Category: Finance

  • MIL-OSI United Nations: Deputy Secretary-General’s remarks at the Joint ECOSOC and UN-Habitat High-Level Dialogue on Adequate Housing for all [as prepared for delivery]

    Source: United Nations secretary general

    Honourable Patty Hadju, Minister of Jobs and Families of Canada. 
    His Excellency, Bob Rae, President of ECOSOC
    Her Excellency Beatrice Karago, Deputy Permanent Representative of The Republic of Kenya to UN-Habitat
    Excellencies,
    Ladies and gentlemen,
    It is a privilege to join you today for this important dialogue.
    I thank the President of ECOSOC and UN-Habitat for convening us at such a critical moment.
    Let me begin with a simple question: What did it take for us to be here today?
    We woke up somewhere safe.
    We had an address where documents could reach us, where our families knew to find us.
    We had a place to eat a meal, charge our phones, and prepare for this day.
    For almost three billion people on our planet, none of that is guaranteed.
    This is why today’s dialogue – at this critical moment during the High-Level Political Forum – matters so urgently.
    Housing is not simply about a roof over one’s head.
    It is a fundamental human right and the foundation upon which peace itself rests.
    Sustainable development and sustainable peace are inseparable.
    Today, in an increasingly urbanized world, almost three billion people still live in inadequate conditions, in informal settlements, overcrowded housing, or with no shelter at all.
    Among them are more than 120 million refugees and internally displaced persons – families torn from their homes by conflict, persecution, and violence.
    When homes are destroyed, when families are forced to flee, when communities are uprooted, we witness how housing becomes both a casualty and weapon of war.
    In Gaza, in Ukraine, in Sudan, in Yemen, in Myanmar, and beyond, we have seen this time and again.
    There is no safe housing in rubble, and without shelter, we lose the very basis of social cohesion and stability that makes peace possible.
    This crisis touches every Sustainable Development Goal we’ve committed to achieving by 2030.
    We often say that home is where the heart is.
    Our work on housing sits at the very heart of the Sustainable Development Goals, and when we secure adequate housing for all, we nurture the conditions where every other goal can flourish.
    We know that when people have access to safe, adequate, and affordable housing, children perform better in school.
    Workers are more productive.
    Health outcomes improve dramatically.
    Decent work becomes accessible.
    Communities become more resilient to the forces that fuel conflict and division.
    And while adequate housing cannot eliminate gender-based violence within the home, it reduces women and girls’ exposure to violence in public spaces.
    So, the reality is that the ambition of the 2030 Agenda to leave no one behind begins with something as fundamental as a safe place to call home.
    By 2030, 60% of the world’s population will live in cities, rising to nearly 70% by 2050.
    We have the tools and the commitment to grow cities, not slums—guided by the New Urban Agenda’ call for planned, inclusive urbanization that ensures housing, services, and dignity for all.
    Success or failure to deliver on our commitments will depend on our ability to act urgently and work together.
    At the Financing for Development Forum, Member States rightly called for bold reforms and investments to strengthen the social contract. That must include housing, not as a standalone project, but as a driver of inclusive development.
    The Pact for the Future reaffirmed the 2030 Agenda and gave us a mandate to make multilateralism deliver in the lives of people, in the neighbourhoods where they live.
    It also gave us a mandate to prevent conflict and sustain peace – and housing sits at the intersection of both.
    Later this year, the Second World Social Summit offers us an opportunity to reaffirm that housing is critical for social protection, decent work, access to services, and essential to building a just and cohesive society.
    It is also an opportunity to recognize housing as a pillar of conflict prevention and peacebuilding.
    As Chair of the UN Sustainable Development Group, I see how country teams are working every day with governments, civil society and local and regional governments to advance these goals.
    But we need to do more.
    Concretely, that means aligning political commitment and financing with the urgency and scale of the challenge.
    It means investing in adequate housing, not just as development infrastructure, but peace infrastructure.  
    We also need to bring to the centre those who are too often pushed to the margins: women, young people, older persons, persons with disabilities, Indigenous Peoples, displaced populations, and people living in homelessness.
    Their voices and experiences must inform the policies and solutions because they know what works, what’s missing, and they can inform the solutions we need to scale.
    They also know intimately the connections between displacement, insecurity, and conflict.
    Their involvement is the best measure of our commitment to equity, dignity, and human rights.

    Ladies and gentlemen,
    The first place where opportunity begins or where it is denied is not an office building or a school – it’s a home.
    Together, let’s deliver not only shelter, but lasting solutions that offer security and a path to prosperity.
    Not only four walls and a roof, but the opportunity to live in dignity.
    Thank you.

    MIL OSI United Nations News

  • MIL-OSI USA: CAMERON COUNTY – Pennsylvania Department of Aging to Announce $3 Million Investment to Help Renovate, Upgrade Senior Community Centers Across the Commonwealth

    Source: US State of Pennsylvania

    July 23, 2025Emporium, PA

    ADVISORY – CAMERON COUNTY – Pennsylvania Department of Aging to Announce $3 Million Investment to Help Renovate, Upgrade Senior Community Centers Across the Commonwealth

    Pennsylvania Department of Aging Secretary Jason Kavulich will join regional leaders to highlight the success of the Senior Community Center (SCC) grant program that provides $3 million in competitive and non-competitive grants. This investment will help SCCs across the Commonwealth fund larger scale projects and smaller needs, ensuring older Pennsylvanians have a safe, community-centered place to gather.

    The Department recently partnered with the National Center to Reframe Aging to explore ways to promote and strengthen Pennsylvania’s 400+ Senior Community Centers as vibrant, in-person community hubs that connects older adults to vital resources, services and broader community life.

    This partnership is a key tactic in Aging Our Way, PA – Pennsylvania’s 10-year multisector plan on aging that was designed to meet the needs and preferences of older adults across the Commonwealth. The Department received funding from Governor Josh Shapiro’s 2024-25 budget to invest in the development of the PA CareKit, another key tactic of the plan.

    In his 2025-26 budget proposal, Governor Shapiro invests more in older Pennsylvanians by including $3 million for year two implementation of the plan. The Department will focus on modernizing and strengthening the PA Link, which serves as Pennsylvania’s Aging and Disability Resource Center network, designed to streamline access to long-term services and supports. Governor Shapiro’s budget proposal also includes $2 millionso the Department canincrease accountability and oversight of the Area Agency on Aging (AAA) network which, among other things, provides resources and protective services for older adults, and a $20 million investment for those AAAs so they can continue to provide key services to older adults.

    WHO:
    Secretary of Aging Jason Kavulich
    Cameron County Commissioners Jessica Herzing, James Moate and Joshua Zucal
    Kim Briggs, Executive Director, Cameron/Elk/McKean Area Agency on Aging
    Don Perry, Board President, Emporium Senior Center

    WHEN:
    Wednesday, July 23, 2025, 11:00 AM

    WHERE:
    Emporium Senior Center
    105 E. 4th St.
    Emporium, PA 15834

    MEDIA RSVP:
    Media interested in attending must RSVP with the name of photographer/reporter to agingcomms@pa.gov.

    MIL OSI USA News

  • MIL-OSI USA: MIFFLIN COUNTY – Governor Shapiro to Visit Lewistown Small Businesses, Highlight Proposed Budget Investments in PA Main Streets

    Source: US State of Pennsylvania

    July 23, 2025Lewistown, PA

    ADVISORY – MIFFLIN COUNTY – Governor Shapiro to Visit Lewistown Small Businesses, Highlight Proposed Budget Investments in PA Main Streets

    Governor Josh Shapiro will join DCED Secretary Rick Siger, local community leaders, and business owners to visit small businesses in Lewistown. This visit follows the Governor’s Main Street Matters stops in Chinatown and Lancaster this year, highlighting the real economic opportunities his 2025-26 budget will create for Pennsylvanians across the Commonwealth.

    Main Street Matters has built upon and modernized the Keystone Communities program and serves as a critical element of the Governor’s Economic Development Strategy. The Governor proposed an additional $20 million for the Main Street Matters program in his budget after its success in 2024, supporting small businesses and commercial corridors as the backbone of communities across the Commonwealth.

    WHO:
    Governor Josh Shapiro
    Secretary of Community and Economic Development Rick Siger
    Commissioner Kevin Kodish, Mifflin County Commissioners
    Julie Fitzpatrick, Executive Director, PA Downtown Center
    Ryan Cherry, Owner, East End Coffee Co.

    WHEN:
    Wednesday, July 23, 2025 at 11:00 AM

    WHERE:
    East End Coffee Co.
    18 E Market St
    Lewistown, PA 17044

    LIVE STREAM:
    pacast.com/live/gov
    governor.pa.gov/live/

    RSVP:
    Press who are interested in attending must RSVP with the names and phone numbers for each member of their team to ra-gvgovpress@pa.gov.

    MIL OSI USA News

  • MIL-OSI: Dreamland Limited Announces Pricing of Initial Public Offering

    Source: GlobeNewswire (MIL-OSI)

    HONG KONG, July 22, 2025 (GLOBE NEWSWIRE) — Dreamland Limited (the “Company” or “Dreamland”), a Hong Kong-based event management service provider, today announced the pricing of its initial public offering (the “Offering”) of 2,000,000 Class A ordinary shares, 1,340,000 of which are being offered by the Company and 660,000 by an existing shareholder (the “Selling Shareholder”), at a public offering price of US$4.00 per Class A ordinary share. The Company is also filing a resale prospectus concurrent with the Offering for the resale of 5,416,740 Class A ordinary shares held by Prime Crest Holdings Limited, Fuji Holdings Limited, Yield Rights Group Limited and Allied Target Limited (the “Resale Shareholders”). The Class A ordinary shares have been approved for listing on the Nasdaq Capital Market and are expected to commence trading on July 23, 2025 under the ticker symbol “TDIC.”

    The Company expects to receive aggregate gross proceeds of US$8,000,000 from the Offering, before deducting underwriting discounts and other related expenses. The Company will not receive any proceeds from the sale of Class A ordinary shares offered by the Selling Shareholder or Resale Shareholders in the Offering. The Offering is expected to close on or about July 24, 2025, subject to the satisfaction of customary closing conditions.

    Net proceeds from the Offering due to the Company will be used for: (i) acquiring multi-territorial IP licenses; (ii) setting up the Company’s own ticketing platform; (iii) possible strategic acquisitions; (iv) expanding the Company’s marketing department and financing and administration department; (v) upgrading the Company’s enterprise resource planning system; (vi) repaying loans made by a director in connection with the payment of costs and expenses in connection with the Offering and obtaining a listing of the Company’s Class A ordinary shares on the Nasdaq Capital Market; and (vii) working capital and other corporate purposes.

    The Offering is being conducted on a firm commitment basis. Bancroft Capital, LLC is acting as the lead managing underwriter for the Offering (the “Underwriters”). Nelson Mullins Riley & Scarborough LLP is acting as U.S. counsel to the Underwriters, led by W. David Mannheim, Kathryn Simons and Ashley Wu, in connection with the Offering.

    A registration statement on Form F-1 relating to the Offering was filed with the U.S. Securities and Exchange Commission (the “SEC”) (File No.: 333-286471), as amended, and was declared effective by the SEC on June 30, 2025. The Offering is being made only by means of a prospectus, forming a part of the registration statement. Copies of the final prospectus relating to the Offering, when available, may be obtained from Bancroft Capital, LLC by email at investmentbanking@bancroft4vets.com, by standard mail to 501 Office Center Drive, Suite 130, Fort Washington, PA 19034, or by telephone at +1 (484) 546-8000. In addition, copies of the final prospectus relating to the Offering, when available, may be obtained via the SEC’s website at www.sec.gov.

    Before you invest, you should read the prospectus and other documents the Company has filed or will file with the SEC for more information about the Company and the Offering. This press release does not constitute an offer to sell, or the solicitation of an offer to buy any of the Company’s securities, nor shall such securities be offered or sold in the United States absent registration or an applicable exemption from registration, nor shall there be any offer, solicitation or sale of any of the Company’s securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of such state or jurisdiction.

    About Dreamland Limited

    Dreamland Limited is a Hong Kong-based event management service provider. The Company specializes in organizing, planning, promoting and managing themed touring walk-through experience events for intellectual property owners of characters in well-publicized animated cartoons and/or live action theatrical motion pictures. For more information, please visit the Company’s website: http://www.trendicint.com.

    Forward-Looking Statements

    Certain statements in this announcement are forward-looking statements, including, but not limited to, the Company’s proposed Offering. These forward-looking statements involve known and unknown risks and uncertainties and are based on the Company’s current expectations and projections about future events that the Company believes may affect its financial condition, results of operations, business strategy and financial needs, including the expectation that the proposed Offering will be successfully completed. Investors can find many (but not all) of these statements by the use of words such as “believe”, “plan”, “expect”, “intend”, “should”, “seek”, “estimate”, “will”, “aim” and “anticipate” or other similar expressions in the prospectus. The Company undertakes no obligation to update or revise publicly any forward-looking statements to reflect subsequent occurring events or circumstances, or changes in its expectations, except as may be required by law. Although the Company believes that the expectations expressed in these forward-looking statements are reasonable, it cannot assure you that such expectations will turn out to be correct, and the Company cautions investors that actual results may differ materially from the anticipated results and encourages investors to review other factors that may affect its future results in the Company’s registration statement and other filings with the SEC.

    For more information, please contact:

    Dreamland Limited
    Ms. Seto Wai Yue
    Email: frances.seto@trendicint.com

    The MIL Network

  • MIL-OSI Africa: Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) ministerial committee endorses membership of Sahel countries as non-Economic Community of West African States (ECOWAS) members

    Source: APO

    The 2nd Extraordinary Meeting of the GIABA Ministerial Committee (GMC) concluded in Accra, Ghana on the 19th of July, 2025, with a decision to allow the three Sahel countries that have withdrawn from the Economic Community of West African States (ECOWAS) to join the Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) as Non-ECOWAS Members.

    The Ministers present at the high-level meeting unanimously considered the importance of dealing with insecurity in the region in a collaborative manner. The decision will be transmitted to the ECOWAS Council of Ministers and the Authority of Heads of State and Government for consideration.

    During the session,Nigeria’s Minister of Justice handed over the chairmanship of the GMC to the Minister of Finance of Sierra Leone, who assumes the role as the new Chair of the Committee.

    The meeting was officially declared open by the Vice President of the Republic of Ghana, Professor Jane Naana Opoku-Agyemang.

    Distributed by APO Group on behalf of Economic Community of West African States (ECOWAS).

    Media files

    .

    MIL OSI Africa

  • MIL-OSI USA: Sens. Hagerty, Tim Scott, Lummis, Moreno Release Market Structure Discussion Draft, Issue Request for Information From Stakeholders

    US Senate News:

    Source: United States Senator for Tennessee Bill Hagerty
    The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support
    WASHINGTON—Today,United States Senator Bill Hagerty (R-TN), a member of the Senate Banking Committee, joined Senators Tim Scott (R-SC), Chairman of the Senate Banking Committee, Cythia Lummis (R-WY), Chairwoman of the Senate Banking Subcommittee on Digital Assets, and Bernie Moreno (R-OH), in releasing an initial discussion draft of digital asset market structure legislation covering issues under the Banking Committee’s jurisdiction. The discussion draft builds on the CLARITY Act, which passed the House of Representatives last week with strong bipartisan support. Along with the discussion draft, the Senators are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions.
    “For too long, outdated laws and regulatory uncertainty around digital asset market structure have hindered American innovation and left consumers without adequate protections,” said Senator Hagerty. “This discussion draft demonstrates a strong commitment to unlocking the full potential of the digital asset economy by delivering responsible legislation that reflects input from stakeholders, fosters innovation, establishes consistent guardrails, and ensures the United States remains a global leader in digital assets.”
    “My colleagues and I in the House and Senate share the same goal: to provide clear rules of the road for digital assets that protect investors, foster innovation, and keep the future of digital finance anchored in America,” said Chairman Scott. “I’m grateful for the hard work of our House counterparts to craft smart, bipartisan legislation, and I look forward to building on their work here in the Senate. Working with President Trump, we can deliver a comprehensive, bipartisan regulatory framework for digital assets.”
    “The time for regulatory uncertainty in the digital asset space has come to an end,” said Senator Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”
    “The GENIUS Act was a critical stride toward ensuring the United States is a leader in Digital Assets,” said Senator Moreno. “This draft represents the next step in putting a bipartisan regulatory framework on President Trump’s desk and I look forward to continuing our important work to encourage innovation, protect consumers, and strengthen national security and US dollar dominance.”
    The discussion draft takes important steps to:
    Define Ancillary Assets – The discussion draft clearly defines an “ancillary asset” to clarify which digital assets are not securities.
    Create Disclosure Requirements – The discussion draft creates disclosure requirements that are tailored for offers, sales, or distributions of ancillary assets.
    Promulgate New Rules – The discussion draft requires the Securities and Exchange Commission (SEC) to promulgate new rules:
    Regulation DA: To exempt certain offers or sales of ancillary assets from SEC registration, including offers of sales that do not exceed $75 million in gross proceeds per year over four years.
    Investment Contracts: To more clearly define what constitutes an investment contract.

    Modernize Securities Regulations – The discussion draft directs the SEC to tailor existing requirements to digital asset activity, so that regulations are no longer outdated, unnecessary, or unduly burdensome in light of the unique technological characteristics of digital assets.
    Prevent Illicit Finance – The discussion draft requires the creation of examination standards for digital assets and encourages private sector entities to partner with federal law enforcement, to detect and deter illicit finance.
    Promote Responsible Banking Innovation – The discussion draft ensures financial holding companies can use a digital asset or distributed ledger system to perform, provide, or deliver any activity, function, product, or service that banks are otherwise authorized by law to perform, provide, or deliver.
    Full text of the discussion draft can be found here.
    In addition to the discussion draft, the Senators are calling on stakeholders to submit their feedback on a wide range of questions around: 
    Regulatory Clarity and Tailoring
    Investor Protection
    Trading Venues and Market Infrastructure
    Custody
    Illicit Finance
    Banking
    Innovation
    Preemption
    To participate in the Request for Information (RFI), please submit your feedback to MarketStructure_RFI@banking.senate.gov.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich Announces Committee Passage of Over $205 Million for New Mexico’s Military Installations and Significant Wins for Veterans

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Investments Heinrich championed include childcare assistance, improved telehealth & rural health services, & expanded homelessness prevention programs

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.) announced the bipartisan Senate Appropriations Committee passage of the Fiscal Year 2026 (FY26) Military Construction, Veterans Affairs, and Related Agencies Appropriations Bill. With Committee passage of this bill, Heinrich secured support for over $205 million for New Mexico’s military installations and significant wins for New Mexico’s veterans, including over $32 million in Congressionally Directed Spending for five local projects.

    “For our nation’s veterans and military families, this bill keeps our promise: that when they come home, they will receive the recognition, education, housing, and health care that they have earned through their service. It also strengthens New Mexico’s role as a leader in national security and bolsters our local economies,” said Heinrich, a member of the Senate Appropriations Committee. “This bill will also ensure that our service members are best equipped with state-of-the-art technology and resources to defend freedom at home and abroad. As a member of the Senate Appropriations Committee, I am committed to doing everything I can to support the heroic Americans who sacrifice so much to keep us safe.”

    Heinrich is a member of the Senate Appropriations Committee and the former Chair of the Appropriations Subcommittee on Military Construction, Veterans Affairs, and Related Agencies.

    New Mexico Military Construction

    Heinrich secured Committee support of investments in seven New Mexico projects.

    Heinrich successfully included funds for the following projects:

    • $90,000,000 for the construction of a 192-bed dormitory for airmen at Cannon Air Force Base.
    • $83,000,000 for the construction of a new Space Rapid Capabilities Office Headquarters on Kirtland Air Force Base.
    • $18,250,000 to construct a new Explosive Operations Building at Kirtland Air Force Base, which is essential for the safe and efficient handling, inspection, and storage of munitions in alignment with Air Force operational requirements.
    • $3,200,000 to construct a Child Development Center (CDC) on Kirtland Air Force Base that supports the growing childcare needs of Kirtland Air Force Base personnel.

    Heinrich also secured language addressing the ongoing energy infrastructure needs at White Sands Missile Range, ensuring troop readiness and training is prioritized.

    Heinrich and U.S. Senator Ben Ray Luján (D-N.M.) also successfully included funding for the following projects:

    • $8,100,000 to renovate and construct a training facility for Security Forces at Cannon Air Force Base. This will help support the continued growth of this Security Force unit.
    • $2,000,000 to restore and improve antiterrorism technology at the Wyoming Gateat Kirtland Air Force Base.
    • $700,000 to finish the design of a new High Speed Test Track at Holloman Air Force Base.

    Support for Veterans

    Heinrich secured Committee support for key veteran programs.

    Suicide Prevention

    Heinrich successfully secured $18,866,195,000 for mental health treatment, including $697,760,000 for suicide prevention outreach. Heinrich also secured language encouraging the VA to use predictive modeling and analytics for veteran suicide prevention in the Recovery Engagement and Coordination for Health-Veterans Enhanced Treatment (REACH VET) program. This innovative solution would identify veterans with evidence-based risk factors for suicidal ideation in order to get help to veterans before a potential mental health crisis.

    In 2020, Heinrich voted in favor of the Commander John Scott Hannon Veterans Mental Health Care Improvement Act of 2019 (P.L. 116-171), which supported and authorized the REACH VET program.

    Rural Health

    Heinrich successfully secured $342,455,000 for the VA’s Office of Rural Health and its Rural Health Initiative to continue supporting veterans with services like transportation to appointments for highly rural veterans, utilization of innovative transportation service technologies, and outreach to highly rural veterans.

    An estimated 2.7 million rural and highly rural veterans are enrolled in the Veterans Health Administration (VHA). Many rural veterans enrolled in the VA health care system are at an advanced age, with approximately 54 percent aged 65 or older. With the aging veteran population growing increasingly medically complex and more likely to be diagnosed with chronic conditions like diabetes, obesity, high blood pressure, and heart disease, each requiring more frequent, ongoing, and costly care, these funds would help close the gap and get highly rural veterans the care they need.

    Telehealth Services

    Heinrich successfully secured $6,356,035,000 to sustain and increase telehealth capacity and expand the reach of VA medical providers to veterans in highly rural areas through the use of in-home telehealth and remote patient monitoring services. The bill also supports the Veterans Health Administration’s (VHA) rulemaking to eliminate copays for all virtual medical appointments of any type and especially for primary and preventative care appointments.

    Preventing Veteran Homelessness

    Heinrich successfully secured $3,459,121,000 to prevent veteran homelessness, including $702,821,000 to bolster the Supportive Services for Veteran Families Program, which would meet the needs of veterans including help with the rising costs of household goods; $670,900,000 for case management and administration of Housing and Urban Development – Veterans Affairs Supportive Housing vouchers; $323,100,000 for the Grant and Per Diem Program, which would support transitional housing and assist veterans in achieving housing stability; and, $139,843,000 for Veterans Justice Outreach and Legal Services for Veterans grants to award community-based organizations with funds to assist veterans with legal issues like accessing benefits, navigating family law, and securing safe and stable housing.

    Veterans Affairs Service Purchasing (VASP) Program

    Heinrich successfully secured report language directing the VA to explain why it abruptly ended the Veterans Affairs Service Purchasing program, a critical program that would keep veterans who were unable to pay their mortgage in their homes. At least 130 New Mexico veterans could be impacted by this administration’s shortsighted decision to end the Veterans Affairs Service Purchasing program without loss mitigation policies.

    Access to Medications for Substance Use Disorder

    Heinrich successfully secured $709,573,000 for the Opioid Prevention and Treatment programs at the VA, including $454,086,000 for treatment programs and $254,487,000 to continue implementation of the Jason Simcakoski Memorial and Promise Act. Heinrich voted in favor of this bill’s authorizing legislation, the Comprehensive Addiction and Recovery Act, in 2016 (P.L. 114-198).

    Veteran Family Resource Program

    Heinrich successfully secured language to require a status report on the Veteran Family Resource Program rollout, including authorities and funding needed to ensure a successful, continued rollout that reduces rates of child abuse and neglect among families with veterans. Services would include interventions like case management assistance to address evidence-based risk factors like housing and food insecurity in veteran families.

    Childcare Assistance

    Heinrich successfully secured an additional $3,000,000 in the VA’s overall budget to support the expansion of childcare centers at VA medical facilities through a pilot program. Heinrich originally voted in favor of the Caregivers and Veterans Omnibus Health Services Act of 2010 (P.L. 111-163) while Congressman for New Mexico’s 1stCongressional district. This bill led to the VA’s initial childcare pilot program to assess feasibility and advisability of providing childcare services to veterans receiving mental health and intensive health care services.

    As a result, in 2016, the VA launched a childcare pilot program to implement three (3) free, drop-in childcare service centers across three locations in the states of New York and Washington. Survey data indicate nearly a third of veterans are interested in childcare services and approximately 10 percent have had to cancel or reschedule medical appointments due to lack of childcare.

    Grants for Construction of State Extended Care Facilities

    Heinrich successfully secured $171,000,000 in construction funds for state extended care facilities. In New Mexico, there is only one VA long-term care facility, despite demand for additional capacity and facilities. These facilities are particularly important to ensure aging and disabled veterans receive the appropriate level of care.

    Medical and Prosthetics Research

    Heinrich successfully secured $943,000,000 to fund medical, rehabilitative, and health services research and support basic and clinical studies that advance knowledge leading to improvements in the prevention, diagnosis, and treatment of diseases and disabilities. Medical and prosthetic research at the Department of Veterans Affairs includes the fields of prosthetics, orthotics, adaptive equipment for vehicles, sensory aids, and related areas.

    VA Court of Appeals

    Heinrich successful secured language requiring the VA to improve transparency surrounding the large back log of cases at the VA Court of Appeals. According to last year’s Annual Report, there is a backlog of 200,805 cases.

    MIL OSI USA News

  • MIL-OSI United Nations: Amid ‘Horror Show in Gaza’, Humanitarian System Denied Space to Deliver, Multilateral Problem-Solving Needed More than Ever, Secretary-General Tells Security Council

    Source: United Nations General Assembly and Security Council

    Following are UN Secretary-General António Guterres’ remarks to the Security Council on multilateralism and peaceful settlement of disputes, in New York today:

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.  The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.  The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate, when unresolved disputes fuel the flames of conflict and when States lose trust in each other.

    The Charter lays out a number of important tools to forge peace.  Article 2.3 of the UN Charter is clear:  “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice”.  Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.  This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts.  And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.  Malnourishment is soaring.  Starvation is knocking on every door.

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.  That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.  With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck — among them facilities of the UN Office for Project Services and the World Health Organization (WHO), including WHO’s main warehouse.  This is despite all parties having been informed of the locations of these UN facilities.  These premises are inviolable and must be protected under international humanitarian law — without exception.

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.  And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.  But it still holds the power to stop them.  Peace is a choice.  And the world expects the UN Security Council to help countries make this choice.  This Council is at the centre of the global architecture for peace and security.  Its creation reflected a central truth.

    Competition between States is a geopolitical reality.  But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.  Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year.

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.  Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.  The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the cold war, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.  One that successfully deployed a range of peacekeeping missions.  One that opened the door for vital humanitarian aid to flow to people in need.  And one that helped prevent a third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.  This Council should be made more representative of today’s geopolitical realities.  And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.  I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.  The landmark adoption of Security Council resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and rebuild regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of States.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.  The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its eightieth anniversary next year.

    As we mark the eightieth anniversary of our Organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.  I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    MIL OSI United Nations News

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI Europe: Karl Nehammer appointed new Vice-President of the European Investment Bank

    Source: European Investment Bank

    Nidetzky

    • Former Chancellor of Austria will join the EIB Management Committee.
    • Vice-President Nehammer will start on 1 September, succeeding Swedish Vice-President Thomas Ostros.

    The European Investment Bank (EIB) is pleased to announce the appointment of Karl Nehammer as a new Vice-President and Member of its Management Committee, following a decision by the 27 EU Finance Ministers, representing the EIB’s shareholders, the EU Member States.

    Mr. Nehammer, an Austrian national, has been nominated by Austria and is set to take up his duties on 1 September 2025, succeeding current Vice-President Thomas Östros.

    Karl Nehammer joins the EIB with a wealth of experience from his distinguished career in Austrian politics. He served as the Federal Chancellor of Austria from 2021 to 2025. Prior to this, he was Minister of the Interior from 2020 to 2021, and he was a member of the National Council from 2017 to 2020 as well as Secretary-General of the People’s Party.

    EIB Group President Nadia Calviño welcomed the appointment, stating, “I am pleased to welcome Karl Nehammer to the EIB Management Committee. His profound experience in European politics will be an important asset for our Group and for delivering on key EU policy goals.”

    Upon his appointment, Karl Nehammer remarked, “I am thrilled to join the European Investment Bank, an institution vital to the economic well-being and strategic autonomy of the European Union. The EIB plays a key role in backing priority investment across Europe and worldwide, and I look forward to working with President Calviño, my fellow Management Committee members, EIB Group staff and stakeholders to advance the Bank’s critical mission”.

    The EIB Group has operated in Austria since 1973 and since then the EIB  has provided more than EUR 34 billion for public and private investment across the country. The last Austrian Vice-President of the EIB was Wilhelm Molterer who served from 2011 to 2015.

    Background information  

    The EIB’s Management Committee is the Bank’s permanent collegiate executive body, composed of a President and eight Vice-Presidents. Its members are appointed by the EIB’s Board of Governors, which consists of the economy and finance ministers of the 28 EU Member States.

    The Committee collectively oversees the day-to-day running of the EIB and is responsible for preparing and ensuring the implementation of the Board of Directors’ decisions, particularly concerning borrowing and lending operations.

    The European Investment Bank (ElB) is the long-term lending institution of the European Union, owned by its Member States. Built around eight core priorities, we finance investments that contribute to EU policy objectives by bolstering climate action and the environment, digitalisation and technological innovation, security and defence, cohesion, agriculture and bioeconomy, social infrastructure, the capital markets union, and a stronger Europe in a more peaceful and prosperous world. 

    The EIB Group, which also includes the European Investment Fund (EIF), signed nearly €89 billion in new financing for over 900 high-impact projects in 2024, boosting Europe’s competitiveness and security.   

    All projects financed by the EIB Group are in line with the Paris Climate Agreement, as pledged in our Climate Bank Roadmap. Almost 60% of the EIB Group’s annual financing supports projects directly contributing to climate change mitigation, adaptation, and a healthier environment.   

    Fostering market integration and mobilising investment, the Group supported a record of over €100 billion in new investment for Europe’s energy security in 2024 and mobilised €110 billion in growth capital for startups, scale-ups and European pioneers.Approximately half of the EIB’s financing within the European Union is directed towards cohesion regions, where per capita income is lower than the EU average. 

    High-quality, up-to-date photos of our headquarters for media use are available here.

    MIL OSI Europe News

  • MIL-OSI Security: Across-the-Board Convictions in Final Highs RICO Trial of 2025

    Source: Office of United States Attorneys

    MINNEAPOLIS – Following an eight-day jury trial, a federal jury convicted two defendants of all charged counts for their involvement in the Highs street gang, announced Acting U.S. Attorney Joseph H. Thompson.

    Defendants Cortez Davon Blakemore, 35, and Robert Lesure, 23, were convicted by a jury of federal RICO conspiracy and conspiracy to distribute controlled substances. A sentencing hearing will be set at a later date. According to court documents and evidence presented at trial, Blakemore and Lesure were long-standing and prolific drug traffickers for the Highs criminal street gang.  They sold fentanyl at the intersection of Broadway and Lyndale in North Minneapolis, which the Highs had taken control of and turned into an open-air drug market. As the jury heard at trial, the Highs is a violent criminal street gang that has long wreaked havoc on North Minneapolis, selling fentanyl and other deadly drugs and enforcing its terorrity through violence, kidnapping, and murder, including the murders of innocent civlians caught in the crossfire. Forty members of the Highs gang were charged in this large RICO indictment. Blakemore and Lesure are the 37th and 38th defendants to be convicted in this case. A final RICO defendant is set to be tried in 2026.

    “These convictions bring justice not just to the victims of the Highs gang, but to an entire community that has endured years of violence, fear, and loss,” said Acting U.S. Attorney Joseph H. Thompson. “For too long, this gang terrorized Minneapolis, maintaining control through chaos. Today, the people of this city get something they’ve long been denied: peace. This case is the result of a relentless federal coalition—the U.S. Attorney’s Office side-by-side with our federal, state, and local law enforcement partners.  Our message is clear: if you endanger our communities, we are coming for you.  And we won’t stop until every neighborhood in this city is free from fear.”

    “This isn’t just another trial; it’s a continuation of our full-court press to dismantle the Highs street gang and hold every last member accountable,” said Travis Riddle, ATF Special Agent in Charge of the St. Paul Field Division. “We’re proud to stand alongside our prosecution and investigative partners who’ve shown unmatched determination, trial after trial, to bring justice to the communities harmed by this violence.”

    “As the summer progresses, Minneapolis is continuing to see a drop in violent crime, especially gun violence throughout the city,” said Minneapolis Police Chief Brian O’Hara.  “The outstanding work of MPD officers and our partnership with the U.S. Attorney’s Office have been instrumental in targeting the small number of individuals committing a disproportionate amount of violence in the city. This conviction is the latest result of efforts that can not only be seen in the reduction of crime, but also felt by the community as we work to rebuild trust.”

    “Our focus isn’t just on the money—it’s on the damage that money fuels,” said Jason Bushey, IRS Acting Special Agent in Charge of the Chicago Field Office. “When violent gangs push drugs and fear into our communities, our agents work relentlessly to expose the money behind the violence. This conviction is the result of that effort and a clear reminder that those who profit from chaos and pain will be held accountable.”

    “In the wake of the guilty verdicts in the Highs gang RICO trial, it becomes abundantly clear that the efficacy of our justice system hinges not merely on the application of law, but on the transformative power of collaborative law enforcement partnerships,” stated FBI Minneapolis Special Agent in Charge Alvin M. Winston, Sr. “These alliances are essential, for they weave a fabric of shared intelligence and resources that fortify our collective resolve against violent crime, ensuring that justice is not merely an ideal, but a tangible reality for our communities.”

    This case is the result of an investigation conducted by the ATF, FBI, Minneapolis Police Department, IRS Criminal Investigation, U.S. Postal Inspection Service, Hennepin County Sheriff’s Office, Minnesota Bureau of Criminal Apprehension, and Minnesota Department of Corrections with the assistance of the U.S. Marshals Service, DEA, Homeland Security Investigation, and the Hennepin County Attorney’s Office. The Ramsey County Sheriff’s Office, Dakota County Sheriff’s Office, St. Paul Police Department, and numerous other law enforcement agencies contributed to the investigation.

    The U.S. Attorney’s Office also is deeply grateful to the Justice Department’s Violent Crime & Racketeering Section (VCRS) for their continued partnership and expertise on this and other ongoing RICO cases. This partnership has been critical to the success of these gang prosecutions.

    Assistant U.S. Attorneys Thomas Calhoun-Lopez, Albania Concepcion, and Carla Baumel tried this case.  They are prosecuting the case along with Attorney Brian Lynch of the Justice Department’s Violent Crime & Racketeering Section. 

    MIL Security OSI

  • MIL-OSI Security: U.S. commences civil action to forfeit $7.1 million in cryptocurrency tied to oil and gas storage fraud scheme

    Source: Office of United States Attorneys

    Seattle – The U.S. Attorney’s Office, Western District of Washington today filed a civil action seeking the forfeiture of cryptocurrency valued at approximately $7.1 million seized in the investigation of an oil and gas related investment fraud scheme, announced Acting U.S. Attorney Teal Luthy Miller. The funds, part of some $97 million taken in by the coconspirators between June 2022 and July 2024, was seized by Homeland Security Investigations in December 2024.

    “The co-schemers in this fraud moved their ill-gotten gain through various cryptocurrency accounts to try to launder the money stolen from victims,” said Acting U.S. Attorney Miller. “Federal investigators and prosecutors in our office moved as quickly as possible to trace and seize the cryptocurrency so that some of the losses can be returned to victims.”

    According to the forfeiture filing and other records in the case, from at least August 2022 through August 2024, the co-schemers convinced victims to send money to what was represented as escrow accounts to purchase oil tank storage in either Rotterdam, Netherlands, or Houston. The schemers indicated that the investors could make significant profits by renting the oil tank storage they obtained to others. The victims sent money to accounts linked to these entities: Sea Forest International LLC; Apex Oil and Gas Trading LLC; Navigator Energy Logistics LLC; Terminal Energy International Escrow Service LLC; Energo Horizons Logistics (EA) LLC; Legacy Energy Logistics Transport Group LLC; Green Tree Gateway LLC. However once victims sent their money, they were not sent any further information on their investment and co-schemers simply stopped responding.

    Newcastle, Washington resident Geoffrey K. Auyeung, 47, was indicted in August 2024 as the coconspirator in the U.S. who is charged with receiving much of the fraud proceeds generated by the fraud scheme. The money was quickly moved to one or more of at least 81 different accounts at financial institutions, moved offshore, or moved to one or more of at least 19 different cryptocurrency accounts, where it was used for the purchase of cryptocurrencies, including Bitcoin, Tether, USD Coin, and Ethereum. Much of the cryptocurrency was further transferred to accounts at the cryptocurrency exchange Binance.

    According to the forfeiture filing, the cryptocurrency accounts that were seized were linked to individuals in Russia and Nigeria. Some of the cryptocurrency purchased with victims’ funds was also sent to cryptocurrency exchanges in Russia and Nigeria, at least one of which is alleged to have facilitated money laundering for transnational criminal organizations – including terrorist organizations and organizations that violate international trade sanctions.

    At the time of Auyeung’s arrest and indictment, some $2.3 million was seized from his bank accounts. The $7.1 million in cryptocurrency the government is seeking to forfeit is in addition to the $2.3 million.

    Should the court approve the forfeiture the money will be distributed to victims in the case. Currently. Investigators have identified dozens of victims who were defrauded out of approximately $17.9 million. Investigators believe those numbers will continue to grow as more victims are identified and verified.

    The case is being investigated by HSI.

    The case is being prosecuted by Assistant United States Attorneys Jehiel Baer and Yunah Chung.

    MIL Security OSI

  • MIL-OSI Security: Amherst Businessman Sentenced for COVID Fraud

    Source: US FBI

    BUFFALO, N.Y. – U.S. Attorney Michael DiGiacomo announced today Hormoz Mansouri, 71, of Amherst, NY, who was convicted of conspiracy to commit wire fraud and bank fraud, and bank fraud, was sentenced to time served and five years’ supervised release, to include one year of home detention. He was also ordered to pay restitution totaling $3,197,562 and to forfeit $1,888,603.

    Assistant U.S. Attorney Paul E. Bonanno, who handled the case, stated that Mansouri filed fraudulent loan applications under both the Paycheck Protection Program (PPP) and Economic Injury Disaster Loan (EIDL) program.  The loans available for these programs were designed to provide emergency financial assistance pursuant to the Coronavirus Aid, Relief, and Economic Security (CARES Act). Mansouri controlled the following business entities which applied for loans:

    • HLM Holding LLC,
    • El Team Inc.,
    • NPTS Inc.,
    • 2060 Sheridan Drive LLC,
    • 212 Holden Avenue LLC,
    • 350 Old Niagara Falls Boulevard LLC,
    • 47 East Amherst LLC, and
    • 3600 Harlem Road LLC.

    The PPP loans that the Mansouri-controlled entities obtained, either inflated or completely fabricated the average monthly payroll and six of the eight entities had no actual employees or payroll expenses at all. The total amount of money received from the fraudulent PPP loans totaled approximately $3,000,000. The Mansouri controlled entities also received approximately $450,600 in Economic Injury Disaster Loans (EIDL). These loan applications falsely represented revenues and cost of goods sold. On May 28, 2021, the United States Attorney’s Office seized approximately $1,923,603 of the fraudulently obtained money.

    Mansouri also moved the fraudulent PPP and EIDL funds between various bank accounts; commingling the proceeds with legitimate business revenues; and funding certain accounts, including a campaign account (in the name of “Mansouri for County Comptroller”). 

    The sentencing is the result of an investigation by the Federal Bureau of Investigation, under the direction of Acting Special Agent-in-Charge Mark Grimm, and the Internal Revenue Service, Criminal Investigation Division, under the direction of Special Agent-in-Charge Harry Chavis.

    # # # #

     

     

    MIL Security OSI

  • MIL-OSI Security: Federal Grand Jury Indicts Louisville Woman for Defrauding Pool Business Customers

    Source: US FBI

    Louisville, KY – A federal grand jury in Louisville returned an indictment on July 16, 2025, charging a Louisville woman with engaging in a scheme to defraud customers of her pool installation business, Davenport Extreme Pools and Spas Inc.

    U.S. Attorney Kyle G. Bumgarner of the Western District of Kentucky, Acting Special Agent in Charge Olivia Olson of the FBI Louisville Field Office, and Special Agent in Charge Karen Wingerd of the Internal Revenue Service Criminal Investigations, Cincinnati Field Office, made the announcement.

    According to the indictment, Tracy Davenport, 50, was charged with 13 counts of wire fraud, 5 counts of money laundering, and 1 count of bankruptcy fraud. The indictment alleges Tracy Davenport, and others working at her direction, engaged in a scheme to induce customers into signing a contract for a pool installation and paying a large down payment up front. Tracy Davenport then used those funds for purposes other than what was agreed upon.

    The defendant will make her initial court appearance before a U.S. Magistrate Judge of the U.S. District Court for the Western District of Kentucky at a later date. 

    There is no parole in the federal system.

    This case is being investigated by the FBI and IRS-CI, with assistance from the Louisville Metro Police Department, the Jefferson County Commonwealth Attorney’s Office, and the United States Trustee’s Office for the Western District of Kentucky.

    Assistant U.S. Attorney Nicole Elver is prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI USA: Lummis Releases Discussion Draft for Comprehensive Digital Asset Market Structure Legislation

    US Senate News:

    Source: United States Senator for Wyoming Cynthia Lummis

    Washington, D.C. –  U.S. Senator Cynthia Lummis (R-WY) joined Senate Banking Committee Chairman Tim Scott (R-SC) and U.S. Senators Bernie Moreno (R-OH) and Bill Hagerty (R-TN) in releasing a discussion draft of the Banking Committee provisions of comprehensive digital asset market structure legislation, building on principles developed in collaboration with Chairman Scott to establish a clear regulatory framework for the digital asset industry.

    The time for regulatory uncertainty in the digital asset space has come to an end,” said Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”

    The discussion draft incorporates key principles designed to:

    • Establish Clear Legal Definitions: Create statutory distinctions between digital asset securities and commodities, providing regulatory certainty and predictability for market participants
    • Allocate Regulatory Authority: Clearly delineates jurisdiction between Federal agencies, ensuring appropriate oversight without regulatory overlap or gaps
    • Modernize Federal Law: Updates securities regulations to account for the unique characteristics of digital assets and distributed ledger technology
    • Protect Consumers and Market Participants: Implements appropriate registration and risk management requirements for centralized digital asset intermediaries while preserving self-custody rights
    • Target Illicit Finance Measures: Include focused provisions to prevent money laundering and sanctions evasion while supporting innovation
    • Foster Responsible Innovation: Encourage federal regulators to provide clear guidance and utilize tools like no-action letters and regulatory sandboxes

    The discussion draft recognizes the different risk profiles of centralized firms versus decentralized protocols and acknowledges that distributed ledger technology extends beyond financial applications. It also emphasizes that tokenization represents an evolution of financial infrastructure that enhances efficiency and transparency.

    Senator Lummis and Chairman Scott are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions. To participate in the RFI, please submit your feedback to MarketStructure_RFI@banking.senate.gov. 

    A copy of the discussion draft can be found here.

    MIL OSI USA News

  • MIL-OSI Security: Forty-Eighth Conviction in Feeding Our Future Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Asad Mohamed Abshir has pleaded guilty to one count of money laundering for his role in the Feeding Our Future fraud scheme, announced Acting U.S. Attorney Joseph H. Thomspon.  He is the 48th defendant to be convicted in this massive fraud scheme.

    “This guilty plea is another step in exposing the staggering levels of fraud that have been hiding in plain sight across Minnesota,” said Acting U.S. Attorney Joseph H. Thompson. “This defendant laundered money meant to feed children and funneled it into a web of shell companies and luxury spending. As FBI Director Kah Patel recently said, this case stands as one of the most egregious abuses of public trust in recent memory. The people of Minnesota deserve better.”

    In fall of 2020, the defendant, Asad Mohamed Abshir, 34, assisted his brother and co-defendant, Abdinasir Abshir, in the operations of non-profit called Stigma Free International. Under the sponsorship of Feeding Our Future, the Abshir brothers claimed to operate, through Stigma Free, a food distribution site in Mankato, Minneosta. At the same time, Abdinasir Abshir claimed to provide food for the Mankato site through an entity he controlled called Horseed Management LLC. But the Abshirs did not provide the food they claimed to, and they were not entitled to the taxpayer dollars they received for their claims.

    Over the course of 2020 to 2021, the Abshirs fraudulently claimed to have provided 1.6 million meals to children. For his role in the scheme, Abdinasir personally received about $750,000. The defendant used $77,353 in fraud proceeds to purchase a 2022 GMC Sierra 1500 Denali truck, which has been seized and will be forfeited to the United States. In addition, the Unites States seized $424,762.51 from the bank account for the defedant’s shell company, Santana LLC, all of which will be forfeited.

    “Asad Abshir’s guilty plea underscores a troubling intersection of deception and exploitation within federal assistance programs designed to nourish vulnerable populations,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “Abshir not only undermined the integrity of the Federal Child Nutrition Program, but also abused the resources intended for the nation’s most at-risk children. This case serves as a stark reminder of the critical need for stringent oversight and accountability in the administration of taxpayer dollars.”

    This case is the result of an investigation conducted by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service

    Abshir pleaded guilty yesterday in U.S. District Court before Judge Nancy E. Brasel. A sentencing hearing will be scheduled at a later date.

    Acting U.S. Attorney Joseph H. Thompson and Assistant U.S. Attorneys Matthew S. Ebert, Harry M. Jacobs, and Daniel W. Bobier are prosecuting the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: Forty-Eighth Conviction in Feeding Our Future Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Asad Mohamed Abshir has pleaded guilty to one count of money laundering for his role in the Feeding Our Future fraud scheme, announced Acting U.S. Attorney Joseph H. Thomspon.  He is the 48th defendant to be convicted in this massive fraud scheme.

    “This guilty plea is another step in exposing the staggering levels of fraud that have been hiding in plain sight across Minnesota,” said Acting U.S. Attorney Joseph H. Thompson. “This defendant laundered money meant to feed children and funneled it into a web of shell companies and luxury spending. As FBI Director Kah Patel recently said, this case stands as one of the most egregious abuses of public trust in recent memory. The people of Minnesota deserve better.”

    In fall of 2020, the defendant, Asad Mohamed Abshir, 34, assisted his brother and co-defendant, Abdinasir Abshir, in the operations of non-profit called Stigma Free International. Under the sponsorship of Feeding Our Future, the Abshir brothers claimed to operate, through Stigma Free, a food distribution site in Mankato, Minneosta. At the same time, Abdinasir Abshir claimed to provide food for the Mankato site through an entity he controlled called Horseed Management LLC. But the Abshirs did not provide the food they claimed to, and they were not entitled to the taxpayer dollars they received for their claims.

    Over the course of 2020 to 2021, the Abshirs fraudulently claimed to have provided 1.6 million meals to children. For his role in the scheme, Abdinasir personally received about $750,000. The defendant used $77,353 in fraud proceeds to purchase a 2022 GMC Sierra 1500 Denali truck, which has been seized and will be forfeited to the United States. In addition, the Unites States seized $424,762.51 from the bank account for the defedant’s shell company, Santana LLC, all of which will be forfeited.

    “Asad Abshir’s guilty plea underscores a troubling intersection of deception and exploitation within federal assistance programs designed to nourish vulnerable populations,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “Abshir not only undermined the integrity of the Federal Child Nutrition Program, but also abused the resources intended for the nation’s most at-risk children. This case serves as a stark reminder of the critical need for stringent oversight and accountability in the administration of taxpayer dollars.”

    This case is the result of an investigation conducted by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service

    Abshir pleaded guilty yesterday in U.S. District Court before Judge Nancy E. Brasel. A sentencing hearing will be scheduled at a later date.

    Acting U.S. Attorney Joseph H. Thompson and Assistant U.S. Attorneys Matthew S. Ebert, Harry M. Jacobs, and Daniel W. Bobier are prosecuting the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: United States Reaches $501,556 Civil Settlement Resolving Allegations of False Claims to Federal Health Care Programs

    Source: Office of United States Attorneys

    ST. LOUIS – Acting U.S. Attorney Matthew T. Drake on Tuesday announced that the U.S. Attorney’s Office for the Eastern District of Missouri and a Missouri psychiatrist have reached a $501,556 civil settlement that will resolve False Claims Act (FCA) allegations.

    The settlement resolves allegations that from Jan. 1, 2019, through May 31, 2024, Dr. Mohd Azfar Malik falsely indicated to both Medicare and Missouri Medicaid that he provided face-to-face psychotherapy to patients, including by submitting false claims for payment when he was out of town and for services that were provided by other practitioners.  Dr. Malik was part-owner of Behavioral Health Services, LLC which owned and operated Psych Care Consultants in St. Louis, Missouri.

    The settlement consists of $250,778 in restitution, which is doubled under the FCA. 

    The civil settlement contains no admission of liability. In April of 2025, Dr. Malik pleaded guilty to making false statement in federal health care related matters and admitted submitting claims for payment to Medicare, Medicaid and private health insurers in which he falsely claimed to have performed in-person services when he was out of Missouri or out of the country. He is scheduled to be sentenced on August 11.

    “Holding health care professionals accountable for submitting false claims for financial gain is crucial for maintaining public trust and ensuring that critical resources are appropriately utilized,” said Linda T. Hanley, Special Agent in Charge with the United States Department of Health and Human Services Office of Inspector General (HHS-OIG).  “HHS-OIG, the U.S. Attorney’s Office, and our law enforcement partners will continue to collaborate our efforts to protect the integrity of the Medicare and Medicaid programs.”

    This civil settlement was a result of the combined work of the U.S. Attorney’s Office for the Eastern District of Missouri, HHS/OIG Office of Investigations, the Missouri Attorney General’s Medicaid Fraud Control Unit, and the Federal Bureau of Investigation.  

    MIL Security OSI

  • MIL-OSI Africa: Ambassador Yin Chengwu attended Liberia Technology Summit 2025

    Source: APO


    .

    On July 21, Ambassador Yin Chengwu attended the Liberia Technology Summit 2025 and delivered a speech. The event was also attended by Hon. Haja Mamaka Bility, Acting Minister of States, Hon. Augustine K. Ngafuan, Minister of Finance and Development Planning, Hon. Sekou M. Kromah, Minister of Post and Telecommunications. Representatives from relevant UN agencies and diplomatic missions in Liberia.

    Yin highlighted the outcomes of the Ministerial Meeting of Coordinators on the Implementation of the Follow-up Actions of the Forum on China-Africa Cooperation and China’s achievements in science and technology. He pointed out that China will establish a global scientific research fund and increase science and technology assistance to developing countries, making technological progress benefits all humanity. He expressed China is willing to strengthen scientific and technological innovation cooperation with Liberia, so as to make it a new engine of China-Liberia strategic partnership.

    Distributed by APO Group on behalf of Embassy of the People’s Republic of China in the Republic of Liberia.

    MIL OSI Africa

  • MIL-OSI Canada: Infrastructure upgrades improve visitor experience in two Okanagan parks

    Source: Government of Canada regional news

    More people can access Myra-Bellevue Park and safely enjoy one of the most scenic sections of the historic Kettle Valley Rail Trail as several infrastructure upgrades are nearing completion.

    The Myra Station parking lot has been expanded with 60 new spaces and 12 spaces for buses and trailers to accommodate the growth in visitors. Six new accessible toilets have also been added to the day-use area at the trailhead, near Kelowna.

    “Myra-Bellevue Park is a gem in B.C.’s Okanagan region, offering a blend of natural beauty, outdoor adventure and historical significance,” said Tamara Davidson, Minister of Environment and Parks. “Investing in infrastructure upgrades at Myra-Bellevue Park ensures this natural treasure remains safe and accessible for everyone who comes to explore the trails, history and biodiversity of this special region in B.C.”

    The upgrades are part of a $2.1-million project that began in 2021 and includes removing and replacing the old decking of all 18 trestles along the Myra-Bellevue section of the Kettle Valley Rail Trail. The trestle decks have also been widened from 1.5 to 2.75 metres to improve accessibility and accommodate safe two-way traffic for hikers and cyclists. Work on the trestles was completed in the summer of 2024.

    “For over two decades, the Friends of the South Slopes (FOSS) has protected and maintained the trail networks in Okanagan Mountain Park and Myra-Bellevue Park, including recently the Myra Canyon trestles. We do so under the leadership of a stellar team at B.C. Parks with whom we enjoy a great working relationship and friendship,” said Cam Kourany, FOSS president. “FOSS and its 70-plus volunteers are proud to support our community and the Ministry of Environment and Parks. Their investments in the trestles and amenities greatly improve usability and safety.”

    At Monashee Park northwest of Vernon, the bridge at Little Peters Lake is being replaced to restore access to several alpine recreation areas, including Big Peters Lake. The bridge was damaged by heavy snow and removed in 2024 due to safety concerns.

    In addition to the bridge replacement, the Big Peters Lake backcountry campground is being expanded from 10 to 18 raised wooden tent platforms. The cost of the project is an estimated $445,000 and includes replacing one pit toilet and adding another one, along with adding a secure storage container to protect food and other items from wildlife.

    “Monashee Park is such a gem that is great for hiking, swimming, camping or a leisurely stroll,” said Steve Morissette, MLA for Kootenay-Monashee. “Replacing the bridge at Little Peters Lake and adding more campsites at Big Peters Lake means more people, whether visitors or locals, can enjoy the beautiful Monashee Mountains.”

    Backcountry camping is available at four locations in Monashee Park: Spectrum Lake, Little Peters Lake, Big Peters Lake and Margie Lake. Big Peters Lake is the largest campground in the sub-alpine and is located 13 kilometres from the Spectrum Creek trailhead and parking lot.  

    The upgrades at Monashee Park are part of a five-year, $21.5-million investment to increase and improve access to outdoor recreation in B.C. Upgrades include new campsites and trails, improvements to existing facilities and accessibility improvements. The upgrades at Myra-Bellevue Park are funded through the B.C. Parks capital budget.

    Learn More:

    For more information about Myra-Bellevue Park, visit: https://bcparks.ca/myra-bellevue-park/

    For more information about Monashee Park, visit: https://bcparks.ca/monashee-park/

    MIL OSI Canada News

  • MIL-OSI Analysis: As Sri Lanka’s economy pivots from tourism, it’s well placed to benefit from global trade and geopolitical jostling – new research

    Source: The Conversation – UK – By Hemamali Tennakoon, Senior Lecturer in Strategy and Management, Brunel University of London

    Dmytro Buianskyi/Shutterstock

    With its natural beauty, wildlife and culture, Sri Lanka is known as the “pearl of the Indian Ocean”, and attracts millions of tourists every year.

    But my research suggests that the country might not be so reliant on tourism in the future, as it looks to become a major player in global maritime trade. The island’s numerous harbours and enviable location along international sea routes have led to major investment from China and the US, as they seek to extend their strategic influence in the region.

    That investment is being welcomed after years of economic and political turmoil in Sri Lanka.

    The Easter bombings of 2019 targeted Catholic churches and hotels, killing 269 people and devastating tourism. The same year, significant tax cuts slashed government revenue before COVID did serious damage to the economy.

    In 2021, a ban on chemical fertilisers led to nationwide agricultural failure, while excessive borrowing and money printing triggered soaring inflation, which peaked at 70% in August 2022. The country ended up failing to pay its foreign debts.

    Following huge protests in 2022 and the resignation of the president, Sri Lanka began a major political and economic shift. It secured a bailout from the International Monetary Fund and implemented reforms aimed at stabilising the economy.

    So far, some of the effects have been positive. Inflation has eased, investor confidence has improved and more tea, clothing and rubber products are being exported up.

    Key to this has been improved logistics and port infrastructure. Business at the port of Colombo, the country’s largest, is booming, aided in part by global shipping disruptions, including the Red Sea crisis, which rerouted vessels through the Indian Ocean.

    But international maritime ambitions can be a complex affair, and Sri Lanka needs to be wary of becoming just a well-positioned commodity for the world’s economic superpowers.

    China for example, has secured a controversial 99-year lease of Hambantota port. India, wary of Chinese encroachment, has ramped up its own investments, including the development of a container terminal in Colombo.

    In 2023, the US announced a US$500 million (£372 million) plan to develop a deep-water shipping container terminal at the port of Colombo. And the potential US tariffs of 30% on imports from Sri Lanka have been interpreted by some as a pressure tactic to get greater access to its waters.

    Balancing these interests is a delicate act. While foreign investment is crucial for infrastructure development, Sri Lanka needs to protect its sovereignty and ensure that port operations serve national, not just international, interests.

    My research suggests that one way of building a resilient and diverse Sri Lankan economy would be to focus on its surrounding waters. Sri Lanka’s vast “exclusive economic zone”, an area of sea where it controls marine resources, holds massive untapped potential.

    Blue economy

    This potential lies in traditional sectors like fisheries and tourism, but also emerging industries such as marine biotechnology.

    This growing field offers opportunities in things like bioengineering and marine-based pharmaceuticals. With other countries rapidly advancing in these sectors, Sri Lanka is well-positioned to follow suit and become a regional leader in the blue economy (economic activities associated with the sustainable use of ocean resources).

    Business is booming in the port of Colombo.
    shutterlk/Shutterstock

    But there is still a complex web of geopolitical interests and economic pressures to navigate, as well as environmental challenges.

    At the moment for example, the Sri Lankan government is making plans for the deep natural port at Trincomalee to become a major marine repair and refuelling centre between Dubai and Singapore. Other proposed projects include offshore wind farms and oil rig facilities.

    The country also needs to compete with the likes of Malaysia, which is investing heavily in AI-driven port operations. To stay competitive, Sri Lanka must modernise infrastructure and streamline processes.

    And despite the progress, challenges persist. Poverty in Sri Lanka has doubled since 2021, while youth unemployment remains high.

    Sri Lanka faces rising maritime threats like piracy and illegal fishing, requiring stronger maritime surveillance. Simultaneously, port expansion risks damaging marine ecosystems. Green technologies and stricter environmental regulations are essential for long-term security and sustainability.

    Sri Lanka’s strategic location and maritime heritage offer a foundation for economic renewal. With wise governance, sustainability, and balanced geopolitics, its ports could once again become vital gateways to regional prosperity and global trade.

    Hemamali Tennakoon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. As Sri Lanka’s economy pivots from tourism, it’s well placed to benefit from global trade and geopolitical jostling – new research – https://theconversation.com/as-sri-lankas-economy-pivots-from-tourism-its-well-placed-to-benefit-from-global-trade-and-geopolitical-jostling-new-research-261231

    MIL OSI Analysis

  • MIL-OSI: Blue Navy Recovery Ramps Up Services to Handle Increased Claims for Unclaimed Property in Georgia

    Source: GlobeNewswire (MIL-OSI)

    Irvine, CA, July 22, 2025 (GLOBE NEWSWIRE) — Blue Navy Recovery, a professional unclaimed property recovery firm, announced today the expansion of its service operations in Georgia to manage a growing volume of state-held asset claims. This move reflects growing demand for unclaimed property recovery in Georgia—delivering trusted, no-upfront-cost recovery assistance for individuals and families.

    Blue Navy Recovery expands service operations to address growing unclaimed property recovery needs in Georgia.

    With experience navigating Georgia’s complex claims process, Blue Navy Recovery offers full-service handling—from eligibility checks and paperwork to agency communication and verification. Clients don’t need to interact with government agencies or decipher procedural forms; the firm takes on the entire burden. This expansion comes as Blue Navy continues to see success through a growing number of client-reported outcomes on Google, demonstrating how its personalized service model helps claimants navigate the system efficiently.

    “We’ve seen a spike in demand across Georgia, and this expansion is about meeting that need with speed and integrity,” said David Dorfman, Managing Partner at Blue Navy Recovery. “Every successful recovery tells a story—and we’re here to make sure more Georgians are part of that success.”

    This announcement comes alongside a similar announcement that the company is increasing services across the Unclaimed Property in California service as well.

    The firm’s model is performance-based, meaning clients owe nothing unless their claim is successfully paid. Each case is personally managed by trained recovery specialists—not automated systems—ensuring accuracy and personal support. Client experiences shared on platforms such as Google and Yelp reinforce the impact Blue Navy is making across the Southeast. The company recently celebrated their 200th successful unclaimed property recovery case alongside their 40th 5-star review, a story that was picked up by media outlets like Yahoo! FinanceBusiness Insider, and Globe Newswire.

    Blue Navy’s personalized guidance and support materials make it easy for residents to determine eligibility and understand the Georgia claims process. Clients can explore the process, read relevant user studies, and get started at the official website.

    Logo of Blue Navy Recovery, a trusted leader supporting unclaimed property claims across Georgia.

    About Blue Navy Recovery

    Blue Navy Recovery is a professional unclaimed property recovery firm that helps individuals and families recover lost or forgotten funds held by the state. With deep experience navigating the claims process in California and Georgia, we’ve helped return millions of dollars to rightful owners. We handle the paperwork, follow-ups, and filing — so you don’t have to. Our team only collects a percentage of the recovered amount, with no upfront cost. 

    Press inquiries

    Blue Navy Recovery
    https://www.bluenavy.org
    David Dorfman
    david@bluenavy.org
    (619) 215-1972

    The MIL Network

  • MIL-OSI Security: Charleroi Staffing Agency Owner Sentenced to Prison and Ordered to Pay More Than $3.6 Million in Restitution for Harboring Illegal Aliens and Failing to Pay Employment Taxes

    Source: Office of United States Attorneys

    PITTSBURGH, Pa. – A resident of Belle Vernon, Pennsylvania, has been sentenced in federal court to 30 months of imprisonment and ordered to pay $3,630,479.13 on his convictions of failing to pay employment taxes and harboring individuals who were not legally authorized to be in the United States, Acting United States Attorney Troy Rivetti announced today.

    United States District Judge Cathy Bissoon imposed the sentence on Andy Ha, 28. Ha pleaded guilty to the charges in February of 2025 (read the plea news release here).

    According to information presented to the Court, Ha was the president and owner of the Charleroi staffing agency Prosperity Services, Inc., where Ha employed individuals who were not legally authorized to be in the United States, and paid for such workers to stay in a former hotel. Ha signed false employment tax returns on behalf of the agency, in which Ha reported less than 10% of Prosperity’s employees. Ha and Prosperity failed to pay taxes on the other unreported employees, resulting in a tax loss of at least $3.1 million over the course of a year.

    Assistant United States Attorney William Guappone prosecuted this case on behalf of the government.

    Acting United States Attorney Rivetti commended the Internal Revenue Service-Criminal Investigation and Homeland Security Investigations for the investigation leading to the successful prosecution of Ha.

    MIL Security OSI

  • MIL-OSI Security: Laredo man sentenced to 63 months for smuggling over 100 illegal aliens in locked trailer

    Source: Office of United States Attorneys

    LAREDO, Texas – A 49-year-old resident of Laredo has been ordered to federal prison for his role in a conspiracy to transport illegal aliens, announced U.S. Attorney Nicholas J. Ganjei.

    Juan Manuel Aguirre pleaded guilty Feb. 6.

    U.S. District Judge Keith P. Ellison has now ordered Aguirre to serve 63 months in federal prison to be immediately followed by three years of supervised release. At the hearing, the court considered Aguirre’s history of smuggling aliens on multiple occasions and the danger he posed by transporting them in a sealed, locked, dark and unventilated trailer that required authorities to open with a bolt cutter. 

    “Human smuggling is an incredibly dangerous enterprise, and it requires the trafficker to care absolutely nothing about the lives and safety of those they transport,” said Ganjei. “Fortunately, there were no deaths in this case, but the underlying facts indicate that several of those transported had difficulty breathing and feared for their life. The Southern District of Texas will make sure that all human smugglers pay a serious price for their callousness.”

    On Dec. 2, 2024, law enforcement observed several individuals being loading into a white trailer in a warehouse parking lot. Aguirre was the driver of the truck hauling it. After he departed the location, authorities conducted a traffic stop which resulted in the discovery of 101 aliens locked inside the trailer, 13 of whom were children as young as 13 years old.

    Multiple illegal aliens reported they had difficulty breathing and feared for their life due to the conditions in the trailer. They were from the countries of Mexico, Guatemala, Cuba and Honduras.

    Aguirre will remain in custody pending transfer to a Federal Bureau of Prisons facility to be determined in the near future.

    Immigration and Customs Enforcement – Homeland Security Investigations, FBI, Texas Department of Public Safety and Border Patrol conducted the Organized Crime Drug Enforcement Task Forces (OCDETF) operation with the assistance of Customs and Border Protection, Drug Enforcement Administration and Webb County Sheriff’s Office. OCDETF identifies, disrupts and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found on the Department of Justice’s OCDETF webpage.

    Assistant U.S. Attorney Brandon Scott Bowling is prosecuting the case.

    MIL Security OSI

  • MIL-OSI USA: Luján Secures Nearly $17 Million in Federal Investments for New Mexico in Committee-Passed Appropriations Bills

    US Senate News:

    Source: United States Senator Ben Ray Luján (D-New Mexico)

    Washington, D.C. – Today, U.S. Senator Ben Ray Luján (D-N.M.) announced funding secured for New Mexico communities through the Appropriations Committee’s bipartisan passage of the Fiscal Year (FY) 2026 Military Construction, Veterans Affairs, and Related Agencies (MilCon-VA) Appropriations Bill and Fiscal Year (FY) 2026 Commerce, Justice, Science, and Related Agencies (CJS) Appropriations Bill.

    From both appropriations bills, Senator Luján secured $16,820,000 in Congressionally Directed Spending for key local projects that will strengthen our national security, boost violence intervention programs, and equip law enforcement with the resources needed to keep New Mexico communities safe.  

    “Across New Mexico, these vital investments will deliver resources to enhance public safety in our communities and upgrade infrastructure at our military bases to boost our military’s readiness and safety,” said Senator Luján. “This funding will equip our brave law enforcement officers with the tools they need to protect New Mexicans, support programs aimed at reducing youth violence and violence in Tribal communities, and reinforce critical infrastructure at our military bases. I’m proud to have fought to secure these investments for our communities, and I’ll continue working to deliver the federal support our families and communities need and deserve.”

    The Committee process is the first step, and the appropriations bills will next be considered by the full U.S. Senate.

    Senator Luján Secured Nearly $17 Million for the Following Local Projects:

    Strengthening New Mexico’s Air Force Bases:

    • $8,100,000 for infrastructure upgrades at Cannon Air Force Base, specifically for ADAL Security Forces Facility. Secured by Senator Luján and Senator Heinrich.
    • $2,000,000 for infrastructure upgrades at Kirtland Air Force Base, specifically for the design for the Wyoming Gate Project. Secured by Senator Luján and Senator Heinrich.
    • $700,000 for infrastructure upgrades at Holloman Air Force Base, specifically for the design for the Holloman High Speed Test Track. Secured by Senator Luján and Senator Heinrich.

    Boosting Public Safety Throughout New Mexico:

    • $1,069,000 for the City of Albuquerque’s Real Time Crime Center for the purchase of law enforcement technology.
    • $1,042,000 for Bernalillo County Sheriff’s Office to purchase a new fleet of vehicles.
    • $1,031,000 for the New Mexico Department of Public Safety Police to provide 5G technology in fleet vehicles. Secured by Senator Luján, Senator Heinrich, and Representative Stansbury in the House-companion bill.
    • $1,000,000 for UNM Office of the Medical Investigator DNA processing laboratory to allow for the purchase of equipment for DNA identification. Secured by Senator Luján and Senator Heinrich.
    • $500,000 for Bernalillo Country public safety technology upgrades to address high rates of crime in the Albuquerque metro area. Secured by Senator Luján, Senator Heinrich, and Representative Vasquez in the House-companion bill.
    • $250,000 for the San Juan County Partnership’s Law Enforcement Assisted Diversion (LEAD) program to assist in mitigating individuals with substance use disorder or mental/behavioral health challenges from continuously interacting with law enforcement.

    Funding Violence Intervention and Prevention Programs:

    • $1,0350,000 for the City of Albuquerque’s expansion of school-based violence intervention program to assist at risk students by improving grades and reducing youth violence.
    • $93,000 for the Coalition to Stop Violence Against Native women to address challenges in domestic violence and sexual violence in Tribal communities.

    MIL OSI USA News

  • MIL-OSI United Nations: Supercharging Clean Energy Will Repair Humankind’s Relationship with Climate, Fuel Economic Growth, Secretary-General Says, Noting $2 Trillion Invested in 2024

    Source: United Nations General Assembly and Security Council

    Following is UN Secretary-General António Guterres’ address on climate action “A Moment of Opportunity:  Supercharging the Clean Energy Age”, in New York today:

    The headlines are dominated by a world in trouble.  By conflict and climate chaos.  By rising human suffering.  By growing geopolitical divides.  But amidst the turmoil, another story is being written.  And its implications will be profound.

    Throughout history, energy has shaped the destiny of humankind — from mastering fire to harnessing steam to splitting the atom.  Now, we are on the cusp of a new era.  Fossil fuels are running out of road.  The sun is rising on a clean energy age.

    Just follow the money.  Two trillion dollars went into clean energy last year — that’s $800 billion more than fossil fuels and up almost 70 per cent in 10 years.  And new data released today from the International Renewable Energy Agency shows that solar — not so long ago four times the cost of fossil fuels — is now 41 per cent cheaper.  Offshore wind — 53 per cent. And over 90 per cent of new renewables worldwide produced electricity for less than the cheapest new fossil fuel alternative.

    This is not just a shift in power.  This is a shift in possibility.  Yes, in repairing our relationship with the climate.  Already, the carbon emissions saved by solar and wind globally are almost equivalent to what the whole European Union produces in a year.

    But this transformation is fundamentally about energy security and people’s security.  It’s about smart economics.  Decent jobs, public health, advancing the Sustainable Development Goals.  And delivering clean and affordable energy to everyone, everywhere.

    Today, we are releasing a special report with the support of UN agencies and partners — the International Energy Agency, the International Monetary Fund (IMF), International Renewable Energy Agency, the Organisation for Economic Cooperation and Development (OECD) and the World Bank.

    The report shows how far we have come in the decade since the Paris Agreement sparked a clean energy revolution.  And it highlights the vast benefits — and actions needed — to accelerate a just transition globally.

    Renewables already nearly match fossil fuels in global installed power capacity.  And that’s just the beginning.  Last year, almost all the new power capacity built came from renewables.  And every continent on Earth added more renewables capacity than fossil fuels.  The clean energy future is no longer a promise.  It’s a fact.  No government.  No industry. No special interest can stop it.

    Of course, the fossil fuel lobby of some fossil fuel companies will try — and we know the lengths to which they will go. But I have never been more confident that they will fail — because we have passed the point of no return.

    For three powerful reasons.  First, market economics.  For decades, emissions and economic growth rose together.  No more.  In many advanced economies, emissions have peaked, but growth continues.

    In 2023 alone, clean energy sectors drove 10 per cent of global gross domestic product (GDP) growth.  In India, 5 per cent.  The United States, 6 per cent.  China — a leader in the energy transition — 20 per cent.  And in the European Union, nearly 33 per cent.  And clean energy sector jobs now outnumber fossil fuel jobs — employing almost 35 million people worldwide.

    Even Texas — the heart of the American fossil fuel industry — now leads the United States in renewables.  Why?  Because it makes economic sense.

    And yet fossil fuels still enjoy a 9-to-1 advantage in consumption subsidies globally — a clear market distortion.  Add to that the unaccounted costs of climate damages on people and planet — and the distortion is even greater.

    Countries that cling to fossil fuels are not protecting their economies — they are sabotaging them.  Driving up costs.  Undermining competitiveness.  Locking in stranded assets.  And missing the greatest economic opportunity of the twenty-first century.

    Second — renewables are here to stay because they are the foundation of energy security and sovereignty. Let’s be clear:  The greatest threat to energy security today is in fossil fuels.  They leave economies and people at the mercy of price shocks, supply disruptions and geopolitical turmoil.  Just look at Russia’s invasion of Ukraine.  A war in Europe led to a global energy crisis.  Oil and gas prices soared.  Electricity and food bills followed.  In 2022 average households around the world saw energy costs jump 20 per cent.

    Modern and competitive economies need stable, affordable energy. Renewables offer both.  There are no price spikes for sunlight.  No embargoes on wind.  Renewables can put power — literally and figuratively — in the hands of people and governments.  And almost every nation has enough sun, wind, or water to become energy self-sufficient.  Renewables mean real energy security.  Real energy sovereignty.  And real freedom from fossil-fuel volatility.

    The third and final reason why there is no going back on renewables: Easy access.  You can’t build a coal plant in someone’s backyard.  But you can deliver solar panels to the most remote village on Earth.  Solar and wind can be deployed faster, cheaper and more flexibly than fossil fuels ever could.  And while nuclear will be part of the global energy mix, it can never fill the access gaps.

    All of this is a game changer for the hundreds of millions of people still living without electricity — most of them in Africa, a continent bursting with renewable potential. By 2040, Africa could generate 10 times more electricity than it needs — entirely from renewables.

    We are already seeing small-scale and off-grid renewable technologies lighting homes, and powering schools and businesses in remote areas.  And in places like Pakistan for example, people power is fuelling a solar surge — consumers are driving the clean energy boom.

    The energy transition is unstoppable.  But the transition is not yet fast enough or fair enough.  OECD countries and China account for 80 per cent of renewable power capacity installed worldwide.  Brazil and India make up nearly 10 per cent.  Africa — just 1.5 per cent.

    Meanwhile, the climate crisis is laying waste to lives and livelihoods.  Climate disasters in small island States have wiped out over 100 per cent of GDP.  In the United States, they are pushing insurance premiums through the roof.

    And the 1.5-degree limit is in unprecedented peril.  To keep it within reach, we must drastically speed up the reduction of emissions — and the reach of the clean energy transition.  With manufacturing capacity racing, prices plummeting, and COP30 [Thirtieth Session of the Conference of the Parties to the United Nations Framework Convention on Climate Change] fast approaching…  This is our moment of opportunity.  We must seize it.  We can do so by taking action in six opportunity areas.

    First — by using new national climate plans to go all-out on the energy transition.  Too often, governments send mixed messages:  Bold renewable targets on one day.  New fossil fuel subsidies and expansions the next.

    The next national climate plans, or NDCs, are due in a matter of months.  They must bring clarity and certainty.  Group of Twenty (G20) countries must lead. They produce 80 per cent of global emissions.  The principle of common but differentiated responsibilities must apply but every country must do more.  Ahead of COP30 in Brazil this November, they must submit new plans.

    I invite leaders to present their new NDCs at an event I will host in September, during General Assembly High-level week.   These must: cover all emissions, across the entire economy; align with the 1.5-degree limit; integrate energy, climate and sustainable development priorities into one coherent vision; and deliver on global promises to double energy efficiency and triple renewables capacity by 2030, and to accelerate the transition away from fossil fuels.  These plans must be backed by long-term road maps for a just transition to net-zero energy systems — in line with global net-zero by 2050.

    And they must be underpinned by policies that show that the clean energy future is not just inevitable — but investable.  Policies that create clear regulations and a pipeline of projects.  That enhance public-private partnerships — unlocking capital and innovation.  That put a meaningful price on carbon.  And that end subsidies and international public finance for fossil fuels — as promised.

    Second, this is our moment of opportunity to build the energy systems of the twenty-first century.  The technology is moving ahead.  In just 15 years, the cost of battery storage systems for electricity grids has dropped over 90 per cent.

    But here’s the problem.  Investments in the right infrastructure are not keeping up.  For every dollar invested in renewable power, just 60 cents go to grids and storage.  That ratio should be one-to-one.

    We are building renewable power — but not connecting it fast enough.  There’s three times more renewable energy waiting to be plugged into grids than was added last year.  And fossil fuels still dominate the global total energy mix.

    We must act now and invest in the backbone of a clean energy future:  In modern, flexible and digital grids — including regional integration.  In a massive scale-up of energy storage.  In charging networks — to power the electric vehicle revolution.

    On the other hand, we need energy efficiency but also electrification — across buildings, transport and industry. This is how we unlock the full promise of renewables — and build energy systems that are clean, secure and fit for the future.

    Third, this is our moment of opportunity to meet the world’s surging energy demand sustainably.  More people are plugging in.  More cities are heating up — with soaring demand for cooling.  And more technologies — from AI to digital finance — are devouring electricity.  Governments must aim to meet all new electricity demand with renewables.

    AI can boost efficiency, innovation and resilience in energy systems.  And we must take profit in it.  But it is also energy hungry.  A typical AI data centre eats up as much electricity as 100,000 homes.  The largest ones will soon use 20 times that.  By 2030, data centres could consume as much electricity as all of Japan does today.

    This is not sustainable — unless we make it so.  And the technology sector must be out front.  Today I call on every major tech firm to power all data centres with 100 per cent renewables by 2030.

    And — along with other industries — they must use water sustainably in cooling systems.  The future is being built in the cloud.  It must be powered by the sun, the wind and the promise of a better world.

    Fourth, this is the moment of opportunity for a just energy transition. The clean energy that we must deliver must also deliver equity, dignity and opportunity for all.

    That means governments leading a just transition.  With support, education and training — for fossil fuel workers, young people, women, Indigenous Peoples and others — so that they can thrive in the new energy economy.  With stronger social protection — so no one is left behind.  And with international cooperation to help low-income countries that are highly-dependent on fossil fuels and struggling to make the shift.

    But justice doesn’t stop here.  The critical minerals that power the clean energy revolution are often found in countries that have long been exploited.  And today, we see history repeating.  Communities mistreated.  Rights trampled.  Environments trashed.  Nations stuck at the bottom of value chains — while others reap rewards.  And extractive models digging deeper holes of inequality and harm.  This must end.

    Developing countries can play a major role in diversifying sources of supply. The UN Panel on Critical Energy Transition Minerals has shown the way forward — with a path grounded in human rights, justice and equity.

    Today, I call on governments, businesses and civil society to work with us to deliver its recommendations.  Let’s build a future that is not only green — but just.  Not only fast — but fair.  Not only transformative — but inclusive.

    Fifth, we have a moment of opportunity to use trade and investment to supercharge the energy transition.  Clean energy needs more than ambition.  It needs access — to technologies, materials and manufacturing.

    But these are concentrated in just a few countries.  And global trade is fragmenting.

    Trade policy must support climate policy.  Countries committed to the new energy era must come together to ensure that trade and investment drive it forward.  By building diverse, secure and resilient supply chains.  By cutting tariffs on clean energy goods.  By unlocking investment and trade — including through South-South cooperation. And by modernizing outdated investment treaties — starting with Investor-State Dispute Settlement provisions.

    Today, fossil fuel interests are weaponizing these provisions to delay the transition, particularly in several developing countries.  Reform is urgent.  The race for the new must not be a race for the few.  It must be a relay — shared, inclusive and resilient.  Let’s make trade a tool for transformation.

    Sixth and finally, this is our moment of opportunity to unleash the full force of finance — driving investment to markets with massive potential.  Despite soaring demand and vast renewables potential — developing countries are being locked out of the energy transition.

    Africa is home to 60 per cent of the world’s best solar resources.  But it received just 2 per cent of global clean energy investment last year.  Zoom out, and the picture is just as stark.

    In the last decade, only 1 in every 5 clean energy dollars went to emerging and developing countries outside China.  To keep the 1.5-degree limit alive — and deliver universal energy access – annual clean energy investment in those countries must rise more than fivefold by 2030.

    That demands bold national policies.  And concrete international action to:  Reform the global financial architecture.  Drastically increase the lending capacity of multilateral development banks — making them bigger, bolder and better able to leverage massive amounts of private finance at reasonable costs.  And take effective action on debt relief — and scale up proven tools like debt for climate swaps.

    Today, developing countries pay outlandish sums for both debt and equity financing — in part because of outdated risk models, bias and broken assumptions that boost the cost of capital.  Credit ratings agencies and investors must modernize.

    We need a new approach to risk that reflects:  the promise of clean energy; the rising cost of climate chaos; and the danger of stranded fossil fuel assets.  I urge parties to unite to solve the complex challenges facing some developing countries in the energy transition — such as early retirement of coal plants.

    The fossil fuel age is flailing and failing.  We are in the dawn of a new energy era.  An era where cheap, clean, abundant energy powers a world rich in economic opportunity.  Where nations have the security of energy autonomy.  And the gift of power is a gift for all.

    That world is within reach.  But it won’t happen on its own.  Not fast enough.  Not fair enough.  It is up to us.  We have the tools to power the future for humanity.  Let’s make the most of them.  This is our moment of opportunity.

    MIL OSI United Nations News

  • MIL-OSI USA: Additional Funding Available for Zero-Emission School Buses

    Source: US State of New York

    overnor Kathy Hochul today announced that an additional $200 million is now available for zero-emission school buses through the third installment of funding from the historic $4.2 billion Clean Water, Clean Air, and Green Jobs Environmental Bond Act of 2022. The funding, distributed through the New York School Bus Incentive Program (NYSBIP), supports the purchase of electric buses, charging infrastructure, and fleet electrification planning as public schools transition to zero-emission technologies that improve air quality and reduce pollution in communities. This investment helps ensure that schoolchildren, drivers, and the communities where they live across New York benefit from clean, quiet, and healthy buses.

    “New York State is leaning into our Environmental Bond Act commitment to provide public schools with the funding and resources to make electric school buses more affordable,” Governor Hochul said. “We are leaving no school behind as we reduce pollution from vehicles so every student can benefit from clean air while building healthier, more sustainable communities for New Yorkers across the state.”

    Administered by the New York State Energy Research and Development Authority (NYSERDA), NYSBIP provides incentives to eligible school bus fleet operators, including school districts and school bus operators, that purchase zero-emission buses. It also offers charging infrastructure vouchers to help support the installation of Level 2 or DC fast chargers and provides funding to develop fleet electrification plans. This support helps ensure safer, more reliable transportation for students while giving schools the tools they need to make smart, cost-effective upgrades.

    The funding is available on a first-come, first-served basis with incentive amounts covering up to 100 percent of the incremental cost of a new or repowered electric school bus. This helps offset some or all of the difference in purchase price between zero-emission buses and comparable diesel or gasoline buses. All school bus fleet operators in New York State can also qualify for funding for fleet electrification plans, which provide a customized roadmap for electric bus adoption.

    New York State Energy Research and Development Authority President and CEO Doreen M. Harris said, “Today is the latest in a series of support that NYSERDA has offered to help make it easier for fleet operators to plan, navigate incentives for bus purchases and install vehicle charging infrastructure. We are excited to help more adopt zero-emission school buses through this additional Environmental Bond Act funding.”

    Program eligibility and rules for charging infrastructure funding are available online through the NYSBIP Implementation Manual. School bus fleet operators do not apply directly for school bus funding. Vehicle dealers apply the funding to the price of buses on their behalf after fleet operators have issued purchase orders. Fleet operators apply directly to NYSERDA for charging vouchers, which support adding charging infrastructure to their depots.

    Larger funding amounts are available for high-need school districts and school districts with significant portions of their population living in disadvantaged communities, as determined by the New York State Climate Justice Working Group criteria. While these districts are defined as priority districts through this program, all school districts can earn increased incentives by removing a gas or diesel bus from operation, purchasing wheelchair accessible buses, or purchasing buses with vehicle to grid capability. All school districts that complete fleet electrification plans also become eligible for higher funding amounts.

    New York State Department of Environmental Conservation Commissioner Amanda Lefton said, “The continued rollout of zero-emission school buses is critical to improving air quality and protecting the health of students and drivers in communities across the State. Investments through the Bond Act are making the transition to these greener vehicles more affordable for school districts. Under the leadership of Governor Hochul and in coordination with our state agency partners, DEC remains focused on administering Bond Act funding to support this important program and continue momentum to help address climate impacts, reduce harmful emissions, and improve quality of life for New York families.”

    New York State Department of Public Service CEO Rory M. Christian said, “Kudos to Governor Hochul and her team for encouraging further adoption and deployment of zero-emission school buses. This program will help continue our move toward a cleaner environment, which benefits all of us.”

    New York State Health Commissioner Dr. James McDonald said, “I thank Governor Hochul for her continued investment in the health of our children and commitment to building healthier communities across the state. Cleaner air means healthier kids, and reducing pollution around schools helps protect them from asthma and other respiratory problems.”

    Modernizing public school transportation with zero-emission buses is a priority for Governor Hochul to ensure the health of New York students. The FY25-26 New York State Budget continued to build momentum for school districts to put electric school buses on the road this year while providing districts with additional flexibility and time to complete their electrification plans and get hands-on experience with this new technology. The new independent range estimate requirement for bus manufacturers will also give school districts greater confidence that the buses will meet specific mileage and route conditions.

    Since NYSBIP’s launch, 88 school districts have applied for funds to purchase 529 buses, which includes 50 priority school districts accounting for 406 buses, and 400 districts are now working with NYSERDA to create Fleet Electrification Plans.

    The Bond Act requires that disadvantaged communities receive no less than 35 percent, with a goal of 40 percent, of the benefit of total Bond Act funds. In line with this goal, NYSERDA aims to ensure that at least 40 percent of the New York School Bus Incentive Program benefits disadvantaged communities. Buses domiciled in priority districts are eligible for higher incentive amounts in support of new zero-emission buses and charging infrastructure.

    New York State provides many resources for school bus fleet operators to transition their fleets to zero-emission buses, including an Electric School Bus Guidebook, a collection of practical user guides that highlight the benefits of electric school buses to make each part of transitioning a bus fleet easy to understand. This is a resource that can inform discussions with schools, New York State agencies, legislators, communities, manufacturers, bus dealers, and utilities to raise awareness on the Bond Act funding available to school districts and to help more communities understand the health and climate benefits that electric buses provide. Fleet operators seeking assistance should contact NYSERDA at [email protected].

    State Senator Kevin Parker said, “The additional $200 million in funding for zero-emission school buses is a bold investment in our children’s health, our environment, and the future of clean energy in New York. By accelerating the transition to electric school buses, we’re not only reducing harmful emissions but also improving air quality and public health in our communities, especially in neighborhoods that have long suffered from high pollution levels. This is a win for clean energy, for equity, and for every New Yorker.”

    State Senator Shelley B. Mayer said, “I am pleased that an additional $200 million is now available to school districts to support the transition to zero-emission school buses. New York has been a leader in the fight against climate change, and this funding, provided through the historic Clean Water, Clean Air, and Green Jobs Environmental Bond Act approved by New Yorkers, will further our efforts to reduce carbon emissions while alleviating financial burdens for New York schools. I would like to thank Governor Hochul and NYSERDA for their dedication to making New York a cleaner place, and I also extend my gratitude to the voters who approved this Bond Act.”

    State Senator Jeremy Cooney said, New York must remain committed to our environmental goals for a brighter future for New Yorkers, but we also realize that the state has a role to play in making this clean energy transition a reality. Today’s announcement is an important step in the right direction, and proof that we’ll continue to help our public schools, bolster charging infrastructure, and create a cleaner, healthier New York.”

    Assemblymember William Magnarelli said, “The Governor’s investment in zero-emission school buses shows the state’s continued commitment to climate leadership and advancing equitable access to clean transportation. The investment allows for a smooth transition to clean transportation and alleviates the anxiety of how districts will pay for the buses.”

    Assemblymember Michael R. Benedetto said, “I applaud Governor Hochul for making this a priority. This $200 million will help many school districts as they work to make the transition to electric buses. It’s a meaningful step toward cleaner air and healthier communities for our children.”

    Assemblymember Didi Barrett said, “The upfront cost of zero emission school buses has been a significant concern for all of the schools in my Assembly District, and the vast majority of districts across the State. This newly released funding from the 2022 Environmental Bond Act offers welcome financial support for our schools to electrify their bus fleets, bringing us closer to creating cleaner, safer and quieter commutes for our school children while helping us get closer to our ambitious climate goals.”

    Association of School Business Officials Executive Director Brian Cechnicki said, “Continued investments, including this funding, are critical for school districts to meet the state’s zero-emission bus mandate, and we are appreciative of NYSERDA for partnering with districts in this work.”

    New York School Bus Contractors Association President Tommy Smith said, “The New York School Bus Contractors Association is grateful that New York State continues to lead in financing the transition to electric school buses. We are excited about the advancements in battery technology that will further accelerate this initiative and help deliver cleaner, quieter, and more sustainable transportation for our students.”

    Mothers Out Front Distributed Senior Organizer Sarah Smiley said, “It is great news for students, parents, and school districts that more funding is now available for electric school buses, charging infrastructure, and fleet transition planning. We hope more districts leverage the New York School Bus Incentive Program funding so that our children have clean rides to school and we can reduce emissions for a healthier planet.”

    For more than fifty years, NYSERDA has been a trusted and objective resource for New Yorkers, taking on the critical role of energy planning and policy analysis, along with making investments that drive New York toward a more sustainable future. New York State is investing nearly $3 billion in electrifying its transportation sector and rapidly advancing measures that all new passenger cars and trucks sold be zero-emission. There are a range of initiatives to grow access to EVs and improve clean transit for all New Yorkers including EV Make Ready, EVolve NY, Charge Ready NY 2.0, the Drive Clean Rebate, the New York Truck Voucher Incentive Program, and the New York State’s climate agenda calls for an affordable and just transition to a clean energy economy that creates family-sustaining jobs, promotes economic growth through green investments, and directs a minimum of 35 percent of the benefits to disadvantaged communities. New York is advancing a suite of efforts to achieve an emissions-free economy by 2050, including in the energy, buildings, transportation, and waste sectors.

    MIL OSI USA News