats to infrastructure continue to rise, these regulations will help water and wastewater system operators better defend against attacks that could disrupt service, threaten public health, or damage trust. We look forward to reviewing public feedback received by all three agencies before finalizing the regulations to support increased resilience and reliability for New York’s water and wastewater systems.”

    New York State Environmental Facilities Corporation President and CEO Maureen A. Coleman said, “In today’s digital world, we must defend our water and wastewater utilities from cyber attacks that cost money, time, and valuable resources – and can potentially halt water services and threaten public health and the environment. That’s why we’re helping local water systems strengthen their cybersecurity while keeping costs down for communities and ratepayers. Governor Hochul’s initiative reflects New York’s leadership in both cybersecurity and environmental protection, and I’m proud that we are taking swift action to protect our communities.”

    New York State Department of Environmental Conservation Commissioner Amanda Lefton said, “Thanks to Governor Hochul’s leadership, DEC is proactively enhancing cybersecurity across our wastewater systems to safeguard our environment, public health, and our nation leading investments in this critical infrastructure. DEC is committed to partnering with state agencies and local governments to protect the communities that rely on these essential services every day from cybersecurity threats.”

    New York State Public Service Commission Chair Rory M. Christian said, “Cybersecurity threats to critical infrastructure are growing in number, intensity, and sophistication. One area of concern is Information Technology (IT). IT systems are utilized across all entities regulated by the Commission and a breach of IT cybersecurity can result in the dissemination of private customer data as well as substantial financial losses to companies. Protection of ratepayers and consumers from cybercriminals is a key reason to pursue stringent IT security for all regulated entities that interact with the public, including gas, electric, telecom, steam, and water providers.”

    New York State Division of Homeland Security and Emergency Services Commissioner Jackie Bray said, “As we move further into the digital age, it’s essential we remain laser-focused on strengthening the cyber security of critical infrastructure. Thanks to the leadership of Governor Hochul, the release of these new regulations and grants not only help ensure the security and resilience of water systems in New York, but are charting a path for the rest of the nation to follow.”

    New York State Chief Information Officer and Director of the Office of Information Technology Services Dru Rai said, “If we are committed to having the strongest and most robust cybersecurity protections possible, it will take all of us working together in pursuit of that goal. Thanks to Governor Hochul’s exemplary leadership and establishment of the Joint Security Operations Center, New York is already doing more than ever before to defend state agencies and local governments from a wide array of dangerous cyber threats. However, it is critical that we also provide the resources necessary to fully safeguard New York’s water infrastructure and protect the health and safety of our residents in the communities in which they live. I applaud today’s announcement and thank our partners in government for their good work.”

    New York State Police Superintendent Steven G. James said, “Cyber attacks and the need to continuously implement cyber security measures continues to increase across several entities. The new regulations and grant program are imperative for the evaluation of cyber security threats against our water infrastructure and provide the necessary resources to address them head-on. I thank Governor Hochul for her support and collaborative approach to identify, confront, and contain the cyber threats we face in New York State.”

    New York State Health Commissioner Dr. James McDonald said, “Protecting public health starts with ensuring the safety and reliability of the systems that deliver clean water to New Yorkers. These first-in-the-nation cybersecurity regulations, along with new funding to strengthen and modernize our infrastructure, reflect Governor Hochul’s commitment to preparing for evolving threats and ensuring our water systems can recover quickly and continue serving communities safely.”

    The new grant program and proposed regulations for the water and wastewater systems sector is the latest step taken by Governor Hochul to strengthen cyber defenses statewide and ensure the resiliency of New York’s critical infrastructure. Under Governor Hochul’s leadership, New York has led the nation in developing smart and effective cybersecurity policy — including establishing nation-leading financial sector regulations, signing landmark legislation to protect New York’s energy grid from cyber threats, strengthening cybersecurity across New York’s municipalities, implementing first-in-the-nation hospital cybersecurity minimum standards, and issuing the first-ever Statewide Cybersecurity Strategy.

    Senator Chuck Schumer said, “We must do all we can to protect our vital water infrastructure assets, like dams and drinking water, from cyber attack. That is why I’m pleased that new cybersecurity regulations for New York’s water and wastewater systems and a new grant program will help our communities meet federal standards and build a safer, more resilient New York. When it comes to fighting off cyberattacks, we must work arm-in-arm with state and local governments to prevent future hacks. I’m grateful for Governor Hochul’s partnership in identifying where we are vulnerable and ramping up our joint security efforts.”

    Senator Kirsten Gillibrand said, “Protecting our nation’s water systems against cyber attacks is a vital component of our national security, but the sector has long struggled to implement necessary cybersecurity protections. I am grateful that these new regulations and grants will drive necessary change in this sector and help defend our state from crippling attacks targeting essential services. I remain committed to ensuring New York is ready to defend itself against cyber threats and will continue to fight to deliver the resources our state needs to protect our critical infrastructure.”

    Assemblymember Steve Otis said, “Increasing cybersecurity protection for our critical infrastructure has been a major priority of Governor Hochul and the Legislature. Through the Governor’s release of the NYS Cybersecurity Strategy in 2023 and the passage of legislation and budgetary support, we are improving our defenses against the always evolving threats. The release of draft regulations for water and wastewater operators is the vital next step to protect the health, safety, and security of all New Yorkers. As a longtime supporter of New York’s nation-leading water infrastructure funding and as an advocate for robust cybersecurity protections, I am very appreciative of the Governor’s efforts here and the great work of New York’s environmental, health, and cybersecurity agencies.”

    These initiatives underline the Governor’s commitment to build a safer and more resilient New York, including online. Over the last three years, Governor Hochul has made foundational investments in New York’s cybersecurity by establishing the NYS Joint Security Operations Center (JSOC), standing up the statewide cybersecurity shared services program for counties and municipalities, and expanding the state’s law enforcement cyber capabilities by growing the Computer Crimes Unit, Cyber Analysis Unit, and Internet Crimes Against Children Center at the New York State Police.

    MIL OSI USA News

  • MIL-OSI Security: Indianapolis CPA Sentenced for Participation in Illegal Tax Shelter

    Source: United States Attorneys General 1

    Defendant Helped Clients in Mississippi and Elsewhere File Returns Claiming False Business Deductions

    An Indiana CPA was sentenced yesterday to three years in prison for assisting in the preparation of false tax returns on behalf of clients who participated in an illegal tax shelter.

    The following is according to court documents and statements made in court: between 2013 and 2022, Jason L. Crace prepared income tax returns for clients that claimed millions of dollars in false deductions for so-called “royalty payments.”  However, as Crace knew, these “royalty payments” were merely circular flows of money designed to give the appearance of genuine business expenses. Typically, a client would send money to bank accounts controlled by scheme promoters who then sent the money — minus a fee — back to a different bank account controlled by the client. In this way, tax shelter participants retained control of the money they transferred, while falsely deducting the transfers as business expenses on their tax returns. One of the scheme’s promoters, Stephen T. Mellinger III, previously pleaded guilty and was sentenced to eight years in prison for his role promoting the scheme.

    In total, Crace’s preparation of false tax returns claiming fraudulent “royalty” deductions caused a loss to the IRS of more than $2.5 million.

    In addition to his prison sentence, the court sentenced Crace to serve one year of supervised release and to pay restitution of $2,532,936.

    Acting Deputy Assistant Attorney General Karen E. Kelly of the Justice Department’s Tax Division and Acting U.S. Attorney Patrick Lemon for the Southern District of Mississippi made the announcement.

    IRS Criminal Investigation is investigating the case.

    Trial Attorneys Richard J. Hagerman, William M. Montague, and Matthew C. Hicks of the Justice Department’s Tax Division and Assistant U.S. Attorney Charles W. Kirkham for the Southern District of Mississippi are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: CaaStle Founder Charged in $300 Million Fraud Scheme

    Source: US FBI

    United States Attorney for the Southern District of New York, Jay Clayton, and Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), Christopher G. Raia, announced today the unsealing of an Indictment charging CHRISTINE HUNSICKER with wire fraud, securities fraud, money laundering, making false statements to a financial institution, and aggravated identity theft.  The charges in the Indictment arise from an alleged scheme by the defendant to defraud investors in the fashion technology business CaaStle and a related venture out of more than $300 million through false statements, misleading claims, and fabricated documents.  HUNSICKER self-surrendered this morning and will be presented this afternoon before U.S. Magistrate Judge Jennifer E. Willis.  The case has been assigned to U.S. District Judge J. Paul Oetken. 

    “As alleged, Christine Hunsicker defrauded investors of hundreds of millions of dollars through document forgery, fabricated audits, and material misrepresentations about her company’s financial condition,” said U.S. Attorney Jay Clayton.  “The promise of pre-IPO technology companies can be fertile ground for fraudsters who play on investor euphoria.  Investors should be aware of these incentives and that pre-IPO companies are not subject to the rigors of SEC registration.  This Office is committed to protecting investors who place their trust and capital in emerging companies.  We will continue to work closely with our law enforcement partners to investigate, detect, and prosecute those individuals who abuse our markets and our investors”

     “Christine Hunsicker allegedly submitted fraudulent financial statements to swindle investors and banks of more than $300 million,” said FBI Assistant Director in Charge Christopher G. Raia.  “This alleged scheme was stitched together with repeated deception and misinformation, ultimately betraying the trust of the defendant’s clients.  The FBI remains committed to apprehending any business owners who implement unlawful practices to increase their personal wealth.”

    As alleged in the Indictment:[1]

    HUNSICKER, a well-known entrepreneur and successful businessperson in the fashion-tech industry, founded and was the chief executive officer of CaaStle, a clothing technology business.  While promoting CaaStle as a rapidly growing business valued at more than $1.4 billion, HUNSICKER knew that CaaStle was in financial distress with limited cash and significant expenses.  To raise the capital for CaaStle’s operations, HUNSICKER provided investors with falsified income statements, fake audited financial statements, fictitious bank records, and sham corporate documents that grossly overstated CaaStle’s operating profit, revenue, and available cash. She also misrepresented to investors that their funds would be used to purchase discounted shares from existing shareholders who needed liquidity, when in fact she fabricated the existence of those shareholders and used the money as new capital for CaaStle while concealing the company’s cash needs.  In total, HUNSICKER fraudulently induced more than $275 million in investments.

    When confronted by an audit firm in October 2023 about transmitting a fake audit to an investor, HUNSICKER lied, falsely claiming that she had created the fake audit in connection with a lecture she gave at Princeton University, and that sending the audit to the investor had been a one-time error. In reality, HUNSICKER had provided two fake audits to the investor while soliciting an investment. She later repaid that investor to prevent the public disclosure of her fraud. Undeterred, she continued the scheme, providing an investor with fake bank account screenshots showing nearly $200 million in available cash when CaaStle had less than $200,000. One month later, in October 2024, HUNSICKER provided a different investor with a fake draft audit. In 2024, HUNSICKER also falsified the signature of a Board director to make it appear that the Board had authorized the grant of stock options to another investor, raising more than $20 million for CaaStle. Around the same time, HUNSICKER extended her fraudulent activities to a new business venture, P180, using false information about CaaStle’s success to raise approximately $30 million for P180. HUNSICKER also submitted false information about CaaStle to a bank in order to obtain and keep a $20 million personal loan.

    Even after the CaaStle Board removed HUNSICKER as Chair and prohibited her from soliciting investments, she continued her fraudulent activities and attempted to raise new capital. In early 2025, she sold $8 million of her CaaStle shares and more than $5 million in P180 convertible notes without disclosing material information to investors. In February 2025, HUNSICKER attempted to sell an additional $19 million of her CaaStle shares to another investor. HUNSICKER persisted in her deceptive practices even after law enforcement agents seized her electronic devices in March 2025, continuing to meet with the investor about a fake audit without revealing its fraudulent nature, her removal from the Board, or the prohibition against her selling shares. CaaStle filed for Chapter 7 bankruptcy on June 20, 2025.

    *               *                *

    HUNSICKER, 48, of Lafayette, New Jersey, is charged with one count of wire fraud, two counts of securities fraud, and one count of money laundering, each of which carries a maximum sentence of 20 years in prison.  HUNSICKER is also charged with one count of making false statements to a financial institution, which carries a maximum sentence of 30 years in prison, and aggravated identity theft, which carries a mandatory sentence of two years in prison.       

    The maximum potential sentences are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge. 

    Mr. Clayton praised the outstanding work of the FBI. Mr. Clayton also expressed appreciation for the assistance of the U.S. Securities and Exchange Commission, which separately initiated civil proceedings against the defendant today.

    The case is being handled by the Office’s Securities and Commodities Fraud Task Force.  Assistant U.S. Attorneys Marguerite Colson and Alexandra Rothman are in charge of the prosecution.


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment and the descriptions of the Indictment set forth herein constitute only allegations, and every fact described should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Canada: Alberta asks for realistic immigration policies: Minister Schow

    Source: Government of Canada regional news (2)

    MIL OSI Canada News

  • MIL-OSI USA: SBA Offers Disaster Relief to Indiana Small Businesses, Private Nonprofits and Residents Affected by Flooding

    Source: United States Small Business Administration

    ATLANTA–The U.S. Small Business Administration (SBA) announced the availability of low interest federal disaster loans for Indiana small businesses, private nonprofits, and residents affected by the flooding occurring June 28-July 2, 2025. The SBA issued a disaster declaration in response to a request received from Gov. Mike Braun on July 11, 2025.

    The disaster declaration covers the counties of Daviess, Dubois, Greene, Knox, Martin and Pike which are eligible for both Physical Damage Loans and Economic Injury Disaster Loans (EIDLs) from the SBA.  

    Small businesses and private nonprofits are eligible to apply for business physical disaster loans and may borrow up to $2 million to repair or replace disaster-damaged or destroyed real estate, machinery and equipment, inventory, and other business assets.  

    Homeowners and renters are eligible to apply for home and personal property loans and may borrow up to $100,000 to replace or repair personal property, such as clothing, furniture, cars, and appliances. Homeowners may apply for up to $500,000 to replace or repair their primary residence.  

    Applicants may also be eligible for a loan increase of up to 20% of their physical damage, as verified by the SBA, for mitigation purposes. Eligible mitigation improvements include strengthening structures to protect against high wind damage, upgrading to wind rated garage doors, and installing a safe room or storm shelter to help protect property and occupants from future damage.  

    “One distinct advantage of SBA’s disaster loan program is the opportunity to fund upgrades reducing the risk of future storm damage,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “I encourage businesses and homeowners to work with contractors and mitigation professionals to improve their storm readiness while taking advantage of SBA’s mitigation loans.”

    SBA’s EIDL program is available to small businesses, small agricultural cooperatives and private nonprofit (PNP) organizations with financial losses directly related to the disaster. The SBA is unable to provide disaster loans to agricultural producers, farmers, or ranchers, except for small aquaculture enterprises.

    EIDLs are for working capital needs caused by the disaster and are available even if the business did not suffer any physical damage. They may be used to pay fixed debts, payroll, accounts payable, and other bills not paid due to the disaster.

    Interest rates are as low as 4% for small businesses, 3.625% for PNPs, and 2.813% for homeowners and renters, with terms up to 30 years. Interest does not begin to accrue, and payments are not due, until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms, based on each applicant’s financial condition.

    Beginning, Wednesday, July 23, SBA customer service representatives will be on hand at the Disaster Loan Outreach Center in the county of Daviess to answer questions about SBA’s disaster loan program, explain the application process and help individuals complete their application. Walk-ins are accepted, but you can schedule an in-person appointment in advance at appointment.sba.gov.

    The DLOC hours of operation are listed below:

    Disaster Loan Outreach Center (DLOC)

    Daviess County

    Odon Community Center

    311 Park Street

    Odon, Indiana 47562

    Opening: Wednesday, July 23, 10 a.m. to 5 p.m.

    Hours:  Monday – Friday, 8 a.m. to 5 p.m.

    Saturday, 10 a.m. to 2 p.m.

    Closed: Sunday

    Permanently Closing: July 31 at 4 p.m.

    Disaster survivors should not wait to settle with their insurance company before applying for a disaster loan. If a survivor does not know how much of their loss will be covered by insurance or other sources, SBA can make a low-interest disaster loan for the total loss up to its loan limits, provided the borrower agrees to use insurance proceeds to reduce or repay the loan.

    To apply online, visit sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    The filing deadline to return applications for physical property damage is Sept. 16, 2025. The deadline to return economic injury applications is April 20, 2026.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow or expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov. 

    MIL OSI USA News

  • MIL-OSI USA: Governor Stein Announces 515 New Jobs in Western NC as Manufacturer Selects Graham County

    Source: US State of North Carolina

    Headline: Governor Stein Announces 515 New Jobs in Western NC as Manufacturer Selects Graham County

    Governor Stein Announces 515 New Jobs in Western NC as Manufacturer Selects Graham County
    lsaito

    Raleigh, NC

    Governor Josh Stein announced today that Eco King Solutions, LLC, a new subsidiary of a major manufacturer, plans to create 515 jobs in Graham County. The company will invest $80.5 million in Robbinsville to establish its first North American production facility to produce disposable, biodegradable paper tableware.

    “North Carolina offers global companies a perfect location for expansion into North America,” said Governor Josh Stein. “We welcome Eco King to western North Carolina, where it will find a welcoming business climate, education and workforce programs tailored to its needs, and the full range of competitive advantages that make North Carolina the top state to do business in the country.”

    Eco King Solutions is the wholly owned U.S. subsidiary of Chinese manufacturer Zhejiang Kingsun Eco-pack Co., Ltd, which was founded in 2008 and operates three high-capacity factories in China employing approximately 1,200 people. The company specializes in the production of disposable dishware such as bowls, plates, clamshell containers, and trays used in supermarkets and a wide variety of other food service industries. The company serves a growing customer base in North America, and the project represents a strategic expansion to better serve this market. Establishing the facility in Robbinsville will allow the company to localize production, improve supply chain efficiency, and reduce international shipping costs and production lead times. 

    “We have been impressed by how welcoming Robbinsville, Graham County and North Carolina have been to our company and this important project,” said Ping Zhang, Chairman of Eco King Solutions. “We worked very hard to find the right location for our business to thrive. We know we found it right here due to the excellent workforce, quality of life and friendly business climate. We are excited to be a part of the community, and we are excited for our company to prosper here.”

    “This investment is a success story for manufacturing in western North Carolina, where folks work hard to make great products,” said Commerce Secretary Lee Lilley. “Whether it’s CNBC naming us the top state for business or investments from CEOs around the world, North Carolina continues to be a global destination for great job creation.”

    Although wages will vary depending on the position, the average salary for the new jobs will be $46,707, in line with the average wage in Graham County of $46,628. The new jobs will generate an annual payroll impact in the community of more than $14 million.

    The company’s project in North Carolina will be facilitated, in part, by a Job Development Investment Grant (JDIG) approved by the state’s Economic Investment Committee earlier today. Over the course of the 12-year term of this grant, the project is estimated to grow the state’s economy by more than $743.4 million. Using a formula that takes into account the new tax revenues generated by 300 of the new jobs and the capital investment, the JDIG agreement authorizes the potential reimbursement to the company of up to $2,894,000, spread over 12 years. State payments occur only following performance verification by the departments of Commerce and Revenue that the company has met its incremental job creation and investment targets.

    The project’s projected return on investment of public dollars is 106 percent, meaning for every dollar of potential cost, the state receives $2.06 in state revenue. JDIG projects result in positive net tax revenue to the state treasury, even after taking into consideration the grant’s reimbursement payments to a given company. 

    “A major economic development win like today’s announcement provides proof that Robbinsville and Graham County are great places to do business,” said Senator Kevin Corbin. “We’re proud that Eco King chose us for their first North American factory, and we will do everything we can to help them be successful in western North Carolina.

    “I am very excited for Robbinsville,” said Representative Karl E. Gillespie. “The company will be establishing its first manufacturing facility in North America in Graham County. It’s another strong example of why North Carolina was recently named the #1 State in the nation to do business. This project is expected to bring new jobs, boost our local economy, and improve the quality of life in our community. Thank you to our local, regional, and state economic development leaders for helping make this project a reality.”

    Partnering with the North Carolina Department of Commerce and the Economic Development Partnership of North Carolina on this project were the North Carolina General Assembly, the North Carolina Community College System, the Commerce Department’s Divisions of Workforce Solutions and Rural Economic Development, Duke Energy, the Town of Robbinsville, Graham County, the Southwestern Commission, and the Mountain West Partnership. 

    Jul 22, 2025

    MIL OSI USA News

  • MIL-OSI Economics: Argentina accepts Agreement on Fisheries Subsidies, five remaining for entry into force

    Source: WTO

    Headline: Argentina accepts Agreement on Fisheries Subsidies, five remaining for entry into force

    DG Okonjo-Iweala said: “I warmly welcome Argentina’s formal acceptance of the WTO Agreement on Fisheries Subsidies. As one of the world’s leading fishing nations and exporters, Argentina’s commitment underscores this Agreement’s importance for protecting marine ecosystems and promoting responsible practices for people’s livelihoods and food security. This milestone brings us closer to the shared goal of curbing harmful fisheries subsidies worldwide: we are only five ratifications away from the Agreement entering into force.”
    Ambassador Lunazzi said: “Today, with the deposit of the instrument of ratification of the Agreement on Fisheries Subsidies, the Argentine Republic is taking an important step. This firm commitment to fairer and freer trade not only strengthens our economy, but also protects the marine resources in the South Atlantic, preserving them for future generations. We look forward to the rapid entry into force of this Agreement, which reflects the collaborative spirit of WTO members and their commitment to the founding principles of the Organization.”
    Formal acceptances from two-thirds of WTO members are required for the Agreement to enter into force — representing 111 members. The list of the 106 WTO members which have deposited their instruments of acceptance with the WTO is available here.
    At the WTO’s 12th Ministerial Conference (MC12) held in Geneva in June 2022, ministers adopted by consensus the Agreement on Fisheries Subsidies, setting new, binding, multilateral rules to curb harmful fisheries subsidies. The Agreement prohibits subsidies for illegal, unreported and unregulated fishing, for fishing overfished stocks, and for fishing on the unregulated high seas.
    Ministers also recognized the needs of developing economies and least-developed countries by establishing a fund to provide technical assistance and capacity-building to help governments that have formally accepted the Agreement to implement the new obligations.
    The Fish Fund launched a Call for Proposals on 6 June, inviting developing economies and LDCs that have ratified the Agreement to submit requests for project grants aimed at helping them implement the Agreement. The WTO Fish Fund portal can be found here.
    WTO members also agreed at MC12 to continue negotiating on remaining fisheries subsidies issues. The objective is to find consensus on additional provisions to further strengthen the disciplines on fisheries subsidies.
    Information for members on how to accept the Protocol of Amendment is available here.

    Share

    MIL OSI Economics

  • MIL-OSI Economics: Argentina accepts Agreement on Fisheries Subsidies, five remaining for entry into force

    Source: WTO

    Headline: Argentina accepts Agreement on Fisheries Subsidies, five remaining for entry into force

    DG Okonjo-Iweala said: “I warmly welcome Argentina’s formal acceptance of the WTO Agreement on Fisheries Subsidies. As one of the world’s leading fishing nations and exporters, Argentina’s commitment underscores this Agreement’s importance for protecting marine ecosystems and promoting responsible practices for people’s livelihoods and food security. This milestone brings us closer to the shared goal of curbing harmful fisheries subsidies worldwide: we are only five ratifications away from the Agreement entering into force.”
    Ambassador Lunazzi said: “Today, with the deposit of the instrument of ratification of the Agreement on Fisheries Subsidies, the Argentine Republic is taking an important step. This firm commitment to fairer and freer trade not only strengthens our economy, but also protects the marine resources in the South Atlantic, preserving them for future generations. We look forward to the rapid entry into force of this Agreement, which reflects the collaborative spirit of WTO members and their commitment to the founding principles of the Organization.”
    Formal acceptances from two-thirds of WTO members are required for the Agreement to enter into force — representing 111 members. The list of the 106 WTO members which have deposited their instruments of acceptance with the WTO is available here.
    At the WTO’s 12th Ministerial Conference (MC12) held in Geneva in June 2022, ministers adopted by consensus the Agreement on Fisheries Subsidies, setting new, binding, multilateral rules to curb harmful fisheries subsidies. The Agreement prohibits subsidies for illegal, unreported and unregulated fishing, for fishing overfished stocks, and for fishing on the unregulated high seas.
    Ministers also recognized the needs of developing economies and least-developed countries by establishing a fund to provide technical assistance and capacity-building to help governments that have formally accepted the Agreement to implement the new obligations.
    The Fish Fund launched a Call for Proposals on 6 June, inviting developing economies and LDCs that have ratified the Agreement to submit requests for project grants aimed at helping them implement the Agreement. The WTO Fish Fund portal can be found here.
    WTO members also agreed at MC12 to continue negotiating on remaining fisheries subsidies issues. The objective is to find consensus on additional provisions to further strengthen the disciplines on fisheries subsidies.
    Information for members on how to accept the Protocol of Amendment is available here.

    Share

    MIL OSI Economics

  • MIL-OSI USA: Budd Joins Young, Colleagues to Urge End to Foreign Free-Riding Burdening American Patients & Calls for IP Negotiator Appointment

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)

    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) joined Senator Todd Young (R-Ind.), and several of his Senate Republicans colleagues, in sending a letter to U.S. Trade Representative Jamieson Greer and Secretary of Commerce Howard Lutnick urging the Trump Administration to use ongoing trade negotiations to eliminate foreign price controls that leave American patients footing the cost for pharmaceutical research and development.

    “We welcome President Trump’s efforts to ensure foreign nations pay their fair share toward the cost of pharmaceutical research and development. For too long, some developed nations have benefited from American-financed innovation by implementing policies that suppress prices and limit spending on new medicines in their own markets,” wrote the senators. “These actions have contributed to American patients bearing a disproportionate share of global pharmaceutical innovation costs. U.S. trade negotiations offer a valuable mechanism to address these unfair practices, which not only burden Americans, but also function as non-tariff barriers to trade.”

    The letter also urges the Administration to designate a senior political official within the Office of the U.S. Trade Representative to lead trade discussions on pharmaceutical pricing in the near term, and to promptly nominate a qualified individual to fill the long-vacant Chief Innovation and Intellectual Property Negotiator role, who would ultimately assume leadership of this effort. Created by Congress in 2015, the position was intended to “address acts, policies, and practices of foreign governments that have a significant adverse impact on the value of United States innovation.”

    “Appointing an experienced Chief Innovation and Intellectual Property Negotiator would send a strong signal to our trading partners that the United States is committed to addressing imbalanced pharmaceutical pricing and ensuring that any commitments secured are effectively implemented and enforced over the long term,” the senators wrote.

    U.S. Senators Thom Tillis (R-N.C.), Tim Scott (R-S.C.), Roger Marshall (R-Kan.), Bill Cassidy (R-La.), Steve Daines (R-Mont.), Cynthia Lummis (R-Wyo.), Ashley Moody (R-Fla.), Chuck Grassley (R-Iowa), Tommy Tuberville (R-Ala.), Roger Wicker (R-Miss.), John Boozman (R-Ark.), Jim Banks (R-Ind.), Jon Husted (R-Ohio), Cindy Hyde-Smith (R-Miss.), Tim Sheehy (R-Mont.), and Lindsey Graham (R-S.C.) also joined in signing the letter.

    Read the full letter text HERE and below:

    Dear Secretary Lutnick and Ambassador Greer,

    We welcome President Trump’s efforts to ensure foreign nations pay their fair share toward the cost of pharmaceutical research and development. For too long, some developed nations have benefited from American-financed innovation by implementing policies that suppress prices and limit spending on new medicines in their own markets. These actions have contributed to American patients bearing a disproportionate share of global pharmaceutical innovation costs. U.S. trade negotiations offer a valuable mechanism to address these unfair practices, which not only burden Americans, but also function as non-tariff barriers to trade.

    Executive Order 14297, issued on May 12, directed the U.S. Department of Commerce (Commerce) and the U.S. Trade Representative (USTR) to pursue the removal of policies and practices abroad that have “the effect of forcing American patients to pay for a disproportionate amount of global pharmaceutical research and development, including by suppressing the price of pharmaceutical products below fair market value in foreign countries.” Consistent with this directive, it is important that Commerce and USTR engage with U.S. trading partners to negotiate binding commitments to remove these market-distorting price controls.

    Currently, dozens of countries—including those with longstanding pricing policies affecting U.S. pharmaceutical products—have expressed interest or are currently undergoing tariff negotiations. Now is the time for Commerce and USTR to clarify top priorities, capitalize on opportunities, and resolve unfair foreign government policies in support of American workers and patients.

    Given the complexity of the issues and their importance to the American public, we urge the Administration to immediately designate a senior political official at USTR to lead the effort to secure and enforce pharmaceutical pricing commitments through trade negotiations and also to promptly nominate a qualified individual to fill the vacant position of Chief Innovation and Intellectual Property Negotiator. Congress created this important position in 2015 to “address acts, policies, and practices of foreign governments that have a significant adverse impact on the value of United States innovation.” Once filled, we recommend this role—supported by a team within USTR—be charged with leading this effort.

    Appointing an experienced Chief Innovation and Intellectual Property Negotiator would send a strong signal to our trading partners that the United States is committed to addressing imbalanced pharmaceutical pricing and ensuring that any commitments secured are effectively implemented and enforced over the long term.

    We look forward to working with you as you confront these longstanding and unfair price controls that leave Americans disproportionately funding global health care innovation. Eliminating these egregious practices could increase investment in medical research and development by billions of dollars and lower overall health care costs for Americans. In addition, encouraging foreign governments to appropriately value medicines developed and produced in the United States would significantly bolster U.S. exports and jobs. We appreciate your continued attention to this issue and stand ready to support efforts that promote fair and sustainable trade outcomes.

    Sincerely,

    /X/

    MIL OSI USA News

  • MIL-OSI USA: Budd Joins Young, Colleagues to Urge End to Foreign Free-Riding Burdening American Patients & Calls for IP Negotiator Appointment

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)

    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) joined Senator Todd Young (R-Ind.), and several of his Senate Republicans colleagues, in sending a letter to U.S. Trade Representative Jamieson Greer and Secretary of Commerce Howard Lutnick urging the Trump Administration to use ongoing trade negotiations to eliminate foreign price controls that leave American patients footing the cost for pharmaceutical research and development.

    “We welcome President Trump’s efforts to ensure foreign nations pay their fair share toward the cost of pharmaceutical research and development. For too long, some developed nations have benefited from American-financed innovation by implementing policies that suppress prices and limit spending on new medicines in their own markets,” wrote the senators. “These actions have contributed to American patients bearing a disproportionate share of global pharmaceutical innovation costs. U.S. trade negotiations offer a valuable mechanism to address these unfair practices, which not only burden Americans, but also function as non-tariff barriers to trade.”

    The letter also urges the Administration to designate a senior political official within the Office of the U.S. Trade Representative to lead trade discussions on pharmaceutical pricing in the near term, and to promptly nominate a qualified individual to fill the long-vacant Chief Innovation and Intellectual Property Negotiator role, who would ultimately assume leadership of this effort. Created by Congress in 2015, the position was intended to “address acts, policies, and practices of foreign governments that have a significant adverse impact on the value of United States innovation.”

    “Appointing an experienced Chief Innovation and Intellectual Property Negotiator would send a strong signal to our trading partners that the United States is committed to addressing imbalanced pharmaceutical pricing and ensuring that any commitments secured are effectively implemented and enforced over the long term,” the senators wrote.

    U.S. Senators Thom Tillis (R-N.C.), Tim Scott (R-S.C.), Roger Marshall (R-Kan.), Bill Cassidy (R-La.), Steve Daines (R-Mont.), Cynthia Lummis (R-Wyo.), Ashley Moody (R-Fla.), Chuck Grassley (R-Iowa), Tommy Tuberville (R-Ala.), Roger Wicker (R-Miss.), John Boozman (R-Ark.), Jim Banks (R-Ind.), Jon Husted (R-Ohio), Cindy Hyde-Smith (R-Miss.), Tim Sheehy (R-Mont.), and Lindsey Graham (R-S.C.) also joined in signing the letter.

    Read the full letter text HERE and below:

    Dear Secretary Lutnick and Ambassador Greer,

    We welcome President Trump’s efforts to ensure foreign nations pay their fair share toward the cost of pharmaceutical research and development. For too long, some developed nations have benefited from American-financed innovation by implementing policies that suppress prices and limit spending on new medicines in their own markets. These actions have contributed to American patients bearing a disproportionate share of global pharmaceutical innovation costs. U.S. trade negotiations offer a valuable mechanism to address these unfair practices, which not only burden Americans, but also function as non-tariff barriers to trade.

    Executive Order 14297, issued on May 12, directed the U.S. Department of Commerce (Commerce) and the U.S. Trade Representative (USTR) to pursue the removal of policies and practices abroad that have “the effect of forcing American patients to pay for a disproportionate amount of global pharmaceutical research and development, including by suppressing the price of pharmaceutical products below fair market value in foreign countries.” Consistent with this directive, it is important that Commerce and USTR engage with U.S. trading partners to negotiate binding commitments to remove these market-distorting price controls.

    Currently, dozens of countries—including those with longstanding pricing policies affecting U.S. pharmaceutical products—have expressed interest or are currently undergoing tariff negotiations. Now is the time for Commerce and USTR to clarify top priorities, capitalize on opportunities, and resolve unfair foreign government policies in support of American workers and patients.

    Given the complexity of the issues and their importance to the American public, we urge the Administration to immediately designate a senior political official at USTR to lead the effort to secure and enforce pharmaceutical pricing commitments through trade negotiations and also to promptly nominate a qualified individual to fill the vacant position of Chief Innovation and Intellectual Property Negotiator. Congress created this important position in 2015 to “address acts, policies, and practices of foreign governments that have a significant adverse impact on the value of United States innovation.” Once filled, we recommend this role—supported by a team within USTR—be charged with leading this effort.

    Appointing an experienced Chief Innovation and Intellectual Property Negotiator would send a strong signal to our trading partners that the United States is committed to addressing imbalanced pharmaceutical pricing and ensuring that any commitments secured are effectively implemented and enforced over the long term.

    We look forward to working with you as you confront these longstanding and unfair price controls that leave Americans disproportionately funding global health care innovation. Eliminating these egregious practices could increase investment in medical research and development by billions of dollars and lower overall health care costs for Americans. In addition, encouraging foreign governments to appropriately value medicines developed and produced in the United States would significantly bolster U.S. exports and jobs. We appreciate your continued attention to this issue and stand ready to support efforts that promote fair and sustainable trade outcomes.

    Sincerely,

    /X/

    MIL OSI USA News

  • MIL-OSI Canada: Premier signs trade agreements with Ontario, Manitoba, Yukon

    Source: Government of Canada regional news

    British Columbia shoppers will have more choice, while workers and professionals will have greater freedom to move between provinces after the signing of three internal trade agreements at the Council of the Federation.

    Premier David Eby signed separate agreements with Ontario Premier Doug Ford, Manitoba Premier Wab Kinew and Yukon Premier Mike Pemberton. All have agreed to continue working to remove trade barriers between provinces and territories.

    “At a time when we’re facing an unprecedented attack on our economy, it’s more important than ever that we work together to remove trade barriers between provinces,” Premier Eby said. “With these trade agreements, we’re making it easier to buy and sell our great Canadian products to our fellow Canadian neighbours. This is another important step towards building a stronger economy here at home — one that’s less reliant on the U.S and works better for people.”

    The agreement with Ontario makes it easier for people in regulated trades and professions to work in either province. The two provinces also agreed to work on a framework for a direct-to-consumer system for alcoholic beverages, so producers will have easier access to markets, while consumers will get more choice.

    The Manitoba agreement includes measures to increase the mobility of regulated workers and professionals. B.C. will also endeavour to allow alcoholic beverages from Manitoba to be sold directly to B.C. consumers. Manitoba already permits this for B.C.’s alcoholic beverages.

    B.C. and Yukon agreed to collaborate on removing barriers to trade. Both will also align standards for regulated occupations and registration processes. In May, both governments signed a memorandum of understanding to collaborate on the potential of connecting electrical grids.

    The agreements were signed during a gathering of all 13 provincial and territorial premiers at the Council of the Federation meeting in Huntsville, Ont.

    Topics discussed at the council’s summer meeting, which was hosted by Premier Ford, included health, public safety, energy security, labour mobility, immigration, Canada-U.S. relations, sovereignty and national security, emergency management, and energy security, as well as international and internal trade.

    When signing the agreements, Premier Eby presented B.C.-themed gifts to his fellow premiers, including a signed B.C. Lions football jersey for Premier Kinew.

    Quotes:

    Doug Ford, Premier of Ontario –

    “With President Trump’s ongoing threats to our economy, there’s never been a more important time to boost internal trade to build a more competitive, resilient and self-reliant economy. By signing these MOUs and working together, we’re helping Canada unlock up to $200 billion in economic potential and standing shoulder to shoulder to protect Canadian workers across the country.”

    Wab Kinew, Premier of Manitoba –

    “These agreements reflect Manitoba’s ongoing efforts to build a stronger, more unified Canadian economy, one where goods, services and workers can move more freely between provinces, while maintaining the highest standards for health and safety. By working with partners across the nation, we are unlocking opportunities for people and businesses and building up this country we all love so much.” 

    Mike Pemberton, Premier of Yukon –

    “The Yukon and British Columbia already have a strong track record of working together from exploring the potential to connect our electrical grids to aligning standards across key sectors. This new internal trade agreement reinforces that collaboration and sets the stage for reducing barriers for regulated workers and professionals, so it’s easier for people to live, work, and do business across both jurisdictions.”

    MIL OSI Canada News

  • MIL-OSI USA: Chairman Aguilar: Republicans spent the last six months putting more money in billionaires’ pockets and cutting health care

    Source: US House of Representatives – Democratic Caucus

    The following text contains opinion that is not, or not necessarily, that of MIL-OSI – July 22, 2025

    WASHINGTON, D.C. — Today, House Democratic Caucus Chair Pete Aguilar, Vice Chair Ted Lieu and DCCC Chair Suzan DelBene held a press conference on Trump and Republicans’ One Big Ugly Law raising health care costs while sinking Republican chances of holding on to the House. 

    CHAIRMAN AGUILAR: Good morning. Grateful to be joined today by DCCC Chair, Suzan DelBene and the Vice Chair, Ted Lieu. At the DCCC today, we had a productive Caucus meeting across the street. Donald Trump promised to lower costs on day one. We’re six months into this Trump Administration, and prices are rising because of reckless tariffs, inflation is still too high and now health care costs are going to skyrocket. For the 24 million Americans who rely on the Affordable Care Act, health insurance will go up by as much as 75 percent. And these price hikes don’t even include the tax credits that Republicans are going to let expire, so even more Americans are going to see higher costs and could lose their health care coverage. Democrats have been warning about the dangers of the Republican cuts to Medicaid leading to higher prices for everyone. The American people were told that Donald Trump and Republicans were going to turn the economy around and prioritize families. But that couldn’t be further from the truth: they’ve spent the last six months putting more money in billionaires’ pockets and cutting health care. But they did make private jets tax deductible, so there’s that. They’re even shielding Jeffrey Epstein and his associates—including the President of the United States—from accountability, despite promising for years to release the files that implicate those involved. At a time when family budgets are stretched thin, Republicans are only prioritizing the needs of billionaires. It’s not just bad policy that will make the economy worse, it’s a slap in the face to working people who voted to bring down costs. Now, I’ll introduce Vice Chair Ted Lieu.

    VICE CHAIR LIEU: Thank you, Chairman Aguilar. This morning, I went on this interesting website called HouseRepublicanPriceHike.com. And if you go on that website, you can see the increases in grocery prices starting from the beginning of this year. Beef prices, for example, are at an all-time high. Donald Trump promised that he was going to lower inflation on day one. He lied. Inflation has continuously increased. The most recent report has inflation increasing above expectations to 2.7 percent. Core CPI increased even more to 2.9 percent. And what are Congressional Republicans doing? Nothing. In fact, it’s even worse than that. They are actually ending this week early because they’re afraid to cast votes on the Jeffrey Epstein issue.

    The Rules Committee is not meeting because they’re afraid to cast votes to release the Epstein files. So you’ve got this Epstein issue affecting Congressional operations and making sure that the Congressional Republicans don’t work on trying to lower costs. So this is an epic cover-up, right? This is a cover-up of epic proportions, where you’ve got the majority party literally having us leave Congress early, and not having the Rules Committee meet, because they don’t want to deal with releasing the Epstein files. We should release the Epstein files. It is what Donald Trump campaigned on. It’s what Attorney General Pam Bondi talked about this February when she said that Epstein’s client list was, ‘sitting on my desk right now.’ Why don’t we have that client list? And these are the questions the American people keep asking, and the story is not going to go away. Because at its core, this is an issue about underage women who were sexually abused and assaulted. Attorney General Pam Bondi should not be protecting Jeffrey Epstein’s legacy, nor his clients, nor should Congressional Republicans be doing the same. With that, it is my honor to introduce our amazing field general for the DCCC, Congresswoman Suzan DelBene. She’s done a fantastic job, and she’s going to discuss what we talked about this morning. 

    DCCC CHAIR DELBENE: Thanks Vice Chair Lieu and Chairman Aguilar. Good morning, everyone. This morning, in Caucus, we presented how we’re holding House Republicans accountable for their disastrous agenda and our path to retake the majority. We hear over and over and over again from people back home that the top issue for them is affordability and lowering costs—lowering costs for everyday goods. By all accounts, Republicans have failed miserably in the time that they’ve had the trifecta. Prices are still rising, whether it’s housing, health insurance premiums or everyday things like food and groceries. Republicans broke their promise to lower costs. Their Big Ugly Law is just another broken promise. It rips coverage away from millions of people and will raise health care bills for everyone, regardless of what kind of insurance that they have, and it takes food off the table from hungry families and children. It guts funding for rural hospitals and increases ER wait times. Energy bills will go up for families across the country. Republicans did all of this to pay for tax breaks for the wealthiest few. Their agenda is cruel, it’s extreme and an absolute disaster, and the American people agree. 

    In poll after poll, we see that the Republicans’ bill is massively unpopular. The more people learn about it, the more they oppose it. The one lie Republicans keep telling themselves is that voters won’t punish them in the midterms because the American people won’t feel the pain of the cuts until after the election. Aside from the fact that this is exactly the kind of insincere political gamesmanship the public hates, it’s also not true. In a matter of months, millions of people will see their health insurance costs go up by an average of 75 percent—rural hospitals are already announcing they’ll close down and cut services. So no matter how many legislative games that Republicans try to play, there’s no hiding from the facts—the Big Ugly Law will have devastating consequences that will absolutely be felt by working families. 

    Republicans are poised to lose the majority next year, and they know it. You can tell by the way they’re behaving. They avoid in-person town halls because they’re afraid to face the public when they have to talk about their Big Ugly Bill. House Republicans are headed for the exits. We already have three vulnerable Republicans decide to retire or not run for re-election because they know they’re not going to take the majority. And we know there are more with one foot out the door, who may soon announce that they won’t seek re-election. So in these last six months, Republicans have broken promise after promise, feeding into a larger narrative that reminds everyone that they don’t work for the American people—they work for the elite, the powerful and the billionaires. It’s a theme we hear on the ground day after day, and if House Republicans would take the time to listen to their constituents back home, instead of only working and waiting for Donald Trump to tell them what to do, they would know. But instead, they blindly follow his orders that are hurting our economy and hitting the American families in their pocketbooks, and that’s why they’ll lose the majority.

    House Democrats will hold every single vulnerable Republican accountable for their betrayal against their communities when they supported the Big Ugly Bill. We have the better message, we have stronger candidates and public sentiment is on our side. And next year, we’ll have the gavels. Thank you and I’ll turn it back to the Chairman.

    Video of the full press conference and Q&A can be viewed here.


    ###

    MIL OSI USA News

  • MIL-OSI: Dreamland Limited Announces Pricing of Initial Public Offering

    Source: GlobeNewswire (MIL-OSI)

    HONG KONG, July 22, 2025 (GLOBE NEWSWIRE) — Dreamland Limited (the “Company” or “Dreamland”), a Hong Kong-based event management service provider, today announced the pricing of its initial public offering (the “Offering”) of 2,000,000 Class A ordinary shares, 1,340,000 of which are being offered by the Company and 660,000 by an existing shareholder (the “Selling Shareholder”), at a public offering price of US$4.00 per Class A ordinary share. The Company is also filing a resale prospectus concurrent with the Offering for the resale of 5,416,740 Class A ordinary shares held by Prime Crest Holdings Limited, Fuji Holdings Limited, Yield Rights Group Limited and Allied Target Limited (the “Resale Shareholders”). The Class A ordinary shares have been approved for listing on the Nasdaq Capital Market and are expected to commence trading on July 23, 2025 under the ticker symbol “TDIC.”

    The Company expects to receive aggregate gross proceeds of US$8,000,000 from the Offering, before deducting underwriting discounts and other related expenses. The Company will not receive any proceeds from the sale of Class A ordinary shares offered by the Selling Shareholder or Resale Shareholders in the Offering. The Offering is expected to close on or about July 24, 2025, subject to the satisfaction of customary closing conditions.

    Net proceeds from the Offering due to the Company will be used for: (i) acquiring multi-territorial IP licenses; (ii) setting up the Company’s own ticketing platform; (iii) possible strategic acquisitions; (iv) expanding the Company’s marketing department and financing and administration department; (v) upgrading the Company’s enterprise resource planning system; (vi) repaying loans made by a director in connection with the payment of costs and expenses in connection with the Offering and obtaining a listing of the Company’s Class A ordinary shares on the Nasdaq Capital Market; and (vii) working capital and other corporate purposes.

    The Offering is being conducted on a firm commitment basis. Bancroft Capital, LLC is acting as the lead managing underwriter for the Offering (the “Underwriters”). Nelson Mullins Riley & Scarborough LLP is acting as U.S. counsel to the Underwriters, led by W. David Mannheim, Kathryn Simons and Ashley Wu, in connection with the Offering.

    A registration statement on Form F-1 relating to the Offering was filed with the U.S. Securities and Exchange Commission (the “SEC”) (File No.: 333-286471), as amended, and was declared effective by the SEC on June 30, 2025. The Offering is being made only by means of a prospectus, forming a part of the registration statement. Copies of the final prospectus relating to the Offering, when available, may be obtained from Bancroft Capital, LLC by email at investmentbanking@bancroft4vets.com, by standard mail to 501 Office Center Drive, Suite 130, Fort Washington, PA 19034, or by telephone at +1 (484) 546-8000. In addition, copies of the final prospectus relating to the Offering, when available, may be obtained via the SEC’s website at www.sec.gov.

    Before you invest, you should read the prospectus and other documents the Company has filed or will file with the SEC for more information about the Company and the Offering. This press release does not constitute an offer to sell, or the solicitation of an offer to buy any of the Company’s securities, nor shall such securities be offered or sold in the United States absent registration or an applicable exemption from registration, nor shall there be any offer, solicitation or sale of any of the Company’s securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of such state or jurisdiction.

    About Dreamland Limited

    Dreamland Limited is a Hong Kong-based event management service provider. The Company specializes in organizing, planning, promoting and managing themed touring walk-through experience events for intellectual property owners of characters in well-publicized animated cartoons and/or live action theatrical motion pictures. For more information, please visit the Company’s website: http://www.trendicint.com.

    Forward-Looking Statements

    Certain statements in this announcement are forward-looking statements, including, but not limited to, the Company’s proposed Offering. These forward-looking statements involve known and unknown risks and uncertainties and are based on the Company’s current expectations and projections about future events that the Company believes may affect its financial condition, results of operations, business strategy and financial needs, including the expectation that the proposed Offering will be successfully completed. Investors can find many (but not all) of these statements by the use of words such as “believe”, “plan”, “expect”, “intend”, “should”, “seek”, “estimate”, “will”, “aim” and “anticipate” or other similar expressions in the prospectus. The Company undertakes no obligation to update or revise publicly any forward-looking statements to reflect subsequent occurring events or circumstances, or changes in its expectations, except as may be required by law. Although the Company believes that the expectations expressed in these forward-looking statements are reasonable, it cannot assure you that such expectations will turn out to be correct, and the Company cautions investors that actual results may differ materially from the anticipated results and encourages investors to review other factors that may affect its future results in the Company’s registration statement and other filings with the SEC.

    For more information, please contact:

    Dreamland Limited
    Ms. Seto Wai Yue
    Email: frances.seto@trendicint.com

    The MIL Network

  • MIL-OSI USA: Donalds Fights For Hardworking Floridians: Leads Bicameral Effort To Deliver Much-Needed Flood Insurance Tax Relief

    Source: United States House of Representatives – Representative Byron Donalds (R-FL)

    WASHINGTON – Congressman Byron Donalds (R-FL) has announced the reintroduction of legislation to provide much-needed tax relief for National Flood Insurance Program (NFIP) and private insurance policyholders across Southwest Florida, the Sunshine State, and the nation.

    H.R. 4494 – “The Flood Insurance Relief Act” is the 18th piece of legislation proposed by Congressman Donalds during the 119th Congress. Specifically, this bill combats the rising cost of flood insurance by creating a non-refundable tax deduction for flood insurance premiums.

    Senate Companion bill, S. 2313 – “The Flood Insurance Relief Act” is sponsored by Sen. Rick Scott (R-FL) and co-led by Sen. Ashley Moody (R-FL). Last Congress, the “The Flood Insurance Relief Act” was introduced by Rep. Donalds as H.R. 8102 and by Sen. Rick Scott as S. 4143.

    “For far too long, the rising cost of flood insurance has crushed hardworking Floridians. This is unacceptable, this must change, and this critical issue must be addressed to ensure our economy works for all Americans. The time for action is now, and I’m proud to join Senator Rick Scott in introducing the Flood Insurance Relief Act to provide this overdue relief to policyholders across our Southwest Florida community, the Sunshine State, and the nation,” said Congressman Byron Donalds (R-FL). 

    “Floridians know well that flood insurance can be a crucial but costly asset, and it is unacceptable that many are left struggling to find flood insurance coverage they can afford. Families shouldn’t have to choose between protecting their homes and putting food on the table. I’ve been working on several bills to fix the broken NFIP system and encourage private-sector participation to allow for a more robust, affordable flood insurance market, but we must do more to help families ASAP. My Flood Insurance Relief Act offers a practical way to directly ease the financial burden of flood insurance for families by allowing a tax deduction on their premiums, whether through the NFIP or the private market. I’m glad to have my fellow Floridians Senator Ashley Moody and Congressman Byron Donalds joining me in leading this effort,” said Senator Rick Scott (R-FL).

    “As I travel around the Sunshine State, one thing folks continue to tell me is that they are worried about the rising cost of flood insurance. That is why today, Senator Scott and I are working to ease the financial burden on Florida families by proposing a bill that would create a tax deduction on their flood insurance premiums. The Flood Insurance Relief Act is a critical solution that will directly benefit Floridians, ” said Senator Ashley Moody (R-FL).


    Bill Overview:

    • This bill allows individuals to deduct the cost of qualified flood insurance premiums paid during the year from their taxable income.

    • The deduction applies to premiums, federal policy fees, and surcharges associated with the National Flood Insurance Program and qualifying private flood insurance.

    • This bill limits any individuals who have a gross income (AGI) of more than $200,000 or $400,000 for joint filers from taking this deduction focusing on middle-class families.

    • The deduction applies only to premiums tied to property owned by the taxpayer.


    Bill Background:

    • Flood insurance premiums have been rapidly rising, but are not deductible under federal tax law, despite being a mandatory expense for many homeowners with federally backed mortgages in high-risk flood zones.
    • As we work to restore the economy for all hardworking Americans, providing tax relief for flood insurance premiums helps to alleviate a major financial burden for many Floridians.


    More:

    • Read text of H.R. 4494 – the Donalds “Flood Insurance Relief Act” HERE.
    • See bill profile of H.R. 4494 HERE.
    • Read text of S. 2313 – the Scott “Flood Insurance Relief Act” HERE.
    • See bill profile of S. 2313 HERE.
    • See H.R. 4494 social media graphics BELOW:

    ###

    MIL OSI USA News

  • MIL-OSI USA: Duckworth, Durbin Join Colleagues in Demanding Trump Administration Stops Blocking Funding for After School Programs, K-12 Schools

    US Senate News:

    Source: United States Senator for Illinois Tammy Duckworth

    July 17, 2025

    More than $241 million in federal funding is being withheld from Illinois schools

    [WASHINGTON, D.C.] – U.S. Senator Tammy Duckworth (D-IL) and U.S. Senate Democratic Whip Dick Durbin (D-IL), a member of the Senate Appropriations Committee, joined U.S. Senators Patty Murray (D-WA), Bernie Sanders (I-VT) and Tammy Baldwin (D-WI) in sending a letter to Office of Management and Budget (OMB) Director Russ Vought and Education Secretary Linda McMahon demanding the immediate release of nearly $7 billion in funding for K-12 schools and adult literacy programs across America that the Trump Administration abruptly and indefinitely blocked earlier this month. More than $241 million of the nearly $7 billion in federal funding being withheld is for Illinois schools.

    The Trump Administration’s decision to withhold the funding has sent school districts scrambling to determine how they could fill the significant budget hole and whether they’ll have to lay off teachers or end after school programs in the coming weeks. Some school districts have announced they will have to end after school programs, told parents to prepare backup options and adult literacy programs have already been forced to lay off staff.

    “We are writing to demand an immediate end to the illegal withholding of nearly $7 billion in federal education formula grant funds our states and communities are expecting for the coming school year, which is set to begin in just a few weeks in some communities,” wrote the Senators. “These funds were made available by the bipartisan Full-Year Continuing Appropriations and Extensions Act, 2025, signed into law on March 15, 2025. Yet, instead of supporting the tens of millions of students and adult learners intended to benefit from these investments, the administration has chosen to continue an unprecedented and opaque ‘programmatic review’ of these formula grant funds past the July 1, 2025, date these funds became available for allotment to states.”

    The lawmakers blasted the Trump Administration for its abrupt notice and illegal freeze of the funds, which has sent school districts and programs nationwide scrambling: “We are shocked by the continued lack of respect for states and local schools evidenced by this latest action by the administration.”

    They noted that blocking funding for before and after school programs, as well as summer learning programs, is already hurting families nationwide: “By withholding these funds from states, the Department will impact programs for nearly 1.4 million students served by 10,000 summer and before and afterschool programs around the nation, which the Department’s latest performance report showed supported significant improvements in student attendance, grades, and teacher reports of student engagement in learning. These centers also help working parents by providing a safe and productive place for their children to be after the school day ends and during the summer months. It is beyond comprehension why the administration would want to jeopardize these outcomes.”

    Warning of how denying these funds will cause schools to lay off teachers and cut back on teacher training, the Senators wrote: “This rash decision will only worsen school working conditions and teacher shortages.”

    The lawmakers also detailed how the move affects adult learners nationwide: “This pause could jeopardize services to more than 1.2 million adult learners working to develop foundational literacy and numeracy skills needed to enter and succeed in workforce training and health, financial, digital, and information literacy skills necessary for full participation in community and civic life. The withholding will have an even more significant impact on 12 states that rely on these funds for 70 to 75 percent of their adult education programs.”

    The Trump Administration has confirmed it is blocking funding for the following programs—all of which are programs President Trump has requested to eliminate in his budget request, raising serious concerns about this Administration’s intentions to simply impound the funding:

    1. Supporting Effective Instruction State Grants (Title II-A), which support professional development and other activities to improve the effectiveness of teachers and school leaders, including reducing class size.
    2. 21st Century Community Learning Centers (Title IV-B), which support high-quality before and after school programs focused on providing academic enrichment opportunities for students.
    3. Student Support and Academic Enrichment Grants (Title IV-A), which provide flexible funding for school districts for a wide range of activities including supporting STEM education, accelerated learning courses, college and career counseling, school-based mental health services and improving school technology, among many others.
    4. English Language Acquisition (Title III-A), which supports language instruction to help English language learners become proficient in English.
    5. Migrant Education (Title I-C), which supports the educational needs of migratory children, including children of migrant and seasonal farmworkers.
    6. Adult Basic and Literacy Education State Grants (including Integrated English Literacy and Civics Education State Grants), which support adult education and literacy programs to provide the basic skills to help prepare adults and out-of-school youth for success in the workforce.

    In addition to Durbin, Duckworth, Murray, Sanders and Baldwin, the letter was also signed by U.S. Senators Chuck Schumer (D-NY), Mazie Hirono (D-HI), Cory Booker (D-NJ), Lisa Blunt Rochester (D-DE), Jack Reed (D-RI), Richard Blumenthal (D-CT), John Fetterman (D-PA), Chris Coons (D-DE), Ron Wyden (D-OR), Jeanne Shaheen (D-NH), John Hickenlooper (D-CO), Martin Heinrich (D-NM), Chris Van Hollen (D-MD), Andy Kim (D-NJ), Maggie Hassan (D-NH), Ed Markey (D-MA), Elissa Slotkin (D-MI), Brian Schatz (D-HI), Alex Padilla (D-CA), Tina Smith (D-MN), Sheldon Whitehouse (D-RI), Elizabeth Warren (D-MA), Tim Kaine (D-VA), Maria Cantwell (D-WA), Gary Peters (D-MI), Angela Alsobrooks (D-MD) and Jeff Merkley (D-OR).

    Full text of the letter is available HERE.

    -30-

    MIL OSI USA News

  • MIL-OSI United Nations: Programme Management Officer, P-4

    Source: UNISDR Disaster Risk Reduction

    Apply here

    Org. Setting and Reporting

    Created in December 1999, the United Nations Office for Disaster Risk Reduction (UNDRR) is the designated focal point in the United Nations system for the coordination of efforts to reduce disasters and to ensure synergies among the disaster reduction activities of the United Nations and regional organizations and activities in both developed and less developed countries. Led by the United Nations Special Representative of the Secretary-General for Disaster Risk Reduction (SRSG), UNDRR has over 140 staff located in its headquarters in Geneva, Switzerland, and in regional offices. Specifically, UNDRR guides, monitors, analyses and reports on progress in the implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030, supports regional and national implementation of the Framework and catalyzes action and increases global awareness to reduce disaster risk working with UN Member States and a broad range of partners and stakeholders, including civil society, the private sector, parliamentarians and the science and technology community.

    This position is located in the UNDRR Office in Bonn, Germany. The Programme Officer will report to the Head of the UNDRR Bonn Office under the overall guidance of the Chief, Risk Knowledge, Monitoring and Capacity-Development Branch.

    Responsibilities

    Within delegated authority, the incumbent will be responsible for the following duties: – 

    • Develops, implements and evaluates assigned systems programmes/projects of significant importance for the Department; monitors and analyses programme/project development and implementation; reviews relevant documents and reports; identifies problems and issues to be addressed and initiates corrective actions; liaises with relevant parties; ensures follow-up actions. In particular, oversees and supports the management and updating of the online monitoring system to track progress in the implementation of the Sendai Framework for Disaster Risk Reduction. Tracks and monitors project progress against plan, requirements, quality measures, standard processes; liaises with users on all aspects and during all phases.
    • Provides expert advice on complex systems analysis and design; identifies the need for new systems (or modifications to existing systems) or responds to requests from users; develops plans for feasibility assessment, requirements specification, design, development and implementation, including project plans, schedules, time and cost estimates, metrics and performance measures. –
    • Provides expert advice and coordinates the roll-out of the Disaster Tracking System in all Member States, liaising with the concerned regional offices. Keeps abreast of developments in the field and determines the need for testing and evaluating new products and technologies. –
    • Leads and coordinates the official reporting on Sendai Framework and SDGs, among others, and organizes and prepares written outputs, e.g. draft background papers, analysis, sections of reports and studies, inputs to publications, technical reports, including advance analytics using AI-based tools.
    • Develops, implements and monitors application of standards and guidelines. Oversees the preparation of technical and user documentation for systems; prepares training materials and detailed technical presentations including technical guidelines to support the reporting against the indicators to assess progress towards the targets of Sendai Framework, as recommended by the open-ended intergovernmental expert working group on indicators and terminology. Works in close collaboration with the UNDRR Global Education and Training Institute (GETI) in Incheon and contributes to the development of training modules on Sendai Framework Monitoring Process. Collaborates and coordinates closely with UNDRR Regional Offices in support of strengthening the capacity of Member States to use the online Sendai Framework Monitoring system and their ability to report against the indicators. –
    • Provides substantive backstopping to consultative and other meetings, conferences, etc., to include proposing agenda topics, identifying participants, preparation of documents and presentations, etc. –
    • Participates in planning and preparation of the budget, work program and spending plan of the Section and of the Branch. Contributes to activities related to budget funding (programme/project preparation and submissions, progress reports, financial statements, etc.) and prepares related documents/reports (pledging, work programme, programme budget, etc.). Develops cost proposals for contractual services, oversees the technical evaluation of proposals received and manages the contract service. Provides professional leadership and work direction to assigned project team, and/or mentor and supervises the work of new/junior officers, contract staff, etc. – Performs other duties as required.

    Competencies

    Professionalism: Knowledge and understanding of theories, concepts and approaches relevant to particular sector, functional area or other specialized field. Ability to identify issues, analyze and participate in the resolution of issues/problems. Ability to conduct data collection using various methods. Conceptual analytical and evaluative skills to conduct independent research and analysis, including familiarity with and experience in the use of various research sources, including electronic sources on the internet, intranet and other databases. Ability to apply judgment in the context of assignments given, plan own work and manage conflicting priorities. Shows pride in work and in achievements; demonstrates professional competence and mastery of subject matter; is conscientious and efficient in meeting commitments, observing deadlines and achieving results; is motivated by professional rather than personal concerns; shows persistence when faced with difficult problems or challenges; remains calm in stressful situations. Takes responsibility for incorporating gender perspectives and ensuring the equal participation of women and men in all areas of work. Planning & Organizing: Develops clear goals that are consistent with agreed strategies; identifies priority activities and assignments; adjusts priorities as required; allocates appropriate amount of time and resources for completing work; foresees risks and allows for contingencies when planning; monitors and adjusts plans and actions as necessary; uses time efficiently. 

    Accountability: Takes ownership of all responsibilities and honours commitments; delivers outputs for which one has responsibility within prescribed time, cost and quality standards; operates in compliance with organizational regulations and rules; supports subordinates, provides oversight and takes responsibility for delegated assignments; takes personal responsibility for his/her own shortcomings and those of the work unit, where applicable. 

    Client Orientation: Considers all those to whom services are provided to be “clients” and seeks to see things from clients’ point of view; establishes and maintains productive partnerships with clients by gaining their trust and respect; identifies clients’ needs and matches them to appropriate solutions; monitors ongoing developments inside and outside the clients’ environment to keep informed and anticipate problems; keeps clients informed of progress or setbacks in projects; meets timeline for delivery of products or services to client.

    Education

    An advanced university degree (Master’s degree or equivalent degree) in social sciences, management, economics, statistics or a related field is required. A first-level degree in combination with two additional years of qualifying experience may be accepted in lieu of the advanced degree.

    Work experience

    • A minimum of seven years of progressively responsible experience in project planning, implementation and monitoring or a related area is required.
    • Experience in disaster risk assessment and monitoring, and disaster risk reduction is required.
    • Experience in data management and statistics is desirable.

    Languages

    English and French are the working languages of the United Nations Secretariat. For the position advertised, fluency in English is required. Knowledge of French is desirable. Knowledge of another UN official language is desirable.

    Assessment

    Evaluation of qualified candidates may include an assessment exercise which will be followed by a competency-based interview.

    Special notice

    The appointment or assignment and renewal thereof are subject to the availability of the post or funds, budgetary approval or extension of the mandate. At the United Nations, the paramount consideration in the recruitment and employment of staff is the necessity of securing the highest standards of efficiency, competence and integrity, with due regard to geographic diversity. All employment decisions are made on the basis of qualifications and organizational needs. The United Nations is committed to creating a diverse and inclusive environment of mutual respect. The United Nations recruits and employs staff regardless of gender identity, sexual orientation, race, religious, cultural and ethnic backgrounds or disabilities. Reasonable accommodation for applicants with disabilities may be provided to support participation in the recruitment process when requested and indicated in the application. The United Nations Secretariat is committed to achieving 50/50 gender balance and geographical diversity in its staff. Female candidates are strongly encouraged to apply for this position. In line with the overall United Nations policy, the UN Office for Disaster Risk Reduction encourages a positive workplace culture which embraces inclusivity and leverages diversity within its workforce. Measures are applied to enable all staff members to contribute equally and fully to the work and development of the organization, including flexible working arrangements, family-friendly policies and standards of conduct. Individual contractors and consultants who have worked within the UN Secretariat in the last six months, irrespective of the administering entity, are ineligible to apply for professional and higher, temporary or fixed-term positions and their applications will not be considered.

    United Nations Considerations

    According to article 101, paragraph 3, of the Charter of the United Nations, the paramount consideration in the employment of the staff is the necessity of securing the highest standards of efficiency, competence, and integrity. Candidates will not be considered for employment with the United Nations if they have committed violations of international human rights law, violations of international humanitarian law, sexual exploitation, sexual abuse, or sexual harassment, or if there are reasonable grounds to believe that they have been involved in the commission of any of these acts. The term “sexual exploitation” means any actual or attempted abuse of a position of vulnerability, differential power, or trust, for sexual purposes, including, but not limited to, profiting monetarily, socially or politically from the sexual exploitation of another. The term “sexual abuse” means the actual or threatened physical intrusion of a sexual nature, whether by force or under unequal or coercive conditions. The term “sexual harassment” means any unwelcome conduct of a sexual nature that might reasonably be expected or be perceived to cause offence or humiliation, when such conduct interferes with work, is made a condition of employment or creates an intimidating, hostile or offensive work environment, and when the gravity of the conduct warrants the termination of the perpetrator’s working relationship. Candidates who have committed crimes other than minor traffic offences may not be considered for employment. Due regard will be paid to the importance of recruiting the staff on as wide a geographical basis as possible. The United Nations places no restrictions on the eligibility of men and women to participate in any capacity and under conditions of equality in its principal and subsidiary organs. The United Nations Secretariat is a non-smoking environment. Reasonable accommodation may be provided to applicants with disabilities upon request, to support their participation in the recruitment process. The paramount consideration in the appointment, transfer, or promotion of staff shall be the necessity of securing the highest standards of efficiency, competence, and integrity. By accepting an offer of appointment, United Nations staff members are subject to the authority of the Secretary-General and assignment by him or her to any activities or offices of the United Nations in accordance with staff regulation 1.2 (c). In this context, all internationally recruited staff members shall be required to move periodically to discharge new functions within or across duty stations under conditions established by the Secretary-General. Applicants are urged to follow carefully all instructions available in the online recruitment platform, inspira. For more detailed guidance, applicants may refer to the Manual for the Applicant, which can be accessed by clicking on “Manuals” hyper-link on the upper right side of the inspira account-holder homepage. The evaluation of applicants will be conducted on the basis of the information submitted in the application according to the evaluation criteria of the job opening and the applicable internal legislations of the United Nations including the Charter of the United Nations, resolutions of the General Assembly, the Staff Regulations and Rules, administrative issuances and guidelines. Applicants must provide complete and accurate information pertaining to their personal profile and qualifications according to the instructions provided in inspira to be considered for the current job opening. No amendment, addition, deletion, revision or modification shall be made to applications that have been submitted. Candidates under serious consideration for selection will be subject to reference checks to verify the information provided in the application. Job openings advertised on the Careers Portal will be removed at 11:59 p.m. (New York time) on the deadline date.

    No Fee

    THE UNITED NATIONS DOES NOT CHARGE A FEE AT ANY STAGE OF THE RECRUITMENT PROCESS (APPLICATION, INTERVIEW MEETING, PROCESSING, OR TRAINING). THE UNITED NATIONS DOES NOT CONCERN ITSELF WITH INFORMATION ON APPLICANTS’ BANK ACCOUNTS.

    Apply here

    MIL OSI United Nations News

  • MIL-OSI USA: Sens. Hagerty, Tim Scott, Lummis, Moreno Release Market Structure Discussion Draft, Issue Request for Information From Stakeholders

    US Senate News:

    Source: United States Senator for Tennessee Bill Hagerty
    The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support
    WASHINGTON—Today,United States Senator Bill Hagerty (R-TN), a member of the Senate Banking Committee, joined Senators Tim Scott (R-SC), Chairman of the Senate Banking Committee, Cythia Lummis (R-WY), Chairwoman of the Senate Banking Subcommittee on Digital Assets, and Bernie Moreno (R-OH), in releasing an initial discussion draft of digital asset market structure legislation covering issues under the Banking Committee’s jurisdiction. The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support. Along with the discussion draft, the Senators are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions.
    “For too long, outdated laws and regulatory uncertainty around digital asset market structure have hindered American innovation and left consumers without adequate protections,” said Senator Hagerty. “This discussion draft demonstrates a strong commitment to unlocking the full potential of the digital asset economy by delivering responsible legislation that reflects input from stakeholders, fosters innovation, establishes consistent guardrails, and ensures the United States remains a global leader in digital assets.”
    “My colleagues and I in the House and Senate share the same goal: to provide clear rules of the road for digital assets that protect investors, foster innovation, and keep the future of digital finance anchored in America,” said Chairman Scott. “I’m grateful for the hard work of our House counterparts to craft smart, bipartisan legislation, and I look forward to building on their work here in the Senate. Working with President Trump, we can deliver a comprehensive, bipartisan regulatory framework for digital assets.”
    “The time for regulatory uncertainty in the digital asset space has come to an end,” said Senator Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”
    “The GENIUS Act was a critical stride toward ensuring the United States is a leader in Digital Assets,” said Senator Moreno. “This draft represents the next step in putting a bipartisan regulatory framework on President Trump’s desk and I look forward to continuing our important work to encourage innovation, protect consumers, and strengthen national security and US dollar dominance.”
    The discussion draft takes important steps to:
    Define Ancillary Assets – The discussion draft clearly defines an “ancillary asset” to clarify which digital assets are not securities.
    Create Disclosure Requirements – The discussion draft creates disclosure requirements that are tailored for offers, sales, or distributions of ancillary assets.
    Promulgate New Rules – The discussion draft requires the Securities and Exchange Commission (SEC) to promulgate new rules:
    Regulation DA: To exempt certain offers or sales of ancillary assets from SEC registration, including offers of sales that do not exceed $75 million in gross proceeds per year over four years.
    Investment Contracts: To more clearly define what constitutes an investment contract.

    Modernize Securities Regulations – The discussion draft directs the SEC to tailor existing requirements to digital asset activity, so that regulations are no longer outdated, unnecessary, or unduly burdensome in light of the unique technological characteristics of digital assets.
    Prevent Illicit Finance – The discussion draft requires the creation of examination standards for digital assets and encourages private sector entities to partner with federal law enforcement, to detect and deter illicit finance.
    Promote Responsible Banking Innovation – The discussion draft ensures financial holding companies can use a digital asset or distributed ledger system to perform, provide, or deliver any activity, function, product, or service that banks are otherwise authorized by law to perform, provide, or deliver.
    Full text of the discussion draft can be found here.
    In addition to the discussion draft, the Senators are calling on stakeholders to submit their feedback on a wide range of questions around: 
    Regulatory Clarity and Tailoring
    Investor Protection
    Trading Venues and Market Infrastructure
    Custody
    Illicit Finance
    Banking
    Innovation
    Preemption
    To participate in the Request for Information (RFI), please submit your feedback to MarketStructure_RFI@banking.senate.gov.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich, Bennet, Hickenlooper Introduce Legislation to Expand and Improve Access to Clean Water for Tribal Families

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Half of households on Native American reservations lack access to reliable water sources, clean drinking water, or adequate sanitation

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.), along with U.S. Senators Michael Bennet (D-Colo.) and John Hickenlooper (D-Colo.), introduced the Tribal Access to Clean Water Act to dramatically expand access to clean water for Tribal families by investing in water infrastructure. This bill would increase funding through the Indian Health Service, the U.S. Department of Agriculture (USDA), and the Bureau of Reclamation to support water infrastructure projects in Tribal communities and help provide clean water to Native American households that currently lack access.

    “Nearly half of Native American households lack access to clean and reliable water supplies. That is completely unacceptable,” said Heinrich. “By addressing a significant backlog of infrastructure projects and removing barriers to federal programs that provide technical and financial assistance to Tribes, this legislation is an important step toward delivering clean drinking water to all families in Indian Country.”

    “Too many Tribal communities in Colorado and across the country cannot access clean, safe water,” said Bennet. “This legislation builds on our efforts to improve access for Tribes in the Bipartisan Infrastructure Law. It fulfills the federal government’s promise to provide these communities with the clean water they deserve.”

    “Clean drinking water is a basic necessity. Yet, so many of our Tribal communities have been left without the infrastructure. It’s unacceptable,” said Hickenlooper. “Let’s cut red tape and invest in modern resources to finally deliver safe, accessible water to every Tribe.”

    Lack of access to clean drinking water is a significant barrier for many Native American communities. According to data from the U.S. Department of Health and Human Services (HHS), Native American households are 19 times more likely than white households to lack indoor plumbing.

    The Tribal Access to Clean Water Act will:

    • Authorize the USDA to make grants and loans for technical and financial assistance, as well as for construction;
    • Increase funding authorizations for USDA’s Rural Development Community Facilities Grant and Loan Program by $100 million per year for five years, provide $30 million per year specifically for technical assistance, and ensure that Native communities are treated equitably and appropriately when considered for grants and loans;
    • Increase funding authorizations for existing programs of the Indian Health Service for water and sanitation facilities construction over a five-year period, including for community facilities ($2.5 billion), technical assistance ($150 million), and operation and maintenance assistance ($500 million); and
    • Authorize $90 million over five years for the Bureau of Reclamation’s existing Native American Affairs Technical Assistance Program.

    “Water is a sacred resource given to us to protect. It is of the utmost importance that Tribes have access to clean water not only for personal consumption and economic development but also for cultural purposes. Many tribes in the Southwest rely on access to clean water to carry on our culture and traditions. We thank U.S. Senators Martin Heinrich and Michael Bennet for reintroducing the Tribal Access to Clean Water Act,” said Myron Armijo, Santa Ana Pueblo Governor.

    “It is far past time to ensure that Native people have the same level of basic water service most Americans take for granted,” said Manuel Heart, Chairman of the Ute Mountain Ute Tribe. “This bill’s recognition of the need for technical support and operation and maintenance assistance for Tribal water supply facilities is not only essential to realizing the benefit of investment in water infrastructure, but also a critical step toward increasing Tribal independence and governance capabilities.”

    “Some of the starkest examples of the public health impacts from not having clean, running water in the home are right in our backyards,” said Anne Castle, co-founder of the initiative on Universal Access to Clean Water for Tribal Communities. “Higher incidence of respiratory disease, gastrointestinal infections, diabetes, and cancer are all linked to ‘water poverty’ – the lack of access to secure and healthy household water – which is particularly acute for Native American households. With targeted resources and Federal agency coordination, we have the ability to solve this longstanding inequity in Indian country.”

    “For far too long, many indigenous Americans – American Indians, Alaska Natives, and Native Hawaiians – have gone without access to a clean and safe drinking water supply,” said John Echohawk, Executive Director and Co-Founder of the Native American Rights Fund and member of the Pawnee Nation. “These are not isolated or regional deficiencies, but rather a nationwide disparity in access to a basic ingredient of life. This bill will help to address gaps in current support for Tribal drinking water access and help to fulfill the Federal government’s treaty and trust responsibility to Native American Tribes.”

    “Every American is entitled to access to clean drinking water,” said Ken Norton, Chairman of the National Tribal Water Council. “But this undeniable truth simply does not hold for far too many Tribal households. It is well past time to bring the necessary resources to bear that will allow all Tribal families to enjoy the same basic services most Americans take for granted.”

    “Water is a basic human right and this bill fulfills the government’s trust obligation to Tribes and Indigenous communities to ensure all Native populations have access to clean drinking water,” said Garrit Voggesser, Senior Director of Tribal Partnerships and Policy, National Wildlife Federation. “For far too long more than half of the country’s Indigenous peoples haven’t had access to clean drinking water. Water must be accessible to not only support public health, but also meet historical, cultural, ecological, and rights-based needs.”

    Heinrich initially introduced this legislation with Bennet in 2021. He also successfully fought to include funding to improve Tribal access to clean water in the Infrastructure Law. The law included $3.5 billion for the Indian Health Service Sanitation Facilities Construction program to address needs for tribal sanitation facilities and services, $1 billion for the Bureau of Reclamation to support legacy rural water supply projects, which will benefit Tribes, and increased funding for the Environmental Protection Agency’s Clean Water Act and Safe Drinking Water Act State Revolving Funds.

    In addition to Heinrich, Bennet, and Hickenlooper, this bill is co-sponsored by U.S. Senators Bernie Sanders (I-Vt.), Ron Wyden (D-Ore.), Elizabeth Warren (D-Mass.), and Alex Padilla (D-Calif.).

    The text of the bill is available here.

    A summary of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: Schatz, Banks Introduce Bipartisan Bill To Build More Affordable Housing, Address America’s Growing Housing Crisis

    US Senate News:

    Source: United States Senator for Hawaii Brian Schatz

    WASHINGTON – U.S. Senators Brian Schatz (D-Hawai‘i) and Jim Banks (R-Ind.) today introduced the Build More Housing Near Transit Act. The bipartisan legislation continues Senator Schatz’s efforts to address America’s housing shortage by offering federal benefits and encouraging local governments to build more housing near transit-oriented urban and suburban spaces, where options are especially lacking.

    “The clearest way out of our national housing shortage is by building more housing,” said Senator Schatz. “Our bipartisan bill incentivizes cities and towns to build housing when they expand or redevelop their public transit systems. This will help put more families in homes, grow local economies, and cut carbon pollution. It’s a win for everyone.”

    “This bill makes it easier for communities to build homes for working families by cutting red tape and giving them the freedom to create strong, family-friendly neighborhoods near public transit,” said Senator Banks.

    Specifically, the legislation directs the Secretary of Transportation to provide a scoring boost to the competitive grant applications of public transit projects that include regulatory reforms that legalize new housing near stations, including removing expensive parking mandates, streamlining approval for new housing, allowing houses on smaller lots, raising height limits, and other pro-housing policies.

    Currently, 47 percent of renter households are cost-burdened, and lack of housing options in transit-friendly areas is a major contributor to this. In addition, transportation costs are often a household’s second-largest expenditure behind housing, meaning more housing in transit areas would have a two-fold benefit.

    By offering easier access to transit centers, the Build More Housing Near Transit Act will connect more employees with jobs and boost economic output, as well as reduce greenhouse gas emissions through increased public transit ridership. It will also make federal transportation projects more efficient and ensure federal dollars are used most effectively.

    “America is experiencing a severe housing shortage that affects every aspect of American lives and the economy,” said Mike Kingsella, CEO of Up for Growth Action. “The Build More Housing Near Transit Act addresses the critical link between transportation and housing and would create greater access to affordable commutes and abundant housing. We applaud the lead sponsors for introducing this bill, serving as an example of how the federal government can use its leverage to ensure the right types of housing are available in the places people want to live.”

    “For decades, the federal government has funded mass transit projects in cities whose growth control laws do not allow people to live near and ride on transit. The Build More Housing Near Transit Act finally corrects this. It protects transit riders and the federal taxpayer from spending scarce transit capital on projects doomed by rigid zoning regulations to low housing growth and low future ridership, while uplifting projects in localities that welcome housing & transit ridership growth. This bill is the essential first step in restoring bipartisan confidence in America’s mass transit investments for taxpayers and transit riders alike,” said Alex Armlovich, Senior Housing Policy Analyst for the Niskanen Center.

    The full text of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News