Category: Fisheries

  • MIL-OSI USA: Fish barrier removal project along US 2 begins May 27 near Snohomish

    Source: Washington State News 2

    WSDOT and Snohomish County will improve fish access along Sexton Creek south of Three Lakes Road

    SNOHOMISH – A new project that will remove barriers to fish along Sexton Creek, a tributary to the Pilchuck River, east of Snohomish shows how important collaboration can be in reconnecting streams and keeping state waterways healthy.

    The Washington State Department of Transportation and Snohomish County will begin a joint project Tuesday, May 27, to replace existing 5½-foot culverts along Sexton Creek with new structures that will allow fish to swim freely.

    Contractor crews working for WSDOT will install an improved, three-sided box structure beneath US 2, while the county project will replace culverts under Sexton Road with a 29-foot-wide, steel arch culvert and remove other barriers on Sexton Creek near where it empties into the Pilchuck River.

    WSDOT’s US 2/Sexton Creek to Pilchuck River Fish Passage and Snohomish County’s Sexton Road Culvert Replacement projects will restore access to the full reach of the tributary for Chinook, coho, pink and chum salmon and steelhead, sea-run cutthroat, bull and resident trout. WSDOT will oversee construction for both projects.

    What to expect

    Beginning Tuesday, May 27, crews will begin building a bypass road along US 2, creating a safe work zone to remove and replace the existing culvert while allowing traffic to flow. People traveling in the area also can expect:

    • Up to three Saturday night full closures of US 2 with detours.
    • Nighttime lane closures of US 2 with alternating traffic.
    • Traffic shifts on US 2, with one lane remaining open in each direction.
    • Daytime shoulder closures along US 2.
    • Sexton Road closed to through traffic for up to two months beginning in July.
    • Local access to homes along Sexton Road near the closure.

    Construction is expected to finish in fall 2025.

    Fish passage program

    WSDOT has worked for nearly three decades to improve fish passage and open natural habitat. A 2013 federal injunction also directed WSDOT to significantly speed up efforts to replace fish barriers. The US 2 culvert along Sexton Creek is subject to the federal injunction.

    Snohomish County has been improving fish passage for over 35 years, with an increased emphasis on barrier removal and improvements since 2015. The county works closely with Washington State Department of Fish and Wildlife and local tribes to identify and correct barriers related to county roads.

    New fish-friendly structures are larger, more resilient to change in the landscape and provide long-term fish passage. People can use the WSDOT interactive map to learn about corrected and uncorrected barriers and the injunction boundary.

    Funding for the $9 million US 2 portion of the project comes from state gas tax, Connecting Washington and Move Ahead Washington accounts. Snohomish County’s portion of the project is funded by a Washington State Department of Recreation and Conservation Office Fish Barrier Removal Board grant, a Bi-Partisan Infrastructure Law grant administered by the National Oceanic and Atmospheric Administration and Snohomish County Surface Water Management utility fees.

    MIL OSI USA News

  • MIL-OSI USA: Steer Clear of Harmful Algae Blooms this Summer

    Source: US State of Rhode Island

    As we approach the summer months and recreational activities on the State’s abundant lakes, ponds and rivers increase, the Rhode Island Department of Health (RIDOH) and the Rhode Island Department of Environmental Management (DEM) remind the public to be on the lookout for harmful algae blooms (HABs). HABs are caused by blue-green algae, also known as cyanobacteria, which are naturally present in bodies of freshwater. Higher temperatures, slow moving water, and high amounts of nutrients cause the cyanobacteria to grow excessively and create potential for HABs. These HABs can produce toxins which can be harmful to humans and animals.

    RIDOH and DEM work together to monitor and respond to HABs and issue recreational advisories when thresholds are met. During a HAB, all recreation, including swimming, fishing, boating, and kayaking should be avoided. In addition people should not drink untreated water or eat fish from affected waterbodies. Pet owners should not allow pets to drink or swim in this water. State and local officials work to post warnings around bodies of water when HABs are present. However, the public should be on the lookout for HABs and know to avoid affected waters if they encounter a HAB before warnings have been posted.

    Affected waters may be bright to dark green in color and have dense, floating algal mats on the water’s surface. The water may look like green paint, thick pea soup, or green cottage cheese. If you see bodies of water that look like this, it’s best for people and pets to avoid contact with the water.

    Skin contact with water containing blue-green algae can cause irritation of the skin, nose, eyes, and throat. Symptoms can include stomachache, diarrhea, vomiting, and nausea. Less common symptoms can include dizziness, headache, fever, liver damage, and nervous system damage. Young children and pets are at higher risk for health effects associated with HABs because they are more likely to swallow water when they are in or around bodies of water.

    If you come into contact with a HAB, rinse your skin with clean water as soon as possible and, when you get home, take a shower and wash your clothes. If your pet comes into contact with the water, immediately wash your pet with clean water and do not let the pet lick algae off its fur. Call a veterinarian if your pet shows any symptoms of blue-green algae poisoning, including loss of energy, loss of appetite, vomiting, diarrhea, or any unexplained sickness that occurs within a day or so after being in contact with a HAB. People who have had contact with a HAB and have any of the symptoms described above should call a healthcare professional.

    To report suspected blue-green algae blooms, contact DEM’s Office of Water Resources at 401-222-4700 or DEM.OWRCyano@dem.ri.gov and if possible, send a photograph of the reported algae bloom.

    MIL OSI USA News

  • MIL-OSI Security: FBI Little Rock Presents National Safe Online Surfing Award to LISA Academy West Elementary in Little Rock

    Source: US FBI

    LITTLE ROCK, AR—Today, LISA Academy West Elementary in Little Rock, Arkansas, was presented with the FBI Safe Online Surfing (FBI-SOS) Internet Challenge’s national award. Under the guidance of computer teacher Vickie Carroll, LISA Academy students scored a composite score of 95.33 percent to win the March 2022 award in the Starfish category. For the month of March 2022, a record-breaking 173,011 students from 2,086 schools across all 50 states and fpur U.S. territories participated in the FBI-SOS Internet Challenge.

    “The impressive accomplishment achieved by the students and teachers at LISA Academy West Elementary reflects highly upon Little Rock and the entire state of Arkansas,” said FBI Little Rock Special Agent in Charge James A. Dawson. “We hope Arkansas students and teachers continue to educate themselves through our SOS program about online safety.”

    “Educating students about staying safe online is extremely important to us at LISA Academy West Elementary,” said Vickie Carroll. “Our students completed several online courses on Internet safety to educate themselves and prepare for the FBI-SOS competition. They were thrilled to learn they placed first in the competition and were even more excited about meeting real-life FBI agents!”

    FBI-SOS is a free initiative designed to educate third through eighth-grade students about cyber safety. All public, private, and home schools are eligible to participate in this entertaining and educational web-based program which can be accessed year-round. The website features six grade-specific “islands” for students to visit. Each island includes games, videos, and interactive features which address the protection of personal information, password strength, cell phone safety, social networking, and online gaming safety. The videos also include real-life stories of kids who have encountered cyberbullies and online predators.

    Each month of the academic year, schools compete for the national award in one of three categories determined by the number of students participating from each school: Starfish (5-50 participants); Stingray (51-100); and Shark (100+). Kids and adults of all ages can explore the site, play the games, watch the videos, and learn about cyber safety. However, the competitive exam can only be taken by third to eighth-grade students whose classes have been registered by their teachers.

    The FBI-SOS Internet Challenge was developed with the assistance of the National Center for Missing and Exploited Children with input from teachers and schools throughout America. Visit the FBI-SOS website at sos.fbi.gov for more information or contact the FBI Little Rock Office Community Outreach Specialist at (501) 221-9100.

    MIL Security OSI

  • MIL-OSI Security: Tigard Repeat Offender Sentenced to Federal Prison for Transporting a Victim Across State Lines for Illegal Sexual Activity and Laundering Proceeds Through a Bottled Water Company

    Source: US FBI

    PORTLAND, Ore.—A Tigard, Oregon man with a lengthy criminal history was sentenced to federal prison today for transporting an adult victim across state lines for illegal sexual activity and laundering the proceeds through a Portland-based bottled water company.

    Johnell Lee Cleveland, 42, was sentenced to 108 months in federal prison and seven years’ supervised release. He was also ordered to pay $32,115 in restitution to the Oregon Department of Employment. The sum of restitution Cleveland must pay to his adult victim will be determined at a later date.

    “In the summer of 2020, Johnell Cleveland received a rare early release from federal prison he could have used as an opportunity to chart a new path away from criminality. Unfortunately, he did the exact opposite, diving headfirst into a remarkable series of crimes,” said Steven T. Mygrant, Chief of the Narcotics and Criminal Enterprises Unit of the United States Attorney’s Office for the District of Oregon. “We thank the FBI, IRS, and PPB for their efforts in holding Cleveland accountable and securing this nine-year prison sentence.” 

    “Johnell Cleveland has demonstrated a flagrant disregard for the law,” said Douglas A. Olson, Special Agent in Charge of the FBI Portland Field Office. “Even after serving a prison term, Cleveland continued his chronic criminal behavior with money laundering, wire fraud, and transporting an adult victim for illegal sexual activity. The FBI, along with our partners, is dedicated to maintaining the safety of our communities, and with Cleveland behind bars, our community is more secure.”

    “30 days is long enough to form positive habits; it is also more than long enough to return to bad ones, as Mr. Cleveland unfortunately chose to do,” said Special Agent in Charge Adam Jobes, IRS Criminal Investigation (CI), Seattle Field Office. “Given a second chance, Mr. Cleveland did not choose to better himself. Instead, he proceeded to cause immense harm to the people and to the communities around him. This sentencing shows that CI, along with our partners in law enforcement, will bring justice to repeat offenders as many times as needed, as Mr. Cleveland is finding out today.”

    According to court documents, in July 2019, Cleveland was sentenced to 57 months in federal prison for distributing cyclopropyl fentanyl, possessing a machine gun and money laundering. In the summer of 2020, nineteen months before his original projected release date, Cleveland sought and was granted a compassionate release from prison based on health risks associated with the COVID-19 pandemic.

    Less than 30 days following his release from prison, Cleveland and an associate submitted a fraudulent insurance policy application for nine pieces of jewelry previously seized by law enforcement. Approximately four months after Cleveland and his associate were issued an insurance policy worth more than $100,000, his associate submitted a false burglary report to the Las Vegas Police Department claiming her Mercedes-Benz sedan and various personal property, including the nine pieces of insured jewelry, had been stolen. Seeking reimbursement, Cleveland quickly notified his insurance company of the purported jewelry theft.

    While his insurance fraud scheme was ongoing, in October 2020, Cleveland devised a separate scheme to fraudulently obtain COVID relief program funds. On October 14, 2020, he applied for Pandemic Unemployment Assistance (PUA) benefits for a five-month period beginning in April 2020, claiming he was unemployed because of the COVID-19 pandemic. In reality, Cleveland was unemployed during this time because he was in federal prison. Despite his false claims, Cleveland’s application was approved, and he began receiving PUA benefits.

    Investigators later learned that during this same time period, Cleveland transported for illegal sexual activity an adult woman he had, in August 2020, commenced a romantic relationship with. Cleveland told the woman that he needed money to get his business ventures off the ground and fund their future together. Over time, Cleveland became less friendly and more menacing toward the woman, demanding she travel frequently and engage in more commercial sex. Meanwhile, Cleveland kept all the money the woman earned and threatened her with various punishments he claimed to have used on other women, including locking her in a dog cage.

    To conceal and disguise the nature of his victim’s proceeds, Cleveland used the money to pay business expenses for the bottled water company, including costs for bottling and manufacturing, rental of corporate office space in Portland, merchandising, and a monthly retainer with a modeling agency.

    On November 3, 2021, Cleveland was arrested without incident in Portland. The same day, investigators seized Cleveland’s vehicle. A subsequent search of the vehicle resulted in the discovery of a secret compartment in the driver-side door that concealed a loaded handgun.

    On October 19, 2021, a federal grand jury in Portland returned an indictment charging Cleveland and his insurance fraud associate with conspiring to commit and committing wire fraud. Later, in on March 10, 2022, Cleveland was indicted a second time for sex trafficking by force, fraud, and coercion; illegally possessing a firearm as a convicted felon; and money laundering. 

    On February 4, 2024, Cleveland pleaded guilty to both counts of his fraud indictment and a three-count superseding criminal information charging him with transportation for illegal sexual activity, illegally possessing a firearm as a convicted felon, and money laundering.

    This case was investigated by the FBI, IRS CI, and the Portland Police Bureau Human Trafficking Unit. It was prosecuted by Peter Sax and Nicole Bockelman, Assistant U.S. Attorneys for the District of Oregon.

    If you or someone you know is in danger, please call 911. If you are a human trafficking victim or have information about a potential human trafficking situation, please call the National Human Trafficking Resource Center at 1-888-373-7888 or by texting 233733. Calls and texts are answered 24 hours a day, seven days a week.

    Human trafficking is a serious federal crime where individuals are compelled by force, fraud, or coercion to engage in commercial sex, labor, or domestic servitude against their will. Traffickers exploit and endanger some of the most vulnerable members of our society and cause unimaginable harm. In February 2022, Attorney General Merrick B. Garland launched a new national strategy to combat human trafficking that aims to prevent all forms of trafficking, prosecute trafficking cases, and support trafficking victims and survivors.

    MIL Security OSI

  • MIL-OSI United Kingdom: Buy angling licences and permits online

    Source: Northern Ireland Direct

    Date published:

    If you want to go angling, you can buy a rod licence and a permit online to allow you to fish the public angling estate.

    Licence and permit

    You need a rod licence and permit to fish in freshwater lakes, loughs and rivers in Northern Ireland.

    The licence is for the fishing rod and the game or coarse fish you’re allowed to catch.

    A permit grants you the right to fish in a particular fishery.

    You can buy a licence or permit online through this page:

    Catch returns online

    Licence holders legally must make a catch return, as these help to manage fish stock.

    Maps of fishing waters

    You can search by county to find out what angling waters are available in your local area.

    You can also find out which waters have recently been stocked and what sort of fishing is allowed there.

    The following pages should be useful:

    Maps of fishing waters in the public angling estate are also available to view at this link:

    Protecting fisheries

    You can help protect fisheries by reporting illegal activity and pollution incidents.

    By reporting these incidents, you can help to improve and protect angling for the future.

    Foyle and Carlingford

    If you want to fish in the Foyle and Carlingford catchment areas, you will need to contact the Loughs Agency.

    They set their own licence duties for fishing in those areas. 

    More useful links

    MIL OSI United Kingdom

  • MIL-OSI Security: Former Finance Minister of Mozambique Sentenced to 102 Months’ Imprisonment for His Role in $2 Billion Fraud and Money Laundering Scheme

    Source: US FBI

    BROOKLYN, NY – Earlier today, in federal court in Brooklyn, Manuel Chang, the former Finance Minister of Mozambique, was sentenced by United States District Judge Nicholas G. Garaufis to a term of imprisonment of 102 months and ordered to pay $7 million in forfeiture.  The restitution amount will be determined at a later date.   Chang was convicted after a four-week trial in July and August 2024 of conspiring to commit wire fraud and money laundering in connection with his role in a $2 billion international fraud, bribery and money laundering scheme that victimized investors in the United States and elsewhere.  He was arrested in December 2018 in South Africa, pursuant to a provisional arrest warrant issued at the request of the United States and extradited to the Eastern District of New York in July 2023.

    Carolyn Pokorny, Acting United States Attorney for the Eastern District of New York, Brent S. Wible, Principal Deputy Assistant Attorney General and head of the Justice Department’s Criminal Division and James E. Dennehy, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI), announced the sentence.

    “Today’s sentence shows that foreign officials who abuse their power to commit crimes targeting the U.S. financial system will meet U.S. justice,” stated Acting United States Attorney Pokorny.  “My Office will continue to pursue those who violate our laws and harm U.S. investors regardless of their power, position or title.”  

    “Manuel Chang abused his position as Finance Minister of Mozambique by obtaining $7 million in bribe payments in exchange for helping secure more than $2 billion in loans,” said Principal Deputy Assistant Attorney General Brent S. Wible, head of the Justice Department’s Criminal Division. “Chang’s brazen misconduct betrayed his duty to the people of Mozambique and defrauded investors, including those in the United States, of substantial amounts. With today’s sentence, Chang has been held accountable for his violations of U.S. law.”

    “Manuel Chang abused his authority as the former Mozambique Finance Minister by helping to obtain billions of dollars in loans, a large portion of which was diverted from its intended purposes to satisfy bribe payments, ultimately causing significant financial loss to U.S. and global investors,” stated FBI Assistant Director in Charge Dennehy.  “With the support of his co-conspirators, Chang violated the trust of his office and wielded his position to enrich himself and other Mozambican officials. May today’s sentencing reiterate the FBI’s commitment to dismantling all corruptive malpractices orchestrated by foreign governments, especially those targeting our country as their personal piggy bank.”

    As proven at trial, Chang received $7 million in bribes in exchange for signing guarantees on behalf of the Republic of Mozambique to secure funding for three loans for maritime projects.  As part of the scheme, Chang and his co-conspirators falsely stated to banks and investors that the loan proceeds would be used for the projects and that the borrower would not pay bribes to Mozambican government officials. In fact, however, Chang and his co-conspirators facilitated the criminal diversion of more than $200 million of the loan proceeds that were used to pay bribes and kickbacks to Chang and others.

    Between approximately 2013 and 2016, in his capacity as Mozambique’s Minister of Finance, Chang, together with his co-conspirators – including executives of Privinvest Group, a United Arab Emirates-based shipbuilding company – ensured that Credit Suisse AG, through its subsidiary in the United Kingdom, Credit Suisse Securities (Europe) Limited (CSSEL), and another foreign investment bank would arrange for more than $2 billion to be extended to companies owned and controlled by the Mozambican government:  Proindicus S.A. (Proindicus), Empresa Moçambicana de Atum, S.A. (EMATUM), and Mozambique Asset Management (MAM).  The proceeds of the loans were intended to fund three maritime projects for which Privinvest was to provide the equipment and services. Specifically, Proindicus was to perform coastal surveillance, EMATUM was to engage in tuna fishing, and MAM was to build and maintain shipyards.

    Instead, Chang and his co-conspirators illegally facilitated Privinvest’s diversion of more than $200 million of the loan proceeds to bribes and kickbacks.  These funds included more than $150 million that Privinvest used to bribe Chang and other Mozambican government officials to ensure that companies owned and controlled by the Mozambican government would enter into the loan arrangements, and that the government of Mozambique would guarantee those loans.  The loans were subsequently sold in whole or in part to investors worldwide, including in the United States.  In doing so, the participants in the scheme conspired to defraud these investors by misrepresenting how the loan proceeds would be used.  Ultimately, Proindicus, EMATUM, and MAM each defaulted on their loans and proceeded to miss more than $700 million in loan payments, causing substantial losses to investors.

    In October 2021, Credit Suisse AG and CSSEL admitted to defrauding U.S. and international investors in the financing of an $850 million loan for the EMATUM project. CSSEL pleaded guilty to conspiracy to commit wire fraud and Credit Suisse AG entered into a deferred prosecution agreement with the United States Attorney’s Office for the Eastern District of New York, the Criminal Division’s Fraud Section (Fraud Section) and the Criminal Division’s Money Laundering and Asset Recovery Section (MLARS).  As a part of the resolution, Credit Suisse AG and CSSEL paid approximately $475 million in penalties, fines, and disgorgement as part of coordinated resolutions with criminal and civil authorities in the United States and the United Kingdom.

    The Office’s Business & Securities Fraud Section is handling the case.  Assistant United States Attorneys Hiral D. Mehta, Genny Ngai and Jonathan Siegel, and Trial Attorneys Peter Cooch of the Fraud Section and Morgan Cohen of MLARS, are in charge of the prosecution, with assistance from Paralegal Specialist Timothy Migliaro.  The Justice Department’s Office of International Affairs provided substantial assistance. The Justice Department appreciates the assistance of South African authorities, particularly those in the South African Department of Justice and Constitutional Development and the South African Police Service, as well as authorities in the United Kingdom, Switzerland, Spain and Portugal.

    The Defendant:

    MANUEL CHANG
    Age: 69
    Mozambique

    E.D.N.Y. Docket No. 18-CR-681 (NGG)

    MIL Security OSI

  • MIL-OSI Security: FBI Honors Columbus Community Leader Nicole Banks with National Award

    Source: US FBI

    On Friday, April 19, 2024, FBI Director Christopher Wray presented Nicole Banks, the president and founder of Starfish Assignment, with the FBI Director’s Community Leadership Award (DCLA) for her service to the community. Starfish Assignment is an impactful Columbus-based non-profit organization that works to establish a foundation of trust and respect between law enforcement and the community to benefit all involved.

    The FBI established the DCLA in 1990 to publicly acknowledge the achievements of those working to make a difference in their communities through the promotion of education and the prevention of crime and violence. Each year, one person or organization from each of the FBI’s 56 field offices is chosen to receive this prestigious award.

    “Our success as both a law enforcement and an intelligence agency hinges on our ability to foster and maintain genuine partnerships with people in all communities,” said FBI Director Christopher Wray. “People like this year’s Leadership Award recipients not only identify what others need, but they are willing to roll up their sleeves and provide services. They are building bridges and relationships while putting in the work to have hard conversations and find a common purpose. They do it out of kindness and compassion with a sincere belief that justice – in its many forms – requires all of us to do the right thing in the right way.”

    Nicole Banks created Starfish Assignment in 2018 to bridge the gap between law enforcement and the community. Through programs and events, Starfish works to foster open communication, build understanding, and increase collaboration to create an environment where everyone feels protected and valued. Along with organizing several Summer Safety Block Parties and other events in Columbus, Starfish also has a Books and Badges program that promotes literacy and allows law enforcement officers to create connections with students in their neighborhoods. The work of Starfish Assignment extends beyond Central Ohio and includes assisting law enforcement agencies throughout the country.

    “Receiving this award from Director Wray is not only an honor for Starfish Assignment, but it also affirms our dedication to fostering strong, positive relationships between law enforcement and the communities they serve,” stated DCLA recipient Nicole Banks. “Our collaboration with the FBI has enabled us to implement programs that build trust and create meaningful change. This recognition fuels our commitment to continue our work of bridging gaps, helping others through law enforcement officers, and strengthening bonds across communities. We are deeply grateful for the FBI’s acknowledgment of our efforts and look forward to furthering our mission together.”

    “It is an honor to recognize Nicole Banks for her hard work and dedication to the community,” stated FBI Cincinnati Special Agent in Charge Elena Iatarola. “Nicole’s work with Starfish Assignment has allowed the FBI and our law enforcement partners to build trust and significant relationships in the communities we serve. These relationships help us to fulfill our mission of protecting the American people while creating safer and more secure neighborhoods.”

    Director Wray hosted the DCLA winners in a special ceremony at FBI Headquarters today, emphasizing the importance of community partnerships in keeping our shared communities safe. These partnerships—as exemplified by the breadth of the work by the DCLA recipients—have led to a host of crime prevention programs that protect the most vulnerable in our communities, educate families and businesses about cyber threats, and work to reduce violent crime in our neighborhoods. Learn more about the Director’s Community Leadership Award program, the FBI’s outreach efforts, and the Cincinnati Field Office online.

    MIL Security OSI

  • MIL-OSI Security: Jury Convicts Self-Described Civil Rights Activist from Toledo of Wire Fraud and Money Laundering

    Source: US FBI

    TOLEDO – Sir Maejor Page, 35, of Toledo, was found guilty of wire fraud and three counts of money laundering by a jury after a six-day trial before U.S. District Judge Jeffrey Helmick.

    According to court documents and testimony, in 2016, Page created a Facebook page for “Black Lives Matter of Greater Atlanta” (“BLMGA”) and registered this organization as a domestic non-profit with the Georgia Secretary of State Corporation’s Division. In 2017, the IRS approved Page’s request granting BLMGA tax-exempt status under Section 503(c)(3) of the tax code, but dissolved this status in 2019. Page nonetheless accepted donations after falsely portraying BLMGA to the public as a legitimate charity engaged in social justice work, when in fact, it was not. Instead, Page used the money that individual donors gave to BLMGA not for social justice causes, but rather to buy items for his own personal use, such as a house and furniture. Page also committed money-laundering crimes when he bought these items with the donations that he fraudulently obtained.

    “The United States Attorney’s Office prioritizes the prosecution of white-collar criminal conduct, particularly conduct involving deceptive schemes that selfishly exploit a charitable donor’s goodwill for personal gain,” said United States Attorney Rebecca C. Lutzko, for the Northern District of Ohio. “The donors to BLMGA thought they were giving their hard-earned money to a cause they believed in. But instead of using it to support that cause, Page used it for himself. The jury’s verdict is a warning to every fraudster that when you misrepresent how donations or other money given to you in trust will be used, you will be prosecuted and punished.”

    “Preying on the generosity of the public for personal gain is cold and calculated,” said FBI Cleveland Special Agent in Charge Greg Nelsen. “The FBI and it’s white-collar crime division along with our federal, state, and local partners will continue to aggressively find and investigate criminals who believe they can deceive others through shady business practices.”

    No sentencing date has been set.

    This case was investigated by the Federal Bureau of Investigation and prosecuted by Assistant U.S. Attorneys Gene Crawford and Rob Melching.

    MIL Security OSI

  • MIL-OSI United Kingdom: EA prosecutes father and son for assaulting fisheries officers

    Source: United Kingdom – Executive Government & Departments

    Press release

    EA prosecutes father and son for assaulting fisheries officers

    A father and son who assaulted 2 Environment Agency water bailiffs at a Shropshire fishery have been ordered to pay fines and costs totalling more than £12,000.

    An Environment Agency bailiff being assaulted.

    • Defendants ordered to pay fines and costs totalling over £12,000
    • Water bailiffs struck in the face and poked in the eye at Shropshire fishery near Bridgnorth
    • Police called to incident after defendants refused to co-operate

    Fines and costs totalling £6,937.00 were imposed on Andrew Bowman, 44 , of Cross Place Dudley. 

    This was made up of a £488 fine for assault, £146 for fishing without a licence, a victim surcharge of £253 and costs of £6,000. He was also ordered to pay £50 compensation to one of the water bailiffs he assaulted. 

    He had pleaded guilty at a previous hearing to assaulting the officers at Poole Hall Fishery on 6 September 2023. This case was heard by Telford Magistrates court on April 25 2025.

    His father, Sidney Bowman, 75, also of Cross Place Dudley, had admitted similar charges in a hearing on 3 October 2024. 

    He was ordered to pay fines and costs totalling £5,128. This was made up of a £660 fine for assault, £146 for fishing without a licence, a victim’s surcharge of £322 and costs of £4,000.

    Environment Agency water bailiffs are deemed to be constables for the purposes of enforcing fisheries legislation and are also protected under the Assaults on Emergency Workers (Offences) Act 2018. 

    The court was told that the pair were fishing when approached by the 2 bailiffs who were checking fishing licences. 

    Andrew Bowman refused to give the officers his details and advised his father not to do so as well. Failing to provide name and address details, when requested by a water bailiff, is an offence. 

    After the officers cautioned Andrew Bowman for not providing his details, he became verbally and physically threatening and began to move his equipment.  

    The officers fearing for their safety moved a fishing knife away from the defendants. Andrew Bowman then assaulted one officer by striking him in the face after the bailiffs said they were removing their fishing gear for evidence. 

    This was followed by Sidney Bowman also assaulting the officer by attempting to grab his chest, where the officer’s radio was, and in doing so poked him in the eye with flailing arms.  

    The court was told as the incident continued Andrew Bowman had to be taken to the ground after he refused to allow the officers to put handcuffs on him. 

    Andrew Bowman gave the officers incorrect details, stating he was called David Wilkes and a wrong address. 

    The incident ended with police attendance resulting in Andrew and Sidney Bowman providing their correct details.

    A spokesperson for the Environment Agency said: 

    These sentences handed out show that the courts will not allow assault of public servants to go unpunished.  

    It sends out a strong message to other people trying to stop our officers from performing their duties. 

    Our officers do endure abuse and threats of violence in carrying out important work to protect people and the environment.  

    The Environment Agency will not hesitate to prosecute those that obstruct or assault its staff. 

    If people suspect illegal fishing incidents they should call our 24/7 hotline on 0800 807060.

    Background

    The charges:

    Andrew Bowman 

    On the 6 September 2023, assaulted an emergency worker, namely a person (other than a constable) who has the powers of a constable, acting in the exercise of his functions as such a worker, by beating him. Contrary to section 39 of the Criminal Justice Act 1988 and Section 1 of the Assaults on Emergency Workers (Offences) Act 2018. 

    On 6 September 2023, assaulted an emergency worker, namely a person (other than a constable) who has the powers of a constable, acting in the exercise of his functions as such a worker. Contrary to section 39 of the Criminal Justice Act 1988 and Section 1 of the Assaults on Emergency Workers (Offences) Act 2018.  

    On 6 September 2023, obstructed a Water Bailiff, a constable in the execution of his duty. Contrary to Section 89(2) of the Police Act 1996.  

    On 6 September 2023, obstructed a Water Bailiff, a constable in the execution of his duty. Contrary to Section 89(2) of the Police Act 1996.  

    On 6 September 2023, at Poole Hall Fisheries, Alverley, in a place where fishing is regulated, was fishing and he was not entitled to do so by virtue of a fishing licence. Contrary to section 27(1)(a)(i) of the Salmon and Freshwater Fisheries Act 1975. 

    Sidney Bowman 

    On 6 September 2023, assaulted an emergency worker, namely a person (other than a constable) who has the powers of a constable, acting in the exercise of his functions as such a worker, by beating him. Contrary to section 39 of the Criminal Justice Act 1988 and Section 1 of the Assaults on Emergency Workers (Offences) Act 2018.  

    On 6 September 2023, assaulted an emergency worker, namely a person (other than a constable) who has the powers of a constable, acting in the exercise of his functions as such a worker. Contrary to section 39 of the Criminal Justice Act 1988 and Section 1 of the Assaults on Emergency Workers (Offences) Act 2018.  

    On 6th September 2023, in a place where fishing is regulated, was fishing and he was not entitled to do so by virtue of a fishing licence. Contrary to section 27(1)(a)(i) of the Salmon and Freshwater Fisheries Act 1975.

    Updates to this page

    Published 23 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Asia-Pac: President Lai presides over fourth meeting of Healthy Taiwan Promotion Committee

    Source: Republic of China Taiwan

    Details
    2025-02-27
    President Lai presides over third meeting of Healthy Taiwan Promotion Committee
    On the afternoon of February 27, President Lai Ching-te presided over the third meeting of the Healthy Taiwan Promotion Committee. In his opening statement, the president stated that the best strategies to care for citizens’ health are to increase physical activity, boost food literacy, and improve the domestic food environment, preventing chronic diseases from the front end. The president said that the Ministry of Health and Welfare (MOHW) has upgraded preventive health services for adults this year, lowering the age eligibility to 30. He expressed hope that public-private sector cooperation can help reduce the incidence of chronic diseases and their associated disability risks and achieve the goal of lowering the standardized mortality rate for chronic diseases related to the “three highs”(high blood pressure, high cholesterol, and high blood sugar) by one-third by 2030. With regard to the hospital congestion issue, President Lai noted that through local health departments, the government will strengthen the supervision and distribution of emergency room beds, boost the distribution of inpatient beds in medical centers, and enhance joint prevention mechanisms among regional hospitals to reduce the pressure on emergency departments. The president said that the government will continue to incentivize hospitals to hire more nursing personnel and will consider adjusting health insurance coverage to encourage more hospitals to participate in emergency and critical care so as to reduce the pressure on medical institutions. By taking a multi-channel approach, the president said, we hope to resolve the problems facing healthcare in Taiwan, provide the public with better care, and achieve our vision of a Healthy Taiwan. A translation of President Lai’s opening statement follows: Today is the third meeting of the Healthy Taiwan Promotion Committee. First, I would like to thank both deputy conveners, our advisors and committee members, and our friends online for their continuing concern about the planning and implementation of the Healthy Taiwan initiative.        At the last meeting, we heard a report on enhancing cancer prevention and treatment strategies. Guided by the Executive Yuan, the scope of government-funded major cancer screenings will be expanded starting this year, including expanding the age parameters and the categories eligible for screening. Treatment efforts will focus on genetic testing and precision medicine, and a fund will be established that provides diversified coverage for new cancer drugs. We hope to achieve our goal of reducing the standardized cancer mortality rate by one-third by 2030.  At today’s meeting, the MOHW will deliver progress reports on certain items listed in the second committee meeting, as well as chronic disease prevention and treatment initiatives under the Healthy Taiwan plan including the development of models for healthy living, obesity prevention and treatment, and the 888 Program for prevention and treatment of the “three highs.”Among the top ten causes of death in Taiwan, seven are related to chronic diseases, and five of those seven are related to “three highs” chronic diseases. Annual spending related to treating “three highs” chronic diseases is up to NT$170 billion, and has become a tremendous medical burden.  According to the World Health Organization, most non-communicable diseases are the result of four particular behaviors: tobacco use, physical inactivity, unhealthy diet, and the harmful use of alcohol. The results of the Nutrition and Health Survey in Taiwan show that most citizens are getting low or moderate amounts of physical activity, and have unbalanced diets that include excessive amounts of sugar and salt, and inadequate amounts of fruits, vegetables, and dairy products.  Therefore, the best strategies to care for the health of our citizens are to increase physical activity, boost food literacy, and improve the domestic food environment, preventing chronic diseases from the front end.  In a few minutes, the MOHW will give complete explanations for the various chronic disease prevention and treatment strategies, from building healthy lifestyles at the front end to preventing and treating obesity in the middle stage, making every effort to prevent citizens from symptoms of the “three highs.” Beginning this year, the MOHW has upgraded preventive health services for adults, lowering the age eligibility to 30. Among people who already suffer from the “three highs,” the 888 Program for the prevention and treatment of those diseases will identify a target group and then conduct interventions, making every effort to improve symptoms and avoid the development of chronic disease.  This kind of action strategy needs to be promoted simultaneously in the workplace, the community, on campus, and in the military. Only through public-private sector cooperation can we reduce the incidence of chronic diseases and their associated disability risks. We have also set a goal to lower the standardized mortality rate for chronic diseases related to the “three highs” by one-third by 2030. I hope that through the expertise of our advisors and committee members, we can provide discussions and suggestions from multiple perspectives to enable the government to propose health policies that meet citizens’ needs. The government will also actively address the hospital congestion issue that everyone is concerned about. The MOHW, in addition to taking preventive measures such as purchasing additional flu vaccines before the Lunar New Year, is addressing the emergency department congestion that occurred from the Lunar New Year until recently, and has formulated a short-term response strategy as well as middle and long-term directions for reforms as directed by Premier Cho Jung-tai (卓榮泰). Through local health departments, we will strengthen the supervision and distribution of emergency room beds. At the same time, we will continue to boost the distribution of inpatient beds in medical centers, and give full play to our emergency medicine network to enhance joint prevention mechanisms among regional hospitals and reduce the pressure on emergency departments. We will also enhance the public’s access to information about tiered healthcare, and implement a tiered treatment system to make better use of resources.  To address middle- and long-term human resource issues, we will continue to incentivize hospitals to hire more nursing personnel to lighten their burdens. We will also consider adjusting health insurance coverage to encourage more hospitals to participate in emergency and critical care. To respond to the challenges of an aging society, home healthcare, acute hospital care at home, Long-term Care 3.0, and post-acute care programs need to be promoted together to reduce the pressure on medical institutions.    By taking a multi-channel approach, we hope to resolve the problems facing healthcare in Taiwan, provide the public with better care, and achieve our vision of a Healthy Taiwan. So let us keep working hard together. Thank you. Following his statement, President Lai heard a report on the progress of certain items listed in the second committee meeting from Minister of Health and Welfare Chiu Tai-yuan (邱泰源), who is also the committee’s executive secretary, and a report on chronic disease prevention and treatment initiatives under the Healthy Taiwan plan including the development of models for healthy living, obesity prevention and treatment, and the 888 Program for prevention and treatment of the “three highs” from Deputy Minister of Health and Welfare Chou Jih-haw (周志浩). Afterward, President Lai exchanged views with the committee members regarding the content of the reports.

    Details
    2024-11-28
    President Lai presides over second meeting of Healthy Taiwan Promotion Committee
    On the afternoon of November 28, President Lai Ching-te presided over the second meeting of the Healthy Taiwan Promotion Committee. In his opening statement, the president said that we are implementing mental health support programs this year to provide more support for young and middle-aged people, pointing out that the policy has served over 20,000 people since it was implemented just over three months ago. In terms of bolstering mental health resilience, the president said we still have much to do, our government must lead by example, and the public and private sectors must work together, making every effort to ensure that no one is left behind. Noting that our goal is to reduce the standardized cancer mortality rate by one-third by the year 2030, President Lai stated that next year’s budget for cancer screening will be increased to NT$6.8 billion. He also stated that plans are in the works to establish a fund for new cancer drugs, adding that in the general budget we will allocate NT$5 billion, which will gradually rise to NT$10 billion. At the same time, he said, we are also actively promoting genetic testing and precision medicine. He expressed confidence that expanding preventive screening at the front end and providing advanced treatments at the back end will effectively fight cancer and improve the overall health of our citizens. A translation of President Lai’s opening statement follows: Today is the second meeting of the Healthy Taiwan Promotion Committee. First, I want to thank our two deputy conveners, our advisors and committee members, and our friends online for their enthusiastic participation. I also want to welcome Committee Member Chien Wen-jen (簡文仁), who was on leave for the previous meeting. I would also like to introduce three new committee members: Let’s welcome Committee Member Huang Chin-shun (黃金舜), president of the Federation of Taiwan Pharmacists Associations. During the pandemic, he led the nation’s pharmacists in promoting services including name-based distribution systems for masks and rapid-test kits and home delivery of medications. I am sure that he will be able to provide many valuable views regarding pharmaceutical safety and supply resilience.    Let’s also welcome Committee Member Ko Fu-yang (柯富揚). During his time as secretary-general of the National Union of Chinese Medical Doctors’ Association, he led the Chinese medicine community in the transition from experience-based medicine to evidence-based medicine, and promoted the modernization of traditional Chinese medicine. With his participation, the committee will be able to spur research and development in both modern and traditional medicine. Our third new committee member is Liao Mei-nan (廖美南), president of the Taiwan Nurses Association, who was unable to be here today. She has long been dedicated to raising the quality of nursing care and actively promoting a high-quality, friendly work environment for nurses. The committee will rely on her experience to strengthen the link between policy and practice in nursing care. I want to thank all the members of the committee once again for working together with the government. Since the last committee meeting, under the guidance of Minister without Portfolio Chen Shih-chung (陳時中), the Ministry of Health and Welfare (MOHW) has implemented various policies. At the beginning of October, for example, three major AI centers were set up to resolve three key AI application issues: implementation, certification, and reimbursement, helping advance Taiwan’s smart healthcare ecosystem. At today’s meeting, the MOHW will first deliver a report on the progress of certain items listed in the first committee meeting, followed by a joint report by the MOHW and Ministry of Education on bolstering public mental health resilience and a report by the MOHW on enhancing cancer prevention and treatment strategies.  The World Health Organization has affirmed that “there is no health without mental health.” In a fast-changing, fast-paced society, the government should invest more resources in the field of mental health to safeguard the people’s overall health. We are therefore implementing mental health support programs this year and expanding the range of eligibility, from 15 to 30, to 15 to 45 years old, to provide more support for young and middle-aged people. That policy has served over 20,000 people since it was implemented just over three months ago. In terms of bolstering mental health resilience, we still have much to do. From the workplace to the campus and every corner of society, our government must lead by example, and the public and private sectors must work together, making every effort to ensure that no one is left behind.    Aside from mental health, in view of cancer being the leading cause of death in Taiwan for 42 consecutive years, our goal is to reduce the standardized cancer mortality rate by one-third by the year 2030. And so we must expand screening and advance treatment. Last year, the government subsidized screenings for five types of cancer, providing a total of 4.87 million screenings and detecting 11,000 cases of cancer and 52,000 cases of precancerous conditions. We have allocated an additional NT$4 billion beginning next year, bringing the total budget for cancer screening to NT$6.8 billion, to expand the scope of cancer screening eligibility and services.  Plans are also in the works to establish a fund for new cancer drugs. In next year’s general budget, we will allocate NT$5 billion, which will gradually rise to NT$10 billion, to provide reimbursement funding for a variety of new cancer drugs and reduce the economic burden on patients. These new measures will be reported on in detail moments from now by the MOHW. At the same time, we are also actively promoting genetic testing and precision medicine. Next generation sequencing, for example, has already been included in National Health Insurance coverage, which will help provide patients with precise, individualized treatment strategies. I am confident that expanding preventive screening at the front end and providing advanced treatments at the back end will effectively fight cancer and improve the overall health of our citizens. Today’s meeting will help the government understand viewpoints from many perspectives so we can promote policies that more closely meet the public’s needs. Let’s keep working hard together. Thank you.  Following his statement, President Lai heard a report on the progress of certain items listed in the first committee meeting from deputy executive secretary and National Health Insurance Administration Director General Shih Chung-liang (石崇良), a joint report on bolstering public mental health resilience from Deputy Minister of Health and Welfare Lin Ching-yi (林靜儀) and Deputy Minister of Education Lin Teng-chiao (林騰蛟), and a report on enhancing cancer prevention and treatment strategies from Deputy Minister of Health and Welfare Chou Jih-haw (周志浩). Afterward, President Lai exchanged views with the committee members regarding the content of the reports.

    Details
    2024-08-22
    President Lai presides over first meeting of Healthy Taiwan Promotion Committee
    On the afternoon of August 22, President Lai Ching-te presided over the first meeting of the Healthy Taiwan Promotion Committee. As the committee’s convener, the president presented committee members with their letters of appointment, and explained that the Healthy Taiwan Promotion Committee is not just about promoting a Healthy Taiwan, but also achieving a Balanced Taiwan. The president stated that the committee spans various areas of expertise, and also considers the balance of Taiwan’s northern, central, southern, and eastern regions. The president expressed confidence that by soliciting a wide range of suggestions, engaging in diverse dialogue, and forging a consensus, the committee can help to realize health equality and further elevate the standard of medical care in Taiwan. President Lai indicated that next year, the Ministry of Health and Welfare’s total budget will be increased, along with expanded investment in medical treatment and care. In addition, he reported that the central government budget has also added a National Health Insurance (NHI) financial assistance program, which will help to enhance the work environments of healthcare professionals. The president stated that we will also launch the Healthy Taiwan Cultivation Plan to help rear talent and develop smart medicine. These budgets and programs, President Lai stated, reflect the government’s determination to create a Healthy Taiwan, and prove that “Healthy Taiwan” is not just a slogan, and has already been turned into concrete action. A translation of President Lai’s opening statement follows: At the end of my first month in office, I announced that the Presidential Office will establish three committees in response to three major global issues of nationwide concern: climate change, health promotion, and social resilience. These committees will consolidate forces from different sectors to strategize on national development. At the beginning of this month, we convened the first meeting of the National Climate Change Committee. Today, we convene the first meeting of the Healthy Taiwan Promotion Committee. I would like to thank the three deputy conveners and all advisors and committee members for making a commitment to the Healthy Taiwan Promotion Committee. I also want to thank our fellow citizens and friends joining us online to follow the committee’s proceedings. During my campaign, I was constantly thinking about what I could contribute to our people that is different from past presidents if I were fortunate enough to be elected. After a lot of thought, I felt that as a physician, I should utilize my professional background in health care and work together with people from all sectors of society to help create a Healthy Taiwan. Healthy Taiwan is our goal, and health is both a basic human right and a universal value. Health promotion not only involves the well-being of a nation’s people, but is also of great concern to humankind so that we may survive and thrive. Taiwan is a responsible member of the international community. Amid the challenges of the pandemic over the past few years, we have shared disease prevention supplies, technology, and experience with countries around the world, and have continued to contribute to the global public health system. Going forward, Taiwan must actively address critical health-related challenges, including cancer, transnational communicable diseases of unknown origin, antibiotic-resistant superbugs, a low birth rate, and an aging society. We are confident that, sharing countermeasures and experience with countries around the world, we can keep people healthy and make the nation stronger so that the world embraces Taiwan. I want to thank former Superintendent of National Cheng Kung University Hospital Chen Jyh-hong (陳志鴻), who is also a mentor of mine, for organizing five regional forums and a national forum for the Healthy Taiwan Promotion Alliance this past March and April. Over 1,200 healthcare professionals from all over the country attended the forums and shared their views. Premier Cho Jung-tai (卓榮泰), Vice Premier Cheng Li-chiun (鄭麗君), and I were also invited to attend the national forum and participate in full. I also want to thank the experts from various fields for their suggestions throughout this process, which became key reference points for promoting policies after we took office on May 20. The position paper on the table in front of you is a compilation of those valuable insights, which will be the foundation of our future actions. To implement the Healthy Taiwan initiative, we must also achieve a Balanced Taiwan. Therefore, the Healthy Taiwan Promotion Committee established today not only spans various areas of expertise, but also considers the balance of Taiwan’s northern, central, southern, and eastern regions to achieve nationwide health equality. I want to thank the nine advisors here with us today: Superintendent Wu Ming-shiang (吳明賢), Superintendent Chen Wei-ming (陳威明), Chairman Cherng Wen-jin (程文俊), President Chiu Kuan-ming (邱冠明), and Chairman Chang Hong-jen (張鴻仁) from northern Taiwan; Superintendent Chen Mu-kuan (陳穆寬) from central Taiwan; Superintendent Lin Sheng-che (林聖哲) and President Yu Ming-lung (余明隆) from southern Taiwan; and Superintendent Lin Shinn-zong (林欣榮) from eastern Taiwan. Your participation will give us a better understanding of viewpoints from around the country. The objective of Healthy Taiwan is to raise the population’s average life expectancy while simultaneously reducing time spent living with illness or disability, while also caring for physical, mental, and spiritual health. The 20 members of the committee are therefore drawn from a variety of fields of professional expertise. We have Superintendent Chen Shih-ann (陳適安) in the field of smart medicine, Vice-Superintendent Susan Shur-fen Gau (高淑芬) in pediatric psychiatry, medical and long-term care service integration specialist Superintendent Chan Ding-cheng (詹鼎正), and emerging infectious disease specialist Director Shen Ching-fen (沈靜芬). We have also invited Professor Tsai Sen-tien (蔡森田) to provide suggestions on optimizing healthcare services and health insurance sustainability, and invited President Chou Ching-ming (周慶明) and President Huang Cheng-kuo (黃振國) to continue promoting The Family Doctors’ Plan 2.0 and report on primary care issues. We have also recruited President Li Yi-heng (李貽恒), who put forward the 888 Program for prevention and treatment of the “three highs” (high blood pressure, high cholesterol, and high blood sugar) and kidney disease, pediatric health specialist President Ni Yen-hsuan (倪衍玄), women’s health care specialist Secretary-General Huang Jian-pei (黃建霈), and President Hung Te-jen (洪德仁), who is focused on community development. We also have Dean Shan Yan-shen (沈延盛) from the field of cancer prevention and treatment, psychiatric and mental health specialist Professor Su Kuan-pin (蘇冠賓), epidemiology expert and Emeritus Research Fellow Ho Mei-shang (何美鄉), and biomedicine and regenerative medicine specialist Professor Patrick Ching-ho Hsieh (謝清河). The committee also includes specialist in nutrition and health for all ages President Kuo Su-e (郭素娥), and expert in the promotion of physical activity and health Vice Chairman Chien Wen-jen (簡文仁). I also want to thank Chairman Lin De-wen (林德文) for participating as we work together to enhance the health and well-being of indigenous peoples. In addition, public sector participants include Minister of National Development Liu Chin-ching (劉鏡清) and Minister of Education Cheng Ying-yao (鄭英耀), as well as Minister of Health and Welfare Chiu Tai-yuan (邱泰源), who is serving as executive secretary, and NHI Administration Director General Shih Chung-liang (石崇良) serving as deputy executive secretary. Over 80 percent of the committee’s members are from the private sector, and I will take advantage of this opportunity to continue to combine the strengths of all stakeholders throughout society to promote a healthy lifestyle for one and all, and enhance medical care for all ages. At today’s first meeting of the committee, the Ministry of Health and Welfare will brief us on two topics: the first is the Healthy Taiwan vision plan, illustrating Taiwan’s current challenges and opportunities, as well as an action blueprint. The second issue is reform and optimization for NHI sustainability. Next year will mark the 30th anniversary of our NHI system. NHI is the pride of Taiwan, because health insurance can free citizens from the vicious cycle of poverty caused by illness, or illness caused by poverty. Since 2020, the NHI system has achieved a public satisfaction rate of over 90 percent. Next year, Taiwan will also become a “super-aged society,” which means that one of every five people will be a senior citizen 65 or older. Due to new pharmaceuticals of all kinds, the development of new technologies, and citizen expectations for an optimized medical practice environment, many aspects of health insurance operations will face an increasing number of challenges. The NHI system’s core values are health equality and mutual assistance for all. Better care for everyone, however, depends on sustainable NHI operations. We closely monitor NHI system point values, but also want to embody the greater values of the system. The government will continue to refine the budget system and management, rationally distribute medical resources and stabilize point values, and continue to optimize NHI finances to enhance the efficiency and quality of services. We also look forward to working with everyone to achieve sustainable NHI development, enhance health equality, and further elevate the standard of medical care in Taiwan. I also want to report that next year, the Ministry of Health and Welfare’s total budget will reach NT$370.2 billion, an increase of NT$31.8 billion over this year. The total budget is expected to allocate NT$60.7 billion to expand investment in medical treatment and care to create a Healthy Taiwan. The central government budget has also added an NHI financial assistance program that includes incentives for maintaining specified nurse-patient ratios across all three shifts and rotating night-shift nursing staff, and promoting smart information upgrades at medical facilities to enhance the work environments of healthcare professionals. We will also launch the Healthy Taiwan Cultivation Plan, investing funds to support medical institutions at all levels nationwide, rear talent, and develop smart medicine. Regarding the fund for new cancer drugs that many cancer patients care deeply about, in next year’s general budget we will allocate NT$5 billion for health insurance funding. In 2026, that figure is expected to reach NT$10 billion. We will also promote the fifth-stage national plan for cancer prevention and treatment, and beginning next year the budget for cancer screening will be increased by NT$4 billion, reaching NT$6.8 billion, to boost screening rates. I want everyone to know that these budgets and programs reflect the government’s determination to create a Healthy Taiwan. Since I took office, the government has created plans and programs to increase nursing staff levels and promote public mental health. We also launched an Acute Hospital Care at Home pilot project to provide integrated long-term and medical care services. Once again, I would like to thank everyone here today for participating, and thank our fellow citizens for their support. I also want our fellow citizens to know that Healthy Taiwan is not just a slogan, and has already been turned into concrete action. These are all concrete, substantive actions by a government team that has been in office for less than 100 days. I am confident that with the support and participation of our committee members and advisors, and through soliciting a wide range of suggestions, engaging in diverse dialogue, and forging a consensus, our actions to create a Healthy Taiwan will more closely align with society’s expectations, and we will move more quickly and steadily toward realizing our vision. Thank you. Following his statement, President Lai presented letters of appointment to the committee members, heard a report from Minister Chiu illustrating the Healthy Taiwan vision plan, and heard a report from Director General Shih on reform and optimization for NHI sustainability. Afterward, President Lai exchanged views with the committee members regarding the content of the two reports and the Rules of Procedure for Meetings of the Office of the President Healthy Taiwan Promotion Committee.

    Details
    2024-06-20
    President Lai attends opening of International Conference on Emergency Medicine 2024
    On the morning of June 20, President Lai Ching-te attended the opening ceremony of the International Conference on Emergency Medicine (ICEM) 2024. In remarks, President Lai stated that one goal of his administration is to create an even healthier Taiwan and that we will continue to strengthen our capabilities in medicine and public health to enhance health for all and help make the world a better place. The president emphasized that the global disease prevention network is something every country should be a part of, and that if any country is missing from this network, the rest of the world will be at a disadvantage. The president then asked for the participants’ support for Taiwan to participate in the World Health Organization so that we may contribute even more to the global public health system. A transcript of President Lai’s remarks follows: I would like to begin by welcoming all guests from overseas to Taiwan. ICEM is the world’s largest conference on emergency medicine. Over 2,500 experts and academics from home and abroad have gathered here for this year’s conference. This not only underlines the importance of emergency medicine, but is also a testament to global cooperation in medicine. This year also marks TSEM’s [Taiwan Society of Emergency Medicine] 30th anniversary. I would like to thank Chairperson Ng Chip-jin (黃集仁), President Hsu Chien-chin (許建清), and everyone who helped bring ICEM to Taiwan. This conference will help expand people-to-people diplomacy, showing Taiwan’s development and contributions in emergency medicine to the world. I am confident that everyone here shares my belief that health is a basic human right. And to ensure this right, emergency medical professionals are indispensable. Before entering politics, I myself worked as a clinician. I know well that emergency rooms are at the frontline of hospitals, and often the last hope for those who need lifesaving care. Especially during the COVID-19 pandemic, we all witnessed the rapid response and important support of emergency medical professionals, who gave their all for the health of others. I want to take this opportunity to express my utmost respect for your work. The theme of ICEM 2024 is Glocalization of Emergency Medicine: Global Wisdom and Local Solution. With that in mind, I hope that through clinical research, public health, smart tech, and other strategies, we can help reduce disparities in emergency medicine around the world. Here in Taiwan, we have made major progress in emergency medicine, from developing a cutting-edge trauma care system to implementing advanced strategies for disaster response. We are also committed to training highly skilled professionals in the field, as well as developing an advanced medical infrastructure. This conference will give Taiwan the opportunity to share our experience, and allow everyone to exchange best practices, engage in discussions, and promote the global development of emergency medicine. One goal of my administration is to create an even healthier Taiwan. We will continue to strengthen our capabilities in medicine and public health to enhance health for all and help make the world a better place. A healthier Taiwan also means a booming medical sector, and an even higher quality and diversity of medical services. Taiwan has had, and will continue to have, many medical accomplishments to share with the world. Today, all of you gather here to continue making global contributions through emergency medicine. The mission of IFEM [International Federation for Emergency Medicine] is to create a world where all people, in all countries, have access to high quality emergency medical care. On this point, the global disease prevention network is something every country should be a part of. If any country is missing from this network, the rest of the world will be at a disadvantage. I would like to ask for your support for Taiwan to participate in the World Health Organization, so that we may contribute even more to the global public health system. And as President Hsu Chien-chin has said, although the road is long, if we travel together, we can travel far. With this vision as our guide, alongside our friends from around the world, Taiwan will strive to achieve our common goals and realize quality healthcare for all. I wish ICEM 2024 great success, and all participants a rewarding experience. I also invite you to travel around Taiwan during your stay, and get to know our beautiful nation. Following his remarks, President Lai and the distinguished guests took part in the kick-off ceremony for the conference. IFEM President Ffion Davies was also in attendance at the event.

    Details
    2024-06-01
    President Lai meets WHA action team
    On the morning of June 1, President Lai Ching-te met with members of Taiwan’s World Health Assembly (WHA) action team. In remarks, President Lai stated that standing on the front lines, the team fought for the human right to health for both Taiwan and the world. He also thanked the international community for their support for Taiwan. The president said that Taiwan is an indispensable member of the international community when it comes to ensuring global health security. In addition, he said that one of the new government’s goals is to create a healthier Taiwan, as we want our people to live longer and healthier, and that we want to leverage Taiwan’s strengths in public health and medicine. He said we will continue to deepen our partnerships with other countries as we build an even more resilient global public health system, and that a healthy Taiwan will help make the world a better place. A translation of President Lai’s remarks follows: I would like to warmly welcome our partners from the WHA action team back from Geneva, and express my appreciation for your hard work and efforts. Standing on the front lines, you fought for the human right to health for both Taiwan and the world, and we thank you for giving it your all. Your flight only just arrived at 7 a.m., but I can see that everyone is still in high spirits. You have truly put in your heart for Taiwan, and once again, I thank you all. It is regrettable that at this year’s WHA, constrained by political factors, a proposal item for Taiwan to join as an observer was not included in the agenda yet again. However, the hard work of our WHA action team over the years has already borne fruit. Last year, the Ministry of Health and Welfare signed MOUs with the public health agencies of the Czech Republic, Canada, and the United Kingdom, and bilateral talks this year included discussion on substantive cooperation. The bilateral talks carried out by our action team in Geneva were not only more numerous this year, but also involved officials of even higher level. The team also held professional forums addressing important issues of the WHA in cooperation with various medical and health organizations. This is all proof of Taiwan’s contribution toward global public health and the human right to health. The steps we take for Taiwan to participate in world health affairs will not falter. Support for Taiwan from the international community grows stronger year by year. This year, 26 member states of the World Health Organization and the European Union, which is an observer, directly or indirectly voiced their support for Taiwan’s participation in the WHA. Their support reaffirms that Taiwan is an indispensable member of the international community when it comes to ensuring global health security. Health knows no borders. Health is a basic human right. One of the new government’s goals is to create a healthier Taiwan. We want our people to live longer and healthier. And we also want to leverage Taiwan’s strengths in public health and medicine, as we deepen our cooperation with other countries and work together to advance the health of humankind and global sustainable development. I want to thank the member states for their support for Taiwan. I also want to once again thank the members of the WHA action team and our many friends, both here and outside of Taiwan, for their hard work on this issue. Moving forward, we will continue to deepen our partnerships with other countries as we build an even more resilient global public health system. So just as democratic Taiwan continues to shine its light upon the world, a healthy Taiwan will help make the world a better place. On that note, let us keep working together toward these goals. After President Lai concluded his remarks, Minister of Health and Welfare Chiu Tai-yuan (邱泰源) presented a photo collage to show President Lai some of the highlights of the action team’s activities in Geneva.

    Details
    2025-05-20
    President Lai interviewed by Nippon Television and Yomiuri TV
    In a recent interview on Nippon Television’s news zero program, President Lai Ching-te responded to questions from host Mr. Sakurai Sho and Yomiuri TV Shanghai Bureau Chief Watanabe Masayo on topics including reflections on his first year in office, cross-strait relations, China’s military threats, Taiwan-United States relations, and Taiwan-Japan relations. The interview was broadcast on the evening of May 19. During the interview, President Lai stated that China intends to change the world’s rules-based international order, and that if Taiwan were invaded, global supply chains would be disrupted. Therefore, he said, Taiwan will strengthen its national defense, prevent war by preparing for war, and achieve the goal of peace. The president also noted that Taiwan’s purpose for developing drones is based on national security and industrial needs, and that Taiwan hopes to collaborate with Japan. He then reiterated that China’s threats are an international problem, and expressed hope to work together with the US, Japan, and others in the global democratic community to prevent China from starting a war. Following is the text of the questions and the president’s responses: Q: How do you feel as you are about to round out your first year in office? President Lai: When I was young, I was determined to practice medicine and save lives. When I left medicine to go into politics, I was determined to transform Taiwan. And when I was sworn in as president on May 20 last year, I was determined to strengthen the nation. Time flies, and it has already been a year. Although the process has been very challenging, I am deeply honored to be a part of it. I am also profoundly grateful to our citizens for allowing me the opportunity to give back to our country. The future will certainly be full of more challenges, but I will do everything I can to unite the people and continue strengthening the nation. That is how I am feeling now. Q: We are now coming up on the 80th anniversary of the end of World War II, and over this period, we have often heard that conflict between Taiwan and the mainland is imminent. Do you personally believe that a cross-strait conflict could happen? President Lai: The international community is very much aware that China intends to replace the US and change the world’s rules-based international order, and annexing Taiwan is just the first step. So, as China’s military power grows stronger, some members of the international community are naturally on edge about whether a cross-strait conflict will break out. The international community must certainly do everything in its power to avoid a conflict in the Taiwan Strait; there is too great a cost. Besides causing direct disasters to both Taiwan and China, the impact on the global economy would be even greater, with estimated losses of US$10 trillion from war alone – that is roughly 10 percent of the global GDP. Additionally, 20 percent of global shipping passes through the Taiwan Strait and surrounding waters, so if a conflict breaks out in the strait, other countries including Japan and Korea would suffer a grave impact. For Japan and Korea, a quarter of external transit passes through the Taiwan Strait and surrounding waters, and a third of the various energy resources and minerals shipped back from other countries pass through said areas. If Taiwan were invaded, global supply chains would be disrupted, and therefore conflict in the Taiwan Strait must be avoided. Such a conflict is indeed avoidable. I am very thankful to Prime Minister of Japan Ishiba Shigeru and former Prime Ministers Abe Shinzo, Suga Yoshihide, and Kishida Fumio, as well as US President Donald Trump and former President Joe Biden, and the other G7 leaders, for continuing to emphasize at international venues that peace and stability across the Taiwan Strait are essential components for global security and prosperity. When everyone in the global democratic community works together, stacking up enough strength to make China’s objectives unattainable or to make the cost of invading Taiwan too high for it to bear, a conflict in the strait can naturally be avoided. Q: As you said, President Lai, maintaining peace and stability across the Taiwan Strait is also very important for other countries. How can war be avoided? What sort of countermeasures is Taiwan prepared to take to prevent war? President Lai: As Mr. Sakurai mentioned earlier, we are coming up on the 80th anniversary of the end of WWII. There are many lessons we can take from that war. First is that peace is priceless, and war has no winners. From the tragedies of WWII, there are lessons that humanity should learn. We must pursue peace, and not start wars blindly, as that would be a major disaster for humanity. In other words, we must be determined to safeguard peace. The second lesson is that we cannot be complacent toward authoritarian powers. If you give them an inch, they will take a mile. They will keep growing, and eventually, not only will peace be unattainable, but war will be inevitable. The third lesson is why WWII ended: It ended because different groups joined together in solidarity. Taiwan, Japan, and the Indo-Pacific region are all directly subjected to China’s threats, so we hope to be able to join together in cooperation. This is why we proposed the Four Pillars of Peace action plan. First, we will strengthen our national defense. Second, we will strengthen economic resilience. Third is standing shoulder to shoulder with the democratic community to demonstrate the strength of deterrence. Fourth is that as long as China treats Taiwan with parity and dignity, Taiwan is willing to conduct exchanges and cooperate with China, and seek peace and mutual prosperity. These four pillars can help us avoid war and achieve peace. That is to say, Taiwan hopes to achieve peace through strength, prevent war by preparing for war, keeping war from happening and pursuing the goal of peace. Q: Regarding drones, everyone knows that recently, Taiwan has been actively researching, developing, and introducing drones. Why do you need to actively research, develop, and introduce new drones at this time? President Lai: This is for two purposes. The first is to meet national security needs. The second is to meet industrial development needs. Because Taiwan, Japan, and the Philippines are all part of the first island chain, and we are all democratic nations, we cannot be like an authoritarian country like China, which has an unlimited national defense budget. In this kind of situation, island nations such as Taiwan, Japan, and the Philippines should leverage their own technologies to develop national defense methods that are asymmetric and utilize unmanned vehicles. In particular, from the Russo-Ukrainian War, we see that Ukraine has successfully utilized unmanned vehicles to protect itself and prevent Russia from unlimited invasion. In other words, the Russo-Ukrainian War has already proven the importance of drones. Therefore, the first purpose of developing drones is based on national security needs. Second, the world has already entered the era of smart technology. Whether generative, agentic, or physical, AI will continue to develop. In the future, cars and ships will also evolve into unmanned vehicles and unmanned boats, and there will be unmanned factories. Drones will even be able to assist with postal deliveries, or services like Uber, Uber Eats, and foodpanda, or agricultural irrigation and pesticide spraying. Therefore, in the future era of comprehensive smart technology, developing unmanned vehicles is a necessity. Taiwan, based on industrial needs, is actively planning the development of drones and unmanned vehicles. I would like to take this opportunity to express Taiwan’s hope to collaborate with Japan in the unmanned vehicle industry. Just as we do in the semiconductor industry, where Japan has raw materials, equipment, and technology, and Taiwan has wafer manufacturing, our two countries can cooperate. Japan is a technological power, and Taiwan also has significant technological strengths. If Taiwan and Japan work together, we will not only be able to safeguard peace and stability in the Taiwan Strait and security in the Indo-Pacific region, but it will also be very helpful for the industrial development of both countries. Q: The drones you just described probably include examples from the Russo-Ukrainian War. Taiwan and China are separated by the Taiwan Strait. Do our drones need to have cross-sea flight capabilities? President Lai: Taiwan does not intend to counterattack the mainland, and does not intend to invade any country. Taiwan’s drones are meant to protect our own nation and territory. Q: Former President Biden previously stated that US forces would assist Taiwan’s defense in the event of an attack. President Trump, however, has yet to clearly state that the US would help defend Taiwan. Do you think that in such an event, the US would help defend Taiwan? Or is Taiwan now trying to persuade the US? President Lai: Former President Biden and President Trump have answered questions from reporters. Although their responses were different, strong cooperation with Taiwan under the Biden administration has continued under the Trump administration; there has been no change. During President Trump’s first term, cooperation with Taiwan was broader and deeper compared to former President Barack Obama’s terms. After former President Biden took office, cooperation with Taiwan increased compared to President Trump’s first term. Now, during President Trump’s second term, cooperation with Taiwan is even greater than under former President Biden. Taiwan-US cooperation continues to grow stronger, and has not changed just because President Trump and former President Biden gave different responses to reporters. Furthermore, the Trump administration publicly stated that in the future, the US will shift its strategic focus from Europe to the Indo-Pacific. The US secretary of defense even publicly stated that the primary mission of the US is to prevent China from invading Taiwan, maintain stability in the Indo-Pacific, and thus maintain world peace. There is a saying in Taiwan that goes, “Help comes most to those who help themselves.” Before asking friends and allies for assistance in facing threats from China, Taiwan must first be determined and prepared to defend itself. This is Taiwan’s principle, and we are working in this direction, making all the necessary preparations to safeguard the nation. Q: I would like to ask you a question about Taiwan-Japan relations. After the Great East Japan Earthquake in 2011, you made an appeal to give Japan a great deal of assistance and care. In particular, you visited Sendai to offer condolences. Later, you also expressed condolences and concern after the earthquakes in Aomori and Kumamoto. What are your expectations for future Taiwan-Japan exchanges and development? President Lai: I come from Tainan, and my constituency is in Tainan. Tainan has very deep ties with Japan, and of course, Taiwan also has deep ties with Japan. However, among Taiwan’s 22 counties and cities, Tainan has the deepest relationship with Japan. I sincerely hope that both of you and your teams will have an opportunity to visit Tainan. I will introduce Tainan’s scenery, including architecture from the era of Japanese rule, Tainan’s cuisine, and unique aspects of Tainan society, and you can also see lifestyles and culture from the Showa era.  The Wushantou Reservoir in Tainan was completed by engineer Mr. Hatta Yoichi from Kanazawa, Japan and the team he led to Tainan after he graduated from then-Tokyo Imperial University. It has nearly a century of history and is still in use today. This reservoir, along with the 16,000-km-long Chianan Canal, transformed the 150,000-hectare Chianan Plain into Taiwan’s premier rice-growing area. It was that foundation in agriculture that enabled Taiwan to develop industry and the technology sector of today. The reservoir continues to supply water to Tainan Science Park. It is used by residents of Tainan, the agricultural sector, and industry, and even the technology sector in Xinshi Industrial Park, as well as Taiwan Semiconductor Manufacturing Company. Because of this, the people of Tainan are deeply grateful for Mr. Hatta and very friendly toward the people of Japan. A major earthquake, the largest in 50 years, struck Tainan on February 6, 2016, resulting in significant casualties. As mayor of Tainan at the time, I was extremely grateful to then-Prime Minister Abe, who sent five Japanese officials to the disaster site in Tainan the day after the earthquake. They were very thoughtful and asked what kind of assistance we needed from the Japanese government. They offered to provide help based on what we needed. I was deeply moved, as former Prime Minister Abe showed such care, going beyond the formality of just sending supplies that we may or may not have actually needed. Instead, the officials asked what we needed and then provided assistance based on those needs, which really moved me. Similarly, when the Great East Japan Earthquake of 2011 or the later Kumamoto earthquakes struck, the people of Tainan, under my leadership, naturally and dutifully expressed their support. Even earlier, when central Taiwan was hit by a major earthquake in 1999, Japan was the first country to deploy a rescue team to the disaster area. On February 6, 2018, after a major earthquake in Hualien, former Prime Minister Abe appeared in a video holding up a message of encouragement he had written in calligraphy saying “Remain strong, Taiwan.” All of Taiwan was deeply moved. Over the years, Taiwan and Japan have supported each other when earthquakes struck, and have forged bonds that are family-like, not just neighborly. This is truly valuable. In the future, I hope Taiwan and Japan can be like brothers, and that the peoples of Taiwan and Japan can treat one another like family. If Taiwan has a problem, then Japan has a problem; if Japan has a problem, then Taiwan has a problem. By caring for and helping each other, we can face various challenges and difficulties, and pursue a brighter future. Q: President Lai, you just used the phrase “If Taiwan has a problem, then Japan has a problem.” In the event that China attempts to invade Taiwan by force, what kind of response measures would you hope the US military and Japan’s Self-Defense Forces take? President Lai: As I just mentioned, annexing Taiwan is only China’s first step. Its ultimate objective is to change the rules-based international order. That being the case, China’s threats are an international problem. So, I would very much hope to work together with the US, Japan, and others in the global democratic community to prevent China from starting a war – prevention, after all, is more important than cure.

    MIL OSI Asia Pacific News

  • MIL-OSI Security: FBI Jacksonville Program Aims to Keep Connected Kids Safe

    Source: US FBI

    Hardwick and Markovsky urged parents to have those difficult conversations with kids ahead of time so they are comfortable enough to reach out if they need help. The sheriff’s office and FBI have resources for to help. “Don’t hesitate to contact us,” Markovsky said. 

    During the recent outreach event, officials highlighted investigations that the FBI and partners worked in the area, and they showed how predators and violent extremists are exploiting new and emerging technologies. In sextortion cases, for example, predators are using sophisticated software to manipulate images teens freely share to then threaten and extort them.

    “When parents understand both the devices and schemes in-depth, they can better explain the risks to their kids and help them take steps to safeguard personal information and secure their online profiles,” said FBI Community Outreach Coordinator Josh Chancey.

    Sara Peters found the support of law enforcement to be empowering. “I know we’ll have to get her a phone at some point,” she said, “but now I feel like I know what to do, and maybe I can stay one step ahead with their help.”

    ASAC Markovsky said when the time comes to get your child a phone, first have an open and honest talk about the people they could meet online and what those people might do.

    “It will probably be a difficult, uncomfortable conversation,” he said. “But it’s necessary because no matter their age, the unfortunate reality is that they will likely be targeted.”

    MIL Security OSI

  • MIL-OSI Security: Ohio Man Sentenced to Prison for Unemployment Insurance and Bank Fraud

    Source: US FBI

    CLEVELAND – Darmani Hawkins, 21, of Aurora, was sentenced to 60 months in prison by U.S. District Judge Donald Nugent after pleading guilty to conspiracy to commit wire fraud and mail fraud; conspiracy to commit bank fraud; and mail theft, as part of schemes to fraudulently obtain coronavirus disease (COVID)-era state unemployment benefits and, separately, to steal checks from the mail, alter them, and deposit them. He was also ordered to pay $681,114.14 in restitution and serve three years of supervised release after imprisonment.

    According to court documents, from 2020 through 2021, Hawkins conspired to fraudulently obtain COVID pandemic unemployment insurance benefits by submitting fake claims, and in 2023, he conspired to steal checks out of the United States mail, deposit them, and keep the proceeds.

    In the COVID fraud scheme, Hawkins and his co-conspirators exploited the CARES Act (Coronavirus Aid, Relief, and Economic Security), which had been established to assist people who were out of work because of the COVID-related shutdown. They submitted false unemployment applications to multiple states, making it appear as if they were eligible to receive benefits when, in fact, they were not. Once a state’s unemployment agency approved the applications, the state mailed the unemployment benefits to Hawkins and his co-conspirators in the form of debit cards, which they used to withdraw cash for their personal benefit.

    In the bank fraud and mail theft scheme, Hawkins used a social media platform to recruit postal workers to steal checks from the U.S. Postal Service in exchange for a fee. Hawkins also offered to pay people to use their established bank accounts to deposit the checks stolen from the mail. Those who agreed to participate in mail theft deposited the stolen checks into bank accounts that Hawkins had paid others to allow him to access.  Hawkins then withdrew or received the stolen deposited funds. 

    “Mr. Hawkins shamelessly exploited federal resources intended to help those who became unemployed as a result of an uncontrollable, life-changing world event. His deceitful actions were selfish and heartless, diverting much-needed funds away from those who lost their jobs through no fault of their own,” said U.S. Attorney Rebecca Lutzko for the Northern District of Ohio. “He also manipulated others to steal checks and misuse our banking system in a greedy effort to make easy money. Those, like Mr. Hawkins, who seek to capitalize on the misfortune of others by abusing federal safety nets established to protect the needy, and who steal from the U.S. taxpayer and private citizens, will be held to account and brought to justice.”

    “The sentencing of Mr. Hawkins should send a strong message to anyone who believes they can deceive government programs designed to help the American public in times of need. As part of our mission, postal inspectors will aggressively work to protect the public and prevent criminal misuse of the mail,” said Postal Inspector in Charge Lesley Allison of the U.S. Postal Inspection Service’s Pittsburgh Division. “We value our relationships with the U.S. Attorney’s Office and the law enforcement partners involved in bringing Mr. Hawkins to justice.”

    During the investigation, officials determined that Hawkins had caused a loss of approximately $425,000 in the COVID fraud scheme and more than $700,000 in the stolen check scheme.  

    This case was investigated by the U.S. Department of Labor, the U.S. Postal Inspection Service, the Social Security Administration Office of the Inspector General, and the FBI Cleveland Division. The case was prosecuted by Assistant United States Attorney Erica Barnhill for the Northern District of Ohio.

    To report fraud, visit https://www.dol.gov/agencies/eta/unemployment-insurance-payment-accuracy/UIFraudReporting or https://www.uspis.gov/report

    MIL Security OSI

  • MIL-OSI Security: FBI Cleveland Cautions Holiday Travelers About In-Flight Safety

    Source: US FBI

    FBI Cleveland is advising the public to be ‘air aware’ and understand the general safety precautions ahead of the busy holiday travel season.

    Being safe when traveling by air

    Sexual assault aboard aircraft—which usually takes the form of unwanted touching—is a federal offense and a felony that can land offenders in prison. Typically, men are the perpetrators, and women and unaccompanied minors are the victims. The FBI has seen every combination of victim and perpetrator.

    “Perpetrators look for easy opportunities to violate the space and trust of their victim. With the increased number of travelers during the holiday season, so are the number of people with nefarious intent,” said FBI Cleveland Special Agent in Charge Greg Nelsen. “That is why we stress that travelers remain air aware, especially when it is easy to become distracted with our devices while in an airport or in-flight.”

    Crimes aboard aircraft fall within the FBI’s jurisdiction, and in the case of in-flight sexual assaults, agents describe elements of these crimes as being strikingly similar. The attacks generally occur on long-haul flights when the cabin is dark. The victims are usually in middle or window seats, sleeping, and covered with a blanket or jacket. They report waking up to their seatmate’s hands inside their clothing or undergarments.

    Compared with a typical year, just a few years ago, the FBI saw a tenfold spike in reported complaints to the Federal Aviation Administration (FAA) regarding unruly and dangerous passenger behavior on airplanes.

    That number continues to grow.

    While no two incidents are the same, the information below will identify common patterns of sexual offenders onboard aircraft.

    Offenders

    The Centers for Disease Control and Prevention (CDC) indicates most perpetrators of sexual violence are known to the victim. However, sexual assaults on airplanes stand out because the victims usually do not know their assailants.

    Generally, sexual crimes are committed by males, and the same holds true when they happen on airplanes. Most often, an assailant sits immediately next to the victim and takes advantage of this proximity. Victims likely sit in a middle or window seat, with the offender closer to or on the aisle, effectively barricading her so she will have to walk past the perpetrator to get out.

    Sexual assaults onboard aircraft follow a predictable pattern that can be routine for experienced offenders. Because flights only last a few hours, assailants undertake a truncated grooming process to draw targets closer for control and exploitation. Grooming involves six steps to perpetrate sexual violence.

    1. Identifying the victim
    2. Gaining trust
    3. Filling a need
    4. Isolating
    5. Initiating sexual contact
    6. Maintaining control

    Though grooming is most frequently applied in the context of targeting minors, the methodology is useful for understanding techniques employed by sexual perpetrators on aircraft for victims of any age.

    Sexual offenders follow the same patterns in the air as they do on the ground but with a shortened timeline.

    In-flight sexual assaults follow a predictable but unfortunate routine, from victim identification to incident. Even if they have never been formally prosecuted, offenders with the boldness to attempt such crimes in a confined space, surrounded by witnesses, and in which they have only a few hours to act have a lot of experience avoiding arrest. Luckily, investigators familiar with this pattern and willing to look into reported incidents can find the information needed to apprehend offenders and protect victims.

    Staying Safe While Flying

    Share these tips with traveling family and friends to ensure they are less susceptible to in-flight sexual assaults.

    • Do not mix medications (even over the counter) with alcohol. These substances can induce deep sleep or affect users in unexpected ways, especially at a high altitude.
    • Dress for comfort, rather than style. Tight clothing can make it easier for sexual predators to access sensitive areas.
    • Flight attendants are there to help. If you do not feel comfortable, ring the call light or get up and ask for assistance or to be reseated.
    • If someone is being inappropriate, politely ask them to stop. It will scare off potential attackers by showing you are aware of their actions. As a worst-case scenario, a regular passenger will give you more space.
    • Trust your gut. Offenders will often test their victims, sometimes pretending to brush against them to see how they react or if they wake up. If such behavior occurs, reprimand the person immediately, and consider asking to be moved to another seat.
    • If your seatmate is a stranger, no matter how polite he or she may seem, keep the armrest between you down.
    • If you are arranging for a child to fly unaccompanied, try to reserve an aisle seat so flight attendants can keep a closer watch on them. Victims have been as young as eight years old.

    If an incident happens, report it immediately to the flight crew and ask that they record the attacker’s identity and report the incident. Flight attendants and captains represent authority on the plane, and they can alert law enforcement, and sometimes deal with the problem in the air. The flight crew can also put the offender on notice, which might prevent further problems.

    If you think you are a victim of sexual assault aboard an aircraft, report the incident to your flight crew and to the FBI at tips.fbi.gov or 1-800-CALL-FBI, or contact your local FBI office.

    If alerted in advance, FBI agents can be on hand when the plane lands to conduct interviews and take subjects into custody. FBI victim specialists can respond as well because victims of federal crimes are entitled by law to a variety of services.

    MIL Security OSI

  • MIL-OSI Security: San Diego Man Charged with Using Explosives to Burglarize ATMs

    Source: US FBI

    NEWS RELEASE SUMMARY – August 23, 2024

    SAN DIEGO – Son Nguyen of San Diego was arrested early today and charged in federal court with two counts of damaging property in connection with using explosives on two ATMs.

    Nguyen, who unsuccessfully attempted to steal money from the machines, was tracked through surveillance video, vehicle registration and facial features, the complaint said. He was taken into custody by the FBI at his Mira Mesa residence and is scheduled to make his first appearance in federal court Monday.

    According to the complaint, at approximately 3:24 a.m. on June 8, 2024, Nguyen drove up to an ATM outside of California Coast Credit Union on Governor Drive in San Diego. Nguyen got out of his car and brought a five-gallon blue plastic container with a white spout to the area in front of the ATM. He then appeared to insert a black polyvinyl chloride plastic (“PVC”) hose into the ATM. A short time later, a small explosion occurred inside the ATM. Despite efforts to pull money out of the machine, Nguyen left empty handed.

    San Diego Police officers responded to an alarm at the credit union and observed a white PVC pipe connected to a black PVC pipe with two batteries taped to it. They also observed pieces of what looked like a blue balloon around the ATM.  Approximately 20 feet from the ATM was another plastic pipe. 

    According to the complaint, a few weeks later, at approximately 2:10 a.m. on June 28, 2024, Nguyen drove up to another ATM in Rancho Bernardo outside of a First Citizen’s Bank branch in San Diego. He then repeated the same steps. After electrical components caught fire and smoke started coming out of the ATM, Nguyen returned and attempted to extract cash from the machine but was unsuccessful.

    Investigators used surveillance camera video to track the defendant and his vehicle. While serving a court-authorized search warrant at Nguyen’s home, investigators found gas, black powder, potassium nitrate sulfur, explosive pre-cursor chemicals, a paper that explains how to make black powder and a firearm in Nguyen’s residence, among other equipment and clothing items consistent with those used during the attempts.

    “Fortunately, neither of these incidents resulted in injury or successful theft of cash,” said U.S. Attorney Tara McGrath. “With the discovery of chemicals and equipment in the search today, future attempts were also thwarted.”

    This case is being prosecuted by Assistant U.S. Attorneys Andrew Sherwood and Shital Thakkar.

    DEFENDANT                                               Case Number                         24-mj-03215

    Son Thanh Nguyen                                         Age: 44                                   San Diego, CA

    SUMMARY OF CHARGES

    Use of an Explosive to Damage Property – 18 U.S.C., Section 844(i)

    Maximum penalty: Twenty years in prison

    INVESTIGATING AGENCIES

    Federal Bureau of Investigation

    San Diego Police Department

    San Diego County Sheriff’s Department Bomb Squad

    City of San Diego’s Hazmat Team

    A complaint itself is not evidence that the defendant committed the crimes charged. The defendant is presumed innocent until the Government meets its burden in court of proving guilt beyond a reasonable doubt. 

    MIL Security OSI

  • MIL-OSI Security: Wasilla Man Sentenced for 2021 Carjacking During Armed Police Altercation

    Source: US FBI

    ANCHORAGE, Alaska – A Wasilla man was sentenced today to over nine years in prison for his involvement in recklessly evading the police and using a firearm during a carjacking in 2021.

    According to court documents, on Dec. 17, 2021, an Anchorage Police officer attempted a traffic stop on Bryson McEneaney, 36, but he evaded the officer and fled north on the Glenn Highway towards Palmer. Palmer Police deployed spike strips to stop the vehicle.  McEneaney avoided the strips by driving into oncoming traffic and stopping the vehicle.

    Officers tased McEneaney as he exited the vehicle, but he was able to continue on foot towards a stopped vehicle.  McEneaney used a rifle to gain control of that vehicle.

    According to a press release from the Anchorage Police Department about the defendant’s actions on Dec. 17, law enforcement located McEneaney in the stolen vehicle on the Palmer-Wasilla Highway. The defendant wrecked the vehicle while attempting to elude Wasilla Police officers and fled on foot. He was located by law enforcement behind a transit building and taken into custody.

    At the time of this conduct, the defendant was previously convicted of multiple violent felonies from 2016, including vehicle theft, assault and burglary.

    “Mr. McEneaney’s selfish and careless actions in 2021 were the pinnacle of his habitual violent offenses over the years. I want to thank our law enforcement partners who did tremendous collaborative work to ensure Mr. McEneaney was off the streets and no longer a threat to our communities,” said U.S. Attorney S. Lane Tucker for the District of Alaska. “My office will continue to work with law enforcement to prioritize prosecuting violent offenders who continually show disregard for the health and safety of Alaskans.”

    The FBI Anchorage Field Office, Alaska State Troopers, Anchorage Police Department, Palmer Police Department and Wasilla Police Department investigated the case.

    Assistant U.S. Attorney Karen Vandergaw prosecuted the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: FBI Warning: ‘Tis the Season for Holiday Scams

    Source: US FBI

    As we enter the 2022 holiday season, Arkansas residents must remain mindful of criminals who care less about giving and more about stealing. Shoppers looking for a good deal this holiday season need to be aware of aggressive and deceptive scams designed by criminals to steal money and personal information. According to the FBI’s Internet Crime Complaint Center (IC3), Americans lost over $6.9 billion to fraudsters just in 2021, including more than $335 million in online shopping and non-delivery scams. This year, FBI Little Rock wants Arkansas shoppers to enjoy a scam-free holiday season by remaining vigilant against the below schemes.

    Online Shopping Scams: Criminals often offer too-good-to-be-true deals via phishing emails, text messages, and fake advertisements on social media. Perhaps you were looking to buy tickets to an upcoming concert and found just what you were looking for—at a good deal—in an online marketplace? Those tickets could end up being bogus. Or maybe you just located a new, hard-to-find gaming system… but in reality, you clicked on a link which gave a criminal the ability to download malware onto your device. Bottom line is if a deal looks too good to be true, it probably is! Stay clear of unfamiliar sites offering unrealistic discounts on brand-name merchandise. Scammers frequently prey on bargain hunters by advertising “One-Day Only” promotions for recognizable brands. Without employing a skeptical eye, consumers may end up paying for an item, giving away personal information, and receiving nothing in return except a compromised identity.

    Fraudulent Social Media Posts: Consumers should beware of posts on social media sites that appear to offer special deals, vouchers, or gift cards. Some may appear as holiday promotions or contests. Others may be sent by friends who shared a link on popular social media sites. These scams frequently lead consumers to participate in online surveys designed to steal personal information. Before you click on a social media advertisement, do your due diligence and check the legitimacy of the website before providing any personal or credit card information.

    Charity Scams: Charity-related frauds increase during the holidays as individuals look to donate money to those less fortunate. Criminals use phone calls, email campaigns, and fake websites to solicit on behalf of fraudulent charities. Scammers target people who want to donate to charity, then hoard well-intentioned donations while those most in need never see a dime.

    Steps to avoid holiday fraud schemes:

    • Before shopping online, secure all your financial accounts with strong passphrases. Additionally, use different passphrases for each financial account.
    • Routinely check bank and credit card statements, especially after making online purchases and in the weeks following the holiday season.
    • Never give personal information— such as your date of birth, Social Security number, or home address— to anyone you do not know.
    • Be highly suspicious of promotions and giveaways which require your personal information.
    • Prior to donating to any charity, verify they have a valid Taxpayer Identification Number by visiting their website or calling the charity directly.

    Reporting fraud: Shoppers who suspect they’ve been victimized should immediately contact their financial institution, then call their local law enforcement agency or FBI Little Rock at (501) 221-9100. Victims of holiday scams are also encouraged to file a complaint with the FBI at www.ic3.gov.

    MIL Security OSI

  • MIL-OSI United Kingdom: New method to evaluate ecological impact of offshore activities A recently published study from the University of Aberdeen has revealed a new approach to evaluating the ecological impacts of offshore activities.

    Source: University of Aberdeen

    New method will evaluate wider disruption caused by offshore wind farm construction

    A recently published study from the University of Aberdeen has revealed a new approach to evaluating the ecological impacts of offshore activities.
    By integrating a dynamic ecosystem model with a comprehensive ecosystem services database the team, which includes researchers from the Plymouth Marine Laboratory, aim to accurately forecast the environmental consequences of fisheries displacement and broader ecosystem-level changes resulting from offshore wind farm development.
    The scientists says that this new methodology will have the ability to support marine spatial planners to balance and minimise conflicts and tensions amongst existing and future planned marine uses of natural resources.
    The proposed methodology also provides an approach to integrating the relative value of Marine Net Gain (i.e a conservation approach that ensures human activities in marine environments result in a measurable net positive impact on biodiversity) interventions in terms of wider Natural Capital Accounting. This will further progress understanding of ecosystem services and market-based approaches which will enable stakeholders to access and compare global studies on the environmental and socio-economic outcomes of offshore wind farm developments.

    In the race to achieve Net Zero, it is essential to ensure that we do not inadvertently create new environmental challenges.” Dr Neda Trifonova

    Dr Neda Trifonova from the University of Aberdeen and lead author of the study said: “The rapid expansion of offshore wind farms is a key component of global decarbonisation efforts. However, in the race to achieve Net Zero, it is essential to ensure that we do not inadvertently create new environmental challenges. Our study presents a methodological roadmap designed to support sustainable and evidence-based marine management and offshore renewable energy policies.
    “Given the dual pressures of climate change and spatial conflicts with existing industries such as fishing, our approach aims to enhance decision-making by balancing environmental and socio-economic trade-offs. We propose the use of dynamic ecosystem modelling to inform a risk assessment framework, supported by a comprehensive ecosystem services database.
    “At the heart of our methodology is supporting a nature-positive approach—a conservation principle that ensures human activities in marine environments result in a measurable net gain for biodiversity and ecosystem services.”
    This project was funded by the Natural Environment Research Council (NERC) and The Crown Estate (TCE), part of the ECOWind Programme, as well as the UK Energy Research Centre. The study is published in BES Ecological Solutions and Evidence.

    MIL OSI United Kingdom

  • MIL-OSI USA: Solidarity, Family, and Service

    Source: US GOIAM Union

    This article was featured in the Summer 2025 IAM Journal and was written by IAM Communications Representative Elias Flamenco Rivera.

    In today’s fast-paced world, balancing a successful career, union commitments, and family life can be impossible. However, for three dedicated IAM mem­bers, this reality is a daily com­mitment that speaks to their work ethic, union pride, and dedication to their professions and families. These members rise before dawn and work well beyond the typical eight-hour workday, driven by their deep-rooted commitment to
    their jobs, families, and the IAM.

    “For JAM members, it’s not about managing time – it’s about commitment. The long hours are made bearable by the strength we find in our families, our union, and our shared mission to serve,” said !AM Southern Territory General Vice President Craig Martin.

    Many of you reading this story have experienced the drill: early mornings, long shifts, and balan­cing work and family. It’s the life of an !AM member in the South, and it’s a testament to our dedication. JAM Union Southern Terri­ tory members Berrin McFadden, Steve Blackwell, and Scott Gar­dner are three exceptional indivi­duals who are balancing work and family to serve JAM members.

    BERRIN MCFADDEN has devoted over three decades of his life to the Jacksonville Transportation Authority (JTA), where he has become an integral part of the workplace and the broader com­ munity. As a seasoned mechanic in the HVAC shop, McFadden spends his mornings ensuring buses are fully operational, provi­ding essential heating and air-con­ditioning services, and offering quick fixes to ensure the safety and comfort of passengers. But it’s not just about the work; it’s about the pride McFadden takes in his craft and the people he serves. Since joining the JAM in 1990, McFadden has taken on various leadership roles within his Local, including eight years as financial secretary and currently serving as conductor sentinel. He values the union’s support for his professional growth and the enhancement of his personal financial skills, which he uses to manage his household budget effectively with his wife.

    “Being part of the TAM helped me become a better financial manager. It made me more disciplined with money and allowed me to share those les­ sons with others,” said McFadden.

    McFadden works long hours during the week to keep things running smoothly, then clearly separates work from personal life on the weekends, maintaining a healthy equilibrium.

    “I dedicate my weekends to my family and myself,” said McFadden. “I’ve learned that it’s important to shut off work and focus on the things that matter the most at home.”

    Beyond work, McFadden is actively engaged in beautification and landscaping projects within his neighborhood, a hobby he has cherished for many years. He believes that a well-maintained lawn reflects the residents’ care and pride.

    His lawn care and landscaping expertise have earned him the respect of his neighbors, who fre­quently seek his advice and gui­dance on maintaining their yards.

    “I’m just doing what I love, and that’s what drives me. I want to leave a legacy showing the importance of community, hard work, and caring for the people around you,” says McFadden.

    STEVE BLACKWELL currently works as a Quality Assurance Representative at Amentum Group. With an extensive background in avia­tion, including roles as Corro­sion Control Mechanic Lead and Aircraft Mechanic 2, he has built a career centered on maintaining safety and efficiency in aviation. Though his daily routine can be unpredictable, his commitment to ensuring every task is performed to the highest standard remains constant.

    “Every day is different in avia­tion,” says Blackwell.

    The role comes with significant responsibilities, including perfor­ming final inspections for mainte­nance actions involving the safety offlight, investigating safety inci­dents, and drafting reports like engineering investigation requests and quality deficiency reports. Blackwell is also responsible for monitoring various maintenance programs, training other staff, and compiling reports to support the Program Management Office.

    “You need solid technical expertise and a deep unders­tanding of aviation standards,” says Blackwell. “Working alon­gside qualified and competent mechanics to ensure tasks are completed efficiently is essential.” As a member of IAM Local 2777 for over seven years, Bla­ckwell has seen firsthand how union membership contributes to a positive work environment.

    “Being part of the JAM has been beneficial in building cama­raderie, especially among those of us who have military backgrou­nds. We work well together and support each other in achieving our goals,” reflects Blackwell.

    In addition to his role as a Chief Steward, Blackwell also serves as the Vice President of his Local.

    “I help lead efforts to resolve issues at the site and ensure that our members are supported,” he says, underscoring the collabora­tive spirit that defines union work. Despite his job’s demanding nature, Blackwell tries to balance work with his personal life. ‘Tm fortunate to have an understanding family, especially my wife, the rock in our hou­sehold. She supports me as I take on additional responsibilities at work,” he says.

    Outside of work, Blackwell is passionate about music. As a local musician, he performs live shows to unwind and support charitable causes.

    “My band donates 100% of our tips to organizations like United Service Organizations (USO) and the Children’s Rescue Initiative (CR!), which fights human traffi­cking,” he explains.

    “I also make time to work out whenever possible, and I set clear boundaries for work-no calls after 7:45 p.m. unless it’s an emergency so that I can be pre­ sent for my family and personal well-being.”

    “I see my work at Amentum as contributing to the security of our community. The aircraft we maintain help train pilots who will protect future generations,” says Blackwell. “The work we do directly impacts the future of avia­tion and defense. It’s rewarding to know that my efforts contribute to the safety of our country and the well-being of the people I work with.”

    SCOTT GARDNER begins the day early as a mechanic at Textron Aviation. The first task includes stretching exercises and a crew meeting to set the stage for the day’s work. From there, it’s all about getting hands-on with tasks, assembling aircraft parts, and ensuring every job is completed precisely. As an assembly ins­ taller, the responsibility is clear: follow Textron Aviation’s blue­ prints and specifications to main­tain quality and safety.

    “In my role, I perform assem­bly work in the final assem­bly area. We work on a weekly sequence, positioning and prepa­ring aircraft as part of the 40-hour moving schedule,” says Gardner, who has been with Textron for 28 years.

    The work is physically deman­ding but highly specialized, and precision is key.

    As a shop steward, Gardner also balances his technical duties with advocating for his coworkers. “A big part of my job invol­ves answering questions, moni­toring safety, and addressing any arising issues throughout the day. I’m constantly in discussions with leadership about daily matters and broader issues affecting our team,” explains Gardner.

    This role involves significant leadership and communication skills, which come naturally to someone who has been a part of JAM Local 774 for nearly 20 years.

    For Gardner, being part of the IAM has provided a sense of voice and security.

    “The !AM has been a big help as it has given me a plat­ form where I can make sure my coworkers’ rights are heard,” said Gardner. “We have benefits that we wouldn’t otherwise have in a right-to-work state.”

    The IAM has helped him grow as an advocate, primarily through leadership classes at the William W. Winpisinger Education and Technology Center.

    “It’s been a great way to bring those lessons back to my family, teaching them the importance of our rights as workers and the advantages of being part of a union,” explains Gardner.

    Gardner also has served as [AM Local 774 Communications Representative, a role that required him to ensure timely and effective communication between union leadership and the members.

    While his work and union res­ponsibilities can be demanding, he strives to ensure his family life doesn’t take a backseat.

    “Although it’s challenging at times, I maintain clear bounda­ries by carving out time for work, union responsibilities, and family, so [ can stay present at home.”

    Family remains his top prio­rity, and his commitment to them is evident in his career choices and personal values.

    “My wife and I have always prioritized our family first. Now that the kids are out of the house, it’s easier to balance things. But even when they were younger, made sure they always came first,” shares Gardner.

    He and his wife are acti­vely involved in the community, supporting local charities like Flags of Freedom and Wreaths Across America. He also attends the annual United Way of the Plains/AFL-CIO Community Ser­ vices Conference in the area.

    “Our work at Textron is critical to the local community. We manu­facture world-class aircraft, and as one of the largest employers in the city, our wages, benefits, and working conditions are vital to the community’s economic health,” says Gardner proudly.

    “My work means something. I know that someone’s loved one might be flying on one of these aircraft, which motivates me to ensure that everything I do is up to the highest standard,” continues Gardner.

    THE SPIRIT OF IAM: COMMITMENT TO SOLIDARITY, WORK, AND SERVICE

    “These workers’ stories are not just about what they do but why they do it – to create a bet­ter future for their families, their communities, and the union that stands behind them,” said Mar­ tin. ‘Through their tireless efforts, they remind us that the true stren­gth of any union is not just in its contracts but in the support we provide one another. Their jour­neys are a powerful reminder that when we work together with pur­pose, we all rise.”

    VIDEO PLAYLIST
    IAM Southern Territory members share their stories of balancing their work, union commitments, and family life with dedication and pride. iam4.me/southemsolidarity

    The post Solidarity, Family, and Service appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News

  • MIL-OSI Economics: DG Okonjo-Iweala, IPU Secretary General Chungong urge parliaments to ratify WTO Fisheries Agreement

    Source: World Trade Organization

    Adopted at the WTO’s 12th Ministerial Conference (MC12) in June 2022, the Agreement tackles some of the most harmful forms of fisheries subsidies, including those that contribute to illegal, unreported and unregulated fishing, the depletion of overfished stocks, and unregulated high seas fishing.

    “We are on the verge of a major milestone,” said WTO Director-General Ngozi Okonjo- Iweala. “This Agreement is not only about preserving deteriorating fish stocks: it is about people’s livelihoods and food security. It’s about responding to problems of the global commons – and demonstrating that the multilateral trading system is delivering global public goods. We need 12 more acceptances to bring it into force. It is now time for the remaining parliaments to take action. This is about improving economic and environmental sustainability – it would be wonderful if we can get this done in time for next month’s 2025 United Nations Oceans Conference in France.”

    IPU Secretary General Martin Chungong added: “Parliaments are the vital link between global agreements and national action. By ratifying this Agreement, they can help restore marine ecosystems, support livelihoods and show that multilateralism works.”

    The joint call for action builds on the letter sent by the IPU Secretary General and the WTO Director-General in September 2023 encouraging parliamentarians to get involved in the campaign to promote the ratification of the Agreement on Fisheries Subsidies.

    The upcoming 2025 United Nations Oceans Conference, taking place from 9 to 13 June in Nice, France, presents a timely opportunity for the Agreement’s ratification and entry into force, building political momentum for action to address rapidly deteriorating fish stocks.

    A prompt entry into force of the Agreement would send a powerful signal of global resolve to implement Sustainable Development Goal 14.6, which aims to eliminate harmful fisheries subsidies and promote the sustainable use of marine resources.

    The 2022 Agreement has already shown that WTO members can deliver meaningful multilateral outcomes, even amid geopolitical tensions and economic uncertainty. Finalizing ongoing negotiations on additional disciplines to address subsidies contributing to overcapacity and overfishing would further strengthen efforts toward long-term sustainability.

    The Agreement holds particular significance for coastal communities in small, vulnerable economies (SVEs) and least-developed countries (LDCs), which depend heavily on marine resources for food security, employment, and economic resilience. Many SVEs and LDCs have already ratified the Agreement, recognizing its potential to preserve marine ecosystems and advance fairness in ocean governance. Even landlocked members see value in the Agreement because it helps address food insecurity. The full list of WTO members that have deposited their instruments of acceptance is available here.

    The WTO Fisheries Funding Mechanism (Fish Fund) is ready to become operational once the Agreement enters into force. In collaboration with international partners, the Fund will provide technical assistance and capacity-building to developing economies that have ratified the Agreement. More information is available here.

    The WTO Secretariat and the IPU reaffirm their commitment to working with national and regional parliaments through technical briefings, outreach activities, and targeted support to ensure swift ratification and effective implementation of the Agreement.

    Share

    MIL OSI Economics

  • MIL-OSI Economics: Frank Elderson: Nature’s bell tolls for thee, economy!

    Source: European Central Bank

    Keynote speech by Frank Elderson, Member of the Executive Board of the ECB and Vice-Chair of the Supervisory Board of the ECB, at the Naturalis Biodiversity Center

    Leiden, 22 May 2025

    Thank you for inviting me to speak at this annual biodiversity dinner. The wide range of speakers here this evening – on international biodiversity day – is testament to the relevance of biodiversity across disciplines.

    Nature isn’t just the roots and shoots of biologists, macroecologists and natural scientists. Beyond its intrinsic value, nature provides vital services that are relevant for all of us – for entrepreneurs, workers, policymakers and bankers, but also for central bankers and financial supervisors.

    A thriving natural environment provides vital benefits that sustain our well-being and serve as a crucial driving force for the global economy. Think of fertile soils, pollination, timber, fishing stocks, clean water and clean air.

    But we are well aware of the daunting facts that confirm the dire state of ecosystem services. Intensive land use, the climate crisis, pollution, overexploitation and other human pressures are rapidly and severely damaging our natural resources.

    75% of land surface ecosystems and 66% of ocean ecosystems have been damaged, degraded or modified.

    We are using natural resources 1.7 times faster than ecosystems can regenerate them. Consequently, the contribution that nature can make to our economies – and our way of life – is steadily diminishing every day.

    These fateful facts and figures confront us as vividly as Edvard Munch’s iconic scream. Yet, accounting for nature and the services it provides is challenging. What nature provides to the economy is typically not measured directly in statistics like GDP.

    We price portfolios instead of pollinators, we monitor markets instead of mangroves and we watch wages instead of water supplies. However, the reality is that while our economies are heavily reliant on ecosystem services, the economic value of those pollinators, mangroves and water supplies is not sufficiently taken into account.

    Nature is too often still wrongly seen as a free good, readily available and abundant in supply, without opportunity costs. For such a good, there is no market – and therefore no price.

    So, why can’t governments intervene by pricing and creating a market for nature as has been done for emissions?

    Unlike for the climate crisis – which can be quantified through carbon emissions and their direct links to rising temperatures – there is no single metric that can be used to quantify the wide range of ecosystem services.

    What is the common denominator of clean air, fertile soils and coasts protected by mangrove forests? Nature is beautifully complex, but this complexity makes it harder to establish a market for nature than a market for climate, such as the carbon markets created through emissions trading systems.

    For central banks to effectively fulfil their mandates, we need to enhance our capacity to measure the vital services that nature provides to our economy and identify the financial risks caused by the degradation of these services. And while this is admittedly not an easy task, it is encouraging that multiple stakeholders are making progress, including academia, firms and also the ECB. We are enhancing our tools, methodologies and data to assess the economic implications of ecosystems and their degradation. And I am pleased to be able to share some of our latest insights this evening.

    I will argue that while nature services may appear to be freely available, they are in fact not abundant at all and there are substantial costs to using and losing them. Costs that we currently overlook when headlines report on GDP growth.

    Accounting for nature in monetary policy and banking supervision

    Nature being of vital importance for the economy and the financial system is hardly a novel insight. Besides scientists, a number of central banks and prudential supervisors have also been highlighting their interlinkages for several years now.[1] And while the climate crisis has received most of the attention, it is encouraging that work on nature-related risks has also significantly evolved.

    Moreover, the ECB has taken significant steps to account for nature-related risks in the pursuit of its mandate. For instance, we take into account the effects nature degradation can have on banks’ balance sheets. The degradation of nature could damage companies’ production processes and consequently weaken their creditworthiness, which might in turn impair loans granted by banks. In our role as the supervisor of Europe’s largest banks, we therefore aim to ensure that the banks we supervise adequately manage both climate-related and nature-related risks.[2] Encouragingly, we are seeing a growing set of good practices among the banks we supervise in terms of identifying, quantifying and managing nature-related risks.

    But are we fully aware of – and sufficiently alert to – how nature degradation could eventually hit balance sheets?

    Advancing our understanding does not mean that economists and supervisors should start studying ants in Aragon, ladybirds in Lombardy or honeybees in Holland (although it is very important that entomologists do!).

    Instead, central banks and supervisors need to gain a better understanding of just how vulnerable the economy and the financial system are to nature degradation.[3]

    Capturing the risks related to ecosystem degradation

    An ECB study in 2023 found that nearly 75% of banks’ corporate lending goes to firms that are highly dependent on at least one ecosystem service.[4] This finding underscores just how interconnected nature, the economy and the financial system really are.[5] But that study does not tell us exactly how much of our economic activity is at risk, or which economic sectors and regions will be most affected.

    To better understand this impact, the ECB has teamed up with the Resilient Planet Finance Lab at the University of Oxford.

    The interdisciplinary team has developed systemic risk indicators that move beyond dependency analysis to a comprehensive assessment of nature-related financial risks. In essence, this indicator assesses the economic implications of the deteriorating state of ecosystems. It shows how much of the economic value added by a particular industry– what economists call “gross value added” – is at risk when ecosystem services degrade. Tomorrow we will publish a blog post showing some of the preliminary results of our work, but I can already share some findings with you this evening.

    Water – the natural currency underwriting purchases, investments and trades

    Our preliminary findings indicate two things. First, water – too little, too much or too dirty water that is –has been identified as posing the most significant risk to the euro area economy. Losses related to water scarcity, poor water quality and flood protection emerge as the most critical from a value added perspective. Concretely, surface water scarcity alone puts almost 15% of the euro area’s economic output at risk. This is not surprising because water is not just any resource – it is one of the most essential natural resources we possess. Second, agriculture is the most exposed sector, as it would suffer the largest proportional output losses due to a decline in surface water. But other sectors are also likely to be significantly affected.

    Chart 1

    Proportion of national gross value added (GVA) at risk due to surface water scarcity in Europe and globally (supply chain risks)

    Water is, for instance, an indispensable resource in industry. In the Netherlands, industry alone uses over 2.6 trillion litres of fresh water a year.[6] This water usage is more than three times the total annual water consumption of all households in the Netherlands. Water is also essential for energy production, not only in hydropower plants but also in thermal power plants – including nuclear – where it is used for cooling and steam generation. It is consumed in vast quantities for mining and mineral processing, which are crucial for the energy transition, as well as in the construction sector for producing concrete, to name just a few examples.

    The risk posed by water scarcity is not hypothetical, we are already experiencing the impact today. I am sure that many of you remember when the summers of 2018, 2019 and 2020 brought severe droughts and heatwaves even to the Netherlands. In 2018 alone, economic losses in the Netherlands were up to €1.9 billion for agriculture and €155 million for shipping, with widespread but hard-to-quantify damage to ecosystems. This year’s drought is especially alarming: spring 2025 is on track to become the driest ever recorded in the Netherlands, likely surpassing the previous record set nearly 50 years ago. And droughts are only projected to increase further as the climate crisis continues to develop. Worryingly, in the driest scenario an average summer in the 2040s will be about as dry as an extremely dry summer now.

    Effective water management will thus be crucial for sustaining production. However, the risk persists that during periods of drought, production might need to be scaled down. Some industrial processes may become economically unviable and might need to relocate.

    For example, some have even gone as far as to point at a risk that more frequent droughts could render traditional tulip-growing regions such as the Bollenstreek unsuitable for bulb cultivation.[7] This may compel growers to explore better-positioned locations where water is more reliably available to safeguard the iconic Dutch tulip industry.

    Hence, as a consequence of water scarcity, our economies could produce less, and production costs are likely to rise during any inevitable transition phase.

    Let me also point out that biodiversity is a critical – and often underestimated – factor in ensuring the availability and quality of fresh water. Ecosystems such as forests and wetlands regulate the quantity, timing and purity of water flows by stabilising soils and filtering pollutants. Maintaining healthy and diverse ecosystems will be crucial for resilient water provisioning as climate change intensifies, particularly in regions facing growing water stress.

    Beyond these macroeconomic impacts, ecosystem degradation can significantly affect financial stability, for example through the loans that banks grant to households and firms. In essence, the greater the impact on firms, the higher the risk of defaults and the higher the risk on banks’ balance sheets.

    For example, in our research with the University of Oxford we found that more than 34% of banks’ total outstanding nominal amount – over €1.3 trillion – is currently extended to sectors exposed to high water scarcity risk.

    As the next step in our research, we will examine changes in the probability of default in the sectors most affected by dwindling ecosystems. Think about it as stress-testing the resilience of banks’ credit portfolios to nature degradation. We plan to publish these results later this year, complete with a more in-depth analysis on the topic, so stay tuned.

    Multiple stakeholders are taking action

    Encouragingly, our work with the University of Oxford is not an isolated case. We are in fact seeing a wide range of stakeholders taking action to better account for ecosystem services.

    For instance, I hear that our host this evening – the Naturalis Biodiversity Center – has teamed up with banks to combine insights from science and finance to further develop indicators quantifying ecosystem services.

    We are also seeing a growing set of good practices among the banks we supervise in terms of identifying, quantifying and managing nature-related risks. Banks typically conduct materiality assessments to understand where they are most affected. And banks also grapple with the challenge that nature-related risks are difficult to express in a single metric. Once they know where they are exposed, they then typically conduct deep dives on specific topics.

    One bank, for example, has conducted a quantitative scenario analysis to understand how the profitability of its customers could be affected if a water pollution tax were to be implemented.

    Other banks design customer scorecards and engage with the most vulnerable counterparties, sometimes offering small discounts or other incentives when customers meet key performance indicators that increase their resilience.

    It is also encouraging that progress is being made at the international level. The Network for Greening the Financial System (NGFS) – a network of 145 central banks and supervisors from around the world – has developed a conceptual framework offering central banks and supervisors a common understanding of nature-related financial risks and a principle-based risk assessment approach.[8][9] And the Financial Stability Board recently took stock of supervisory and regulatory initiatives among its members, finding that a growing number of financial authorities are considering the potential implications of nature-related risks for the financial sector.[10]

    So scientists, banks, policymakers and supervisors are in fact taking action. That’s good news. Given the high level of uncertainty regarding impacts, non-linearities, tipping points and irreversibility, continuous scientific input and engagement are essential to determine the transmission channels from nature to our economies.

    Reliable and comparable data are key to managing risks and identifying opportunities

    Before I conclude, let me stress a vital enabler to better measure ecosystem services: data. Closer cooperation with natural scientists can help us better understand the data they have available on the status of nature and the ecosystem services it provides. The National Hub for Biodiversity Information provided by our host tonight is an excellent example.[11]

    Moreover, continuous engagement with the scientific community can also help improve our understanding of non-linearities, tipping points and the irreversibility of the biodiversity crisis.

    Similarly, the availability of reliable and comparable data from companies is essential for us to know where the risks are hiding and where opportunities can be found. Such data can, for example, provide insights into companies’ reliance on fresh water for their production processes. In this context, the reporting requirements in the EU’s sustainable finance framework are not merely a “nice to have”, they are providing indispensable information about financial risks and are a solution to the patchwork of different reporting criteria.

    Does that mean that there is no room for simplification? Does it mean that there is no room to ease the reporting burden on smaller firms?

    Of course not.

    As the ECB noted in its recent opinion[And they do!
    Send not to know
    For whom the bell tolls.
    It tolls for thee, ECOnomy!

    Thank you for your attention.

    MIL OSI Economics

  • MIL-Evening Report: From peasant fodder to posh fare: how snails and oysters became luxury foods

    Source: The Conversation (Au and NZ) – By Garritt C. Van Dyk, Senior Lecturer in History, University of Waikato

    An Oyster cellar in Leith John Burnet, 1819; National Galleries of Scotland, Photo: Antonia Reeve

    Oysters and escargot are recognised as luxury foods around the world – but they were once valued by the lower classes as cheap sources of protein.

    Less adventurous eaters today see snails as a garden pest, and are quick to point out that freshly shucked oysters are not only raw but also alive when they are eaten.

    How did these unusual ingredients become items of conspicuous consumption?

    From garden snail to gastronomy

    Eating what many consider to be a slimy nuisance seems almost counter-intuitive, but consuming land snails has an ancient history, dating to the Palaeolithic period, some 30,000 years ago in eastern Spain.

    Ancient Romans also dined on snails, and spread their eating habits across their empire into Europe.

    Lower and middle class Romans ate snails from their gardens, while elite consumers ate specially farmed snails, fed spices, honey and milk.

    An Ancient Roman mosaic dating to the 4th century AD depicting a basket of snails, Basilica di Santa Maria Assunta, Aquileia, Italy.
    Carole Raddato/Wikimedia Commons, CC BY-SA

    Pliny the Elder (AD 24–79) described how snails were raised in ponds and given wine to fatten them up.

    The first French recipe for snails appears in 1390, in Le Ménagier de Paris (The Good Wife’s Guide), but not in other cookbooks from the period.

    In 1530, a French treatise on frogs, snails, turtles and artichokes considered all these foods bizarre, but surprisingly popular. Some of the appeal had to do with avoiding meat on “lean” days. Snails were classified as fish by the Catholic Church, and could even be eaten during Lent.

    For the next 200 years, snails only appeared in Parisian cookbooks with an apology for including such a disgusting ingredient. This reflected the taste of upper-class urbanites, but snails were still eaten in the eastern provinces.

    Schneckenweib, or Snail Seller, illustrated by Johann Christian Brand in Vienna, after 1798.
    Wien Museum

    An 1811 cookbook from Metz, in the Alsace region in northeastern France, describes raising snails like the Romans, and a special platter, l’escargotière, for serving them. The trend did not travel to Paris until after 1814.

    French diplomat Charles-Maurice de Talleyrand-Périgord (1754–1838) hosted a dinner for Russian Tsar Alexander I, after he marched into Paris following the allied forces’ defeat of Napoleon in 1814.

    The chef catering the meal was the father of French cuisine Marie-Antoine Carême, a native of Burgundy, spiritual home of the now famous escargots de Bourgogne.

    Carême served the Tsar what would become a classic recipe, prepared with garlic, parsley and butter. Allegedly, the Tsar raved about the “new” dish, and snails became wildly popular. A recipe for Burgundy snails first appeared in a French culinary dictionary published in 1825.

    It is ironic that it took the approval of a foreign emperor, who had just conquered Napoleon, to restore luxury status to escargot, a food that became a symbol of French cuisine.

    Snails remain popular today in France, with consumption peaking during the Christmas holidays, but May 24 is National Escargot Day in France.

    Oysters: the original fast food

    Oysters are another ancient food, as seen in fossils dating to the Triassic Era, 200 million years ago. Evidence of fossilised oysters are found on every major land mass, and there is evidence of Indigenous oyster fisheries in North America and Australia that dates to the Holocene period, about 12,000 years ago.

    There are references in classical Greek texts to what are probably oysters, by authors like Aristotle and Homer. Oyster shells found at Troy confirm they were a favoured food. Traditionally served as a first course at banquets in Ancient Greece, they were often cooked, sometimes with exotic spices.

    Music-cover sheet for ‘Bonne-Bouche’ by Emile Waldteufel, 1847-1897.
    © The Trustees of the British Museum, CC BY-NC-SA

    Pliny the Elder refers to oysters as a Roman delicacy. He recorded methods of the pioneer of Roman oyster farming, Sergius Orata, who brought the best specimens from across the Empire to sell to elite customers.

    Medieval coastal dwellers gathered oysters at low tide, while wealthy inland consumers would have paid a premium for shellfish, a perishable luxury, transported to their castles.

    French nobles in 1390 preferred cooked oysters, roasted over coals or poached in broths, perhaps as a measure to prevent food poisoning. As late as the 17th century, authors cautioned:

    But if they be eaten raw, they require good wine […] to aid digestion.

    Oyster Seller, Jacob Gole, 1688–1724.
    Rijksmuseum

    By the 18th century, small oysters were a popular pub snack, and larger ones were added as meat to the stew pot. That century, it is believed as many as 100,000 oysters were eaten each day in Edinburgh and the shells from the tavern in the basement filled in gaps in the brickwork at Gladstone’s Land in Edinburgh’s Royal Mile.

    Scottish oyster farms in the Firth of Forth, an inlet of the North Sea, produced 30 million oysters in 1790, but continual over-harvesting took its toll.

    By 1883 only 6,000 oysters were landed, and the population was declared extinct in 1957.

    As wild oyster stocks dwindled, large oyster farms developed in cities like New York in the 19th century. Initially successful, they were polluted, and infected by typhoid from sewage. An outbreak in 1924 killed 150 people, the deadliest food poisoning in United States history.

    Costumes of Naples: Oyster Sellers, c. 1906–10.
    Rijksmuseum

    Far from the overabundance of oysters we once had, over-fishing, pollution, and invasive species all threaten oyster populations worldwide today. Due to this scarcity of wild oysters and the resources required to safely farm environmentally sustainable oysters, they are now a premium product.

    Next on the menu

    Scarcity made oysters a luxury, and a Tsar’s approval elevated snails to gourmet status. Could insects become the next status food?

    Ancient Romans ate beetles and grasshoppers, and cultures around the world consume insects, but not (yet) as luxury products.

    Maybe the right influencer can make honey-roasted locust the next species to jump from paddock to plate.

    Garritt C. Van Dyk has received funding from the Getty Research Institute.

    ref. From peasant fodder to posh fare: how snails and oysters became luxury foods – https://theconversation.com/from-peasant-fodder-to-posh-fare-how-snails-and-oysters-became-luxury-foods-254299

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI USA: Rep. Sara Jacobs Calls Out Trump Administration For Failing to Prioritize Sudan

    Source: United States House of Representatives – Congresswoman Sara Jacobs (D-CA-53)

    May 22, 2025

    Rep. Sara Jacobs (CA-51), Ranking Member of the House Foreign Affairs Subcommittee on Africa, today called out the Trump Administration for failing to prioritize Sudan and helping to bring an end to the war and genocide in Sudan.

    Watch Rep. Sara Jacobs’ Opening Remarks Here

    Rep. Sara Jacobs said:

    “Thank you, Chairman Smith, and thank you to all of our witnesses joining us today to testify and bring attention to the ongoing catastrophe in Sudan. Last month marked two years since the outbreak of war in Sudan. It is now the largest humanitarian crisis in the world. Nearly 25 million people – half of Sudan’s population – are facing acute hunger, and more than half a million people are facing famine. More than 13 million Sudanese have been displaced from their homes since the conflict began, including nearly four million people forced to flee across Sudan’s borders as refugees. I have seen this suffering firsthand when I traveled to Chad and met with Sudanese refugees last year.

    “And let’s be clear: this is a war of choice. The Rapid Support Forces (RSF), Sudanese Armed Forces (SAF), and allied militias have waged this war, committing war crimes and holding the Sudanese people captive for their own selfish interests. And their external backers, particularly the United Arab Emirates with their support to the RSF, in addition to Egypt, Turkey, Saudi Arabia, Iran, and Russia, have turned this war into a regional proxy war by supporting and arming either side, risking further regional destabilization.

    “But despite this, the Trump Administration is nowhere to be found. In fact, the Administration’s actions have only worsened the suffering of the Sudanese people. The Trump Administration’s sham “foreign assistance review” was really just a pretext to end most foreign assistance – like food aid, disaster relief, global health programs, development and economic aid, and more. In Sudan, it’s meant cancelling millions of dollars in U.S.-funded life-saving aid. For instance, before it was illegally dismantled, USAID was supporting the heroic efforts of the Sudanese Emergency Response Rooms (ERRs) to open community kitchens and provide basic meals to Sudanese civilians throughout the country. Following the massive cuts to U.S. foreign assistance, which included USAID support to the ERRs, more than 80% of the roughly 1500 community kitchens across Sudan have been forced to close their doors – cutting off vulnerable Sudanese civilians from life-saving food assistance. 

    “And the Administration hasn’t stopped there. Yesterday, they announced over $87 million worth of cancelled humanitarian programs, including $30 million for emergency nutrition, water, and food aid in Darfur. The SAF and the RSF continue to commit atrocities against the Sudanese people, and the people of Darfur are facing a second genocide in 20 years at the hands of the RSF. Yet despite the clear need for the United States to play an active role in negotiations to end this brutal conflict, the Trump Administration has failed to dedicate the resources necessary to do so. 

    “More than four months into President Trump’s term, the Administration has still failed to nominate an Assistant Secretary for the Bureau of African Affairs at the State Department, an NSC Senior Director for Africa, or a Special Envoy for Sudan – a position the Administration is required by law to fill. And just yesterday, during Secretary Rubio’s testimony, he actually refused to say the word genocide and reaffirm his previous statements that the RSF is in fact committing a genocide.

    “These actions – or lack thereof – show that Sudan is not a priority for the Trump Administration. And while the Administration ignores the conflict and its human consequences, it chooses instead to provide weapons to the UAE – a country that is arming the RSF, fueling the war and facilitating a genocide in Darfur. There is widespread and credible reporting that the UAE continues to funnel arms to the RSF, even though the UAE continues to deny this publicly. But instead of pressuring the UAE to stop arming the RSF forces currently carrying out a genocide, the Trump Administration has chosen to blow through a Congressional hold by Ranking Member Meeks and proceed with arms sales worth more than $1 billion. 

    “Just as I did under the Biden Administration, I believe that the United States needs to use its significant leverage with the UAE to pressure them to finally end their support to the RSF. That is why I, along with Ranking Member Meeks, introduced Joint Resolutions of Disapproval last week to block the Administration’s arms sales to the UAE. If the United States wanted to, we could take tangible actions and make sensible policy decisions that would help bring an end to the war in Sudan and a sustainable peace agreement that ends military rule, establishes a civilian government, and provides a clear roadmap to democratic elections. Instead, this Administration seems to be ignoring the problem and selling weapons that are fueling genocide, war crimes, crimes against humanity, and ethnic cleansing. 

    “The Sudanese people have suffered enough. It is time for the United States and the international community to step up and focus on bringing an end to this war so that the Sudanese people can finally rebuild their country. Thank you, Chairman Smith, and with that, I yield back.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: Contractor team selected for the final stage of the SR 167 Completion Project in Pierce County

    Source: Washington State News 2

    PIERCE COUNTY – The finish line for the State Route 167 Completion Project in Pierce County is getting closer with the selection of a contractor for the fourth and final stage of design and construction.

    On Thursday, May 22, the Washington State Department of Transportation announced that Kraemer-Scarsella Joint Venture is the highest scoring proposer for a progressive design-build contract for the remaining 2.6 miles of the SR 167 Expressway between I-5 in Fife and SR 161/North Meridian Avenue in Puyallup.

    The selection of Kraemer-Scarsella Joint Venture means that all seven Puget Sound Gateway Program projects to finish SR 167 in Pierce County and SR 509 in south King County are either complete, under construction or final design and construction is imminent.

    Joining forces

    General contractors Kraemer North America and Kent-based Scarsella Bros., Inc. joined forces to submit a proposal for the last stage of the SR 167 Completion Project. WSDOT evaluated five different teams and invited two of them to submit proposals.

    “The quality of both proposing teams was outstanding,” said SR 167 Project Manager Steve Fuchs. “In the end, Kraemer-Scarsella Joint Venture stood out for its extensive experience successfully delivering progressive design-build projects, including its current project building Confluence Parkway in Wenatchee.”

    About progressive design-build

    WSDOT is using a contracting method called progressive design-build on a major highway construction project for the first time. It is the same contracting method being used to correct 58 fish barrier locations in western Washington.

    Progressive design-build divides the contract into two phases. During the first phase, Kraemer-Scarsella Joint Venture will collaboratively review and confirm the initial designs with WSDOT. WSDOT and the contracting team will identify and mitigate project risks and incorporate design and construction innovations. A final construction cost for the project will be developed and agreed upon. The second phase of the contract includes completing the final design and construction.

    “This progressive design-build contract provides us with multiple advantages in our current economic climate,” said Puget Sound Gateway Program Administrator John White. “It allows us to work collaboratively with the contractor to make sure that we all agree in advance on construction strategies, innovations, risks and together we develop the costs associated with those elements.”

    The contract is worth up to $475 million.

    Design work will continue for approximately a year with construction slated to begin in mid-2026.

    In addition to completing the four-lane expressway, the project also includes:

    • Multimodal elements, including connections to regional trails.
    • Local road and intersection improvements.
    • Eight new bridges.
    • Restoration of approximately 90 acres of stream and wetland habitat.

    A 3D project video highlighting the expressway, multimodal features and other improvements is available on WSDOT’s YouTube site with translations in five languages.

    SR 167 Completion Project information

    The SR 167 Completion Project builds 6 miles of new tolled highway between Puyallup and the Port of Tacoma. The first stage of work completed the new Wapato Way East bridge and SR 99 roundabout in Fife. The second stage builds the expressway between I-5 and the Port of Tacoma. It’s scheduled to open in 2026. Work on the third stage between SR 161/North Meridian Avenue and SR 410 began in 2025. The entire project is planned for completion by 2030.  
    Photos of construction work are available on the project’s Flickr page.

    Puget Sound Gateway Program overview

    The Puget Sound Gateway Program also includes the SR 509 Completion Project in south King County. Together, the two completion projects finish critical missing links in Washington’s highway and freight network.

    MIL OSI USA News

  • MIL-OSI USA: Cramer, Sheehy Introduce Bill to Improve Veterans Access to Timely, Local Health Care

    US Senate News:

    Source: United States Senator Kevin Cramer (R-ND)

    Legislation streamlines health care access and creates new pathway for rural veterans within 35 miles of a Critical Access Hospital

    WASHINGTON, D.C. – Many of America’s veterans live in rural or highly rural areas and face major challenges to accessing quality and timely health care. To improve access to local rural care options, U.S. Senators Kevin Cramer (R-ND) and Tim Sheehy (R-MT), members of the Senate Veterans’ Affairs Committee, introduced the Critical Access for Veterans Care Act. The bill would create a new option for veterans living in rural America, allowing them to seek health care services at their local rural hospital or clinic under the U.S. Department of Veterans Affairs (VA) Community Care Program.

    Specifically, the legislation would amend the VA MISSION Act of 2018 to create a new category under which care is required to be furnished through community providers, specifically for care sought by a rural veteran residing with 35 miles of the Critical Access Hospital or Rural Health Clinic.

    While communities may lack a VA Medical Center or Community-Based Outpatient Clinic (CBOC), they are often served by Critical Access Hospitals or Rural Health Clinics. Critical Access Hospital is a designation given to eligible rural hospitals by the Centers for Medicare & Medicaid Services (CMS). As defined by federal statute, they are the sole provider within 35 miles, must have 25 or less inpatient beds, and provide 24/7 emergency care services. They are often the only available care in rural communities, but due to community care restrictions veterans can only access them with prior authorization from the VA. There are 37 Critical Access Hospitals across North Dakota, five of which also have a VA CBOC. The Critical Access for Veterans Care Act would expand immediate access in the 32 other communities, as well as the few areas already served by a CBOC.

    “Many of our nation’s veterans live in rural areas and face significant barriers to getting the care they need,” said Cramer. “As a country, we have prioritized the preservation of Critical Access Hospitals to ensure rural America has readily available care. This designation has been a lifeline for so many, yet veterans in these communities do not have the same open access as their neighbors. Our bill removes the unnecessary roadblocks, allowing veterans to freely pursue care at their local hospital or clinics already serving those communities.”

    “As a combat veteran myself, putting America’s veterans first is at the center of my mission, and that means increasing access to the best care, people, and facilities available for our veterans,” said Sheehy. “For too long, the status quo has failed veterans, especially in rural communities, leaving them without timely access to the high-quality care they have rightly earned. In Congress, it’s our duty to ensure our veterans have the support they need to achieve the same American Dream they fought to defend, and the Critical Access for Veterans Care Act helps accomplish that mission.”

    Additionally, the legislation:

    • Prohibits VA from employing tactics like prior authorization, referrals, or other box checking activities which delay care and create unnecessary hurdles for veterans.
    • Updates the payment methodology to match the cost-based reimbursement currently used in Medicare to ensure Critical Access Hospitals are not reimbursed less to treat veterans than other patients.
    • Allows referrals originating from the Critical Access Hospital or Rural Health Clinic to other providers within the same community.

    The Critical Access for Veterans Care Act is supported by several groups in North Dakota, including Unity Medical Center in Grafton and First Care Health Center in Park River. The bill is also endorsed by America’s Warrior Partnership and the National Rural Health Association.

    “The Critical Access for Veterans Care Act is a necessary step toward ensuring rural veterans can receive timely, high-quality care close to home,” said Alan Morgan, CEO of National Rural Health Association. “By removing unnecessary prior authorization requirements and aligning VA reimbursement with Medicare’s cost-based rates for rural providers, this legislation supports rural providers and expands access to essential health services for veterans who need them most. We commend Senator Cramer and Senator Sheehy for championing this bill and urge Congress to advance this life-improving policy without delay.”

    “America’s Warrior Partnership strongly supports the Critical Access for Veterans Care Act and thanks Senator Cramer for its introduction,” said Jim Lorraine, President of America’s Warrior Partnership. “This essential legislation expands veterans’ access to local and timely healthcare, removing prior authorization hurdles for care delivered at critical access hospitals and affiliated rural clinics under the Veterans Community Care Program. America’s Warrior Partnership recognizes this bill as a meaningful step toward enhancing quality of life, continuity of care, health outcomes, and local community-based care for our nation’s veterans.”

    “I am very encouraged by the effort and direction being taken by Senator Cramer and others as they work to improve healthcare access opportunities for the nearly 3.0 million veterans residing in the rural areas of the United States,” said Alan O’Neil, CEO, Unity Medical Center in Grafton, N.D. “This bill will not only help the veterans, but will also improve utilization of the 1300 plus Critical Access Hospitals in the rural areas of the United States. Thank you for your support of our Rural Veterans and Rural Hospitals!”

    “Thank you Senator Cramer for your commitment to improving healthcare access for rural veterans,” said Marcus Lewis, CEO, First Care Health Center in Park River N.D. “Like many, I was hopeful when the Veteran’s Choice Program was introduced in 2013. Unfortunately, that hope gave way to frustration as I encountered delays, denials, and a confusing credentialing process that has too often left me—and countless other veterans—without timely or effective care. That’s why this bill is so critical. It acknowledges the unique challenges rural veterans face and offers a real pathway to timely, local, and reliable care.”

    Click here for bill text.

    MIL OSI USA News

  • MIL-OSI USA: PLASKETT RELEASES STATEMENT ON HOUSE PASSAGE OF RECONCILIATION BILL

    Source: United States House of Representatives – Congresswoman Stacey E. Plaskett (USVI)

    PLASKETT RELEASES STATEMENT ON HOUSE PASSAGE OF RECONCILIATION BILL

    Washington, D.C., May 22, 2025

    For Immediate Release                                          Contact: Tionee Scotland 

    May 22, 2025                                                           202-808-6129 

    PRESS RELEASE 

    PLASKETT RELEASES STATEMENT ON HOUSE PASSAGE OF RECONCILIATION BILL 

    Washington, DC – Early this morning, the House of Representatives passed the Republican reconciliation package (H.R. 1) with a vote of 215-214-1. Every Democrat in the House voted no.  

    The 2 Republicans who voted against the bill, Congressman Thomas Massie (KY-4) and Congressman Warren Davidson (OH-8), opposed the legislation as they wanted to see further federal funding cuts. They held out hoping for full dismantlement.  

    This bill includes the largest cuts to healthcare in American history. This loss of funding – nearly one trillion dollars – will eliminate healthcare coverage for at least 13.7 million Americans and make it harder for people to access vital medical services. In Medicaid alone, funding is cut by more than $730 billion, which will leave 7.6 million people uninsured. The Virgin Islands presently has 21,000 Medicaid enrollees presently, many of whom will be impacted through loss of service or disenrollment.  

    Medicare funding was cut by more than $500 billion and vital programs, including the Social Services Block Grant – which provides more than $4.2 million to the Virgin Islands – are eliminated until 2034. With 20,000 Medicare enrollees in the U.S. Virgin Islands, services are sure to be impacted.  Federal funding for the Virgin Islands’ Meals on Wheels Program and the Low-Income Home Energy Assistance Program (LIHEAP) has also been eliminated until 2034. 

    Republicans’ reconciliation bill will make everyday life more expensive for Americans and removes programs which gave opportunities and support for a better life. It is estimated that more than 4 million students will see a reduction, or elimination, of their Pell Grants. The requirements for ‘full-time’ students are increased from 12 to 15 credits, which will decrease the maximum award for any student taking 12 credits by $1,479. In addition, students that are enrolled less than half-time will no longer receive Pell aid.  

    This bill harms efforts to lower energy costs, increase clean energy manufacturing and jobs, and eliminate economic assistance for communities on the frontline of the climate crisis. Unobligated funds will be rescinded from Inflation Reduction Act programs including Environmental Justice Block Grants, State-Based Home Energy Efficiency Contractor Training Grants, and the Greenhouse Gas Reduction Fund.  One of these programs already in place in the Virgin Islands is the Solar for All Program, which provided $62.5 million for homes and businesses. 

    Republicans voted to cut $35 billion in funding for the Supplemental Nutrition Assistance Program (SNAP), which includes children, working families, seniors, veterans and people with disabilities. This includes a $1 million cut to the Summer Electronic Benefits Transfer (EBT program), which gives food assistance to children when they cannot rely on school lunches. This will impact the more than 15,000 Virgin Islands residents who rely upon SNAP for access to nutritious food for their wellbeing. The $35 billion cut includes a $1 billion decrease in funding for the Nutrition Assistance Program in Puerto Rico despite tremendous efforts and advocacy from their lobbyists, led by Republican Governor, Jenniffer Gonzalez-Colon and Congressman Pablo Hernandez. 

    The reconciliation bill does not provide the increased rum cover over rate. Rum cover over is the rebate of federal excise taxes on distilled spirits produced in or imported into the rest of the United States from the Virgin Islands and Puerto Rico. Despite Congresswoman Plaskett’s success in securing a Republican lead for the rum cover over legislation (H.R. 1378), Congressman Ron Estes (KS-4), and the support of 24 of her colleagues – 16 Republicans and 8 Democrats – the extension for Puerto Rico and the Virgin Islands was not included in the bill.  

    It is unfortunate that at the last minute while trying to find additional funds, the Republicans attempted to remove duty drawback – an export-promotion program that American alcohol and tobacco companies rely upon for a refund of duties paid at the time of import when similar goods are exported.  That program saves the alcohol industry alone approximately $30 billion.  Because of that concern, the full push of the rum industry was not present for rum cover over as the industry prioritized its efforts on safeguarding duty drawback which represented direct dollars to their industry. It’s also important to recognize that many discretionary provisions that made it into the bill were included to secure the necessary votes to advance the legislation – which ultimately was not the case with the provision for an increased rum cover over rate.  

    During the 18-hour markup in the Ways and Means Committee for the tax provisions of the reconciliation bill, Congresswoman Plaskett offered an amendment to increase the rate of the rum cover offer, to publicly demonstrate the bipartisan support for this provision. Both Democrats and Republicans emphasize the importance of the increased rum cover over rate.  The Ways and Means Chairman, Jason Smith, publicly stated that he would work to advance this, and the Committee is expected to craft a bipartisan tax bill this summer. “I will continue to work with my colleagues, Democrats and Republicans, to secure the increased rum cover over rate of $13.25, both retroactively and with an extension, for the Virgin Islands and Puerto Rico.” 

    While Congresswoman Plaskett cannot support the bill in its entirety, Plaskett’s legislation, the Restore Economic Vitality and Investment in the Virgin Islands (REVIVE VI) Act is included in the Republicans’ bill – one of only four Democrat Ways and Means provisions. REVIVE VI fixes an unintentional consequence of the Global Intangible Low Tax Income (GILTI) regime which, as a practical matter, inadvertently overrode the U.S. Virgin Islands’ economic development program that was previously authorized by Congress. This provision restores the Virgin Islands’ right to have an economic development program which will benefit our economy and workforce.  

    The U.S. Senate is anticipated to draft an entirely different bill that proposes fewer cuts to critical programs. Then, the Senate bill and House bill will likely be negotiated on a version that can be passed in both chambers of Congress and then be signed by the President.  

    Congresswoman Plaskett shared, “This bill is a wholesale betrayal of the working class and the future of America. The nonpartisan Congressional Budget Office found that the bottom 10%–working- and middle-class Americans will be 4% poorer in household wealth under this bill, with most of the benefits going to the top 10% of Americans. Not only does the bill make the largest healthcare cut in our nation’s history, it also makes the largest cuts to food assistance, energy projects and Pell grants. All to give additional money to the wealthiest Americans – an average of $278,000 per year, $762 per day, to the top 0.1% of Americans. This bill is cruel, shameful, unfair and unamerican.”  

    MIL OSI USA News

  • MIL-OSI USA: Cassidy Delivers Floor Speech Calling for Affordable Flood Insurance Ahead of Hurricane Season

    US Senate News:

    Source: United States Senator for Louisiana Bill Cassidy

    [embedded content]

    WASHINGTON – U.S. Senator Bill Cassidy, M.D. (R-LA) delivered a speech on the U.S. Senate floor highlighting the need for the National Flood Insurance Program (NFIP) to remain affordable and the danger that Risk Rating 2.0 poses to low- and middle-income families’ ability to be enrolled in the program.
    “With Risk Rating 2.0 driving up costs for low- and middle-income families, about a fifth of those enrolled in NFIP will be forced to drop their coverage altogether over the next ten years,” said Dr. Cassidy.
    “If we really want to put Americans first, we start by making NFIP affordable now and keeping it affordable 10, 15 years from now,” continued Dr. Cassidy. 
    Background
    In April, Cassidy delivered a speech on the Senate floor calling for the continuation of FEMA’s Building Resilient Infrastructure and Communities (BRIC) grant program, which helps fund pre-disaster mitigation and flood prevention projects in Louisiana and nationwide.
    In March, Cassidy delivered a floor speech calling for a long-term extension of the National Flood Insurance Program (NFIP) and introduced legislation to extend the program through December 31, 2026. Cassidy also met with the Jefferson Business Council where he discussed his efforts to keep flood insurance affordable and extend NFIP long-term.
    In February, Cassidy introduced the Flood Insurance Affordability Tax Credit Act to give low- and middle-income households enrolled in the National Flood Insurance Program (NFIP) a 33% refundable tax credit to combat rising flood insurance premiums. Cassidy released a report last fall outlining the current state of the NFIP and the issues that have led to skyrocketing premiums for millions of homeowners.
    Last year, the U.S. Senate Banking Committee held a hearing on NFIP at the request of Cassidy. The hearing highlighted the urgent need for Congress to act and featured a Louisiana witness. Cassidy also participated in a roundtable hosted by GNO, Inc. and the Coalition for Sustainable Flood Insurance to hear from community leaders and advocates on the issue.
    Cassidy traveled St. Bernard Parish in 2023 to talk with residents about their flood insurance premiums, recording the second episode of his Bill on the Hill series.
    Cassidy’s remarks as prepared for delivery are below:
    Mr. President,
    Folks in Louisiana are preparing for hurricane season.
    I just had a meeting with the Calcasieu Parish Police Jury who sent me some photos of a few Lake Charles homes.
    To reduce flood risk and their monthly flood insurance premiums, people are paying to have their houses raised.
    That costs anywhere between 25,000 and 40,000 dollars.
    If your foundation needs repairs, you’re looking at up to 25,000 dollars in additional costs.
    A full replacement of the foundation can cost 100,000 dollars.
    It seems like a worthwhile investment.
    Lifting your home lowers your risk of flooding and insurance premiums go down, saving you money in the long run.
    But unfortunately, that is not the experience people in Louisiana are having under Risk Rating 2.0—FEMA’s current risk assessment program.
    Here are just two instances in Calcasieu Parish in which homeowners invested in flood mitigation to lower their flood insurance premiums.
    These people did everything right!
    They did what they were supposed to!
    These people are not going to flood. And yet, after Risk Rating 2.0, this is what happened to their premiums!
    You’d feel like you got ripped off if that happened to you.
    One pre-mitigation premium nearly doubled.
    This is bad news for all Americans, particularly lower-income families.
    When the number of families getting a bill like this goes up, the number of people able to afford flood insurance at all goes down.
    With Risk Rating 2.0 driving up costs for low- and middle-income families, about a fifth of those enrolled in NFIP will be forced to drop their coverage altogether over the next ten years.
    The pool of policyholders shrinking at this rate will force the program into what’s called an actuarial death spiral.
    Risk Rating 2.0 is like termites eating away at the foundation of a house.
    If we do nothing, it’s going to collapse.
    I introduced legislation back in February to give low- and middle-income households enrolled in NFIP a 33% reduction in their NFIP premium in the form of a refundable tax credit that would go directly to their premium payment at the time it’s due. 
    Hurricane season will not wait on those who need flood insurance to get it. Americans in my state and across the country need relief now.
    If we really want to put Americans first, we start by making NFIP affordable now and keeping it affordable 10, 15 years from now.
    The issue is a pocketbook issue for many families, but when you flood like so many in Louisiana have, it becomes a personal issue—an issue of loss.
    Since the start of 2025, at least 21 Americans across 8 states have been killed as a result of flooding and storms hitting their communities.
    Millions have been without power or evacuated from their homes.
    When you hear “flood insurance” you might think, “Well I don’t live in a coastal state like Louisiana, for example. My house won’t get destroyed by a flood. I don’t need flood insurance!”
    I wish that were true.
    States hit the hardest aren’t the only states hit.
    This is not a one-state problem.
    This is a one-nation problem.
    All fifty states have NFIP policyholders.
    And there are many who don’t have flood insurance who, unfortunately, wish they did.
    When more rain comes—and it will—all Americans need stability.
    The National Flood Insurance Program can provide that certainty.
    Maybe you won’t see flooding as extreme as losing your house—I hope you don’t.
    But I’m not just talking about the worst-case scenario.
    Let’s say you get a couple of inches of water in your living room.
    You’ve got to pull up your carpets and replace the drywall. You’re going to wish you had flood insurance.
    And you probably would if it were affordable.
    The National Flood Insurance Program, often the only flood insurance option for many communities, is broken.
    Right now, the very program designed to help Americans is failing them.
    And when millions of Americans are impacted, Washington must act.
    Let me be very clear: NFIP is a federal program—meaning we can change and improve it. We just need to have the will.
    I urge my colleagues to join me in working with President Trump’s Administration to end Risk Rating 2.0.
    In 2019, my office worked with the Trump administration to successfully delay Risk Rating 2.0 because of the lack of transparency on how FEMA was calculating rates.
    President Trump understood then and understands now that Americans are tired of being ripped off.
    When rivers swell, Americans should not have to fear the cost of rebuilding without insurance.
    Let’s make NFIP affordable for the homeowner, accountable to the taxpayer, and sustainable for future generations.
    Severe weather is relentless. We must be too.
    With that, I yield.

    MIL OSI USA News

  • MIL-OSI USA: Crapo Joins Resolution Reaffirming U.S.-Canada Partnership

    US Senate News:

    Source: United States Senator for Idaho Mike Crapo
    Washington, D.C.–The United States and Canada share three oceans and the world’s longest border.  About 400,000 people and more than $2.5 billion worth of goods and services move across the U.S.-Canada border each day.  The relationship between the two countries fosters one of the most significant bilateral trading relationships in the world.
    U.S. Senator Mike Crapo (R-Idaho) joined U.S. Senators Kevin Cramer (R-North Dakota) and Angus King (I-Maine) in introducing a resolution to recognize the U.S.-Canada partnership and its shared interests in economics, energy, critical minerals and national security.
    “Canada is America’s top trading partner and one of our strongest allies,” said Crapo.  “The almost $1 trillion exchanged in trade between the U.S. and Canada in 2023 powers 8 million U.S. jobs and 2.4 million Canadian workers.  Our two nations are inextricably linked economically and strategically–sharing deep historical and cultural ties.  This resolution reiterates our firm commitment to bolster the long-term, mutual relationship with our Canadian neighbors far into the future.”
    Idaho exports more products to Canada than any other country.  According to the Idaho Department of Commerce, in 2023, Idaho exported $1.5 billion in goods to Canada—more than a quarter of which were food and agricultural products.  Additionally, Idaho imported $360 million worth of Canadian food and agriculture goods.  Idaho’s largest import/export industries include:
    Agriculture and food;
    Wood, paper, pulp and printing;
    Electrical equipment and machinery;
    Mineral products; and
    Chemicals, cosmetics and fertilizers.
    Cramer and King serve as co-chairmen of the bipartisan, bicameral American Canadian Economy and Security (ACES) Caucus, and Senator Crapo is a member.
    “Representing a Northern border state, I recognize the importance of the unique partnership between the United States and Canada,” said Cramer.  “Not only are our neighbors to the north crucial economic and national security partners, but they are literally our closest ally.  This resolution celebrates our closeness and is a testament to the enduring strength, friendship and importance of the U.S.-Canada alliance across the country and the globe.”
    “The United States and Canada have always been closely tied; we share our economies, cultures, military interests and more.  In fact, in Maine, even our next door neighbor lives right across the border,” said King.  “I continue to be proud of the work we have achieved under the American-Canadian Economy and Security (ACES) Caucus alongside my Senate Co-Chair Kevin Cramer, but know that the current situation presents many unfortunate challenges.  While I am excited to reintroduce this resolution to reaffirm our two nations’ commitment to one another, we must acknowledge the close ties between our countries to resolve and mitigate any potential disruptions to our intertwined interests.  As close trade partners and allies, I look forward to strengthening this close alliance to tackle these shared challenges and seize new opportunities.”  
    Among other provisions, the resolution recognizes the relationship between the United States and Canada is critical to promoting peace, expanding global economic opportunity and being prepared to respond to unforeseen events.  It also reaffirms the bilateral and international alliance between the two nations, which allows both countries to face common threats together and uphold common values, including democracy, human rights and the rule of law. 
    Additionally, the resolution emphasizes the shared defense and security commitments between the two nations, including the modernization of the North American Aerospace Defense Command (NORAD), joint border security initiatives, and cooperation in combating transnational threats such as illegal migration and fentanyl trafficking.
    The resolution is also co-sponsored by U.S. Senators Marsha Blackburn (R-Tennessee), Susan Collins (R-Maine), Maggie Hassan (D-New Hampshire), Amy Klobuchar (D-Minnesota), Lisa Murkowski (R-Alaska), Mike Rounds (R-South Dakota) and Peter Welch (D-Vermont).  A similar resolution was introduced in the House by U.S. Representative Mark Amodei (R-Nevada).
    Click here for bill text.

    MIL OSI USA News

  • MIL-OSI United Kingdom: Thousands of young people set to benefit from new support into work and training

    Source: United Kingdom – Executive Government & Departments

    Press release

    Thousands of young people set to benefit from new support into work and training

    Thousands of young people across England will receive targeted support into work, under a new £45 million scheme launched by the Work and Pensions Secretary.

    • Landmark programme to support thousands of 18 to 21 year olds into education, work and training officially launches in Liverpool.
    • Marks major win in the Government’s Youth Guarantee to ensure all young people have the chance to upskill, earn or learn.
    • Comes as part of the Government’s Plan for Change to drive growth and break down barriers to opportunity by helping people into work.

    Thousands of young people across England will receive targeted support into work, under a new £45 million scheme launched by the Work and Pensions Secretary.

    The Youth Guarantee trailblazers will match young people to job or training opportunities and will provide all-important foundations for the national roll-out of the programme, ensuring all 18 to 21 year olds in England can access help to find work – breaking down barriers to opportunity as part of the Plan for Change.

    The trailblazers will play a key role in helping the government understand which local structures are most effective and in identifying the organisations best placed to deliver targeted support.

    They will also develop innovative ways to identify, engage and sustain contact with young people most at risk of falling out of education, employment or training.

    It comes as new ONS figures published today (Friday 23 May 2025) will reveal the number of young people not in education, employment or training, with the current figure standing at 987,000.

    Liverpool City Region is one of eight areas across England set to receive a £5 million investment into work with 18 to 21 year olds most at risk of falling out of education or employment.

    In its first year, the City Region aims to support tens of thousands of young people. Within this, the trailblazer will focus on vulnerable young people often facing the most complex barriers, including care leavers, nearly 40% of whom are not in employment, education or training.

    They will receive a range of support including work and training opportunities, free travel passes, mental health support and money advice.

    Work and Pensions Secretary Liz Kendall said:

    Young people are our future – and yet for too long they have been denied access to the opportunities and support they need.

    At Liverpool FC, the home of champions, we are championing young people to get the skills, education and jobs they require to achieve their ambitions.

    We are investing £45 million – including almost £5m here in Liverpool – to deliver our Youth Guarantee, so every young person across England gets the chance to earn or learn, as we boost living standards and get Britain working under the Plan for Change.

    Further to this, Liverpool will work with over 600 employers to develop tailored roles and placements, and through the region’s BeMore portal which brings career and skills advice straight into your pocket. A panel made up of young people to ensure they are at the heart of decision making will also be set up.

    The city has already had success in tailoring support to meet the needs of young people, including:

    • Ethan who has cerebral palsy and had just finished university with no work experience. With the help of Liverpool, including support with housing, mental health and navigating familial challenges, Ethan gained part-time experience as a youth support worker and has since been offered a job with the Civil Service.
    • Luke who felt he was in a black hole searching for jobs but not being successful. He has since received an apprenticeship levy from Liverpool which meant he was able to do his Level 4 Marketing apprenticeship and now works in Product & Operations Market at Liverpool Football Club.
    • Ellie who decided to explore new career paths following mental health challenges. Through engaging with Liverpool, she was provided with a laptop in order to join the Movement to Work programme and has since been offered a job at the DWP.

    Mayor of the Liverpool City Region Steve Rotheram said:

    When I travel across our region, I feel fortunate to meet some of the best and brightest young people in the country. But for too long, too many of them have been held back from getting on in life, not because of a lack of talent, but by a lack of opportunity – and I have made it my mission to put that right.

    It’s because of the investments we’ve made, through initiatives like my Young Person’s Guarantee and BeMore, that we’ve been able to connect tens of thousands of people in our area with jobs and training opportunities. Now, backed by the government’s Plan for Change, we can go even further, giving even more young people the best possible start in life.

    Education Secretary Bridget Phillipson said:

    Through our Plan for Change we are breaking down barriers to opportunity so every young person can get on in life, regardless of their background.

    The Youth Guarantee is a genuine game changer for young people in England. I’m delighted Liverpool is leading the way as one of our trailblazers – ensuring every young person has support to develop essential skills for work and life at the critical early stage of their careers.

    Every young person deserves the best life chances — and we won’t stop until everyone has a level playing field to succeed.

    Liz Kendall and Mayor Steve Rotheram unveiled the landmark programme at a careers fair in partnership with key Youth Guarantee partner, the Premier League.

    Hosted at the iconic Anfield Stadium, three days before the champions lift the Premier League Trophy, around one thousand 18 to 21 year olds attended with opportunities on offer from around 40 employers – including Liverpool FC Foundation, Everton in the Community, John Lewis, and Google.

    Clare Sumner, Chief Policy and Social Impact Officer at the Premier League, said:

    The Premier League and our clubs continue to support young people across the country with a range of positive opportunities that help them build self-confidence and fulfil their potential.

    The jobs fair at Anfield is the latest initiative supporting those who need it most in clubs’ local communities, and we will continue to work with Government to deliver similar events as part of the Youth Guarantee.

    The programme comes alongside an unprecedented £1 billion investment to support disabled people and those with long-term health conditions back into work, as well as major reforms to Jobcentres to better align their services with the needs of employers.

    Two youth trailblazers have already launched in London with more beginning to start work in the West of England, Tees Valley, Cambridgeshire and Peterborough, West Midlands, and East Midlands

    As well as this, nine inactivity trailblazers backed by £125 million have been rolled out across England and Wales. These programmes will help areas with the highest levels of economic inactivity by connecting work, health and skills offers.

    Richard Rigby, Head of UK Government Affairs at The King’s Trust said:

    With almost one million young people across the UK waking up today with no job, no training, and no education to go to, the prominence being given to developing a Youth Guarantee is not only very welcome, but absolutely vital.

    Young people’s futures are worth fighting for. By getting behind them, we can all help to make the UK a healthier, wealthier, more positive, more cohesive place. The King’s Trust looks forward to working with local areas, including Liverpool City Region, to understand how we can help to deliver the Guarantee.

    Laura-Jane Rawlings MBE, Founder and CEO of Youth Employment UK, said:

    It is great to see the Youth Guarantee launch in Liverpool. The focus on providing young people with the tools that they need to transition into education, employment or training is critical.

    Young people, particularly those who are care experienced or care leavers face multiple barriers to accessing employment so I am pleased to see those barriers be recognised and tailored support put in place.

    Young people when in good quality employment not only add huge value to an employer but they are also much more like to feel fulfilled and happier.

    Susannah Hardyman MBE, CEO of Impetus, said:

    The Youth Guarantee Trailblazers are a vital step toward ensuring every young person – regardless of background – has the opportunity to thrive in employment. Targeted interventions are critical to reaching the young people furthest from the labour market.

    Our research shows that factors like socioeconomic disadvantage, lower educational qualifications, and geographic location can combine to make a young person nearly three times more likely to be not in education, employment, or training than average – but this is not inevitable.

    By connecting these young people with the right support and resources, we can spur economic growth, deliver on the Government’s opportunity mission, and transform lives.

    Sarah Yong, Director of Policy and External Affairs at the Youth Futures Foundation said:

    The launch of the eight trailblazers represents a positive first step in Government’s plans for its Youth Guarantee; we will await the learnings from these place-based approaches from this pilot year with interest.

    The voices and experiences of young people alongside high-quality evidence of what works will be crucial for the Government in further developing the Guarantee for national rollout.

    This comes as the government has, for the first time, linked immigration policy to our plan to deliver a higher skilled economy that backs British workers.

    Alongside boosting the National Living Wage, we are also creating more secure jobs through the Employment Rights Bill and overhauling Jobcentres as we Get Britain Working as part of the Plan for Change.

    Additional information:

    • The latest ONS young people not in education, employment or training statistics will be published on Friday 23 May at 9.30 here: Young people not in education, employment or training (NEET), UK: May 2025 – Office for National Statistics
    • The eight youth trailblazers will be in: Liverpool, West Midlands, Tees Valley, East Midlands, West of England, and Cambridgeshire & Peterborough and two in London
    • Employment support measures are fully transferred to Northern Ireland. Jobcentre Plus services is reserved in both Scotland and Wales, but the Scottish Government and the Welsh Government also deliver other forms of employment support. The funding announced in the Pathways to Work Green Paper is UK wide, the share of funding for devolved Governments will be calculated in the usual way.
    • The Youth Guarantee is an England only initiative, and trailblazer locations will reflect this since Skills, Education and Employment support are devolved in Scotland, Wales and Northern Ireland.
    • We will work closely with the devolved governments to share experiences and lessons learned.
    • Additionally, Wales have developed their own Young Persons Guarantee and Scotland also had one until recently (now a comprehensive offer for all age-groups)
    • The UK Government also plans to establish new governance arrangements with the Scottish and Welsh Governments to help frame discussions around the reform of Jobcentres and agree how best to work in partnership on shared employment ambition across devolved and reserved provision.
    • Movement to Work is a voluntary collaboration of leading employers in the UK, including the Department for Work and Pensions to help support young people into employment by providing vocational employment and work placement opportunities.

    Updates to this page

    Published 23 May 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: Statement from Governor Josh Stein on FEMA Ending Direct Assistance

    Source: US State of North Carolina

    Headline: Statement from Governor Josh Stein on FEMA Ending Direct Assistance

    Statement from Governor Josh Stein on FEMA Ending Direct Assistance
    lsaito

    Raleigh, NC

    Governor Josh Stein today released the following statement regarding FEMA’s notification that it will no longer provide direct federal assistance for the US Army Corps of Engineers:

    “I want to thank FEMA and the Army Corps of Engineers for its hard work to clear debris all over western North Carolina. I am pleased that they will stay in North Carolina to finish existing missions, and my team looks forward to working closely with them to get those jobs done quickly. Together, we have removed more than 12 million cubic yards of debris from our roads and waterways. Unfortunately, there remains vast amounts of work yet to be done. Our state’s debris removal program is prepared to contract and execute the remaining debris removal and will work diligently and with urgency to complete those jobs as soon as possible.

    “We continue to ask President Trump to respond favorably to the state’s appeal for 100% FEMA reimbursement. This is a critical part of the state’s successful recovery. If not, North Carolina taxpayers will be responsible for a portion of the cost to remove the remaining debris, which could total hundreds of millions of dollars.” 

    May 22, 2025

    MIL OSI USA News