Category: Education

  • MIL-OSI Security: CEO of Non-Profit That Provided Mentoring Services to Public School Students Pleads Guilty to Fraudulently Obtaining COVID Benefits

    Source: US FBI

    LOS ANGELES – A South Bay man who provided lifestyle and personal development coaching to students in public schools through a non-profit he founded pleaded guilty today to fraudulently applying for millions of dollars in COVID-19 jobless benefits, including by using stolen identities.

    Reginald Foster Jr., 38, of the Westchester neighborhood of Los Angeles, pleaded guilty to one count of conspiracy to commit mail fraud and bank fraud, and one count of use of unauthorized access devices.

    Foster admitted in court today that, from June 2020 to October 2020, he conspired with others to fraudulently obtain unemployment insurance benefits under the Coronavirus Aid, Relief, and Economic Security Act (CARES Act), a law Congress passed in March 2020 to help individuals and businesses deal with the economic impact of the COVID-19 pandemic.

    Foster exploited the Pandemic Unemployment Assistance (PUA) provision of the CARES Act, which is designed to expand access to unemployment benefits to self-employed workers, independent contractors, and others who would not otherwise have been eligible because of the pandemic. The California Employment Development Department (EDD) administers the state’s unemployment insurance program, which included the PUA provision.

    Foster admitted that he and his co-conspirators filed fraudulent applications for benefits in the names of people who had not authorized him to do so, using the identity-theft victims’ personal identifying information without their permission. Foster included false information on the applications to ensure that EDD would approve the applications and send the debit cards through which the benefits were dispersed to a mailing address he used. In total, Foster and his co-conspirators submitted 118 fraudulent applications as part of the scheme.

    Foster used the debit cards to make transfers to his non-profit, Champs Up! LLC, which Foster has said provides guidance programs to middle school students in Los Angeles and Long Beach. Foster also used the cards to make multiple $1,000 withdrawals at ATMs. He then transferred the cards to co-conspirators, who used them to make further ATM withdrawals. Foster and his co-conspirators were able to withdraw almost $1.5 million of the benefits. EDD and Bank of America froze the remaining benefits as soon as the scheme was uncovered, preventing further losses of more than $4 million.

    United States District Judge Mark C. Scarsi scheduled a March 24, 2025, sentencing hearing, at which time Foster will face a statutory maximum sentence of 30 years in federal prison for the conspiracy count and up to 10 years in federal prison for the unauthorized access devices count.

    Foster remains free on $50,000 bond.

    Co-defendants Shelece Counts, 31, of the Westlake neighborhood of Los Angeles; and Isaiah Herbert Lawrence, 31, of Houston, Texas, have pleaded not guilty to criminal charges in this case and are scheduled to go to trial on January 21, 2025.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.       

    The United States Department of Labor Office of Inspector General, the California Employment Development Department, and Homeland Security Investigations investigated this matter. Substantial assistance was provided by the Department of Homeland Security Office of Inspector General; the United States Secret Service; the FBI; U.S. Customs and Border Protection Special Response Team; and the Los Angeles Unified School District Office of Inspector General.

    Assistant United States Attorney Ranee A. Katzenstein of the Criminal Appeals Section is prosecuting this case.

    On May 17, 2021, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The Task Force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes, and sharing and harnessing information and insights gained from prior enforcement efforts. More information on the Justice Department’s response to the pandemic may be found here.

    Anyone with information about allegations of attempted fraud involving COVID-19 can report it to the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at (866) 720-5721 or via the NCDF online complaint form.

    MIL Security OSI

  • MIL-OSI United Kingdom: New method to evaluate ecological impact of offshore activities A recently published study from the University of Aberdeen has revealed a new approach to evaluating the ecological impacts of offshore activities.

    Source: University of Aberdeen

    New method will evaluate wider disruption caused by offshore wind farm construction

    A recently published study from the University of Aberdeen has revealed a new approach to evaluating the ecological impacts of offshore activities.
    By integrating a dynamic ecosystem model with a comprehensive ecosystem services database the team, which includes researchers from the Plymouth Marine Laboratory, aim to accurately forecast the environmental consequences of fisheries displacement and broader ecosystem-level changes resulting from offshore wind farm development.
    The scientists says that this new methodology will have the ability to support marine spatial planners to balance and minimise conflicts and tensions amongst existing and future planned marine uses of natural resources.
    The proposed methodology also provides an approach to integrating the relative value of Marine Net Gain (i.e a conservation approach that ensures human activities in marine environments result in a measurable net positive impact on biodiversity) interventions in terms of wider Natural Capital Accounting. This will further progress understanding of ecosystem services and market-based approaches which will enable stakeholders to access and compare global studies on the environmental and socio-economic outcomes of offshore wind farm developments.

    In the race to achieve Net Zero, it is essential to ensure that we do not inadvertently create new environmental challenges.” Dr Neda Trifonova

    Dr Neda Trifonova from the University of Aberdeen and lead author of the study said: “The rapid expansion of offshore wind farms is a key component of global decarbonisation efforts. However, in the race to achieve Net Zero, it is essential to ensure that we do not inadvertently create new environmental challenges. Our study presents a methodological roadmap designed to support sustainable and evidence-based marine management and offshore renewable energy policies.
    “Given the dual pressures of climate change and spatial conflicts with existing industries such as fishing, our approach aims to enhance decision-making by balancing environmental and socio-economic trade-offs. We propose the use of dynamic ecosystem modelling to inform a risk assessment framework, supported by a comprehensive ecosystem services database.
    “At the heart of our methodology is supporting a nature-positive approach—a conservation principle that ensures human activities in marine environments result in a measurable net gain for biodiversity and ecosystem services.”
    This project was funded by the Natural Environment Research Council (NERC) and The Crown Estate (TCE), part of the ECOWind Programme, as well as the UK Energy Research Centre. The study is published in BES Ecological Solutions and Evidence.

    MIL OSI United Kingdom

  • MIL-OSI Russia: Archaeologists from China and Uzbekistan were “prompted” to collaborate by the Sogdians who visited China in ancient times

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 23 (Xinhua) — The Fergana-Shanxi Archaeological Center and the Laboratory for the Protection and Restoration of Cultural Monuments were officially opened in Uzbekistan earlier this month. They were founded by the Archaeological Institute of North China’s Shanxi Province, the Shanxi Provincial Museum and Fergana State University.

    The parties agreed to conduct joint archaeological research in the Fergana Valley, train specialists, etc.

    The interest of experts on both sides in establishing cooperation is probably quite justified, given the fact that close contacts between the ancestors of the inhabitants of today’s Shanxi Province and Fergana Region were established in ancient times. In a sense, bilateral cooperation was prescribed more than a thousand years ago.

    From the middle of the 1st millennium BC, the Sogdians inhabited Sogdiana, a historical region between the Amu Darya and Syr Darya rivers in the territory of modern Uzbekistan and Tajikistan. As historical records and archaeological research show, they actively participated in trade on the Great Silk Road.

    Among the Sogdians who established contacts with the Celestial Empire, Yu Hong is one of the most well-studied. The discovery of his tomb in 1999 in Taiyuan, the capital of Shanxi Province, was a sensation in scientific circles.

    Archaeologists were extremely surprised when, during the excavation of a single-chamber brick tomb, a giant sarcophagus made of white marble appeared before them. The monumental coffin with elegant paintings and bas-reliefs has dimensions of 2.17 m, 2.95 m and 2.20 m and weighs more than 10 tons. In shape, it resembles a traditional Chinese wooden building with a “floating” roof.

    According to ancient Chinese rules, sarcophagi made of ordinary stone slabs were available only to members of imperial families. A sarcophagus made of high-quality snow-white marble in a burial has never been found in China before!

    Researchers soon clarified the identity of the deceased based on the epitaph. It turned out that a native of Central Asia was buried there, who bore a Chinese surname and the name Yu Hong.

    Yu Hong’s biography is legendary. He was born in 533 in Sogdiana. Starting from the age of 13, he held high positions in the Rouran Khaganate. Then he was sent on a mission to Persia, Tuyuhun and other states. As a diplomatic representative, Yu Hong visited the state of Northern Qi /550-577/, which included some of today’s northern regions of China, and for one reason or another remained in China until his death at the age of 60.

    Yu Hong held many positions in China, from the commander of the troops, the head of the Liangzhou district to the general. He was also assigned to oversee the affairs of foreign immigrants, said Ji Meijun, deputy director of the Institute for the Preservation of Cultural Heritage of Taiyuan City.

    In the 5th and 6th centuries, a large number of people from the “Western Region” visited Taiyuan and other cities in northern China. Traveling east along the Great Silk Road, they were either engaged in trade or cultural and artistic activities in the Celestial Empire. The numerous material sources they left behind formed brilliant pictures of the exchanges between the East and the West, experts believe.

    Rector of Fergana State University Bakhodirjon Shermukhammadov noted the ancient history of contacts between Central Asia and China at the opening ceremony of the Fergana-Shanxi Archaeological Center.

    The interaction between the two sides clearly demonstrates the modern significance of the Great Silk Road. Fergana State University is trying to serve as an example of Uzbek-Chinese cultural exchanges and cooperation, he added. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: Polytechnic University to Train Top AI and IT Specialists

    Translation. Region: Russian Federal

    Source: Peter the Great St Petersburg Polytechnic University – Peter the Great St Petersburg Polytechnic University –

    The Ministry of Digital Development, Communications and Mass Media of Russia and the Analytical Center under the Government of the Russian Federation have summed up the results of the competitive selection of universities to receive grants to launch higher education programs aimed at training highly qualified specialists in the field of artificial intelligence and information technology. Polytechnic University became the winner of both competitions. The project will be implemented at the Institute of Computer Science and Cybersecurity.

    Two structures will be created in the IKNK.

    Cross-industry educational center for artificial intelligence. Educational center for software and hardware systems for information systems, data storage systems and telecommunications.

    Winning the competition was a natural step in the development of IT education at our university. Now the task is to create an educational environment aimed at developing skills in analyzing large amounts of data, mastering machine learning methods, deeply understanding the capabilities and limitations of artificial intelligence, as well as the ability to assess the ethical implications of using the latest digital solutions. The joint work of the university and our partners in creating specialized centers helps to prepare high-level professionals who are able to successfully cope with modern challenges of the labor market and strengthen Russia’s competitiveness in the global digital environment, said Lyudmila Pankova, Vice-Rector for Educational Activities at SPbPU.

    The project will be implemented jointly with industrial partners from among leading IT companies, including Rostelecom and YADRO.

    Admission to bachelor’s degree programs in AI and IT will start this academic year. Top specialists will be trained within the framework of the national project “Data Economy and Digital Transformation of the State”.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: NSU students win student track of National Technological Olympiad

    Translation. Region: Russian Federal

    Source: Novosibirsk State University – Novosibirsk State University –

    Students had to propose their own solution to a case on creating a water consumption management system in a residential area of a “smart city”, taking into account the elimination of drinking water losses during its transportation to the consumer.

    The Novosibirsk team, consisting of two NSU and two NSTU students, beat students from Tomsk Polytechnic University, Skoltech, Moscow Aviation Institute, Moscow Engineering Physics Institute, Bauman Moscow State Technical University, Higher School of Economics, Innopolis University, and Izhevsk State Technical University named after M.T. Kalashnikov in the final competition.

    Team composition:

    — Daria Kolomnikova, 1st year master’s student Faculty of Mechanics and Mathematics of NSU,

    — Ilya Merzlyakov, 1st year master’s student Faculty of Information Technology NSU,

    — Igor Uchanov, Novosibirsk State Technical University,

    — Maxim Nerlikh, Novosibirsk State Technical University.

    — Our team has been participating in the NTO finals in the Smart City profile for many years, since school days. For many participating teams, this has already become a tradition, so the competition for first place has always been very serious. And now, after several years of winning prizes, we finally achieved our goal and took first place. We experienced a storm of emotions: joy for the victory, sadness that we might not return as participants, respect for our rivals who became our friends, and enormous gratitude to the profile organizers.

    I was especially pleased that the organizers paid attention to the problem of insufficient involvement of female students in the Olympiad movement in the field of IT, and presented me with an award for “courage” to participate not for the first time in an all-male team of six teams, – shared her impressions Daria Kolomnikova.

    The Smart City profile implies the concept of integrating information and communication technologies and the Internet of Things to improve the quality of life and well-being of the city’s population. This is the digitalization of all services, measurement and control of parameters in the city infrastructure, predictive diagnostics and management based on data analytics.

    — Every year, the organizers come up with new tasks related to the automation of the city infrastructure. This year was no exception, and we solved the problem of modeling and automating water consumption and water supply. In the water consumption task, it was important to make a full-fledged service where the user can get all the statistics on consumption, payment and leaks in his apartment. At the same time, the statistics were based on real data obtained from our model. In addition, the smart city concept pays much attention to saving resources and conscious consumption, so it was necessary to implement a limitation of water supply depending on user consumption, — added Daria.

    In this way, the finalists contribute to the construction of the digital city of the future with their projects.

    — The algorithms developed by the finalists in the urban water supply management systems can be modified and scaled for operation in a real urban environment. This will not only allow you to monitor your water consumption in real time, but also significantly save water resources and your own finances, — said Alexander Zarnitsyn, profile developer, senior lecturer in the electronic engineering department of the TPU School of Non-Destructive Testing and Safety.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • White House ‘MAHA’ report calls out food, chemicals impact on children’s health

    Source: Government of India

    Source: Government of India (4)

    A commission led by U.S. Health Secretary Robert F. Kennedy Jr. on Thursday issued a report that said processed food, chemicals, stress and overprescription of medications and vaccines may be factors behind chronic illness in American children.

    The report, from the commission named after the Make America Healthy Again, or MAHA, social movement aligned with Kennedy, is focused on what he says is a national crisis of increasing rates of childhood obesity, diabetes, cancer, mental health disorders, allergies and neurodevelopmental conditions like autism.

    “MAHA is hot,” President Donald Trump said during a press event. “We will not allow our public health system to be captured by the very industries it’s supposed to oversee.”

    Kennedy said there was consensus among the commission’s members to prioritize what he called the ultra-processed food crisis and to work to improve the food American children eat.

    The report also highlighted studies linking health disorders in humans and animals to the weed killers glyphosate and atrazine, but did not call for specific regulatory changes or restrictions on pesticides used in farming. It said the chemicals should be further researched.

    It criticized the U.S. approach to vaccines in children, saying European children are recommended to receive fewer. He called for study of the impact of vaccines on childhood chronic disease and of vaccine injuries.

    Kennedy, a longtime vaccine skeptic, has for many years pushed debunked theories about the safety of vaccines contrary to scientific evidence. As head of the agency, he has overseen cuts of about 20,000 of 80,000 employees due to layoffs and departures.

    Peter Lurie, president of the Center for Science in the Public Interest, a food and health watchdog, said the report recycles longtime concerns of Kennedy, from vaccines to seed oils.

    “To the extent that they come up with good ideas, they’re going to run into the self-inflicted wound of their own decimation of the federal workforce. Many of their better ideas will not be doable,” Lurie said.

    Many of the MAHA activists that surround Kennedy were present in Washington for the release of the report, which they largely applauded as a vindication of their work.

    But, one such activist, Kelly Ryerson, who campaigns against the use of glyphosate-based pesticides, called the report “very cautious on the subject of pesticides,” adding that she’d like to see more Environmental Protection Agency action on the topic.

    Bayer BAYGn.DE, which is involved in thousands of lawsuits surrounding its glyphosate-based herbicide Roundup, said some details around pesticides in the report were not “fact based.”

    “We believe a fact and data-driven approach with robust science that follows international gold standards is necessary to support these important initiatives,” Bayer said.

    As an environmental lawyer, Kennedy was associated with three lawsuits related to Roundup, which is owned by Bayer after its acquisition of Monsanto.

    ULTRAPROCESSED FOOD

    The food industry has said that additives in packaged food have been thoroughly reviewed by regulators and help it remain shelf stable.

    The American Soybean Association was critical of the report, which they said was “drafted entirely behind closed doors” and inaccurately suggests that pesticides and soy oils contribute to negative health outcomes.

    “We’re discouraging people from consuming heart-healthy oils and driving them to instead use fats that will make them less healthy and cost them more in the process,” said ASA Director Alan Meadows, a soybean farmer.

    Marion Nestle, a professor of nutrition at New York University, told Reuters the report was “a devastating critique of what’s happened to America’s children.”

    But she said, “to deal with the root causes of the conditions detailed here, this administration will have to take on Big Food, Big Pharma, Big Agriculture, Big Chemical, and get coal-burning plants to clean up their emissions. A lot of this is counter to the MAGA agenda, and the decimation of federal agencies can’t help.”

    The report called for enhanced surveillance and safety research into drugs and childhood health outcomes and clinical studies comparing whole-food to processed-food diets in children.

    The definition of ultra-processed food is hotly debated, while the report describes it as industrially manufactured products.

    The report says that core products of so-called “Big Food”, which typically references companies such as Kraft Heinz KHC.O, Nestle NESN.S and PepsiCo PEP.O, are ultra-processed.

    Kraft Heinz manufactures Heinz Ketchup and Kraft mac & cheese, Nestle produces frozen pizzas and dinners under the Stouffer’s and Lean Cuisine brands, while PepsiCo owns Frito-Lay, a salty snacks business.

    The report also cites infant formula as an ultra-processed food that is concerning.

    FARM LOBBY PRESSURE

    Thursday’s report will be followed by policy prescriptions due in August. Trump signed an executive order in February establishing the commission whose members include Kennedy, Agriculture Secretary Brooke Rollins, other cabinet members and senior White House officials.

    Before the report’s publication, farm lobby groups had warned that criticizing specific farm practices could impede collaboration on the administration’s health agenda and put food production at risk.

    According to a source familiar with the matter, the lobby groups had strongly pressured the administration to not mention pesticides in the report.

    EPA head Lee Zeldin said on a call with reporters that farmers are key partners in enacting the MAHA agenda and that any changes to pesticide regulations would need careful consideration.

    REUTERS

  • MIL-OSI USA: PHILADELPHIA – Governor Shapiro to Highlight Positive Results of Historic Investments in K-12 Public Education, Importance of Continuing to Deliver for PA Students

    Source: US State of Pennsylvania

    May 23, 2025Philadelphia

    ADVISORY – PHILADELPHIA – Governor Shapiro to Highlight Positive Results of Historic Investments in K-12 Public Education, Importance of Continuing to Deliver for PA Students

    Governor Josh Shapiro will visit A. Philip Randolph Career and Technical High School to meet with students, teachers, and legislators and highlight how the historic funding he secured for public K-12 education is leading to positive results in schools across the Commonwealth. In his first two budgets, Governor Shapiro secured historic investments in our public schools, students, and teachers, delivering the largest increase in K-12 education funding in Pennsylvania history – and schools are now putting those investments to work.

    Governor Shapiro’s 2025-26 budget proposal builds on that foundation by proposing new funding for K-12 public education, with a focus on driving more dollars to the schools that need them most. It also continues our progress to build strong and safe school communities, hire and support our teachers, and expand mental health resources. The Governor’s budget creates more opportunity for our students and builds on our progress to bring vo-tech back into the classroom with a $5.5 million increase for Career and Technical Education (CTE).

    WHO:
    Governor Josh Shapiro
    Acting Secretary Carrie Rowe, Department of Education
    Dr. Tony Watlington, School District of Philadelphia Superintendent
    Arthur Steinberg, AFTPA President

    WHEN:
    Friday, May 23, 2025, at 10:00AM

    WHERE:
    A. Philip Randolph Career and Technical High School
    3101 Henry Avenue,
    Philadelphia, PA 19129

    LIVE STREAM:
    pacast.com/live/gov
    governor.pa.gov/live/

    RSVP:
    Press who are interested in attending must RSVP with the names and phone numbers for each member of their team to ra-gvgovpress@pa.gov.

    MIL OSI USA News

  • MIL-OSI Europe: Press release – Court of Auditors: MEPs back Croatian candidate Ivana Maletić

    Source: European Parliament

    On Thursday, Parliament endorsed Ivana Maletić for a second term as Croatia’s Member of the European Court of Auditors.

    Maletić, whose appointment was endorsed by the Committee on Budgetary Control on 14 May 2025, has been serving on the European Court of Auditors since 2019. Prior to that, she served as an MEP from 2013 to 2019, following a career in Croatia’s Ministry of Finance. Maletić holds a master’s degree in accounting, auditing and finance from the University of Zagreb, and is currently working on a PhD with the University of Rijeka.

    MEPs backed Maletić’s nomination in a secret ballot, by 460 votes in favour and 72 against, and with 59 abstentions.

    Next steps

    The final decision will be taken by EU member states in the Council.

    Background

    As stipulated in the EU Treaty, each member state proposes one candidate to serve on the European Court of Auditors. The Council of the EU, after consulting the European Parliament, adopts the list of members for a six-year term.

    MIL OSI Europe News

  • MIL-OSI United Nations: Experts of the Committee on the Rights of the Child Praise Qatar’s Investments in Child Health and Education, Ask about the Age of Criminal Responsibility and Penalties for Child Offenders

    Source: United Nations – Geneva

    The Committee on the Rights of the Child today concluded its consideration of the fifth and sixth combined periodic reports of Qatar under the Convention on the Rights of the Child, with Committee Experts praising the State’s investments in child health and education, and raising questions about its efforts to raise the minimum age of criminal responsibility and prohibit the imposition of harsh penalties, including the death penalty and flagellation, on child offenders aged 16 years and over.

    Aissatou Alassane Sidikou, Committee Expert and Taskforce Coordinator for Qatar, commended Qatar’s efforts to invest in children’s health and education; implement its national development programme, which promoted sustainable development; establish its Ministry of Social Development and Family; and implement the Committee’s recommendations.

    Ms. Sidikou asked whether Qatar’s draft bill on children’s rights would increase the minimum age of criminal responsibility of children, which was currently one of the lowest in the world at seven years, and prohibit imprisonment, flagellation and forced labour for children, which was currently allowed from 16 years of age.  In Qatar, children could be sentenced to death. What measures were in place to strictly prohibit the application of the death penalty on children?

    Rosaria Correa, Committee Expert and Country Taskforce Member, said that despite the recommendations of various human rights mechanisms, the new nationality law did not allow Qatari women married to foreign citizens to pass on their nationality to their children. What steps had been taken to amend this law and other laws to allow Qatari women to pass on their nationality to their children?

    Introducing the report, Ahmad bin Hassan Al-Hammadi, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, said that, over the reporting period, Qatar had worked to strengthen legislative and institutional measures to protect children’s rights in the fields of education, health, social protection and criminal justice. The Qatar National Vision 2030 and the State’s third national development strategy 2024-2030 included key measures addressing children’s rights, and promoted equality and non-discrimination of children.

    The delegation said Qatar had reduced sentences for cases where perpetrators of crimes were children.  Sanctions for children under 16 years did not include corporal punishment or flagellation.  The draft law on the rights of the child would increase the minimum age of criminal liability and define all persons less than 18 years old as children.  It would be adopted and published soon.

    The delegation also said the death penalty could be imposed on children aged 16 to 18, who were more aware of their actions, but judges could commute the sentence, considering the age of the child when the crime was committed.  No one aged 16 to 18 had been sentenced to death in Qatar.

    The Qatari Nationality Code addressed the issue of kinship, the delegation said.  Children of non-Qatari fathers were given the nationality of their father, but such children also had the ability to access Qatari nationality if they had permanent residence.  The State had made great strides in reducing statelessness.

    In closing remarks, Ms. Sidikou said many efforts had been made by the State for children, but challenges remained.  The Committee hoped that the dialogue would help to improve protections for children in Qatar.

    Mr. Al-Hammadi, in concluding remarks, thanked the Committee and all persons who contributed to the constructive dialogue.  Qatar was committed to cooperating with the Committee and to addressing the challenges and risks it faced concerning the rights of the child.  It had achieved great progress in human rights over the years through cooperation with human rights mechanisms.

    Sophie Kiladze, Committee Chair, said in concluding remarks that the information provided by the State party would help the Committee to assess the achievements made by Qatar and the challenges it faced.  The Committee would do its best to develop concluding observations that would strengthen the rights of children in Qatar to the extent possible.

    The delegation of Qatar consisted of representatives from the Ministry of Foreign Affairs; Ministry of Interior; Ministry of Public Health; Ministry of Social Development and Family; Ministry of Education and Higher Education; Ministry of Justice; Supreme Judiciary Council; Public Prosecution; National Group for Protection of Children from Abuse and Violence; and the Permanent Mission of Qatar to the United Nations Office at Geneva.

    The Committee will issue the concluding observations on the report of Qatar at the end of its ninety-ninth session on 30 May. Those, and other documents relating to the Committee’s work, including reports submitted by States parties, will be available on the session’s webpage.  Summaries of the public meetings of the Committee can be found here, while webcasts of the public meetings can be found here.

    The Committee will next meet in public this afternoon at 3 p.m. to consider the combined fifth to seventh periodic reports of Brazil (CRC/C/BRA/5-7).

    Report

    The Committee has before it the fifth and sixth combined periodic reports of Qatar (CRC/C/QAT/5-6).

    Presentation of Report

    AHMAD BIN HASSAN AL-HAMMADI, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, said that Qatar was firmly and permanently committed to the principles of the Convention. Articles 21 and 22 of the Constitution emphasised the role of the family in protecting children from exploitation and neglect, and supporting their development.  The State had worked to strengthen legislative and institutional measures to protect children’s rights in the fields of education, health, social protection and criminal justice.

    The national report was the result of consultation and cooperation between the various national authorities, civil society and children.  The State had made great efforts to address and implement most of the previous recommendations made by the Committee, contributing to tangible progress in ensuring the rights of children.

    The Qatar National Vision 2030 and the State’s third national development strategy 2024-2030 included key measures addressing human rights issues in various fields, including children’s rights, and promoted equality and non-discrimination of children.  Over the reporting period, there had been extensive legislative amendments regarding the protection and promotion of children’s rights, most notably law 22 of 2021 regulating health care services, which included provisions promoting access to health care for all children, and the anti-cybercrime law, which criminalised sexual exploitation.  A draft law on children’s rights was also currently under review; it established effective mechanisms for the protection and development of children’s capacities and promoted the best interests of the child.

    The Ministry of Social Development and Family, established in 2021, was responsible for following up on childhood issues through specialised departments on family development, community welfare, and social protection.  The Qatar Foundation for Social Work had mechanisms for monitoring, follow-up and reporting on protection measures for child victims of violence, as well as awareness campaigns informing children of their rights and methods of reporting and seeking assistance.  The State had also established the National Planning Council, which was responsible for planning and implementing public policies related to children.  The Council of Ministers approved in April 2025 the establishment of the Digital Safety Committee for Children and Young People, and an awareness campaign on the safe use of technology would also be launched in June 2025.

    Efforts had continued to increase the enrolment rates of children, including children with disabilities, in compulsory education.  The overall enrolment rate was more than 97.5 per cent.  The State was encouraging girls to enrol in scientific disciplines; the percentage of girls in these disciplines had reached about 54 per cent at the secondary level.  New schools had also been established to provide technical and specialised education for both boys and girls.  The national education strategy 2024-2030 focused on improving the quality and inclusiveness of education, ensuring equal opportunities and enhancing governance. Five “peace schools” that received children of various nationalities, especially from countries in crisis, including children with disabilities, had been established.

    In the health sector, the national health strategy 2024-2030 was launched, which aimed to promote children’s health by preventing chronic diseases such as obesity and diabetes, and paying attention to oral health.  The State had established a system of child-friendly hospitals and general paediatric clinics.  The national team for child protection from violence and neglect received approximately 500 cases annually of suspected cases of child abuse and implemented preventive measures in response.  Effective countermeasures adopted during the COVID-19 pandemic contributed to Qatar having one of the lowest child mortality rates globally.

    Qatar’s Labour Code protected children from exploitation, prohibited their employment before reaching the legal age, and regulated the types of work that children could not do.  Moreover, the consumer protection law and the food control law promoted children’s rights as vulnerable consumers, while the Ministries of Health and Commerce were closely monitoring to ensure safe and healthy food for children.  The State had also launched plans to reduce and assess environmental pollution, especially in areas near schools and residential areas.

    The State had also paid attention to building the capacity of professionals working with children, such as judges, teachers, doctors and media professionals, through training programmes on the Convention delivered in cooperation with civil society.  Qatar was also studying the possibility of establishing a national children’s parliament and had established interactive platforms that allowed children to express their opinions and suggestions, especially when discussing policies that directly affected their lives.

    To protect children’s rights, Qatar was cooperating with United Nations agencies, including the United Nations Children’s Fund, which opened an office at the United Nations House in Doha in 2022. It was working to protect children in conflict areas in countries such as Syria, Palestine, Yemen, Somalia, Afghanistan, Russia and Ukraine.  The Qatari Education Above All initiative had reached over 17 million children in more than 65 countries.  Qatar had provided humanitarian assistance, including food and health care, to children in Gaza.

    Qatar was fully committed to the implementation of the Convention and its two Optional Protocols, and the protection of children’s rights.  Achieving this goal required continuous reform efforts through measures that kept pace with emerging changes and challenges.

    Questions by Committee Experts 

    AISSATOU ALASSANE SIDIKOU, Committee Expert and Taskforce Coordinator for Qatar, commended Qatar’s efforts to invest in children’s health and education; implement its national development programme, which promoted sustainable development; establish its Ministry on the Rights of Children and Families; and implement the Committee’s recommendations. Why had the State party maintained its reservations to articles two and 14 of the Convention?  The provisions in article two of the Convention were much broader than those of articles 34 and 35 of the Constitution. 

    Why was there was no schedule for adoption of the draft bill on children’s rights, which had been considered by the State for over 15 years?  Would the bill increase the minimum age of criminal responsibility of children, which was currently at seven years, and prohibit imprisonment, flagellation and forced labour for children, which was currently allowed from 16 years of age?  Did the National Human Rights Commission and the National Planning Council have sufficient resources?  How did they coordinate to protect child rights?

    Qatar’s investments in health and education had increased in 2022 and 2024, but these amounts were still below global standards.  Would this be addressed?  Were funds allocated for children in the budget clearly outlined?  How did the State party ensure that resources were equitably assigned?  A national survey conducted in 2023 contained very little information on vulnerable children. What was being done to strengthen data collection on such children?

    Did migrant children have access to mechanisms to report violations of their rights?  How did the State party support access to remedies for child victims? Were there capacity building and awareness raising mechanisms on child rights for State officials, civil society, the media and the public?  Did the National Human Rights Commission’s monitoring mechanism follow up on the implementation of the Convention and receive complaints on violations of the rights of children, including from migrant children?  How did the State party monitor policies and programmes on children’s rights?  Were there regulations that promoted compliance with international standards on children’s rights in the private sector?

    Girls in Qatar continued to face multiple forms of discrimination due to traditional beliefs.  What actions had been taken to change these negative social norms?  Children with disabilities, children with unmarried or foreign parents, and the children of migrant workers were subject to widespread discrimination.  How did the State party ensure that all children had access to basic social services?  Was there a general law prohibiting all forms of discrimination?

    There were no guidelines for professionals on determining the best interests of the child.  Would these be developed?  How did the State party ensure that this principle was applied consistently in all legal procedures?  In Qatar, children could be sentenced to death.  What measures were in place to strictly prohibit the application of the death penalty on children?  How did the State party facilitate the participation of children in matters affecting them?

    Despite the recommendations of various human rights mechanisms, the new nationality law did not allow Qatari women married to foreign citizens to pass on their nationality to their children. What steps had been taken to amend this law and other laws to allow Qatari women to pass on their nationality to their children?

    ROSARIA CORREA, Committee Expert and Taskforce Member, welcomed that the State party had taken several measures to address corporal punishment.  Had it assessed the impact that these measures had had on society? There was no law prohibiting corporal punishment.  What legislative efforts had been made to prohibit corporal punishment in all settings? Had studies into violent disciplining been carried out?  What measures had schools adopted to protect children?  How many child victims of violence had received remedies?  How was the State party monitoring child protection measures?  Did the draft bill on child rights address the child protection system?  Who was responsible for representing minors in the courts?

    How was the State party combatting the sale and trafficking of children domestically and internationally?  What was preventing the State from developing a law to ban child marriages?  How did the electronic monitoring system for convicted children work and how effective was it?  What social and psychological programmes were in place to protect the rights of children in conflict with the law and prevent their stigmatisation?

    TIMOTHY P.T. EKESA, Committee Expert and Taskforce Member, welcomed the data on children with disabilities that the State party had collected in 2016.  There were concerns that the State party did not provide access to mainstream education to all children with disabilities, as many were enrolled in special schools.  Only a small percentage of schools had inclusive education programmes, and a medical model was used to determine whether children with disabilities were enrolled in special schools.  Many children with disabilities remained out of school due to denial of admission or the inability of their families to pay school fees.  Could the State party provide data on the number of children with disabilities enrolled in mainstream education?

    Responses by the Delegation

    The delegation said its reservations to articles two and 14 of the Convention were consistent with Islamic Sharia and public morals.  The draft law on the rights of the child would increase the minimum age of criminal liability.  It would be adopted and published soon.

    In 2016, a programme was set up to investigate cases of violations of children’s rights and provide protection and remedies to victims.  It dealt with between 500 and 600 cases a year, some 30 per cent of which involved violence and negligence.  The programme included awareness raising campaigns on children’s rights and on reporting mistreatment of children.  A confidential hotline had been set up for reporting violence; it received 300 calls a year, 60 per cent of which came from children.  A register for cases of child abuse had recorded some 3,000 cases in recent years, and the Qatari Care Centre had provided psychological care to more than 4,000 children.  A conference on combatting violence against children held in 2020 in Qatar was attended by around 2,000 people.

    Qatar monitored the impact of business activities on children, guided by the United Nations Guiding Principles on Business and Human Rights.  The National Human Rights Committee monitored child labour but had not registered any cases. A regional conference had been held in Qatar that had called on businesses not to violate children’s rights in digital spaces.

    The Ministry of Social Affairs had signed a memorandum of understanding with the National Human Rights Committee on cooperation on protecting children’s rights.  This Committee was made up of eight representatives of civil society and five Government employees.  It reviewed legislation concerning children, visited schools to assess violations of children’s right to education, and conducted yearly awareness raising campaigns on the Convention.

    Qatari law did not permit marriages for boys under the age of 17 and girls under the age of 16.  Marriages under the age of 18 were permitted by judges only when there were exceptional circumstances.  A committee had been set up to review the Family Code; it was considering revising the legal minimum age of marriage.  It was very rare for families to allow their children to marry before the age of 18.

    Some six per cent of the national budget was allocated to education, and some 25 per cent of the Ministry of Social Affairs’ budget was allocated to programmes for children.  The State party had dispersed several million Qatari riyals for supporting vulnerable children and families.  A new centre for orphans was established in 2024.

    The Ministry of Education promoted gender equality at all stages of education.  Enrolment rates for boys and girls were equal at primary and secondary schools, and literacy rates were over 99 per cent in 2023.  The Ministry had launched awareness raising campaigns on human rights and non-discrimination.  Guidance was provided to teachers on preventing discrimination against children.  Qataris and non-Qataris received the same treatment in State schools and hospitals. Employers provided migrant workers with health insurance.

    The Qatari Nationality Code addressed the issue of kinship.  Children of non-Qatari fathers were given the nationality of their father, but such children also had the ability to access Qatari nationality if they had permanent residence.  The State had made great strides in reducing statelessness.

    Qatar had laws that enabled children to receive remedies such as compensation if they were victims of a crime. Specialised courts for crimes committed by children and cases of violence against children had been established, which could conduct hearings online.  There was also a witness protection programme for children. Courts had an interpretation and translation service that supported foreign children.  The State assigned lawyers to persons who could not afford them.

    All schools had student councils that allowed students to express their views on issues such as the environment, culture and education.  Cultural activities were organised for children.  Each school calculated its carbon footprint.

    Articles 21 and 68 of the Constitution incorporated the Convention into the legal order.  The State party had increased penalties for trafficking in persons when the victim was under 18 and reduced sentences for cases where perpetrators of crimes were children.  Sanctions for children under 16 years did not include corporal punishment, flagellation or the death penalty. 

    Articles permitting corporal punishment were removed from legislation after the adoption of the Convention. Persons, including parents, who used corporal punishment were held criminally liable.  Guidelines had been developed for parents on disciplining children without using corporal punishment and a centre that worked to educate parents on protecting children had been set up.  Corporal punishment in schools was banned in the 1990s. Inspectors conducted visits to schools to ensure that the rights of students were not violated. 

    The Prosecutor’s Office stepped in if there were conflicts of interest between parents and children.  Child psychologists were deployed to determine the best interests of the child.  Children’s confidentiality was protected in courts.

    The Ministry of Education attached great importance to inclusive education.  Curricula were adapted for children with disabilities and protocols had been adopted for children with autism.  There were programmes for vocational training for children with disabilities.

    Questions by Committee Experts

    ROSARIA CORREA, Committee Expert and Country Taskforce Member, said that Qatar had a set of measures to combat violence between children in schools.  Were there response measures and a recording mechanism for such violence? Some 83 per cent of children reportedly suffered from some form of harassment in primary school.

    What measures had been taken to ensure children could grow up in a pollution-free environment and access green spaces?  How did education programmes address climate change?  What impact was climate change having on Qatari children and how was the State working to mitigate its effects?  How was the State party encouraging children’s involvement in designing environmental policies?  How did the State party monitor children’s nutrition?

    How did the State party ensure that parents equally shared responsibilities concerning child-rearing? When parents divorced, the mother lost custody of her children in Qatar.  Were women who were victims of sexual exploitation criminalised in the Criminal Code?

    TIMOTHY P.T. EKESA, Committee Expert and Country Taskforce Member, said the national action plan on the inclusion of children with disabilities in schools had commendable objectives, but there was a lack of clarity on measures being implemented to achieve inclusion. Had the plan, which expired in 2023, been renewed?  Were there provisions in draft legislation on persons with disabilities that prohibited discrimination against children with disabilities in education?  The Committee had previously called on the State party to implement a national action plan on human rights education; had this been done?

    The Committee commended the State party’s high quality and widely accessible health care system and the launch of the national health strategy for 2023-2030.  Would children receive targeted attention under the strategy? There were reports of discrimination in access to health centres for non-Qatari citizens.  What measures were in place to address disparities in access to healthcare?  Qatar had one of the highest rates of adolescent obesity in the region.  How was the State party addressing this?  How was it promoting access to mental health for children and adolescents?

    BENOIT VAN KEIRSBILCK, Committee Expert and Country Taskforce Member, said that Qatar had not ratified the United Nations Educational, Scientific and Cultural Organization Convention against Discrimination in Education.  Why was this?  Why did most Qatari families choose private schools, while non-Qataris typically attended public schools?  What was the State party doing to support education costs?  There were schools that supported children who had dropped out of school; how effective were they?  Was there an official sexual and reproductive health education programme in schools? What was being done to promote access to safe and inclusive spaces for play and recreation?

    The Committee was concerned that Qatar continued to detain migrant children and families.  In which detention centres were migrants placed? Were there plans to revise the policy of detaining migrant children?  Most migrant workers in Qatar were men.  Were there plans to revise family reunification rules to make it more accessible for workers with low wages?  Were there plans to regularise the children of migrants born in Qatar?

    Members of the Al-Ghufran clan had been deprived of their nationality many years ago. How many of these people still did not have Qatari nationality, and were there plans to resolve their situation? How did the State party ensure that migrant children could enrol in schools and how did it investigate complaints issued by domestic workers?  How many girls were working as domestic workers?  What programmes were in place that supported children in street situations? What results had been achieved by the law on trafficking in persons?  What measures had been implemented to prevent and prosecute cases of trafficking in children occurring during the 2022 World Cup?

    Qatar had one of the lowest minimum ages of criminal responsibility in the world, at seven years of age, and many legal protections for child offenders only applied for children under age 16.  How many children up to 18 years old were deprived of liberty and in what settings? Were they mixed with adults?  Were children in detention informed about the National Human Rights Committee’s complaints mechanism?  Did the State party intend to ratify the Safe Schools Declaration?

    Responses by the Delegation

    The delegation said corporal punishment against all persons was prohibited, including punishment of persons with disabilities.  There was no dedicated legislation on domestic violence, but there were legislative measures that covered domestic violence, and a court had been set up that specialised in domestic violence and temporary shelters, mandated to protect women and children who were victims of domestic violence.  In 2024, the State party organised workshops training for around 5,000 people on issues such as protecting children from violence and intimidation.  There were around 40,000 confirmed cases of domestic violence between 2024 and 2025.

    Initiatives had been adopted to minimise the impact of climate change on children, including adaption of infrastructure and measures to reduce carbon emissions and increase the use of renewable energy.  The State party had constructed 18 square kilometres of green zones in 2023 and an additional eight in 2024.  There was also a course within the school curriculum that focused on protecting the environment and living sustainably.  Schools celebrated a “sustainability week”.  Qatar had also taken measures to ensure the provision of good quality water.  It periodically monitored water and air quality in schools, kindergartens and public hospitals. 

    Qatar promoted children’s health through various measures.  Nine free health check-ups were provided to children up to age five.  The State party encouraged exclusive breastfeeding up to six months; there had been a sharp increase in breastfeeding rates over the past decade.  The State party had developed programmes to tackle the child obesity rate, which aimed to reduce this rate by 30 per cent by 2030.  School nutrition clinics provided specialised services to prevent childhood obesity and nutritional problems.  A 2022 law governed universal healthcare coverage.

    Sexual and reproductive health education and education on drug addiction were provided in schools from primary level, and there was also teaching on the protection of children from neglect, and online and sexual exploitation.  Children were instructed on how to find psychological assistance, and on alerting authorities about threats.

    Qatar promoted access to a healthy environment for children with disabilities.  It had beaches that had been adapted to ensure accessibility.  Various projects were being developed for children with disabilities up to 2030.  A single database covering all children with disabilities in the education system had been set up.  Qatar had over 5,300 pupils with disabilities in public and private schools.  Some 62 per cent of schools were inclusive. There were specialised training programmes for children with disabilities that supported them to become autonomous.

    Children with disabilities had access to specialised healthcare through 10 healthcare centres tailored to their needs, including four centres for children with autism.  The third national strategy 2024-2030 included measures for improving rehabilitation and diagnosis services for persons with disabilities. Social workers, family and community members were trained to care for children with disabilities and support their inclusion in society. 

    Qatari legislators sought to recognise children with disabilities as having legal capacity on par with others, and to promote their access to work, education and other rights.  The draft disability code had been developed and was now being deliberated by the Government.  Measures to exempt persons with disabilities from certain Government fees were being developed.  Legislators sought to promote access to complaints mechanisms for children with disabilities and their families.  The State funded legal aid services to support children in court, including children with disabilities.

    The draft child code defined all persons less than 18 years old as children.

    As part of the 2024-2030 development strategy, the State party had visited schools and engaged in dialogue with students, parents and teachers.  “Sustainability ambassadors” who promoted environmental protection were appointed in schools, and young people could contribute to the Shura Council. Many children had taken part in drafting the State party’s report.

    The State party was promoting awareness of human rights for children through social education courses and campaigns in schools, through which children learned about the Convention, gender equality, democracy, acceptance of others, cybersecurity, and preventing bullying.  Media campaigns on children’s rights were carried out and manuals and training programmes had been developed to inform teachers, social workers and other public officials about children’s rights.  The State party organised annual events to mark Children’s Day.

    Qatar was committed to protecting school establishments from attack.  It had signed the Safe Schools Declaration and participated in the Education for All initiative.  Qatar helped organise events on 9 September each year at United Nations offices in New York and Geneva to mark the International Day to Protect Education from Attack.

    Public schools applied international standards, including the international baccalaureate programme. Migrant parents could choose the school that their children attended and the language of instruction.  The State ensured the provision of free schooling to students coming from regions of armed conflict.

    Questions by Committee Experts

    BENOIT VAN KEIRSBILCK, Committee Expert and Country Taskforce Member, asked whether police provided sexual education in schools?  Was legal aid free for every child and accessible from the first stage of arrest? Did the State party criminally prosecute children who were addicted to drugs?

    TIMOTHY P.T. EKESA, Committee Expert and Country Taskforce Member, said Qatar generally prohibited abortion, only allowing it in three special cases.  There were severe penalties imposed on women who received unauthorised abortions.  How many unauthorised abortions had the State recorded over the reporting period?

    Another Committee Expert asked about the likelihood of approving the children’s act soon.  Would Qatar provide a complete definition of the child in this legislation?

    A Committee Expert asked about awareness raising campaigns in place to reduce the rate of child deaths from road accidents, which remained quite high in Qatar.  How was wastewater treated and what percentage of the population had access to potable water?

    One Committee Expert asked if Qatari children had access to contraception.  Were children who were the product of rape given Qatari nationality? Did national institutions take a gender specific approach?  Was free legal assistance provided to victims of domestic violence?

    A Committee Expert asked about the level of integration that the State party’s hotline had with law enforcement, health services and social services.  What services were provided to children of adults deprived of liberty, including adults on death row?

    SOPHIE KILADZE, Committee Chair, asked whether the State party had measures to reduce children’s screen time and a policy on artificial intelligence and its effects on children.

    Responses by the Delegation

    The delegation said the 2015 law on the departure of migrants set up a mechanism for entering and exiting Qatar. It regulated the provision of housing, healthcare and education for migrants, as well as the conditions migrants needed to meet to obtain residence permits.  Migrants who did not meet these conditions were deported following the standard procedure.  Persons without identity documents who were accompanied by children, as well as stateless and unaccompanied children, were placed in a shelter while being processed. In 2024, there were 22 such detentions, and thus far there had been six detentions in 2025.  The State party worked with relevant embassies to support processing of these people.

    A directorate had been established that was mandated to prevent road accidents.

    Psychological support was provided to children whose parents had been sentenced to death.  The Criminal Procedural Code provided for two years of reprieve from detention for pregnant women, and when both parents were charged with the same crime, one parent was granted reprieve from detention to care for their children while the other parent was detained.

    The age of criminal liability started from seven years.  From ages seven to 16, judges could only impose sanctions requiring the child’s parents to obey certain commitments or send the child to rehabilitation programmes. The juvenile justice system was based on rehabilitation, not punishment.  Children aged 16 to 18 were more aware of their actions and thus had increased criminal liability.  The death penalty could be used on such children, but judges could commute the sentence, considering the age of the child when the crime was committed.  No one aged 16 to 18 had been sentenced to death in Qatar.

    Qatar had evacuated over 65,000 people from Afghanistan in 2021.  Qatar provided these people with housing and psychological support and facilitated their voluntary travel to other countries.  The State had also evacuated many children from Gaza to Qatar, providing them with free healthcare and education.

    Sexual education was provided by teachers and social workers, not police, in schools.  A national workshop had been set up to develop sexual education; psychologists were involved in this process.

    The State had a legal aid office with attorneys who provided children with free legal assistance and defended them in court.  The office also provided assistance in cases of domestic violence.

    Islamic Sharia was the source of laws in Qatar.  Criminal legislation on abortion was in line with Sharia.  In the State’s view, foetuses had the same rights as adults and benefited from legal protection.  Abortions could only take place if the pregnancy threatened the life of the mother.  Children who were the product of rape could access Qatari nationality.

    Qatar had created legislation combatting cybercrime, which punished all digital intimation and threats.  There were harsher sentences when the victim was a child or had a disability.  The State had also launched a platform that aimed to educate children and families on the safe use of digital technology and build children’s digital skills.  It had a national strategy on artificial intelligence and was committed to developing digital infrastructure that respected human rights. 

    Qatar had acceded to International Labour Organization Conventions 138 and 180 on child labour.  The State’s law on domestic workers protected such workers from exploitation.  The law banned hiring people under 18 years of age for domestic work.  Migrant workers needed to be 18 years of age or older. Domestic workers had the same rights as other workers, including regarding access to healthcare.  There was a Government Department that received complaints from domestic workers, which operated in 11 different languages.

    The State party respected the rights of migrant workers to live with their families.  These workers could bring their children to the State if they fulfilled a strict set of conditions.

    Qatar had criminalised all forms of trafficking of persons, including labour exploitation.  Penalties for trafficking were increased when the victim was a child.  There was a committee within the Ministry of Labour that was responsible for combatting trafficking in persons.  Qatari law was in line with the Optional Protocol on the sale of children, child prostitution and child pornography.

    The hotline for reporting violations of children’s rights was manned by psychologists, who assessed the urgency of the complaint and referred it to the relevant authorities.

    The Qatar Social Work Foundation worked to enhance family bonds and to prevent domestic violence.  It provided lectures for prospective parents and counselling and mediation services seeking to resolve family problems amicability. The Foundation worked to defend children’s rights in cases of divorce, providing them with psychological counselling. Legislation had been developed that ensured that custody could be provided to mothers in cases of divorce.

    Concluding Remarks 

    AISSATOU ALASSANE SIDIKOU, Committee Expert and Taskforce Coordinator, thanked the delegation for the interesting dialogue.  Many efforts had been made by the State for children, but challenges remained.  The Committee hoped that the dialogue would help to improve protections for children in Qatar.  Ms. Sidikou said she hoped that the members of the State party would carry all children in their hearts in their work.

    AHMAD BIN HASSAN AL-HAMMADI, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, thanked the Committee and all persons who had contributed to the constructive dialogue, which was an important opportunity to promote the rights of the child and global peace.  The State party would use the Committee’s concluding observations to improve measures for children.  The Committee needed to consider the information provided by the State and its cultural specificities.  Qatar was committed to cooperating with the Committee and to addressing the challenges and risks it faced concerning the rights of the child.  It had achieved great progress in human rights over the years through cooperation with human rights mechanisms.

    SOPHIE KILADZE, Committee Chair, said that the information provided by the State party would help the Committee to assess the achievements made by Qatar and the challenges it faced. The Committee respected States’ cultural specificities, but violations of the Convention could not be justified in any circumstances.  The Committee would do its best to develop concluding observations that would strengthen the rights of children in Qatar to the extent possible.  It hoped that the State party would present further progress for children in its next dialogue with the Committee.

    ___________

    Produced by the United Nations Information Service in Geneva for use of the media; 
    not an official record. English and French versions of our releases are different as they are the product of two separate coverage teams that work independently.

     

    CRC25.014E

    MIL OSI United Nations News

  • MIL-OSI USA: Representative Peters Votes NO on GOP Tax Plan

    Source: United States House of Representatives – Congressman Scott Peters (52nd District of California)

    Washington, D.C. – Today, Representative Scott Peters (CA-50) voted against the Republican plan to cut healthcare for millions of vulnerable patients under Medicaid and the Affordable Care Act to pay for tax cuts for wealthy individuals and corporations that don’t need them. The Republican plan would kick 13.7 million people off of their healthcare, according to an analysis by the independent Congressional Budget Office. And the non-partisan Committee for a Responsible Federal Budget has found that the bill could add $37 trillion to the national debt over the next 30 years. After the House voted 215-214 to advance the legislation, Rep. Peters released the following statement:  

    “Not only is the Republican tax plan fiscally irresponsible, it is also unnecessarily cruel. Our country borrows $2 trillion every year just to keep the lights on. That number will only grow and add to our colossal debt under this tax plan. But Republicans aren’t trying to reduce the debt, they are kicking people off their healthcare to lower taxes for the highest earners. If we allowed marginal taxes for people making more than $609,000 to go from 37 to 39.6 percent, where it was in 2017, we could generate up to $402 billion in revenue over 10 years. Those people would pay a bit more in taxes, and we could avoid kicking millions of people off their healthcare. 

    “Irresponsible borrowing like this is why Moody’s, for the first time ever, downgraded our credit rating, why the stock market is falling, why the bond markets are going haywire, and why consumers are worried they won’t be able to keep up with rising prices. It is time to have an honest and tough bipartisan conversation about how we reduce the debt. While today’s vote was disappointing, I will continue to fight this debt-financed plan as it moves through the Senate.” 

    Read about Rep. Peters’ opposition to the tax plan in the Energy and Commerce Committee here.  

    Read about Rep. Peters’ opposition to the tax plan in the Budget Committee here.  

    CA-50 Medicaid Facts: 

    • 156,100 people in the district rely on Medicaid for health coverage—that’s 20 percent of all district residents. 
      • 34,700 children in the district are covered by Medicaid. 
      • 17,700 seniors in the district are covered by Medicaid. 
      • 64,900 adults in the district have Medicaid coverage through Medicaid expansion—that includes pregnant women who are able to access prenatal care sooner because of Medicaid expansion, parents, caretakers, veterans, people with substance use disorder and mental health treatment needs, and people with chronic conditions and disabilities. 
    • At least five hospitals in the district had negative operating margins in 2022. These hospitals would be especially hard-hit by cuts to Medicaid. For example: 
      • Scripps Mercy Hospital had a negative 25.3 percent operating margin—and nearly 22 percent of its revenue came from Medicaid. 
      • Sharp Coronado Hospital had a negative 3.5 percent operating margin—and over 36 percent of its revenue came from Medicaid. 
      • University of California San Diego Medical Center had a negative 2.4 percent operating margin—and nearly 19 percent of its revenue came from Medicaid. 
    • There are 54 health center delivery sites in the district that serve 529,944 patients. 
    • Those health centers and patients rely on Medicaid—statewide, 69 percent of health center patients rely on Medicaid for coverage. 
    • Health centers will not be able to stay open and provide the same care that they do today, with more uninsured and underinsured patients. They are already operating on thin margins—in 2023, nationally, nearly half of health centers had negative operating margins. 
    • Medicaid cuts put health centers at risk, including: 
      • Family Health Centers of San Diego 
      • Neighborhood Healthcare 
      • North County Health Project 
      • San Diego American Indian Health Centers 
      • St. Vincent De Paul Village 

    Representative Peters is the co-author of the Fiscal Commission Act, legislation to create a bicameral and open-door commission to tackle our nation’s long-term debt, help us avoid automatic and across-the-board cuts to Social Security and Medicare, and secure a more prosperous future for our children. 

    ###

    MIL OSI USA News

  • MIL-OSI USA: Harvard University Loses Student and Exchange Visitor Program Certification for Pro-Terrorist Conduct

    Source: US Federal Emergency Management Agency

    Headline: Harvard University Loses Student and Exchange Visitor Program Certification for Pro-Terrorist Conduct

    lass=”text-align-center”>Harvard is being held accountable for collaboration with the CCP, fostering violence, antisemitism, and pro-terrorist conduct from students on its campus

    WASHINGTON – Today, Homeland Security Secretary Kristi Noem ordered DHS to terminate the Harvard University’s Student and Exchange Visitor Program (SEVP) certification

    This means Harvard can no longer enroll foreign students and existing foreign students must transfer or lose their legal status

    Harvard’s leadership has created an unsafe campus environment by permitting anti-American, pro-terrorist agitators to harass and physically assault individuals, including many Jewish students, and otherwise obstruct its once-venerable learning environment

    Many of these agitators are foreign students

    Harvard’s leadership further facilitated, and engaged in coordinated activity with the CCP, including hosting and training members of a CCP paramilitary group complicit in the Uyghur genocide

    “This administration is holding Harvard accountable for fostering violence, antisemitism, and coordinating with the Chinese Communist Party on its campus,” said Secretary Noem

    “It is a privilege, not a right, for universities to enroll foreign students and benefit from their higher tuition payments to help pad their multibillion-dollar endowments

    Harvard had plenty of opportunity to do the right thing

    It refused

    They have lost their Student and Exchange Visitor Program certification as a result of their failure to adhere to the law

    Let this serve as a warning to all universities and academic institutions across the country


    On April 16, 2025, Secretary Noem demanded Harvard provide information about the criminality and misconduct of foreign students on its campus

    Secretary Noem warned refusal to comply with this lawful order would result in SEVP termination

    This action comes after DHS terminated $2

    7 million in DHS grants for Harvard last month

    Harvard University brazenly refused to provide the required information requested and ignored a follow up request from the Department’s Office of General Council

    Secretary Noem is following through on her promise to protect students and prohibit terrorist sympathizers from receiving benefits from the U

    S

    government

    Facts about Harvard’s toxic campus climate:

    A joint-government task force found that Harvard has failed to confront pervasive race discrimination and anti-Semitic harassment plaguing its campus

    Jewish students on campus were subject to pervasive insults, physical assault, and intimidation, with no meaningful response from Harvard’s leadership

    A protester charged for his role in the assault of a Jewish student on campus was chosen by the Harvard Divinity School to be the Class Marshal for commencement

    Harvard’s own 2025 internal study on anti-Semitism revealed that almost 60% of Jewish students reported experiencing “discrimination, stereotyping, or negative bias on campus due to [their] views on current events


    In one instance, a Jewish student speaker at a conference had planned to tell the story of his Holocaust survivor grandfather finding refuge in Israel

    Organizers told the student the story was not “tasteful” and laughed at him when he expressed his confusion

    They said the story would have justified oppression

    Meanwhile, Pro-Hamas student groups that promoted antisemitism after the October 7 attacks remained recognized and funded

    Instead of protecting its students, Harvard has let crime rates skyrocket, enacted racist DEI practices, and accepted boatloads of cash from foreign governments and donors

    ###

    MIL OSI USA News

  • MIL-OSI USA: Sols 4547-4548: Taking in the View After a Long Drive

    Source: NASA

    Written by Alex Innanen, Atmospheric Scientist at York University
    Earth planning date: Wednesday, May 21, 2025
    Monday’s single-sol plan included a marathon 45-meter drive (about 148 feet), which put us in position for two full sols of imaging. This means both sols have what we call “targeted” science blocks, in which we have images of the workspace down from the last plan and can carefully choose what we want to take a closer look at. This always means a lot of good discussion amongst the geology and mineralogy theme group (GEO) about what deserves this closer look. As an outsider on the environmental theme group (ENV), I don’t always grasp the complexities of these discussions, but it’s always interesting to see what GEO is up to and to learn new things about the geology of Mount Sharp.
    GEO ended up picking “Big Bear Lake” as our contact science target, which is getting its typical treatment from APXS and MAHLI, as well as a LIBS observation from ChemCam. Aside from that there was plenty of room for remote sensing. ChemCam is also taking a LIBS observation of “Volcan Mountains” and a long-distance mosaic of the Texoli butte. Mastcam is also taking mosaics of a nearby trough, as well as two depressions known as “Sulphur Spring,” a more distant boxwork structure, and the very distant Mishe Mokwa butte.
    All of ENV’s activities are remote sensing, and we managed to squeeze in a few of those too. We have a couple dust monitoring observations, looking for dust devils and checking the amount of dust in the atmosphere. And since we’re still in the cloudy season we always try to make room for cloud observations. Today that meant a suraphorizon movie looking for clouds just above the horizon to the south, and a phase function sky survey, which captures clouds all around the rover, to try to understand how these clouds scatter sunlight.

    MIL OSI USA News

  • MIL-OSI USA: Percolating Clues: NASA Models New Way to Build Planetary Cores

    Source: NASA

    A new NASA study reveals a surprising way planetary cores may have formed—one that could reshape how scientists understand the early evolution of rocky planets like Mars.
    Conducted by a team of early-career scientists and long-time researchers across the Astromaterials Research and Exploration Science (ARES) Division at NASA’s Johnson Space Center in Houston, the study offers the first direct experimental and geochemical evidence that molten sulfide, rather than metal, could percolate through solid rock and form a core—even before a planet’s silicate mantle begins to melt.
    For decades, scientists believed that forming a core required large-scale melting of a planetary body, followed by heavy metallic elements sinking to the center. This study introduces a new scenario—especially relevant for planets forming farther from the Sun, where sulfur and oxygen are more abundant than iron. In these volatile-rich environments, sulfur behaves like road salt on an icy street—it lowers the melting point by reacting with metallic iron to form iron-sulfide so that it may migrate and combine into a core. Until now, scientists didn’t know if sulfide could travel through solid rock under realistic planet formation conditions.

    Working on this project pushed us to be creative. It was exciting to see both data streams converge on the same story.

    Dr. Jake Setera
    ARES Scientist with Amentum

    The study results gave researchers a way to directly observe this process using high-resolution 3D imagery—confirming long-standing models about how core formation can occur through percolation, in which dense liquid sulfide travels through microscopic cracks in solid rock.
    “We could actually see in full 3D renderings how the sulfide melts were moving through the experimental sample, percolating in cracks between other minerals,” said Dr. Sam Crossley of the University of Arizona in Tucson, who led the project while a postdoctoral fellow with NASA Johnson’s ARES Division. “It confirmed our hypothesis—that in a planetary setting, these dense melts would migrate to the center of a body and form a core, even before the surrounding rock began to melt.”
    Recreating planetary formation conditions in the lab required not only experimental precision but also close collaboration among early-career scientists across ARES to develop new ways of observing and analyzing the results. The high-temperature experiments were first conducted in the experimental petrology lab, after which the resulting samples—or “run products”—were brought to NASA Johnson’s X-ray computed tomography (XCT) lab for imaging.

    X-ray scientist and study co-author Dr. Scott Eckley of Amentum at NASA Johnson used XCT to produce high-resolution 3D renderings—revealing melt pockets and flow pathways within the samples in microscopic detail. These visualizations offered insight into the physical behavior of materials during early core formation without destroying the sample.
    The 3D XCT visualizations initially confirmed that sulfide melts could percolate through solid rock under experimental conditions, but that alone could not confirm whether percolative core formation occurred over 4.5 billion years ago. For that, researchers turned to meteorites.
    “We took the next step and searched for forensic chemical evidence of sulfide percolation in meteorites,” Crossley said. “By partially melting synthetic sulfides infused with trace platinum-group metals, we were able to reproduce the same unusual chemical patterns found in oxygen-rich meteorites—providing strong evidence that sulfide percolation occurred under those conditions in the early solar system.”
    To understand the distribution of trace elements, study co-author Dr. Jake Setera, also of Amentum, developed a novel laser ablation technique to accurately measure platinum-group metals, which concentrate in sulfides and metals.
    “Working on this project pushed us to be creative,” Setera said. “To confirm what the 3D visualizations were showing us, we needed to develop an appropriate laser ablation method that could trace the platinum group-elements in these complex experimental samples. It was exciting to see both data streams converge on the same story.”
    When paired with Setera’s geochemical analysis, the data provided powerful, independent lines of evidence that molten sulfide had migrated and coalesced within a solid planetary interior. This dual confirmation marked the first direct demonstration of the process in a laboratory setting.

    The study offers a new lens through which to interpret planetary geochemistry. Mars in particular shows signs of early core formation—but the timeline has puzzled scientists for years. The new results suggest that Mars’ core may have formed at an earlier stage, thanks to its sulfur-rich composition—potentially without requiring the full-scale melting that Earth experienced. This could help explain longstanding puzzles in Mars’ geochemical timeline and early differentiation.
    The results also raise new questions about how scientists date core formation events using radiogenic isotopes, such as hafnium and tungsten. If sulfur and oxygen are more abundant during a planet’s formation, certain elements may behave differently than expected—remaining in the mantle instead of the core and affecting the geochemical “clocks” used to estimate planetary timelines.
    This research advances our understanding of how planetary interiors can form under different chemical conditions—offering new possibilities for interpreting the evolution of rocky bodies like Mars. By combining experimental petrology, geochemical analysis, and 3D imaging, the team demonstrated how collaborative, multi-method approaches can uncover processes that were once only theoretical.
    Crossley led the research during his time as a McKay Postdoctoral Fellow—a program that recognizes outstanding early-career scientists within five years of earning their doctorate. Jointly offered by NASA’s ARES Division and the Lunar and Planetary Institute in Houston, the fellowship supports innovative research in astromaterials science, including the origin and evolution of planetary bodies across the solar system.
    As NASA prepares for future missions to the Moon, Mars, and beyond, understanding how planetary interiors form is more important than ever. Studies like this one help scientists interpret remote data from spacecraft, analyze returned samples, and build better models of how our solar system came to be.
    For more information on NASA’s ARES division, visit: https://ares.jsc.nasa.gov/
    Victoria SegoviaNASA’s Johnson Space Center281-483-5111victoria.segovia@nasa.gov

    MIL OSI USA News

  • MIL-OSI USA: NASA’s Dragonfly Mission Sets Sights on Titan’s Mysteries

    Source: NASA

    When it descends through the thick golden haze on Saturn’s moon Titan, NASA’s Dragonfly rotorcraft will find eerily familiar terrain. Dunes wrap around Titan’s equator. Clouds drift across its skies. Rain drizzles. Rivers flow, forming canyons, lakes and seas. 

    But not everything is as familiar as it seems. At minus 292 degrees Fahrenheit, the dune sands aren’t silicate grains but organic material. The rivers, lakes and seas hold liquid methane and ethane, not water. Titan is a frigid world laden with organic molecules. 
    Yet Dragonfly, a car-sized rotorcraft set to launch no earlier than 2028, will explore this frigid world to potentially answer one of science’s biggest questions: How did life begin?
    Seeking answers about life in a place where it likely can’t survive seems odd. But that’s precisely the point.
    “Dragonfly isn’t a mission to detect life — it’s a mission to investigate the chemistry that came before biology here on Earth,” said Zibi Turtle, principal investigator for Dragonfly and a planetary scientist at the Johns Hopkins Applied Physics Laboratory in Laurel, Maryland. “On Titan, we can explore the chemical processes that may have led to life on Earth without life complicating the picture.”
    On Earth, life has reshaped nearly everything, burying its chemical forebears beneath eons of evolution. Even today’s microbes rely on a slew of reactions to keep squirming.
    “You need to have gone from simple to complex chemistry before jumping to biology, but we don’t know all the steps,” Turtle said. “Titan allows us to uncover some of them.”
    Titan is an untouched chemical laboratory where all the ingredients for known life — organics, liquid water and an energy source — have interacted in the past. What Dragonfly uncovers will illuminate a past since erased on Earth and refine our understanding of habitability and whether the chemistry that sparked life here is a universal rule — or a wonderous cosmic fluke. 
    Before NASA’s Cassini-Huygens mission, researchers didn’t know just how rich Titan is in organic molecules. The mission’s data, combined with laboratory experiments, revealed a molecular smorgasbord — ethane, propane, acetylene, acetone, vinyl cyanide, benzene, cyanogen, and more. 
    These molecules fall to the surface, forming thick deposits on Titan’s ice bedrock. Scientists believe life-related chemistry could start there — if given some liquid water, such as from an asteroid impact.
    Enter Selk crater, a 50-mile-wide impact site. It’s a key Dragonfly destination, not only because it’s covered in organics, but because it may have had liquid water for an extended time.

    The impact that formed Selk melted the icy bedrock, creating a temporary pool that could have remained liquid for hundreds to thousands of years under an insulating ice layer, like winter ponds on Earth. If a natural antifreeze like ammonia were mixed in, the pool could have remained unfrozen even longer, blending water with organics and the impactor’s silicon, phosphorus, sulfur and iron to form a primordial soup.
    “It’s essentially a long-running chemical experiment,” said Sarah Hörst, an atmospheric chemist at Johns Hopkins University and co-investigator on Dragonfly’s science team. “That’s why Titan is exciting. It’s a natural version of our origin-of-life experiments — except it’s been running much longer and on a planetary scale.”
    For decades, scientists have simulated Earth’s early conditions, mixing water with simple organics to create a “prebiotic soup” and jumpstarting reactions with an electrical shock. The problem is time. Most tests last weeks, maybe months or years.
    The melt pools at Selk crater, however, possibly lasted tens of thousands of years. Still shorter than the hundreds of millions of years it took life to emerge on Earth, but potentially enough time for critical chemistry to occur. 
    “We don’t know if Earth life took so long because conditions had to stabilize or because the chemistry itself needed time,” Hörst said. “But models show that if you toss Titan’s organics into water, tens of thousands of years is plenty of time for chemistry to happen.”
    Dragonfly will test that theory. Landing near Selk, it will fly from site to site, analyzing the surface chemistry to investigate the frozen remains of what could have been prebiotic chemistry in action. 
    Morgan Cable, a research scientist at NASA’s Jet Propulsion Laboratory in Southern California and co-investigator on Dragonfly, is particularly excited about the Dragonfly Mass Spectrometer (DraMS) instrument. Developed by NASA’s Goddard Space Flight Center in Greenbelt, Maryland, with a key subsystem provided by the CNES (Centre National d’Etudes Spatiales), DraMS will search for indicators of complex chemistry.
    “We’re not looking for exact molecules, but patterns that suggest complexity,” Cable said. On Earth, for example, amino acids — fundamental to proteins — appear in specific patterns. A world without life would mainly manufacture the simplest amino acids and form fewer complex ones. 
    Generally, Titan isn’t regarded as habitable; it’s too cold for the chemistry of life as we know it to occur, and there’s is no liquid water on the surface, where the organics and likely energy sources exist. 
    Still, scientists have assumed that if a place has life’s ingredients and enough time, complex chemistry — and eventually life —  should emerge. If Titan proves otherwise, it may mean we’ve misunderstood something about life’s start and it may be rarer than we thought.
    “We won’t know how easy or difficult it is for these chemical steps to occur if we don’t go, so we need to go and look,” Cable said. “That’s the fun thing about going to a world like Titan. We’re like detectives with our magnifying glasses, looking at everything and wondering what this is.” 
    Dragonfly is being designed and built under the direction of the Johns Hopkins Applied Physics Laboratory (APL), which manages the mission for NASA. The team includes key partners at NASA’s Goddard Space Flight Center and NASA’s Jet Propulsion Laboratory. Dragonfly is managed by NASA’s Marshall Space Flight Center in Huntsville, Alabama, for the agency’s Science Mission Directorate at NASA Headquarters in Washington.
    For more information on Dragonfly, visit:

    Dragonfly

    By Jeremy RehmJohns Hopkins Applied Physics Laboratory, Laurel, Md.
    Media Contacts:Karen Fox / Molly WasserHeadquarters, Washington202-358-1600 karen.c.fox@nasa.gov / molly.l.wasser@nasa.gov    
    Mike BuckleyJohns Hopkins Applied Physics Laboratory443-567-3145michael.buckley@jhuapl.edu

    MIL OSI USA News

  • MIL-OSI USA: Winners Announced in NASA’s 2025 Gateways to Blue Skies Competition

    Source: NASA

    A team from South Dakota State University, with their project titled “Soil Testing and Plant Leaf Extraction Drone” took first place at the 2025 NASA Gateways to Blue Skies Competition, which challenged student teams to research aviation solutions to support U.S. agriculture.
    The winning project proposed a drone-based soil and tissue sampling process that would automate a typically labor-intensive farming task. The South Dakota State team competed among eight finalists at the 2025 Blue Skies Forum May 20-21 in Palmdale, California, near NASA’s Armstrong Flight Research Center. Subject matter experts from NASA and industry served as judges.
    “This competition challenges students to think creatively, explore new possibilities, and confront the emerging issues and opportunity spaces solvable through aviation platforms,” said Steven Holz, assistant project manager for University Innovation with NASA’s Aeronautics Research Mission Directorate and Blue Skies judge and co-chair. “They bring imaginative ideas, interesting insights, and an impressive level of dedication. It’s always an honor to work with the next generation of innovators participating in our competition.”

    Steven holz
    Assistant Project Manager for University Innovation

    The winning team members were awarded an opportunity to intern during the 2025-26 academic year at any of four aeronautics-focused NASA centers — Langley Research Center in Hampton, Virginia, Glenn Research Center in Cleveland, Ames Research Center in California’s Silicon Valley, or Armstrong Flight Research Center in Edwards, California.  
    “It’s been super-rewarding for our team to see how far we’ve come, especially with all these other amazing projects that we were competing against,” said Nathan Kuehl, team lead at South Dakota State University. “It wouldn’t have been possible without our graduate advisor, Allea Klauenberg, and advisor, Todd Lechter. We want to thank everybody that made this experience possible.”
    Other awards included: 

    Second Place — University of Tulsa, CattleLog Cattle Management System
    Best Technical Paper — Boston University, PLAANT: Precision Land Analysis and Aerial Nitrogen Treatment

    Sponsored by NASA’s Aeronautics Research Mission Directorate, this year’s competition asked teams of university students to research new or improved aviation solutions to support agriculture that could be applied by 2035 or sooner. The goal of the competition, titled AgAir: Aviation Solutions for Agriculture, was to enhance production, efficiency, sustainability, and resilience to extreme weather. 
    At the forum, finalist teams presented concepts of aviation systems that could help the agriculture industry.Students had the opportunity to meet with NASA and industry experts, tour NASA Armstrong, and gain insight into the agency’s aviation mission.
    U.S. agriculture provides food, fuel, and fiber to the nation and the world. However, the industry faces significant challenges. NASA Aeronautics is committed to supporting commercial, industrial, and governmental partners in advancing aviation systems to modernize agricultural capabilities.  
    The Gateways to Blue Skies competition is sponsored by NASA’s Aeronautics Research Mission Directorate’s University Innovation Project and is managed by the National Institute of Aerospace.
    The National Institute of Aerospace has made available a livestream of the competition, as well as information about the finalists and their projects, and details about the 2025 competition.

    MIL OSI USA News

  • MIL-OSI USA: FEMA Resumes In-Person Trainings at National Schoolhouses to Strengthen State and Local Government’s Ability to Respond to Disasters

    Source: US Federal Emergency Management Agency

    Headline: FEMA Resumes In-Person Trainings at National Schoolhouses to Strengthen State and Local Government’s Ability to Respond to Disasters

    FEMA Resumes In-Person Trainings at National Schoolhouses to Strengthen State and Local Government’s Ability to Respond to Disasters

    WASHINGTON — FEMA announced today that in-person training will resume at three national schoolhouses in early June—the Center for Domestic Preparedness (CDP) in Anniston, Ala

    , the National Fire Academy (NFA) and the National Disaster and Emergency Management University (NDEMU) in Emmitsburg, Md

     In-person training was paused in March of 2025 following President Trump’s Executive Order 14222, Implementing the President’s “Department of Government Efficiency” Cost Efficiency Initiative to ensure alignment with the Administration’s priority of good use of taxpayer funds

        Following a comprehensive review by FEMA and the U

    S

    Fire Administration (USFA), it was determined certain courses provide effective training to enhance national readiness for state, local, tribal and territorial emergency managers, first responders and local leaders

    FEMA’s principles for emergency management assert that disasters are best managed when they’re federally supported, state managed and locally executed

     
    amy

    ashbridge
    Thu, 05/22/2025 – 15:16

    MIL OSI USA News

  • MIL-OSI USA: Solidarity, Family, and Service

    Source: US GOIAM Union

    This article was featured in the Summer 2025 IAM Journal and was written by IAM Communications Representative Elias Flamenco Rivera.

    In today’s fast-paced world, balancing a successful career, union commitments, and family life can be impossible. However, for three dedicated IAM mem­bers, this reality is a daily com­mitment that speaks to their work ethic, union pride, and dedication to their professions and families. These members rise before dawn and work well beyond the typical eight-hour workday, driven by their deep-rooted commitment to
    their jobs, families, and the IAM.

    “For JAM members, it’s not about managing time – it’s about commitment. The long hours are made bearable by the strength we find in our families, our union, and our shared mission to serve,” said !AM Southern Territory General Vice President Craig Martin.

    Many of you reading this story have experienced the drill: early mornings, long shifts, and balan­cing work and family. It’s the life of an !AM member in the South, and it’s a testament to our dedication. JAM Union Southern Terri­ tory members Berrin McFadden, Steve Blackwell, and Scott Gar­dner are three exceptional indivi­duals who are balancing work and family to serve JAM members.

    BERRIN MCFADDEN has devoted over three decades of his life to the Jacksonville Transportation Authority (JTA), where he has become an integral part of the workplace and the broader com­ munity. As a seasoned mechanic in the HVAC shop, McFadden spends his mornings ensuring buses are fully operational, provi­ding essential heating and air-con­ditioning services, and offering quick fixes to ensure the safety and comfort of passengers. But it’s not just about the work; it’s about the pride McFadden takes in his craft and the people he serves. Since joining the JAM in 1990, McFadden has taken on various leadership roles within his Local, including eight years as financial secretary and currently serving as conductor sentinel. He values the union’s support for his professional growth and the enhancement of his personal financial skills, which he uses to manage his household budget effectively with his wife.

    “Being part of the TAM helped me become a better financial manager. It made me more disciplined with money and allowed me to share those les­ sons with others,” said McFadden.

    McFadden works long hours during the week to keep things running smoothly, then clearly separates work from personal life on the weekends, maintaining a healthy equilibrium.

    “I dedicate my weekends to my family and myself,” said McFadden. “I’ve learned that it’s important to shut off work and focus on the things that matter the most at home.”

    Beyond work, McFadden is actively engaged in beautification and landscaping projects within his neighborhood, a hobby he has cherished for many years. He believes that a well-maintained lawn reflects the residents’ care and pride.

    His lawn care and landscaping expertise have earned him the respect of his neighbors, who fre­quently seek his advice and gui­dance on maintaining their yards.

    “I’m just doing what I love, and that’s what drives me. I want to leave a legacy showing the importance of community, hard work, and caring for the people around you,” says McFadden.

    STEVE BLACKWELL currently works as a Quality Assurance Representative at Amentum Group. With an extensive background in avia­tion, including roles as Corro­sion Control Mechanic Lead and Aircraft Mechanic 2, he has built a career centered on maintaining safety and efficiency in aviation. Though his daily routine can be unpredictable, his commitment to ensuring every task is performed to the highest standard remains constant.

    “Every day is different in avia­tion,” says Blackwell.

    The role comes with significant responsibilities, including perfor­ming final inspections for mainte­nance actions involving the safety offlight, investigating safety inci­dents, and drafting reports like engineering investigation requests and quality deficiency reports. Blackwell is also responsible for monitoring various maintenance programs, training other staff, and compiling reports to support the Program Management Office.

    “You need solid technical expertise and a deep unders­tanding of aviation standards,” says Blackwell. “Working alon­gside qualified and competent mechanics to ensure tasks are completed efficiently is essential.” As a member of IAM Local 2777 for over seven years, Bla­ckwell has seen firsthand how union membership contributes to a positive work environment.

    “Being part of the JAM has been beneficial in building cama­raderie, especially among those of us who have military backgrou­nds. We work well together and support each other in achieving our goals,” reflects Blackwell.

    In addition to his role as a Chief Steward, Blackwell also serves as the Vice President of his Local.

    “I help lead efforts to resolve issues at the site and ensure that our members are supported,” he says, underscoring the collabora­tive spirit that defines union work. Despite his job’s demanding nature, Blackwell tries to balance work with his personal life. ‘Tm fortunate to have an understanding family, especially my wife, the rock in our hou­sehold. She supports me as I take on additional responsibilities at work,” he says.

    Outside of work, Blackwell is passionate about music. As a local musician, he performs live shows to unwind and support charitable causes.

    “My band donates 100% of our tips to organizations like United Service Organizations (USO) and the Children’s Rescue Initiative (CR!), which fights human traffi­cking,” he explains.

    “I also make time to work out whenever possible, and I set clear boundaries for work-no calls after 7:45 p.m. unless it’s an emergency so that I can be pre­ sent for my family and personal well-being.”

    “I see my work at Amentum as contributing to the security of our community. The aircraft we maintain help train pilots who will protect future generations,” says Blackwell. “The work we do directly impacts the future of avia­tion and defense. It’s rewarding to know that my efforts contribute to the safety of our country and the well-being of the people I work with.”

    SCOTT GARDNER begins the day early as a mechanic at Textron Aviation. The first task includes stretching exercises and a crew meeting to set the stage for the day’s work. From there, it’s all about getting hands-on with tasks, assembling aircraft parts, and ensuring every job is completed precisely. As an assembly ins­ taller, the responsibility is clear: follow Textron Aviation’s blue­ prints and specifications to main­tain quality and safety.

    “In my role, I perform assem­bly work in the final assem­bly area. We work on a weekly sequence, positioning and prepa­ring aircraft as part of the 40-hour moving schedule,” says Gardner, who has been with Textron for 28 years.

    The work is physically deman­ding but highly specialized, and precision is key.

    As a shop steward, Gardner also balances his technical duties with advocating for his coworkers. “A big part of my job invol­ves answering questions, moni­toring safety, and addressing any arising issues throughout the day. I’m constantly in discussions with leadership about daily matters and broader issues affecting our team,” explains Gardner.

    This role involves significant leadership and communication skills, which come naturally to someone who has been a part of JAM Local 774 for nearly 20 years.

    For Gardner, being part of the IAM has provided a sense of voice and security.

    “The !AM has been a big help as it has given me a plat­ form where I can make sure my coworkers’ rights are heard,” said Gardner. “We have benefits that we wouldn’t otherwise have in a right-to-work state.”

    The IAM has helped him grow as an advocate, primarily through leadership classes at the William W. Winpisinger Education and Technology Center.

    “It’s been a great way to bring those lessons back to my family, teaching them the importance of our rights as workers and the advantages of being part of a union,” explains Gardner.

    Gardner also has served as [AM Local 774 Communications Representative, a role that required him to ensure timely and effective communication between union leadership and the members.

    While his work and union res­ponsibilities can be demanding, he strives to ensure his family life doesn’t take a backseat.

    “Although it’s challenging at times, I maintain clear bounda­ries by carving out time for work, union responsibilities, and family, so [ can stay present at home.”

    Family remains his top prio­rity, and his commitment to them is evident in his career choices and personal values.

    “My wife and I have always prioritized our family first. Now that the kids are out of the house, it’s easier to balance things. But even when they were younger, made sure they always came first,” shares Gardner.

    He and his wife are acti­vely involved in the community, supporting local charities like Flags of Freedom and Wreaths Across America. He also attends the annual United Way of the Plains/AFL-CIO Community Ser­ vices Conference in the area.

    “Our work at Textron is critical to the local community. We manu­facture world-class aircraft, and as one of the largest employers in the city, our wages, benefits, and working conditions are vital to the community’s economic health,” says Gardner proudly.

    “My work means something. I know that someone’s loved one might be flying on one of these aircraft, which motivates me to ensure that everything I do is up to the highest standard,” continues Gardner.

    THE SPIRIT OF IAM: COMMITMENT TO SOLIDARITY, WORK, AND SERVICE

    “These workers’ stories are not just about what they do but why they do it – to create a bet­ter future for their families, their communities, and the union that stands behind them,” said Mar­ tin. ‘Through their tireless efforts, they remind us that the true stren­gth of any union is not just in its contracts but in the support we provide one another. Their jour­neys are a powerful reminder that when we work together with pur­pose, we all rise.”

    VIDEO PLAYLIST
    IAM Southern Territory members share their stories of balancing their work, union commitments, and family life with dedication and pride. iam4.me/southemsolidarity

    The post Solidarity, Family, and Service appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News

  • MIL-OSI Economics: Frank Elderson: Nature’s bell tolls for thee, economy!

    Source: European Central Bank

    Keynote speech by Frank Elderson, Member of the Executive Board of the ECB and Vice-Chair of the Supervisory Board of the ECB, at the Naturalis Biodiversity Center

    Leiden, 22 May 2025

    Thank you for inviting me to speak at this annual biodiversity dinner. The wide range of speakers here this evening – on international biodiversity day – is testament to the relevance of biodiversity across disciplines.

    Nature isn’t just the roots and shoots of biologists, macroecologists and natural scientists. Beyond its intrinsic value, nature provides vital services that are relevant for all of us – for entrepreneurs, workers, policymakers and bankers, but also for central bankers and financial supervisors.

    A thriving natural environment provides vital benefits that sustain our well-being and serve as a crucial driving force for the global economy. Think of fertile soils, pollination, timber, fishing stocks, clean water and clean air.

    But we are well aware of the daunting facts that confirm the dire state of ecosystem services. Intensive land use, the climate crisis, pollution, overexploitation and other human pressures are rapidly and severely damaging our natural resources.

    75% of land surface ecosystems and 66% of ocean ecosystems have been damaged, degraded or modified.

    We are using natural resources 1.7 times faster than ecosystems can regenerate them. Consequently, the contribution that nature can make to our economies – and our way of life – is steadily diminishing every day.

    These fateful facts and figures confront us as vividly as Edvard Munch’s iconic scream. Yet, accounting for nature and the services it provides is challenging. What nature provides to the economy is typically not measured directly in statistics like GDP.

    We price portfolios instead of pollinators, we monitor markets instead of mangroves and we watch wages instead of water supplies. However, the reality is that while our economies are heavily reliant on ecosystem services, the economic value of those pollinators, mangroves and water supplies is not sufficiently taken into account.

    Nature is too often still wrongly seen as a free good, readily available and abundant in supply, without opportunity costs. For such a good, there is no market – and therefore no price.

    So, why can’t governments intervene by pricing and creating a market for nature as has been done for emissions?

    Unlike for the climate crisis – which can be quantified through carbon emissions and their direct links to rising temperatures – there is no single metric that can be used to quantify the wide range of ecosystem services.

    What is the common denominator of clean air, fertile soils and coasts protected by mangrove forests? Nature is beautifully complex, but this complexity makes it harder to establish a market for nature than a market for climate, such as the carbon markets created through emissions trading systems.

    For central banks to effectively fulfil their mandates, we need to enhance our capacity to measure the vital services that nature provides to our economy and identify the financial risks caused by the degradation of these services. And while this is admittedly not an easy task, it is encouraging that multiple stakeholders are making progress, including academia, firms and also the ECB. We are enhancing our tools, methodologies and data to assess the economic implications of ecosystems and their degradation. And I am pleased to be able to share some of our latest insights this evening.

    I will argue that while nature services may appear to be freely available, they are in fact not abundant at all and there are substantial costs to using and losing them. Costs that we currently overlook when headlines report on GDP growth.

    Accounting for nature in monetary policy and banking supervision

    Nature being of vital importance for the economy and the financial system is hardly a novel insight. Besides scientists, a number of central banks and prudential supervisors have also been highlighting their interlinkages for several years now.[1] And while the climate crisis has received most of the attention, it is encouraging that work on nature-related risks has also significantly evolved.

    Moreover, the ECB has taken significant steps to account for nature-related risks in the pursuit of its mandate. For instance, we take into account the effects nature degradation can have on banks’ balance sheets. The degradation of nature could damage companies’ production processes and consequently weaken their creditworthiness, which might in turn impair loans granted by banks. In our role as the supervisor of Europe’s largest banks, we therefore aim to ensure that the banks we supervise adequately manage both climate-related and nature-related risks.[2] Encouragingly, we are seeing a growing set of good practices among the banks we supervise in terms of identifying, quantifying and managing nature-related risks.

    But are we fully aware of – and sufficiently alert to – how nature degradation could eventually hit balance sheets?

    Advancing our understanding does not mean that economists and supervisors should start studying ants in Aragon, ladybirds in Lombardy or honeybees in Holland (although it is very important that entomologists do!).

    Instead, central banks and supervisors need to gain a better understanding of just how vulnerable the economy and the financial system are to nature degradation.[3]

    Capturing the risks related to ecosystem degradation

    An ECB study in 2023 found that nearly 75% of banks’ corporate lending goes to firms that are highly dependent on at least one ecosystem service.[4] This finding underscores just how interconnected nature, the economy and the financial system really are.[5] But that study does not tell us exactly how much of our economic activity is at risk, or which economic sectors and regions will be most affected.

    To better understand this impact, the ECB has teamed up with the Resilient Planet Finance Lab at the University of Oxford.

    The interdisciplinary team has developed systemic risk indicators that move beyond dependency analysis to a comprehensive assessment of nature-related financial risks. In essence, this indicator assesses the economic implications of the deteriorating state of ecosystems. It shows how much of the economic value added by a particular industry– what economists call “gross value added” – is at risk when ecosystem services degrade. Tomorrow we will publish a blog post showing some of the preliminary results of our work, but I can already share some findings with you this evening.

    Water – the natural currency underwriting purchases, investments and trades

    Our preliminary findings indicate two things. First, water – too little, too much or too dirty water that is –has been identified as posing the most significant risk to the euro area economy. Losses related to water scarcity, poor water quality and flood protection emerge as the most critical from a value added perspective. Concretely, surface water scarcity alone puts almost 15% of the euro area’s economic output at risk. This is not surprising because water is not just any resource – it is one of the most essential natural resources we possess. Second, agriculture is the most exposed sector, as it would suffer the largest proportional output losses due to a decline in surface water. But other sectors are also likely to be significantly affected.

    Chart 1

    Proportion of national gross value added (GVA) at risk due to surface water scarcity in Europe and globally (supply chain risks)

    Water is, for instance, an indispensable resource in industry. In the Netherlands, industry alone uses over 2.6 trillion litres of fresh water a year.[6] This water usage is more than three times the total annual water consumption of all households in the Netherlands. Water is also essential for energy production, not only in hydropower plants but also in thermal power plants – including nuclear – where it is used for cooling and steam generation. It is consumed in vast quantities for mining and mineral processing, which are crucial for the energy transition, as well as in the construction sector for producing concrete, to name just a few examples.

    The risk posed by water scarcity is not hypothetical, we are already experiencing the impact today. I am sure that many of you remember when the summers of 2018, 2019 and 2020 brought severe droughts and heatwaves even to the Netherlands. In 2018 alone, economic losses in the Netherlands were up to €1.9 billion for agriculture and €155 million for shipping, with widespread but hard-to-quantify damage to ecosystems. This year’s drought is especially alarming: spring 2025 is on track to become the driest ever recorded in the Netherlands, likely surpassing the previous record set nearly 50 years ago. And droughts are only projected to increase further as the climate crisis continues to develop. Worryingly, in the driest scenario an average summer in the 2040s will be about as dry as an extremely dry summer now.

    Effective water management will thus be crucial for sustaining production. However, the risk persists that during periods of drought, production might need to be scaled down. Some industrial processes may become economically unviable and might need to relocate.

    For example, some have even gone as far as to point at a risk that more frequent droughts could render traditional tulip-growing regions such as the Bollenstreek unsuitable for bulb cultivation.[7] This may compel growers to explore better-positioned locations where water is more reliably available to safeguard the iconic Dutch tulip industry.

    Hence, as a consequence of water scarcity, our economies could produce less, and production costs are likely to rise during any inevitable transition phase.

    Let me also point out that biodiversity is a critical – and often underestimated – factor in ensuring the availability and quality of fresh water. Ecosystems such as forests and wetlands regulate the quantity, timing and purity of water flows by stabilising soils and filtering pollutants. Maintaining healthy and diverse ecosystems will be crucial for resilient water provisioning as climate change intensifies, particularly in regions facing growing water stress.

    Beyond these macroeconomic impacts, ecosystem degradation can significantly affect financial stability, for example through the loans that banks grant to households and firms. In essence, the greater the impact on firms, the higher the risk of defaults and the higher the risk on banks’ balance sheets.

    For example, in our research with the University of Oxford we found that more than 34% of banks’ total outstanding nominal amount – over €1.3 trillion – is currently extended to sectors exposed to high water scarcity risk.

    As the next step in our research, we will examine changes in the probability of default in the sectors most affected by dwindling ecosystems. Think about it as stress-testing the resilience of banks’ credit portfolios to nature degradation. We plan to publish these results later this year, complete with a more in-depth analysis on the topic, so stay tuned.

    Multiple stakeholders are taking action

    Encouragingly, our work with the University of Oxford is not an isolated case. We are in fact seeing a wide range of stakeholders taking action to better account for ecosystem services.

    For instance, I hear that our host this evening – the Naturalis Biodiversity Center – has teamed up with banks to combine insights from science and finance to further develop indicators quantifying ecosystem services.

    We are also seeing a growing set of good practices among the banks we supervise in terms of identifying, quantifying and managing nature-related risks. Banks typically conduct materiality assessments to understand where they are most affected. And banks also grapple with the challenge that nature-related risks are difficult to express in a single metric. Once they know where they are exposed, they then typically conduct deep dives on specific topics.

    One bank, for example, has conducted a quantitative scenario analysis to understand how the profitability of its customers could be affected if a water pollution tax were to be implemented.

    Other banks design customer scorecards and engage with the most vulnerable counterparties, sometimes offering small discounts or other incentives when customers meet key performance indicators that increase their resilience.

    It is also encouraging that progress is being made at the international level. The Network for Greening the Financial System (NGFS) – a network of 145 central banks and supervisors from around the world – has developed a conceptual framework offering central banks and supervisors a common understanding of nature-related financial risks and a principle-based risk assessment approach.[8][9] And the Financial Stability Board recently took stock of supervisory and regulatory initiatives among its members, finding that a growing number of financial authorities are considering the potential implications of nature-related risks for the financial sector.[10]

    So scientists, banks, policymakers and supervisors are in fact taking action. That’s good news. Given the high level of uncertainty regarding impacts, non-linearities, tipping points and irreversibility, continuous scientific input and engagement are essential to determine the transmission channels from nature to our economies.

    Reliable and comparable data are key to managing risks and identifying opportunities

    Before I conclude, let me stress a vital enabler to better measure ecosystem services: data. Closer cooperation with natural scientists can help us better understand the data they have available on the status of nature and the ecosystem services it provides. The National Hub for Biodiversity Information provided by our host tonight is an excellent example.[11]

    Moreover, continuous engagement with the scientific community can also help improve our understanding of non-linearities, tipping points and the irreversibility of the biodiversity crisis.

    Similarly, the availability of reliable and comparable data from companies is essential for us to know where the risks are hiding and where opportunities can be found. Such data can, for example, provide insights into companies’ reliance on fresh water for their production processes. In this context, the reporting requirements in the EU’s sustainable finance framework are not merely a “nice to have”, they are providing indispensable information about financial risks and are a solution to the patchwork of different reporting criteria.

    Does that mean that there is no room for simplification? Does it mean that there is no room to ease the reporting burden on smaller firms?

    Of course not.

    As the ECB noted in its recent opinion[And they do!
    Send not to know
    For whom the bell tolls.
    It tolls for thee, ECOnomy!

    Thank you for your attention.

    MIL OSI Economics

  • MIL-OSI USA: LaMalfa Applauds House Passage of Budget Reconciliation Package

    Source: United States House of Representatives – Congressman Doug LaMalfa 1st District of California

    Washington, D.C.—Congressman Doug LaMalfa (R-Richvale) released the following statement after the House passed the budget reconciliation package.

    “This bill is the course correction we desperately needed. For years, taxpayers have been footing the bill for wasteful programs, unchecked spending, and handouts to people gaming the system,” said Rep. LaMalfa. “It delivers a significant tax cut, providing relief for working families and much needed reforms to government spending. It starts the process of eliminating fraud in programs like Medicaid and SNAP. It also includes major wins for folks in the West, allocating $2 billion to expand water storage, and much needed funding for the Secure Rural Schools program. It’s a big win across the board, and I’m happy to see the House pass this crucial piece of legislation.”

    Background:

    • Tax Relief for Working Americans: Delivers significant tax cuts, cutting tax bills by about 15% for Americans earning $30,000–$80,000. No tax on tips or overtime.
    • Medicaid and SNAP Reform: Ends benefits for 1.4 million illegal immigrants and restores work requirements for able-bodied adults receiving assistance.
    • Support for Farmers: Strengthens crop insurance and conservation tools without adding red tape.
    • Water Storage Expansion: Includes $2 billion to upgrade and expand Bureau of Reclamation surface water storage, helping the West store more water in wet years.
    • Secure Rural Schools: Provides a 3-year reauthorization of SRS to support education in rural areas with large amounts of federal land.
    • Energy and Resource Development: Repeals Green New Deal-style handouts and boosts American oil, gas, and mineral production.
    • Border Security and Immigration Enforcement: Fully funds Trump’s border wall, ramps up deportations, and hires thousands of new ICE and Border Patrol agents.

    Congressman Doug LaMalfa is Chairman of the Congressional Western Caucus and a lifelong farmer representing California’s First Congressional District, including Butte, Colusa, Glenn, Lassen, Modoc, Shasta, Siskiyou, Sutter, Tehama and Yuba Counties.

    ###

    MIL OSI USA News

  • MIL-OSI USA: Connecticut Addressing the Impact of Racism on Health

    Source: US State of Connecticut

    Connecticut made history in 2021 by declaring racism a public health crisis, with the legislation forming the Commission on Racial Equity in Public Health. Now, four years later, the UConn Health Disparities Institute (HDI) is teaming up with the Commission to advance the charge toward systemic change to eradicate the impact of racism on health.

    On May 21, HDI and the Commission shared a preview of the Commission’s statewide strategic plan’s recommendations at the Connecticut State Capitol. The event marked the culmination of the statewide strategic planning process that gathered insights from residents across the state on how racism affects their health.

    The Commission recommended addressing racism in four key areas of health and well-being, housing, environment and communities, education and economic security, and criminal justice.

    Together, HDI and the Commission presented a powerful set of community-informed recommendations and actionable solutions to legislators and community members, touching on the trends of racism repeatedly seen in childcare access, affordable housing, medical debt, and the legal system.

    The State Commission on Racial Equity in Public Health shared four goals in the key areas:

    1. Make health care more affordable and reduce medical debt.
    2. Increase the availability and accessibility of health and affordable housing.
    3. Improve childcare affordability and accessibility.
    4. Ensure people in re-entry or involved in the criminal legal system have access to healthy, affordable housing.
    DeLita Rose Daniels, Community Faculty, sharing remarks at the event.

    To fulfill the Commission’s statutory mandate to develop a strategic plan to reduce racial health inequities, HDI was selected through a competitive grant process to lead a statewide community-based participatory assessment and planning process to hear from Connecticut residents disproportionately affected by racial inequities.

    HDI assembled a community research team of impacted residents from across the state to co-design and co-lead the process, ensuring it was grounded in community voices and lived experience. Statewide surveys and focus groups were also completed.

    At the event on May 21, there were speakers from the Commission, its Advisory Body, HDI, and the community research team. Pareesa Charmchi Goodwin, the executive director of the Commission on Racial Equity in Public Health opened the event stating, “This is only the beginning. This work will be an ongoing, intentional, and incremental effort to dismantle racism in public policy.”

    “Dismantling racism in public health is no easy fix, it will take time. But these new recommendations are an important first step. We now have a plan to challenge the ways racism operates to negatively impact health issues,” said UConn School of Medicine’s Dr. Linda Sprague Martinez, director of the UConn Health Disparities Institute.

    “Our collaboration with the State Commission on Racial Equity in Public Health is novel, in that it is highly participatory and involves residents from across the state. Connecticut is leading the way when it comes to operationalizing how to address racism as a public health issue, and other states across the nation may be interested in replicating our approach. Our state is taking an anti-racism in health approach with deep community engagement to inform the legislation it recommends.”

    May 21 event of the Commission on Racial Equity in Public Health included CREPH staff and Advisory Body members, HDI team, and State Senator Saud Anwar. (Photo by Shariffah Mason, Reef’s Views).

    Sprague Martinez believes people in the community know what they need to be healthy.

    “The Commission has worked with HDI to keep a finger on the pulse of the community, creating opportunities to hear from residents. Through participatory planning we have engaged broadly with residents on-the-ground from across our state to collect data, ensuring the voices of impacted communities have a hand in contributing to solutions and to future public policy,” says Sprague Martinez.

    She adds, “These collaborative recommendations released by the Commission demonstrate the value of having community members participate as researchers in the research and planning process. This really can help make a difference to help create policy changes that really reflect local priorities,” says Sprague Martinez. “As a Black woman, addressing the impacts of racism in public health can be taxing on the soul; there are communities experiencing exclusion, erasure, exploitation, marginalization, and violence. This makes our work both necessary and important. Racism in public policy is a threat to the health and well-being of all people. We need to continue to work collaboratively across communities to ensure our collective well-being,” stresses Sprague Martinez.

    She concludes, “Systems, health, social and others, are not broken, they are working as they were intended. For health and social systems to work for more people we need to start including more voices in the planning process. The approach the Commission used to develop its strategic plan is an important step forward in dismantling racism and ensuring the optimal health of all residents in the state. There is still more to do, but this is an important beginning.”

    This summer the Commission and HDI plan to release the full strategic plan.

    For assessment reports and more information, visit the strategic plan webpage of the State Commission on Racial Equity in Public Health.

    Community research team and State Senator Saud Anwar (Photo by Shariffah Mason, Reef’s Views).

    About the Health Disparities Institute (HDI)
    The Health Disparities Institute at UConn Health works to advance equity and improve health outcomes by addressing the root causes of health disparities. Through research, data, workforce development, and strong partnerships with communities disproportionately impacted by inequities, HDI leads efforts to create systemic change. HDI’s vision is equitable health, education, and economic opportunity for all in Connecticut.

    About the Commission on Racial Equity in Public Health (CREPH)
    Housed within Connecticut’s legislative branch, CREPH’s mission is to make policy and systems change recommendations to eliminate racial and ethnic inequities in health and social drivers of health. CREPH advances this mission through study, documentation, policy analysis, and collaboration with impacted communities, state agencies, and stakeholders. Our vision is a healthy, racially equitable Connecticut.

    MIL OSI USA News

  • MIL-OSI USA: Warren on Federal Judge Blocking Trump’s Attempt to Dismantle the Department of Education

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren
    May 22, 2025
    Washington, D.C. – Today, in response to the news that a federal judge issued a preliminary injunction blocking Trump’s attempts to dismantle the Department of Education., U.S. Senator Elizabeth Warren (D-Mass.) released the following statement:
    “Firing over 1,300 federal education workers was all part of Trump’s illegal scheme to dismantle the Education Department. But Donald Trump is not a king, and his attempts to dismantle the Department of Education are illegal. This court ruling is a win for students with disabilities, for working-class students trying to afford college, and for teachers in under-resourced schools.”

    MIL OSI USA News

  • MIL-OSI USA: SEC Charges Former Real-Estate Investment CEO with Operating Multimillion Dollar Ponzi-Like Scheme

    Source: Securities and Exchange Commission

    The Securities and Exchange Commission today charged San Francisco Bay Area resident Kenneth Mattson, the former CEO of real estate investment business LeFever Mattson, with defrauding approximately 200 investors of at least $46 million by selling them fake interests in real estate investment limited partnerships. Many of these investors were retired senior citizens Mattson met through his church community.

    According to the SEC’s complaint, LeFever Mattson managed legitimate limited partnerships that invested in residential and commercial real estate, and that were owned by a set of real investors. From approximately 2007 to April 2024, Mattson allegedly offered and sold fake ownership interests in these limited partnerships to defrauded investors. According to the complaint, the fake sales were not reflected in the legitimate records of ownership, and investors who purchased the fake interests never became actual limited partners or received ownership rights. Instead, Mattson allegedly commingled new investor funds with personal and business funds and used the commingled funds to make Ponzi-like payments, gave defrauded investors false tax records, and misappropriated investor funds to pay for personal expenses and real estate transactions and expenses related to his personal partnership, KS Mattson Partners LP. The complaint further alleges that Mattson solicited investors to transfer funds from their individual retirement accounts (IRA) to so-called self-directed IRAs, enabling them to invest in the purported limited partnership interests Mattson offered and sold. These purported sales were not recorded in LeFever Mattson’s books and records, and these investors did not become actual limited partners, according to the complaint.

    “As our complaint alleges, Mattson lied to hundreds of individual investors, many of whom were retirees investing their hard-earned savings, and did not actually sell them the ownership interests that he promised,” said Sam Waldon, Acting Director of the SEC’s Division of Enforcement. “The SEC is firmly committed to pursuing those who prey on retail investors and retirees, such as the individuals we allege that Mattson targeted.”

    The SEC’s complaint, filed in the U.S. District Court for the Northern District of California, charges Mattson with violating the antifraud and registration provisions of the federal securities laws. The SEC seeks permanent injunctions, including a conduct-based injunction, disgorgement with prejudgment interest, civil penalties, and an officer and director bar. The complaint also names KS Mattson Partners LP as a relief defendant and seeks disgorgement of its ill-gotten gains with prejudgment interest.

    The SEC’s Office of Investor Education and Advocacy has issued an Investor Alert with tips on how investors can identify and avoid frauds that operate in connection with self-directed IRAs.

    In a parallel action, the U.S. Attorney’s Office for the Northern District of California today announced criminal charges against Mattson.

    The SEC’s investigation was conducted by Duncan C. Simpson LaGoy, Natasha Bronn Schrier, and Michael Foley and was supervised by David Zhou and Jason H. Lee of the San Francisco Regional Office. The litigation will be led by Mr. Simpson LaGoy and Ms. Bronn Schrier. The SEC appreciates the assistance of the U.S. Attorney’s Office for the Northern District of California and the FBI.

    MIL OSI USA News

  • MIL-Evening Report: From peasant fodder to posh fare: how snails and oysters became luxury foods

    Source: The Conversation (Au and NZ) – By Garritt C. Van Dyk, Senior Lecturer in History, University of Waikato

    An Oyster cellar in Leith John Burnet, 1819; National Galleries of Scotland, Photo: Antonia Reeve

    Oysters and escargot are recognised as luxury foods around the world – but they were once valued by the lower classes as cheap sources of protein.

    Less adventurous eaters today see snails as a garden pest, and are quick to point out that freshly shucked oysters are not only raw but also alive when they are eaten.

    How did these unusual ingredients become items of conspicuous consumption?

    From garden snail to gastronomy

    Eating what many consider to be a slimy nuisance seems almost counter-intuitive, but consuming land snails has an ancient history, dating to the Palaeolithic period, some 30,000 years ago in eastern Spain.

    Ancient Romans also dined on snails, and spread their eating habits across their empire into Europe.

    Lower and middle class Romans ate snails from their gardens, while elite consumers ate specially farmed snails, fed spices, honey and milk.

    An Ancient Roman mosaic dating to the 4th century AD depicting a basket of snails, Basilica di Santa Maria Assunta, Aquileia, Italy.
    Carole Raddato/Wikimedia Commons, CC BY-SA

    Pliny the Elder (AD 24–79) described how snails were raised in ponds and given wine to fatten them up.

    The first French recipe for snails appears in 1390, in Le Ménagier de Paris (The Good Wife’s Guide), but not in other cookbooks from the period.

    In 1530, a French treatise on frogs, snails, turtles and artichokes considered all these foods bizarre, but surprisingly popular. Some of the appeal had to do with avoiding meat on “lean” days. Snails were classified as fish by the Catholic Church, and could even be eaten during Lent.

    For the next 200 years, snails only appeared in Parisian cookbooks with an apology for including such a disgusting ingredient. This reflected the taste of upper-class urbanites, but snails were still eaten in the eastern provinces.

    Schneckenweib, or Snail Seller, illustrated by Johann Christian Brand in Vienna, after 1798.
    Wien Museum

    An 1811 cookbook from Metz, in the Alsace region in northeastern France, describes raising snails like the Romans, and a special platter, l’escargotière, for serving them. The trend did not travel to Paris until after 1814.

    French diplomat Charles-Maurice de Talleyrand-Périgord (1754–1838) hosted a dinner for Russian Tsar Alexander I, after he marched into Paris following the allied forces’ defeat of Napoleon in 1814.

    The chef catering the meal was the father of French cuisine Marie-Antoine Carême, a native of Burgundy, spiritual home of the now famous escargots de Bourgogne.

    Carême served the Tsar what would become a classic recipe, prepared with garlic, parsley and butter. Allegedly, the Tsar raved about the “new” dish, and snails became wildly popular. A recipe for Burgundy snails first appeared in a French culinary dictionary published in 1825.

    It is ironic that it took the approval of a foreign emperor, who had just conquered Napoleon, to restore luxury status to escargot, a food that became a symbol of French cuisine.

    Snails remain popular today in France, with consumption peaking during the Christmas holidays, but May 24 is National Escargot Day in France.

    Oysters: the original fast food

    Oysters are another ancient food, as seen in fossils dating to the Triassic Era, 200 million years ago. Evidence of fossilised oysters are found on every major land mass, and there is evidence of Indigenous oyster fisheries in North America and Australia that dates to the Holocene period, about 12,000 years ago.

    There are references in classical Greek texts to what are probably oysters, by authors like Aristotle and Homer. Oyster shells found at Troy confirm they were a favoured food. Traditionally served as a first course at banquets in Ancient Greece, they were often cooked, sometimes with exotic spices.

    Music-cover sheet for ‘Bonne-Bouche’ by Emile Waldteufel, 1847-1897.
    © The Trustees of the British Museum, CC BY-NC-SA

    Pliny the Elder refers to oysters as a Roman delicacy. He recorded methods of the pioneer of Roman oyster farming, Sergius Orata, who brought the best specimens from across the Empire to sell to elite customers.

    Medieval coastal dwellers gathered oysters at low tide, while wealthy inland consumers would have paid a premium for shellfish, a perishable luxury, transported to their castles.

    French nobles in 1390 preferred cooked oysters, roasted over coals or poached in broths, perhaps as a measure to prevent food poisoning. As late as the 17th century, authors cautioned:

    But if they be eaten raw, they require good wine […] to aid digestion.

    Oyster Seller, Jacob Gole, 1688–1724.
    Rijksmuseum

    By the 18th century, small oysters were a popular pub snack, and larger ones were added as meat to the stew pot. That century, it is believed as many as 100,000 oysters were eaten each day in Edinburgh and the shells from the tavern in the basement filled in gaps in the brickwork at Gladstone’s Land in Edinburgh’s Royal Mile.

    Scottish oyster farms in the Firth of Forth, an inlet of the North Sea, produced 30 million oysters in 1790, but continual over-harvesting took its toll.

    By 1883 only 6,000 oysters were landed, and the population was declared extinct in 1957.

    As wild oyster stocks dwindled, large oyster farms developed in cities like New York in the 19th century. Initially successful, they were polluted, and infected by typhoid from sewage. An outbreak in 1924 killed 150 people, the deadliest food poisoning in United States history.

    Costumes of Naples: Oyster Sellers, c. 1906–10.
    Rijksmuseum

    Far from the overabundance of oysters we once had, over-fishing, pollution, and invasive species all threaten oyster populations worldwide today. Due to this scarcity of wild oysters and the resources required to safely farm environmentally sustainable oysters, they are now a premium product.

    Next on the menu

    Scarcity made oysters a luxury, and a Tsar’s approval elevated snails to gourmet status. Could insects become the next status food?

    Ancient Romans ate beetles and grasshoppers, and cultures around the world consume insects, but not (yet) as luxury products.

    Maybe the right influencer can make honey-roasted locust the next species to jump from paddock to plate.

    Garritt C. Van Dyk has received funding from the Getty Research Institute.

    ref. From peasant fodder to posh fare: how snails and oysters became luxury foods – https://theconversation.com/from-peasant-fodder-to-posh-fare-how-snails-and-oysters-became-luxury-foods-254299

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: There is a growing number of ‘super-sized’ schools. Does the number of students matter?

    Source: The Conversation (Au and NZ) – By Emma Rowe, Associate Professor in Education, Deakin University

    LBeddoe/Shutterstock

    Earlier this week, The Sydney Morning Herald reported one of Sydney’s top public high schools had more than 2,000 students for the first time, thanks to the booming population in the area.

    This follows similar reports of other “super-sized” schools in Victoria, Western Australia and Queensland.

    Parents may be wondering if a school’s size will impact their child’s opportunities or experience. What does the research say?

    A controversial subject

    Policy-makers have been concerned about school sizes for decades. This largely relates to declining enrolments in some areas and growing demand in others. For example, in Victoria during the Kennett government in the 1990s, some schools were merged into “super schools”.

    Super schools are attractive to policy-makers due to their ability to pool resources. However, anecdotally, parents have tended to oppose mergers on the basis that big schools detract from the community feel and personal relationships.

    There is no national data on average school size, although you can check individual school sizes on the MySchool website.

    Education authorities consider a school to be “small” if it has fewer than 300 students for primary school and fewer than 700 for high school.

    What does the research say?

    Australian-based research tends to support larger schools, on the basis they provide more curriculum choices. In a 2014 study published in the Journal of Education Policy, the authors wrote:

    large schools have more resources and are therefore better placed to offer a large range of curriculum, often including both academic and vocational subjects.

    A 2023 study similarly argued:

    smaller schools are generally less able to offer a wide range and diversity of curricular offerings compared to larger schools.

    Small schools can be beneficial

    But other education advocates argue small schools better facilitate participatory democratic environments for young people, improve discipline and sense of community.

    A 2009 review of 57 studies (the majority from the United States) published after 1990 recommended high schools do not have more than 1,000 students.

    The review said smaller schools can offer a community-like feel for students and are more likely to have smaller class sizes. A smaller school may be particularly advantageous for neurodiverse students if there are lower levels of noise and movement.

    A US-based study from 1991 found schools with less than 400 students lead to better student participation, attendance and satisfaction with school:

    The two primary arguments for large schools, cost savings and curriculum enhancement, pale in comparison with the positive schooling outcomes […] achieved by small schools.

    Smaller schools can offer a stronger sense of community.
    Dean Drobot/ Shutterstock

    But context matters

    In 2000, the Gates Foundation had a “big idea” to break up large high schools and turn them into “small learning communities” of 400 or fewer students.

    The foundation believed the initiative would lift graduation rates and student achievement, especially among minority students, because of the close relationships between students and teachers.

    But by 2008, the foundation conceded it had not worked – there had been no “dramatic improvements” in the number of students who leave high school adequately prepared for further study.

    But it’s not really about size

    So the research offers a mixed picture – this strongly suggests the size of a school on its own is not the most important factor.

    We also need to look at factors such as class size. Research shows smaller class sizes and lower teacher to student ratios are beneficial for student outcomes.

    Smaller class sizes and lower teacher to student ratios can lead to more one-on-one attention, improved relationships and lower noise levels in a classroom.

    Some studies have categorised “small classes” as between 13-17 students and larger classes as between 22-25 students.

    Teaching quality may also be improved with a smaller class size, as the teacher has more time to tailor their instruction to individual students.

    Importantly, the size of a school overall does not necessarily determine class sizes. A large school or a small school can still have large class sizes, and still struggle for quality one-on-one time.

    Similarly, a large school can still offer a strong sense of community and positive relationships between teachers and peers, depending on the way the school is organised (for example, a “school-within-a-school” or specific learning group within the school).

    If a small school is not well-resourced or does not have enough teachers, it may struggle to provide a positive, happy learning environment.

    The point is the school size on its own is not necessarily a positive or negative. What matters is what else is going on inside that school and whether it has the funding and resources to offer smaller class sizes, specialised teachers and access to a wide variety of subjects.

    Emma Rowe receives funding from the Australian Research Council.

    ref. There is a growing number of ‘super-sized’ schools. Does the number of students matter? – https://theconversation.com/there-is-a-growing-number-of-super-sized-schools-does-the-number-of-students-matter-257012

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Australian roads are getting deadlier – pedestrians and males are among those at greater risk

    Source: The Conversation (Au and NZ) – By Milad Haghani, Associate Professor & Principal Fellow in Urban Risk & Resilience, The University of Melbourne

    At least ten people died in fatal crashes earlier this month in a single 48-hour period on Victorian roads. It was the latest tragic demonstration of the mounting road trauma in Australia.

    In the decade up to 2020, the national road toll was gradually declining, albeit with some fluctuations. But the trend has since reversed, with fatalities rising steadily year after year.

    According to the latest official data, 1,296 people died on Australian roads in the year to April. 108 lives were lost last month alone, almost 15% more than the average for April over the previous five years.

    While our population has increased by about 6% over this five-year period, our road deaths have gone up by 18.5%.

    Road fatalities rarely follow evenly distributed averages. They sometimes spike, as they have in Victoria. And while we must never lose sight of the fact that these are people, and not just data, there is value in interrogating clusters when they occur.

    Victoria breakdown

    In the 12 months to May 20 this year, 118 lives were lost on Victorian roads, up 8.3% on the previous year and well above the five-year average of 100 annual deaths.

    The sharpest increases by transport mode have been among pedestrians (up 24%), one of the most vulnerable road-user groups. And a new threat has emerged with the first publicly reported case in Australia of a pedestrian dying after being struck by an electric bike.

    At least one pattern stands out from the recent cluster: five of the eight crashes occurred outside metropolitan Melbourne. This reflects the longstanding reality that fatal collisions remain disproportionately common in regional and remote areas. Over the 12 months, country road deaths have risen by 11%, compared to a 2% increase in metropolitan Melbourne.

    A large share of road deaths continue to occur in the country.
    Inge Blessas/Shutterstock

    Another striking detail is the gender distribution. Male deaths are up 22% on the previous period and now comprise nearly 80% of all fatalities. In contrast, female deaths have declined by 33%.

    Another trend that stands out is the rising toll among older road users. In the last 12 months, 40 people aged 60 and over have died on Victorian roads – a 25% increase on the previous period.

    4 National trends

    The national road fatality data tells us some of these trends are not exclusive to Victoria. They reflect what is happening across the country.

    1. Vulnerable road users: Nationally, pedestrians and motorcyclists have experienced sustained increases in lives lost for at least four years in a row. The share of pedestrians in total road deaths has risen from 11% in 2021 to 14% in the latest period. Despite the growing number, motorcyclist fatalities have remained relatively stable at about 20% of all deaths.

    2. Gender disparity: Men continue to be disproportionately represented in the national road toll, accounting for approximately 75% of all road deaths in Australia.

    3. Older age groups: In the 12 months to April 2025, deaths among individuals aged 75 and over increased by nearly 19% to 185.

    4. Regional and remote areas: in the 12 months to April 2024, there were roughly 818 deaths on country roads, compared to 400 in metropolitan areas.

    What do the trends tell us?

    There are several key points in the data.

    First, the persistent over-representation of men in fatalities remains a defining feature of the road toll. This gender imbalance is not specific to Australia.

    But put simply, we still know very little about what’s driving this pattern. Known behavioural and physiological sex-based differences don’t fully explain the scale of the disparity.

    The rise in fatalities among older Australians does not appear to be particularly abnormal when tracked with demographic changes. From 2020 to 2024, the number of Australians aged 75 and over increased by nearly 31%. In comparison, fatalities in this age group rose by around 25% over the same period. This suggests that the relative risk for older Australians has not necessarily increased.

    As for rural and regional areas, approximately two-thirds of road deaths occur in these areas, while only one-third of Australians reside there. Despite years of acknowledgment, this urban–rural divide in road safety remains wide and unresolved.

    SUVs a menace?

    While vehicles have become safer for their occupants, they have become more dangerous for other road users, especially pedestrians.

    One contributing factor could be the fast growing dominance of SUVs and light trucks in Australia.

    A recent international review that pooled the findings of 24 studies found SUVs were associated with significantly higher fatality rates in crashes involving vulnerable road users, compared to smaller cars. The effect was particularly pronounced for children.

    Heavier vehicles, such as SUVs, pose a higher road risk to pedestrians.
    King Ropes Access/Shutterstock

    The dangers are not limited to pedestrians. In two-vehicle collisions, increasing the striking vehicle’s weight by around 450 kilograms raises the probability of a fatality in the other vehicle by 40–50%.

    New targets

    Australian governments have adopted a Vision Zero goal of no road deaths or serious injuries by 2050.

    The complete elimination of fatalities should remain our moral benchmark. But the current data suggests intermediate targets are urgently needed.

    A more achievable near-term priority may be to first reverse the rising national toll by focusing on where the greatest preventable harms persist: vulnerable road users, especially pedestrians, males and non-urban roads.

    Milad Haghani receives funding from The Australian Government.

    Iman Taheri Sarteshnizi does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Australian roads are getting deadlier – pedestrians and males are among those at greater risk – https://theconversation.com/australian-roads-are-getting-deadlier-pedestrians-and-males-are-among-those-at-greater-risk-256994

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI USA: ‘Tis the Season for Dismissals: Statement on Ending “Dealer” Lawsuits

    Source: Securities and Exchange Commission

    First came the abandonment of crypto lawsuits.[1] Now the dismissals of “dealer” lawsuits. What do these unprecedented dismissals of ongoing enforcement actions have in common? They ignore the laws enacted by Congress – namely fundamental registration requirements of the federal securities laws – as well as long lines of judicial precedent. And they harm investors, businesses, and the capital markets.

    It is astonishing that an agency tasked with enforcing the law has decided the law does not matter.

    Overview of dismissals

    Today, the SEC dismissed three lawsuits that alleged that certain businesses broke the law by failing to register with the SEC as “dealers.”[2] Though seemingly mundane, one of our agency’s foundational statutes, passed in the wake of the Great Depression, defines a “dealer” and requires said dealers to register with the SEC.[3] The core of the dealer definition is written in plain terms: a dealer is any person or entity engaged in the regular business of buying and selling securities for their own account.

    The allegations in these now-dismissed lawsuits were not a stretch. They concerned well-established businesses that made money by purchasing debt directly from small issuers and then converting that debt into stock they would sell on the open market at high volumes and frequencies.[4] The defendants in those lawsuits transacted in billions of shares of newly issued stocks for their own accounts, generating millions in profits. They had sophisticated marketing operations to maintain a pipeline of deals. That sure sounds like being in the regular business of buying and selling securities.

    In two of these cases, courts have in fact already ruled that the SEC’s allegations were sufficient to support the charges that these entities violated the law.[5] These rulings were consistent with judgments the SEC has obtained in similar past enforcement actions holding that such activity requires registering as a dealer.[6]

    Debunking arguments for dismissals

    While favorable court precedent alone would, historically, be enough to continue litigating these cases, there are no other new or convincing reasons for the dismissals.

    First, those who have advocated for dismissals of these types of cases seem to read a non-existent requirement – that dealers have customers – into the statutory definition.[7] They argue that, historically, dealers were understood to have customers and that enforcing the dealer registration requirement more broadly is arbitrary. However, the dealer definition concerns whether one is in the regular business of transacting in securities for one’s own account, not whether one has customers. A customer requirement is simply not part of the definition. As time-consuming (or inconvenient for some) as it may be, determining whether a person is a dealer is a fact-specific inquiry, and examination of all relevant facts is necessary. Enforcing the law relies on applying all the facts to the then-current law.

    Second, those advocates also claim that, without a customer requirement, the statute will sweep into the dealer definition investment advisers, hedge funds, and others not traditionally understood as dealers. But that is not what the cases dismissed today did. An appellate court in SEC v. Almagarby spoke to this very issue in upholding a dealer registration violation:

    To be clear, we do not mean to suggest that every professional investor who buys and sell[s] securities in high volumes is a “dealer.” [S]ignificant differences exist between Almagarby’s conduct and that of…investment advisor and fund members. For example, institutional asset managers do not rely on dilution financing or the rapid resale of microcap share issues as their sole source of income. Nor do they employ networks of finders to solicit microcap debtholders or operate without financial disclosures or regulatory oversight.[8]

    Third, those who have advocated for dismissals also claim that these cases have stifled capital formation and the growth of small businesses. But this notion that, by ignoring the law we will facilitate capital formation and small business growth, turns logic on its head. Wholesale rejection of the rule of law never has, and never will, promote capital formation and business growth. And as the Almagarby court noted, the type of conduct at issue here “is called ‘toxic’ or ‘death spiral’ financing” and is “disfavored,” including by issuers and investors.[9] Today’s dismissals open the floodgates to this type of unsavory financing without regulatory oversight.

    What is at stake?

    So, what is at stake here? Registration “serves as a keystone of the entire system of broker-dealer regulations.”[10] Dealers perform important market functions, such as distributing securities, helping to balance supply and demand when there are order imbalances, and facilitating investor trading by providing liquidity to buyers and sellers who otherwise might not be able to immediately find other investors with whom to trade. The SEC has promulgated rules governing the operation of dealers, including by setting standards of conduct. These have been designed with market integrity and investor protection in mind. They also foster capital formation.

    The defendants in the now-dismissed lawsuits were alleged to have eschewed applicable securities laws and regulations. Doing so leaves investors holding the proverbial bag. And it leaves them and the markets without the fundamental protections Congress envisioned for entities acting in a dealer capacity. That regime includes, among other things, certain financial responsibility and risk management rules,[11] transaction and other and reporting requirements,[12] operational integrity rules,[13] and books and record requirements.[14] These requirements enhance market stability by providing regulators with insight into firm-level and aggregate trading activity, which helps assess and mitigate market risks. In addition, dealers are subject to examination and enforcement for compliance with applicable laws and Self-Regulatory Organization (SRO) rules by the SEC and the SROs.[15]

    Last but not least, dismissing these lawsuits encourages others to flout registration and other legal requirements. This undermines the securities law framework that has been constructed over the years to protect investors and facilitate capital markets. It is a worrisome world when we help participants evade the law because the law is inconvenient for their bottom line.

    Conclusion

    A lot of lip service is paid to the SEC’s mission: protecting investors; maintaining fair, orderly, and efficient markets; and facilitating capital formation. But actions, or in this instance dismissals of actions, speak louder than words. Dismantling enforcement of across-the-board registration requirements – which has now reached every fundamental registration provision (exchange, broker, dealer, and offering) under the securities laws – undermines the mission.


    [1] See, e.g., Joint Stipulation to Dismiss, and Releases, SEC v. Balina, 22-cv-950 (W.D. Tex. May 1, 2025); Joint Stipulation to Dismiss, and Releases, Joint Stipulation to Dismiss, and Releases, SEC v. Dragonchain, 22-cv-1145-JNW (W.D. Wash. Apr. 24, 2025); SEC v. Cumberland DRW, 24-cv-9842 (N. D. Ill. Mar. 27, 2025); Joint Stipulation to Dismiss and Releases, SEC v. Payward (d/b/a Kraken), 23-cv-6003-WHO (Mar. 27, 2025); Joint Stipulation to Dismiss, and Releases, SEC v. Consensys Software, 24-cv-4578-MKB-TAM (Mar. 27, 2025); Joint Stipulation to Dismiss, and Releases, SEC v. Coinbase, 23-cv-4738-KPF (Feb. 27, 2025).

    [2] Stipulation to Dismiss and Release, SEC v. Long, No. 23-cv-14260 (N.D. Ill. May 22, 2025); Joint Stipulation to Dismiss, and Releases, SEC v. Tri-Bridge Ventures, No. 24-cv-5711-ZNQ-RLS (D.N.J. May 22, 2025); Stipulation of Dismissal and Releases, SEC v. LG Capital Funding, No. 22-cv-3353 (E.D.N.Y. May 22, 2025). See also Stipulation to Dismiss and Release, SEC v. River North, No. 19-cv-1711 (N.D. Ill. May 22, 2025) (dismissing with prejudice unregistered dealer claims, but continuing to litigate other claims).

    [3] Securities and Exchange Act of 1934 Section 3(a)(5) (15 U.S.C. § 78c(a)(5)) (defining dealer) and Section 15(a) (15 U.S.C. § 78o(a)) (requiring dealer registration).

    [4] See Complaint, SEC v. Tri-Bridge Ventures, No. 24-cv-05711 (D.N.J. Apr. 29, 2024); Complaint, SEC v. Long, No. 23-cv-14260 (N.D. Ill. Sept. 28, 2023); Complaint, SEC v. LG Capital Funding, 22-cv-3353 (E.D.N.Y. June 7, 2022). See also Complaint, SEC v. River North, 19-cv-1711 (N.D. Ill. Mar. 13, 2019).

    [5] SEC v. LG Capital Funding, 702 F.Supp.3d 61 (E.D.N.Y. Nov. 13, 2023) (denying motion to dismiss); SEC v. Long, 2024 WL 3161669 (N.D. Ill. June 25, 2024) (same). See also SEC v. River North, 2019 WL 6527971 (N.D. Ill. Dec. 4, 2019) (same).

    [6] See, e.g., SEC v. Keener, 580 F. Supp. 3d 1272 (S.D. Fla. 2022) (granting summary judgment to SEC on unregistered dealer claim), aff’d, 102 F.4th 1328 (11th Cir. 2024) (upholding district court ruling that defendant operated as an unregistered dealer and rejecting due process and equal protection arguments); SEC v. Almagarby, 479 F. Supp. 3d 1266 (S.D. Fla. 2020) (same), aff’d in relevant part, 92 F.4th 1306 (11th Cir. 2024) (upholding district court ruling that defendant operated as an unregistered dealer and rejecting fair notice arguments); SEC v. Carebourn Capital, 2023 WL 6296032 (D. Minn. Sept. 27, 2023) (granting summary judgment to SEC on unregistered dealer claim); SEC v. Fierro, 2023 WL 4249011 (D.N.J. June 29, 2023) (same). See also, SEC v. Morningview Financial, 2023 WL 7326125 (S.D.N.Y. Nov. 7, 2023) (denying motion to dismiss unregistered dealer claim); SEC v. GPL Ventures, 2022 WL 158885 (S.D.N.Y Jan. 18, 2022) (same).

    [9] Id. at 1312.

    [10] Roth v. SEC, 22 F.3d 1108, 1109 (D.C. Cir. 1994) (internal citation omitted).

    [11] See, e.g., 17 CFR 240.15c3-1 (“Rule 15c3-1” or “Net Capital Rule”); Financial Responsibility Rules for Broker-Dealers, Exchange Act Release No. 70072 (July 30, 2013), 78 FR 51823 at 51849 (Aug. 21, 2013).

    [12] See, e.g., FINRA Rule 6730(a)(1); FINRA Rule 4530 (Reporting Requirements); Consolidated Audit Trail, Exchange Act Release No. 62174 (May 26, 2010), 75 FR 32556 (June 8, 2010); Joint Industry Plan; Order Approving the National Market System Plan Governing the Consolidated Audit Trail, Exchange Act Release No. 79318 (Nov. 15, 2016), 81 FR 84696 (Nov. 23, 2016) (“CAT Approval Order”).

    [13] See, e.g., Market Access Rule (promotes market integrity by reducing risks associated with market access by requiring financial and regulatory risk management controls reasonably designed to limit financial exposures and ensure compliance with applicable regulatory requirements).

    [14] See, e.g., Exchange Act Section 17(a) and 17 CFR 240.17a-3 (“Rule 17a-3”) and 240.17a-4 (“Rule 17a-4”). See also, e.g., FINRA Rules 2268, 4510, 4511, 4512, 4513, 4514, 4515, 5340, and 7440(a)(4) (requiring member firms to make and preserve certain books and records to show compliance with applicable securities laws, rules, and regulations and enable SEC and FINRA staffs to conduct effective examinations). Among other things, SEC and SRO books and records rules help to ensure that regulators can access information to evaluate the financial and operational condition of the firm, including examining compliance with financial responsibility rules, among other rules, as well as assess whether and how a firm’s participation in the securities markets impacted a major market event. See Staff Study on Investment Advisers and Broker Dealers As Required by Section 913 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Jan. 2011) at 72.

    [15] See e.g., Exchange Act Section15(b) (regarding SEC authority to sanction brokers and dealers) and Section 17(b) (broker-dealer recordkeeping and examination).

    MIL OSI USA News

  • MIL-OSI USA: Washington State Wins Court Order Stopping Dismantling of Department of Education

    Source: Washington State News

    SEATTLE — Attorney General Nick Brown and a coalition of 20 other state attorneys general today won a court order stopping the Trump administration’s attempts to dismantle the Department of Education.

    On March 13, the coalition of attorneys general filed a lawsuit against the Trump administration for its plans to cut 50 percent of Department of Education’s s workforce. Following a March 20 Executive Order directing the closure of the Department and President Trump’s March 21 announcement that, in addition to implementing layoffs, the Department must “immediately” transfer student loan management and special education services outside of the Department, Attorney General Brown and the coalition sought a preliminary injunction to immediately stop the mass layoffs and transfer of services.

    Today the U.S. District Court for the District of Massachusetts granted the preliminary injunction, halting the administration’s policies that would dismantle the Department of Education and ordering all employees who were fired as part of the layoffs to be reinstated.

    “Today’s injunction supports the rule of law, and students and educators around the country,” Brown said. “Our office will fight illegal and unconstitutional executive orders. And we will continue to win.”

    The coalition of attorneys general argued in their lawsuit and motion for a preliminary injunction that the Trump administration’s attacks on the Department of Education are illegal and unconstitutional. It is an executive agency authorized by Congress, with numerous laws creating its programs and funding streams. The lawsuit asserts that the executive branch does not have the legal authority to unilaterally dismantle it without an act of Congress. In addition, the coalition argued that Department of Education’s mass layoffs violate the Administrative Procedures Act.

    Joining the Washington State Attorney General’s Office in filing the lawsuit are the attorneys general of Arizona, California, Colorado, Connecticut, Delaware, Hawaii, Illinois, Maine, Maryland, Massachusetts, Michigan, Minnesota, Nevada, New Jersey, New York, Oregon, Rhode Island, Wisconsin, Vermont, and the District of Columbia.

    The court order can be found here.

    -30-

    Washington’s Attorney General serves the people and the state of Washington. As the state’s largest law firm, the Attorney General’s Office provides legal representation to every state agency, board, and commission in Washington. Additionally, the Office serves the people directly by enforcing consumer protection, civil rights, and environmental protection laws. The Office also prosecutes elder abuse, Medicaid fraud, and handles sexually violent predator cases in 38 of Washington’s 39 counties. Visit www.atg.wa.gov to learn more.

    Media Contact:

    Email: press@atg.wa.gov

    Phone: (360) 753-2727

    General contacts: Click here

    Media Resource Guide & Attorney General’s Office FAQ

    MIL OSI USA News

  • MIL-OSI USA: Big Y Foods Recalls Made-To-Order Subs, Wraps and Paninis Sold in Massachusetts and Connecticut Because of Possible Health Risk

    Source: US Department of Health and Human Services – 3

    Summary

    Company Announcement Date:
    May 22, 2025
    FDA Publish Date:
    May 22, 2025
    Product Type:
    Food & BeveragesFoodborne Illness
    Reason for Announcement:

    Recall Reason Description
    Salmonella

    Company Name:
    Big Y Foods
    Brand Name:

    Brand Name(s)
    Big Y Foods

    Product Description:

    Product Description
    Made-to-order subs, wraps and paninis

    Company Announcement
    Big Y Foods of Springfield, MA is voluntarily recalling some Made-To-Order Subs, Wraps and Paninis sold between 5/20 and 5/21 in some Massachusetts and Connecticut retail stores (listed below), because they have the potential to be contaminated with Salmonella, an organism which can cause serious and sometimes fatal infections in young children, frail or elderly people and others with weakened immune systems. Healthy persons infected with Salmonella often experience fever, diarrhea (which may be bloody), nausea, vomiting and abdominal pain. In rare circumstances, infection with Salmonella can result in the organism getting into the bloodstream and producing more severe illnesses such as arterial infections (i.e., infected aneurysms), endocarditis and arthritis.
    This recall includes any Made-To-Order Small Sub, Large Sub, 30” Super Sub, Wrap or Panini purchased on 5/20 or 5/21 sold in the following Big Y Stores:

    Address

    City 

    State

    Zip

    1090 St. James Avenue

    Springfield

    MA

    01104

    79 Stonington Rd.

    Mystic

    CT

    06355

    136 North King Street Rt. 5

    Northampton

    MA

    01060

    10 College Highway Rt. 10

    Southampton

    MA

    01073

    802 Williams Street

    Longmeadow

    MA

    01106

    441 N Main St.

    E. Longmeadow

    MA

    01028

    772 North Main St.

    West Hartford

    CT

    06117

    148 West St.

    Ware

    MA

    01082

    200 West St.

    Pittsfield

    MA

    01201

    45 Veterans Memorial Drive

    North Adams

    MA

    01247

    224 Salem Turnpike

    Norwich

    CT

    06360

    141B Storrs Road

    Mansfield

    CT

    06250

    1040 Elm Street

    Rocky Hill

    CT

    06067

    234 Tolland Turnpike

    Manchester

    CT

    06040

    175 University Drive

    Amherst

    MA

    01002

    65 Palomba Drive

    Enfield

    CT

    06082

    1 Kent Road

    New Milford

    CT

    06776

    22 Spencer Plan Rd.

    Old Saybrook

    CT

    06475

    995 Poquonnock Road

    Groton

    CT

    06340

    237 Mohawk Trail, Route 2

    Greenfield

    MA

    01301

    300 Cooley Street

    Springfield

    MA

    01128

    135 West Rd.

    Elington

    CT

    06029

    355 Hawley Lane

    Stratford

    CT

    06614

    2035 Boston Rd.

    Wilbraham

    MA

    01095

    405 Bridgeport Ave.

    Shelton

    CT

    06484

    1313 Hopmeadow St.

    Slimsbury

    CT

    06070

    7 East Hampton Rd. Route 66

    Marlborough

    CT

    06447

    23 Killingworth Turnpike

    Clinton

    CT

    06413

    150 Boston Post Rd.

    Milford

    CT

    06460

    434 Walpole St.

    Norwood

    MA

    02062

    Big Y Foods was notified by Smartcuts that the sliced cucumber distributed to Big Y Foods was impacted by the ongoing Bedner Growers Inc. Cucumber Outbreak investigation. The Smartcuts sliced cucumber is provided as an ingredient option for customers to order when ordering a sub, wrap, or panini at the sandwich service line within the retail Kitchen Department. Big Y Foods ceased operation in all stores listed above, discarded product within the sub, wrap, and panini service line, then thoroughly cleaned and sanitized the service line.
    All Made-To-Order subs, wraps and paninis were produced within the Kitchen Department upon customer request. The subs, wraps and paninis impacted by the cucumber recall were provided for sale to consumers May 20, 2025, and May 21, 2025. These subs, wraps and paninis were not prepackaged for customer self-service.
    No illnesses have been reported to date.
    Consumers who have purchased Made-To-Order subs, wraps and paninis are urged to return the product or show a receipt to the place of purchase for a full refund. Consumers with questions may contact Big Y Foods at wecare@bigy.com, call Big Y Foods at 1-800-828-2688 select Option #7, Monday through Friday from 7am – 4pm, or contact the Smartcuts company at 1-860-525-3237 Monday through Friday from 8am – 5pm.
    Link to FDA Outbreak Advisory

    Company Contact Information

    Consumers:
    Big Y Foods, Smartcuts
    1-800-828-2688 select Option #7, 1-860-525-3237
    wecare@bigy.com

    Media:
    Aimee Diliberto, Big Y Foods
    1-800-828-2688

    Content current as of:
    05/22/2025

    Regulated Product(s)

    Topic(s)

    Follow FDA

    MIL OSI USA News

  • MIL-OSI Security: Montgomery Man Sentenced for Possessing Machinegun Conversion Device During Tuskegee University Shooting Incident

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    MONTGOMERY, AL – Acting United States Attorney Kevin Davidson announced today that a Montgomery man who was present during a campus shooting at Tuskegee University has been sentenced in federal court. On May 20, 2025, 25-year-old Jaquez Kevon Myrick was sentenced to 24 months in prison for possession of a firearm equipped with a machinegun conversion device. Following his prison term, Myrick will serve three years of supervised release. There is no parole in the federal system.

    According to court records and the criminal complaint, on November 10, 2024, law enforcement officers responded to reports of a mass shooting in a parking lot on the campus of Tuskegee University in Tuskegee, Alabama. Upon arrival, officers encountered a large crowd and heard gunfire in the area. During the response, an officer observed Myrick moving through the parking lot with a firearm in his hand and detained him.

    Upon inspection, agents determined that the handgun Myrick possessed was equipped with a machinegun conversion device—commonly referred to as a “switch.” When installed, such a device transforms a semi-automatic firearm into a fully automatic weapon, capable of firing up to 20 rounds per second with a single pull of the trigger. Myrick pleaded guilty to possession of the device on January 29, 2025.

    “This case is yet another example of the danger posed by illegal machinegun conversion devices,” said Acting U.S. Attorney Davidson. “These devices turn handguns into weapons of war, with no place on our streets or campuses. We will continue to work with our law enforcement partners to keep our communities safe and hold offenders accountable.”

    The investigation was conducted by the Alabama Law Enforcement Agency (ALEA), Tuskegee University Police Department, City of Tuskegee Police Department, Macon County Sheriff’s Office, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), Federal Bureau of Investigation (FBI), Fifth Judicial Circuit District Attorney’s Office, and the Alabama Attorney General’s Office. Assistant United States Attorney Tara S. Ratz prosecuted the case for the Middle District of Alabama.

    MIL Security OSI