Category: Justice

  • MIL-OSI USA: California Department of Justice Releases Report on Officer-Involved Shooting of Trent Millsap

    Source: US State of California

    OAKLAND – California Attorney General Rob Bonta, pursuant to Assembly Bill 1506 (AB 1506), today released a report on Trent Millsap’s death from an officer-involved shooting in Anaheim, California, which occurred on July 15, 2022. The incident involved members of the Westminster Police Department assigned to the multi-agency West County SWAT. The report is part of the California Department of Justice’s (DOJ) ongoing efforts to provide transparency and accountability in law enforcement practices. The report provides a detailed analysis of the incident and outlines DOJ’s findings. After a thorough investigation, DOJ concluded that criminal charges were not appropriate in this case.  
     
    “The California Department of Justice remains steadfast in our commitment to working together with all law enforcement partners to ensure an unbiased, transparent, and accountable legal system for every resident of California,” said Attorney General Bonta. “AB 1506 is a critical transparency and accountability tool, and our hope is that this report provides understanding that advances towards a safer California for all. We appreciate the law enforcement personnel who put their lives on the line carrying out this high-risk operation. At the same time, we recognize that loss of life is always a tragedy, and we express our condolences to Mr. Millsap’s family.”      

    On July 15, 2022, West County SWAT was tasked with serving a search and arrest warrant on Mr. Millsap for his suspected involvement in a murder committed two days earlier. West County SWAT went to an apartment unit in Anaheim and tried to get Mr. Millsap to surrender. During the course of the operation, a canine was released into the apartment to gain Mr. Millsap’s compliance. At one point, Millsap abruptly lifted his baggy sweatshirt with his left hand and reached toward his waistband with his right hand in a manner consistent with reaching for a concealed weapon. Two Westminster Police Department detectives immediately shot Mr. Millsap in response. Medical care was provided on scene, and Mr. Millsap was taken to the hospital, where he passed away from the gunshot wounds.

    AB 1506 requires DOJ to investigate all incidents of officer-involved shootings resulting in the death of an unarmed civilian in the state. Based upon a thorough investigation and legal analysis of the facts and circumstances of this incident, DOJ concluded that there is insufficient evidence to prove, beyond a reasonable doubt, that the officers’ use of lethal force was not justified by an actual and reasonable belief of imminent risk of death or serious bodily injury to themselves or others. Therefore, there is insufficient evidence to support a criminal prosecution of the officers and no further action will be taken in this case. 
     
    As part of its investigation, DOJ has identified four policy recommendations related to this incident. The first recommendation is that Westminster Police Department and West County SWAT revise their policies to require preparation and distribution of a written operational plan that follows National Tactical Officers Association guidelines whenever practical. In this incident, West County SWAT carried out the high-risk operation without a formal written operational plan due to perceived time constraints.

    The second recommendation is that Westminster Police Department and West County SWAT revise its de-escalation policy to clarify that personnel must use de-escalation techniques when feasible, and that Westminster Police Department and West County SWAT consider further training and instruction regarding the use of de-escalation techniques. The Westminster Police Department’s current de-escalation policy suggests that the use of de-escalation techniques is optional, whereas, current law (Government Code section 7286) mandates de-escalation when feasible.

    The third recommendation is that Cypress Police Department, whose canine was deployed, and West County SWAT further evaluate whether deployment of the canine was appropriate under the circumstances presented. DOJ also recommends that Cypress Police Department and West County SWAT provide further training and instruction regarding the appropriate circumstances for the deployment of a canine to apprehend a suspect.

    The fourth recommendation is that Westminster Police Department clarify its uniform and attire policies to address if and when shorts and casual footwear are permitted during an operation.

    A copy of the report can be found here.

    MIL OSI USA News

  • MIL-OSI USA: Preventing Bridge Strikes with Enforcement Campaign

    Source: US State of New York

    overnor Kathy Hochul today announced a coordinated public awareness and enforcement campaign to prevent bridge strikes by commercial vehicles and large trucks across New York State. This special enforcement and education campaign, “Check Your Height, Know It’s Right,” which originated at the New York State Department of Transportation, is now being adopted by 16 states and Washington, D.C. from Tuesday, July 22 to Saturday, July 26. In 2024 there were 350 bridge strikes in New York State, usually involving commercial and large truck operators failing to recognize their vehicle’s height or warning signs and resulting in collisions with bridges and overpasses. Operators using consumer-grade GPS can also be guided onto routes with low bridges, and those driving rented box trucks — such as moving trucks — can strike bridges if their drivers are not aware of the vehicle’s height.

    “Bridge strikes are 100 percent preventable, but it takes a concerted effort combining the forces of education, enforcement and public awareness to prevent them from occurring, and that’s just what our nationally-adopted ‘Check Your Height, Know it’s Right’ campaign aims to do,” Governor Hochul said. “Traffic safety is an essential element of public safety, and preventing bridge strikes fundamentally increases the safety of the traveling public. Drivers also play an important role in this so I encourage everyone to ‘Check Your Height, Know it’s Right’ before hitting the road, and if you are driving a truck, make sure that you’re utilizing commercial GPS.”

    As part of this week’s campaign, State Troopers will focus active patrols in areas across the state where there have been documented bridge strikes by large commercial vehicles. These bridge strikes are most likely to occur on roadways with low railroad bridges, and on New York State Parkways in the Lower Hudson Valley, New York City and Long Island. Commercial trucks are banned from driving on the parkways, which sometimes have bridge overpasses with a vertical clearance less than many standard commercial vehicles. Bridge strikes cause extensive damage to the vehicle and sometimes to the bridge, and can lead to secondary collisions due to unexpected traffic congestion and subsequent emergency repairs.

    In November 2023, the State Department of Transportation launched a social media and video campaign titled “Check Your Height, Know it’s Right” in an effort to educate the traveling public about the importance of preventing bridge strikes. Since then, the Department has worked with the Eastern Transportation Coalition to get other states to adopt the campaign. To date, the following states have adopted the campaign that originated in New York and will be utilizing it to get the word out to the traveling public:

    • Alabama
    • Connecticut
    • Washington, D.C.
    • Delaware
    • Georgia
    • Kentucky
    • Maine
    • Maryland
    • Massachusetts
    • New Jersey
    • North Carolina
    • Pennsylvania
    • Rhode Island
    • Tennessee
    • Vermont
    • Virginia
    • West Virginia

    New York State Department of Transportation Commissioner Marie Therese Dominguez said, “Working with our transportation and law enforcement partners, the Department of Transportation is doing everything it possibly can to prevent bridge strikes across the state, but at the end of the day, commercial vehicle operators also have an important role to play. Before getting on the road, we want everyone to ‘Check Your Height, Know it’s Right.’ I couldn’t be prouder that a campaign that originated here in New York is being adopted all across the eastern seaboard as many other states are dealing with the same issues related to bridge strikes. Working together, we will continue to raise awareness of this important public safety issue and prevent further bridge strikes from occurring.”

    New York State Police Superintendent Steven G. James said, “Preventing bridge strikes isn’t just about protecting infrastructure, it’s about protecting lives. When a large vehicle hits a bridge, the consequences can be severe, resulting in damaged roadways, traffic delays, and serious injuries. That’s why our Troopers proudly join this multi-state effort focused on enforcement and education. We’re committed to holding operators accountable and reminding everyone behind the wheel of a commercial or rental truck to “Check Your Height, Know it’s Right’ before they drive.”

    New York State Department of Motor Vehicles Commissioner and Chair of the Governor’s Traffic Safety Committee Mark J.F. Schroeder said, “I commend the efforts of the Department of Transportation and the Bridge Strike Task Force to tackle this preventable problem. DMV is also taking action through regulatory amendments that will assign eight points to the driving record of a driver who exceeds height limitations and strikes a bridge. No matter whether you are driving a tractor trailer or a pickup truck, you should be aware of what you may encounter on the road. If you know you will be going through an area with potentially lower height bridges, you need to check to make sure your vehicle will fit and if it will not, find an alternate route. ”

    New York State Thruway Authority Executive Director Frank G. Hoare said, “The ‘Know Your Height’ campaign is a critical tool in preventing bridge strikes, not just on the New York State Thruway, but on every roadway across our state. Each bridge strike is more than an inconvenience; it poses a serious risk to drivers and the local communities we connect. We proudly stand with Governor Hochul, our partners in state government, and key stakeholders to raise awareness and take meaningful action to ensure safer roads for all New Yorkers.”

    New York State Bridge Authority Executive Director Dr. Minosca Alcantara said, “The Bridge Authority is proud to stand with its colleagues across the state and along the eastern seaboard in raising awareness of this critical issue. Bridge strikes are entirely preventable. Just as commercial vehicle operators must know the weight and width of their load and plan their routes accordingly, it is equally essential that they are aware of their vehicle’s height. With a little foresight and responsible trip planning, we can protect human lives and preserve vital infrastructure.”

    Trucking Association of New York Vice President of Government Affairs Zach Miller said, “The trucking industry prioritizes the safe and efficient movement of freight. Unfortunately, in New York, we too often see drivers — unfamiliar with our roads, renting larger equipment, or both — striking low-clearance bridges. Such occurrences threaten the efficiency of our already delicate and diverse freight network. We applaud the ‘Check Your Height, Know It’s Right’ campaign — regional education and awareness, and partnership with state agencies will have a meaningful impact in protecting infrastructure, educating drivers, and making our roads safer for everyone.”

    MIL OSI USA News

  • MIL-OSI USA: Rep. Huffman Introduces Bill to Protect Small Farmers and Producers

    Source: United States House of Representatives – Congressman Jared Huffman Representing the 2nd District of California

    July 22, 2025

    Washington, D.C. – Today, Representative Jared Huffman (CA-02) re-introduced legislation that would enshrine the right for small cannabis producers to ship and sell their products directly to consumers. This bill, the Small and Homestead Independent Producers (SHIP) Act, would enable small farmers and producers to operate their businesses within and across state lines. The legislation is specifically targeted to support the smallest family farmers and help them sustain their businesses under a larger federal legalization law.

    “Larger, commercialized cannabis operators are infiltrating the market and squeezing out our local farmers in the process,” said Rep. Jared Huffman. “So when the antiquated federal prohibition on cannabis finally gets repealed, we need to have substantial legislation ready to help these small businesses survive. My legislation would ensure that folks can ship their products straight to consumers, which would both help expand small businesses and ensure farmers stay afloat. When full legalization is guaranteed, we must commit to not leaving our smallest family-farmers behind.”

    “Nearly 15 years into the experiment of state-level cannabis legalization, the cracks in the system are clear: small and craft producers are being pushed to the margins, safe access for consumers and patients is shrinking, and the industry is consolidating into the hands of a few,” said Ross Gordon, Co-Founder at National Craft Cannabis Coalition and Policy Analyst at Origins Council. “Without direct-to-consumer shipping, federal cannabis legalization risks reinforcing these failures instead of correcting them. The SHIP Act is a make-or-break policy for the future of small cannabis businesses in California and across the country.”

     “Our state’s DTC framework helps support nearly 1,700 cultivators in a state of 1.2 million people,” said Mark Barnett, Co-Founder at National Craft Cannabis Coalition and Policy Director at Maine Craft Cannabis Association. “Without these opportunities, quality in the legal market will suffer, and consumers will look elsewhere. The SHIP Act would guarantee that small farmers have a pathway to participate in one of the country’s most promising new economic frontiers.”

    “The regulation of cannabis has, unfortunately, not equated to adequate access,” said Frederika McClary Easley, President of the Minority Cannabis Business Association (MCBA). “Many patients and consumers navigate plant deserts that have been created due to municipal opt-outs and zoning restrictions. The SHIP Act will help to address this while prioritizing access for small craft producers, which in turn positively impacts their success and sustainability. MCBA is proud to support this piece of federal legislation that recognizes the importance of craft growing and small businesses as the bedrock of this burgeoning industry.”

    This bill is co-sponsored by Representative Val Hoyle.

    It is endorsed by National Craft Cannabis Coalition, Minority Cannabis Business Association, National Cannabis Industry Association, Drug Policy Alliance, Parabola Center, Marijuana Justice, Veterans Cannabis Coalition, Origins Council, Washington Sun & Craft Growers Association, Vermont Growers Association, Maine Craft Cannabis Association, Humboldt County Growers Alliance, Mendocino Cannabis Alliance, Trinity County Agricultural Alliance, and the Central California Cannabis Club.

    Full text of this legislation can be found here.

    ###



    Previous Article

    MIL OSI USA News

  • MIL-OSI USA: Chairman Aguilar: Republicans spent the last six months putting more money in billionaires’ pockets and cutting health care

    Source: US House of Representatives – Democratic Caucus

    The following text contains opinion that is not, or not necessarily, that of MIL-OSI – July 22, 2025

    WASHINGTON, D.C. — Today, House Democratic Caucus Chair Pete Aguilar, Vice Chair Ted Lieu and DCCC Chair Suzan DelBene held a press conference on Trump and Republicans’ One Big Ugly Law raising health care costs while sinking Republican chances of holding on to the House. 

    CHAIRMAN AGUILAR: Good morning. Grateful to be joined today by DCCC Chair, Suzan DelBene and the Vice Chair, Ted Lieu. At the DCCC today, we had a productive Caucus meeting across the street. Donald Trump promised to lower costs on day one. We’re six months into this Trump Administration, and prices are rising because of reckless tariffs, inflation is still too high and now health care costs are going to skyrocket. For the 24 million Americans who rely on the Affordable Care Act, health insurance will go up by as much as 75 percent. And these price hikes don’t even include the tax credits that Republicans are going to let expire, so even more Americans are going to see higher costs and could lose their health care coverage. Democrats have been warning about the dangers of the Republican cuts to Medicaid leading to higher prices for everyone. The American people were told that Donald Trump and Republicans were going to turn the economy around and prioritize families. But that couldn’t be further from the truth: they’ve spent the last six months putting more money in billionaires’ pockets and cutting health care. But they did make private jets tax deductible, so there’s that. They’re even shielding Jeffrey Epstein and his associates—including the President of the United States—from accountability, despite promising for years to release the files that implicate those involved. At a time when family budgets are stretched thin, Republicans are only prioritizing the needs of billionaires. It’s not just bad policy that will make the economy worse, it’s a slap in the face to working people who voted to bring down costs. Now, I’ll introduce Vice Chair Ted Lieu.

    VICE CHAIR LIEU: Thank you, Chairman Aguilar. This morning, I went on this interesting website called HouseRepublicanPriceHike.com. And if you go on that website, you can see the increases in grocery prices starting from the beginning of this year. Beef prices, for example, are at an all-time high. Donald Trump promised that he was going to lower inflation on day one. He lied. Inflation has continuously increased. The most recent report has inflation increasing above expectations to 2.7 percent. Core CPI increased even more to 2.9 percent. And what are Congressional Republicans doing? Nothing. In fact, it’s even worse than that. They are actually ending this week early because they’re afraid to cast votes on the Jeffrey Epstein issue.

    The Rules Committee is not meeting because they’re afraid to cast votes to release the Epstein files. So you’ve got this Epstein issue affecting Congressional operations and making sure that the Congressional Republicans don’t work on trying to lower costs. So this is an epic cover-up, right? This is a cover-up of epic proportions, where you’ve got the majority party literally having us leave Congress early, and not having the Rules Committee meet, because they don’t want to deal with releasing the Epstein files. We should release the Epstein files. It is what Donald Trump campaigned on. It’s what Attorney General Pam Bondi talked about this February when she said that Epstein’s client list was, ‘sitting on my desk right now.’ Why don’t we have that client list? And these are the questions the American people keep asking, and the story is not going to go away. Because at its core, this is an issue about underage women who were sexually abused and assaulted. Attorney General Pam Bondi should not be protecting Jeffrey Epstein’s legacy, nor his clients, nor should Congressional Republicans be doing the same. With that, it is my honor to introduce our amazing field general for the DCCC, Congresswoman Suzan DelBene. She’s done a fantastic job, and she’s going to discuss what we talked about this morning. 

    DCCC CHAIR DELBENE: Thanks Vice Chair Lieu and Chairman Aguilar. Good morning, everyone. This morning, in Caucus, we presented how we’re holding House Republicans accountable for their disastrous agenda and our path to retake the majority. We hear over and over and over again from people back home that the top issue for them is affordability and lowering costs—lowering costs for everyday goods. By all accounts, Republicans have failed miserably in the time that they’ve had the trifecta. Prices are still rising, whether it’s housing, health insurance premiums or everyday things like food and groceries. Republicans broke their promise to lower costs. Their Big Ugly Law is just another broken promise. It rips coverage away from millions of people and will raise health care bills for everyone, regardless of what kind of insurance that they have, and it takes food off the table from hungry families and children. It guts funding for rural hospitals and increases ER wait times. Energy bills will go up for families across the country. Republicans did all of this to pay for tax breaks for the wealthiest few. Their agenda is cruel, it’s extreme and an absolute disaster, and the American people agree. 

    In poll after poll, we see that the Republicans’ bill is massively unpopular. The more people learn about it, the more they oppose it. The one lie Republicans keep telling themselves is that voters won’t punish them in the midterms because the American people won’t feel the pain of the cuts until after the election. Aside from the fact that this is exactly the kind of insincere political gamesmanship the public hates, it’s also not true. In a matter of months, millions of people will see their health insurance costs go up by an average of 75 percent—rural hospitals are already announcing they’ll close down and cut services. So no matter how many legislative games that Republicans try to play, there’s no hiding from the facts—the Big Ugly Law will have devastating consequences that will absolutely be felt by working families. 

    Republicans are poised to lose the majority next year, and they know it. You can tell by the way they’re behaving. They avoid in-person town halls because they’re afraid to face the public when they have to talk about their Big Ugly Bill. House Republicans are headed for the exits. We already have three vulnerable Republicans decide to retire or not run for re-election because they know they’re not going to take the majority. And we know there are more with one foot out the door, who may soon announce that they won’t seek re-election. So in these last six months, Republicans have broken promise after promise, feeding into a larger narrative that reminds everyone that they don’t work for the American people—they work for the elite, the powerful and the billionaires. It’s a theme we hear on the ground day after day, and if House Republicans would take the time to listen to their constituents back home, instead of only working and waiting for Donald Trump to tell them what to do, they would know. But instead, they blindly follow his orders that are hurting our economy and hitting the American families in their pocketbooks, and that’s why they’ll lose the majority.

    House Democrats will hold every single vulnerable Republican accountable for their betrayal against their communities when they supported the Big Ugly Bill. We have the better message, we have stronger candidates and public sentiment is on our side. And next year, we’ll have the gavels. Thank you and I’ll turn it back to the Chairman.

    Video of the full press conference and Q&A can be viewed here.


    ###

    MIL OSI USA News

  • MIL-OSI NGOs: Scotland: First Minister must reject Trump’s anti-rights agenda

    Source: Amnesty International –

    Amnesty says meeting with President Trump is a ‘major test’ of the Scottish Government’s commitment to global justice and equality

    Call to protect protest rights amid concerns over heavy-handed policing of Pro-Palestinian demonstrations

    ‘In a moment of global crisis for these values, the question is whether the First Minister will rise to the occasion or remain silent in the face of authoritarian practices’ – Liz Thomson

    In a critical moment for global human rights, Amnesty International has called on First Minister John Swinney to stand firm against authoritarian practices and defend the principles of universal human rights and international justice during his meeting with President Donald Trump.

    Amnesty has warned that the meeting will be a serious test of the Scottish Government’s stated commitment to human rights – both at home and internationally.

    In a letter sent to the First Minister, Amnesty wrote:

    ‘This meeting will be a major test of the Scottish Government’s commitment to global justice, one which [you must] meet with a resolve to defend universal human rights and to stand against the authoritarian practices of the Trump Administration.’

    Amnesty noted that the Trump Administration’s sweeping attacks on civic space, refugee and migrant rights, the rule of law, women’s rights, racial justice, and LGBTI protections have fuelled human rights crises and emboldened anti-rights leaders and movements and said the First Minister must be prepared to challenge those practices when the two meet. The letter continued with:

    ‘You have said in recent days that it is in Scotland’s interest for you meet with the President. It is in Scotland’s interest that political leaders reject the President’s anti-rights agenda and stand firm against authoritarian practices.’

    Amnesty also called on the Scottish Government to ensure Police Scotland and other forces involved in policing the President’s visit uphold the right to peaceful protest– amid growing concern over recent reports of heavy-handed responses to pro-Palestinian demonstrations.

    Liz Thomson, Amnesty International’s Scotland Programme Director said:

    “President Trump’s administration has fully embraced authoritarian tactics while furthering an anti-rights agenda – no UK leader should be rolling out the red carpet to welcome him.

    “If the Scottish Government wants to be seen as a principled global actor, warm words on human rights must translate into action – especially in high-stakes moments like this.

    “The First Minister’s priority during  his visit should be to directly challenge the serious human rights violations the Trump administration is responsible for, and to ensure that those who wish  o peacefully protest are fully able to without fear of heavy-handed policing.

    “This meeting will be a major test of the First Minister’s commitment to human rights and international justice. In a moment of global crisis for these values, the question is whether he will rise to the occasion or remain silent in the face of authoritarian practices.”

    MIL OSI NGO

  • MIL-OSI NGOs: EU/China: Joint NGO letter ahead of EU-China Summit

    Source: Amnesty International –

    Dear President Costa,

    Dear President von der Leyen,

    We write to urge you to prioritize human rights in the forthcoming European Union (EU)-China Summit to be held in China on July 24-25. At the recent G7 meeting, European Commission President Ursula von der Leyen spoke of a “new China shock,” and urged that G7 members respond with greater cooperation, resilience and alternative approaches. We believe similar ambition should apply to the approach of the EU and its member states regarding the deepening human rights crisis in China, and that new initiatives be publicly articulated at the forthcoming Summit to build on and go beyond existing commitments set out in the March 2019 EU-China Strategic Outlook.

    We appreciate the EU’s longtime support to independent civil society and human rights defenders across China, and welcome public remarks, such as strong statements at the United Nations (UN) Human Rights Council, identifying particular cases of concern. We thank the EU for condemning the arbitrary detention of human rights legal activists Xu Yan and Yu Wensheng, who were detained en route to meeting with EU officials. In September 2022, then-High Representative and Vice President Josep Borrell helpfully echoed the UN Office of the High Commissioner for Human Rights’ (OHCHR) concern that Chinese government policies in the Uyghur region “may constitute international crimes, in particular crimes against humanity.” We acknowledge the recent – the fortieth – round of the EU-China human rights dialogue.

    Yet these EU and member states’ initiatives have not deterred Chinese authorities’ wholesale assault on human rights since President Xi Jinping assumed power in 2012. He and other officials are confident in their impunity for widespread arbitrary detention, forced assimilation, forced labour and torture in China; and transnational repression, including in Europe. Chinese authorities not only refuse to comply with the vast majority of their international human rights obligations, they also seek to rewrite global human rights norms and weaken key international institutions.

    We urge the EU and its member states to confront this human rights crisis—which increasingly affects not only people across China but also people worldwide—with the same determination to identify and commit to alternative approaches as it is now setting out on security and trade issues.

    In that spirit, our organizations urge you to use the Summit to ensure justice for victims and survivors of Beijing’s violations and abuses by publicly:

    1. Condemning the Chinese government’s crimes against humanity, and the impunity that sustains them, echoing the findings and recommendations of UN bodies, including the August 2022 OHCHR report on Xinjiang, the 2023 reviews of China by the Committee for the Elimination of All Forms of Discrimination Against Women (CEDAW) and the Committee on Economic, Social and Cultural Rights, the 2024 Universal Periodic Review (UPR), and UN Special Procedures. The EU should reiterate that crimes against humanity are subject to universal jurisdiction, and that those responsible can and should be held criminally responsible and face justice, including in EU member states. The 18 June 2025 announcement by Argentina’s highest criminal court to hear a case brought by Uyghurs alleging Chinese authorities have committed genocide and crimes against humanity should lend confidence and momentum to similar initiatives across EU member states, and to a push for accountability through UN mechanisms. Doing so is consistent with High Representative Kaja Kallas’ March 2025 remarks broadly supporting international law and the need for perpetrators to be “brought to justice.”
    2. Calling for the immediate and unconditional releases of human rights defenders who have been detained for their work, naming individuals explicitly, including EU citizen Gui Minhai, Sakharov Prize laureate Ilham Tohti and others identified in the most recent EU statement at the UN Human Rights Council: Gulshan Abbas, Anya Sengdra, Ekpar Asat, Chadrel Rinpoche, Rahile Dawut, Ding Jiaxi, Ding Yuande, Dong Yuyu, Drugdra, Gao Zhen, Gao Zhisheng, Go Sherab Gyatso, Golog Palden, He Fangmei, Huang Qi, Huang Xueqin, Hushtar Isa, Yalkun Isa, Ji Xiaolong, Li Yanhe, Lobsang Gephel, Lobsang, Khedrub, Lu Siwei, Peng Lifa, Qin Yongmin, Ruan Xiaohuan, Semkyi Dolma, Tashi Dorje, Tashpolat Tiyip, Wang Bingzhang, Pastor Wang Yi, Kamile Wayit, Xie Yang, Xu Na, Xu Zhiyong, Yang Hengjun, Yang Maodong, Yu Wensheng, Pastor Zhang Chunlei and Zhang Zhan.
    3. Emphasizing the commitments made at the G7 to ending transnational repression (TNR), including abuses undertaken by the Chinese government, both across EU member states and elsewhere. Those commitments can be demonstrated through investigations and prosecutions, while also supporting and protecting individuals and communities who may be or have already been targeted by TNR. These human rights abuses include intimidation, surveillance, threats or acts of physical violence, threats against family members and digital repression, in particular sexual harassment or degrading language targeting women.
    4. Reiterating that the EU and its member states are ready to use all tools at their disposal to hold Chinese government officials accountable for human rights violations, including the right to freedom of religion or belief, such as in the context of the selection of the next Dalai Lama.
    5. Stressing that the EU expects the Chinese government to comply with its freely-undertaken human rights obligations under international law, and calling for the urgent repeal of laws and criminal provisions incompatible with those obligations, including but not limited to the Hong Kong National Security Law, the Hong Kong Safeguarding National Security Ordinance, “picking quarrels and provoking trouble,” “subversion” and “inciting subversion of state power,” and the criminal procedure of “residential surveillance at a designated location,” in line with recommendations by UN human rights bodies.

    After 50 years of EU-China relations, the EU should take stock of deepening Chinese government repression inside and outside the country, and express solidarity with people across China who seek to exercise, uphold and defend human rights. The EU’s recent decision to cancel an economic and trade dialogue with the Chinese government over serious differences suggests a willingness to pressure Beijing in new and different ways. Grave and worsening human rights violations by Chinese authorities should motivate new strategies. Without those, people across China—and in Europe—are increasingly at risk.

    Amnesty International

    Asian Forum for Human Rights and Development (FORUM-ASIA) Chinese Human Rights Defenders

    Christian Solidarity Worldwide

    CIVICUS: World Alliance for Citizen Participation Front Line Defenders

    Hong Kong Watch Human Rights in China Human Rights Watch

    Human Rights Without Frontiers International Campaign for Tibet

    International Federation for Human Rights (FIDH), in the framework of the Observatory for the Protection of Human Rights Defenders

    International Partnership for Human Rights (IPHR) International Service for Human Rights

    The Rights Practice

    World Organisation Against Torture (OMCT), in the framework of the Observatory for the Protection of Human Rights Defenders

    World Uyghur Congress

    MIL OSI NGO

  • MIL-OSI NGOs: 30 years after Srebrenica, the promise of “never again” rings hollow   

    Source: Amnesty International

    Dinushka Disanayake attends the anniversary commemorations of the the Srebrenica genocide in Bosnia

    A week ago, I stood in silence by a graveside and watched as seven coffins were lowered into the soil. But this was no normal funeral. Those being laid to rest had been killed three decades earlier alongside more than 8,300 men and boys, over a period of several days in July 1995. This was Srebrenica and I was there with thousands of others, beneath a hot sun, looking out across a lush valley filled with white marble headstones that fanned out as far as the eye could see.

    The seven people being buried were only being laid to rest now because – like many of those brutally executed in the campaign of genocide against Bosnian Muslims in Srebrenica – their bodies had been moved multiple times, using heavy machinery, sometimes across hundreds of kilometres and across multiple mass burial sites. All of this a concerted effort to erase the evidence of these massacres and impede future investigations into these crimes. As a result, the remains of nearly a thousand people presumed killed during those days are still missing.

    Before coming to the graveside, the mourners and dignitaries had gathered in one of the cavernous halls of a former battery factory. In 1995, it had been the temporary headquarters of a lightly armed Dutch contingent of a UN peacekeeping force assigned to safeguard more than 20,000 civilians seeking refuge from the approaching Army of Republika Srpska. In this same hall, children, women and men had sheltered hoping for protection. But the international community failed to meet its most basic obligations under international humanitarian law, and they were fatally let down.

    The so-called UN safe area was overrun. Men and teenage boys were separated from their families and executed. Women and children were forcibly transferred from Srebrenica, and many women and girls were raped and killed.

    One of the Mothers of Srebrenica, spoke of the suffering of Palestinians in Gaza and reminded the audience that silence is never neutral

    In this same hall, besuited representatives of governments from around the world now gathered. As promises of “never again” fell from the mouths of these state officials whose governments persist in transferring arms to Israel which has not relented in its genocide against Palestinians in the Gaza Strip, I felt the hypocrisy hang heavy from the rafters.

    In her speech, Munira Subašić, one of the Mothers of Srebrenica, spoke of the suffering of Palestinians in Gaza and reminded the audience that grief knows no boundaries and that silence is never neutral.

    In Bosnia and Herzegovina, and neighbouring Serbia, denial and historical revisionism persist despite the International Criminal Tribunal for the Former Yugoslavia finding that the crimes committed in Srebrenica were part of a well-planned and coordinated operation and amounted to a genocide. The masterminds behind the operation, Bosnian Serb leaders Ratko Mladić and Radovan Karadžić, were found guilty of genocide by the same tribunal. Yet justice, truth and reparations remain elusive for many survivors and victims’ families. Far too many perpetrators of this and other crimes have never brought to justice.

    Whilst in Srebrenica, I was reminded of other mass graves in Chemmani, near Jaffna, Sri Lanka – and how, earlier this year, routine building excavations had unearthed 19 human skeletons. Yet another mass grave resulting from the bloody assault on Tamil populations in the north of Sri Lanka likely during the civil war. Some of the skeletons were of babies. Another belonged to a child buried under the clay with their UNICEF-issued bag, a toy, a bangle, and a slipper. It was a haunting reminder that no one – no matter how young – was spared from violence and mass killings in a state that has avoided accountability for these crimes since 2009, despite multiple UN resolutions calling for it. Tamil mothers of the disappeared continue to demand justice, truth and accountability as hope fades and time passes.

    In Potočari, the commemoration ceremony prompted tears of pain and rage, and a quiet grief. The wounds as fresh as they were 30 years ago.

    If world leaders really mean ‘never again’, they must bring a swift end to Israel’s genocide against Palestinians in the Gaza Strip

    For the Mothers of Srebrenica, justice does not lie in the empty words of world leaders that converge in Potočari once a year to shake hands and take photos in front of a sea of graves. “Never again” means stopping genocide before it happens. Justice means knowing where their loved ones are buried, finding out the truth about what happened to them, and seeing the perpetrators held to account in a recognized court of law. It is about reparations, healing and seeing a world in which crimes against humanity, war crimes and genocide are prevented and ended.

    If world leaders really mean “never again”, they must bring a swift end to Israel’s genocide against Palestinians in the Gaza Strip. They must ensure the perpetrators of international crimes, wherever they occur, are held to account, and they must demonstrate genuine commitment towards justice and human rights for all. The white marble headstones in Potočari should remain on their conscience.

    Dinushka Disanayake is Amnesty’s Deputy Director for Europe and attended the anniversary ceremony in Srebrenica.

     

    MIL OSI NGO

  • MIL-OSI Africa: Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) ministerial committee endorses membership of Sahel countries as non-Economic Community of West African States (ECOWAS) members

    Source: APO

    The 2nd Extraordinary Meeting of the GIABA Ministerial Committee (GMC) concluded in Accra, Ghana on the 19th of July, 2025, with a decision to allow the three Sahel countries that have withdrawn from the Economic Community of West African States (ECOWAS) to join the Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) as Non-ECOWAS Members.

    The Ministers present at the high-level meeting unanimously considered the importance of dealing with insecurity in the region in a collaborative manner. The decision will be transmitted to the ECOWAS Council of Ministers and the Authority of Heads of State and Government for consideration.

    During the session,Nigeria’s Minister of Justice handed over the chairmanship of the GMC to the Minister of Finance of Sierra Leone, who assumes the role as the new Chair of the Committee.

    The meeting was officially declared open by the Vice President of the Republic of Ghana, Professor Jane Naana Opoku-Agyemang.

    Distributed by APO Group on behalf of Economic Community of West African States (ECOWAS).

    Media files

    .

    MIL OSI Africa

  • MIL-OSI USA: Understanding Thai Names: Law and Culture

    Source: US Global Legal Monitor

    The following is a guest post by foreign law intern, Yuri Rattanaboonsen. Yuri works with Foreign Law Specialist, Sayuri Umeda, in the Global Legal Research Directorate in the Law Library of Congress. 

    In Thailand, surnames are generally unique to family lines, and more often than not, we rarely meet a stranger who has the same surname if he or she is not a distant relative.

    Before the enactment of the Thai Nationality Act in 1913, which is also known as the Surname Act, surnames were uncommon for the general public. This law required all Thai citizens and permanent residents to register a family surname for the first time. As a result, many families had to create a new surname. One important feature of the law was that each family’s surname had to be unique. (Thai Nationality Act sec.12(5).) If a name was already registered, the family would have to register a different one.

    Currently, the Person’s Name Act B.E. 2505 (1962), as amended by the Person’s Name Act (No. 3), B.E. 2548 (2005), governs the rules for personal names in Thailand. It still states “[t]he surname shall not repeat … a registered surname.” (sec. 8(3).)

    Thai Surnames

    Originally, Thai surnames often reflected a person’s ancestry, place of origin, or occupation, and usually consisted of two to three syllables. They can relate to information about religion, social class, or even links to royalty or heritage.

    Thai immigrant families’ surnames are often long. For example, because many Chinese families’ surnames were the same and were already in use, many immigrant families had to modify or expand them to register unique surnames under the 1913 law. Some families chose Thai words that sounded similar to their original Chinese surname. Others created longer surnames by adding extra syllables or translating the original name’s meaning into Thai. As a result, many names and surnames today are long and complex.

    The Person’s Name Act limits the length of a surname. It states “[t]he surname shall … not be comprised of more than 10 alphabetical letters….” (Id. sec. 8(5).) This only applies to the Thai alphabet. Therefore, a romanized Thai surname often has more than 10 Roman characters.

    It is rare, but some overlap of Thai surnames exists because technology was not advanced enough to detect all registered surnames nationwide at the time the registry was created. The Department of Provincial Administration’s system, which can check the population registration going back to 1984, came online to link data nationwide in 1993. It was then discovered that many people are not relatives but have the same last names.

    Name Change

    When a surname is changed to a new one, it often becomes quite long. In Thailand, people can change their names for any reason. (Id. sec. 17) Many individuals choose to change their names for personal, cultural, or spiritual reasons.

    Some people change names based on astrological beliefs, selecting letters that are thought to be compatible with the individual’s birthday. In these naming calculations, each letter and vowel has a specific meaning. People try to make the total value of their name and surname lucky or strong. To do this, they often need to use more letters, which results in longer names and surnames. However, many people who do not hold these beliefs still have short surnames.

    Permission to Use Another Person’s Surname

    A Thai person who is not a spouse or relative of another person and who has a different surname can have the person’s surname upon permission of the person who registered the surname. The act states that the permission “can be made by filing an application to the local Registrar in the area where he or she has his or her name on the household registry …The permission … shall be valid only upon the local Registrar’s issuance of a letter showing the permission to use such surname to” a particular person. (Id. sec. 11.)

    Romanization of surnames

    The same Thai names might be spelled differently in Roman characters on passports or national identity cards due to the different practices in different registrars’ offices. In addition, the registrar’s consideration and opinion affected the registration process. (Id. sec. 18.)

    In July 2023, Bangkok Metropolitan sent a letter to the Department of Provincial Administration to discuss the practice of using Roman characters for first and last names on national identity cards. The Department of Provincial Administration responded by stating that a person’s name must be romanized through transliteration based on phonetic principles, as written in the Prime Minister’s Office Announcement of English transliteration criteria on August 26, 1989, and the Royal Institute criteria for transliteration of Thai into Roman letters by phonetic means on January 11, 1999. The Department of Provincial Administration also forwarded this response to all provincial governors to study and practice in the same way. No other specific regulation was made apart from what the Person’s Name Act B.E. 2505 (1962) provides.

    Nickname of Thai People

    Although it is not officially registered or recognized under Thai law, nicknames are widely used in everyday life. Most Thai individuals receive a nickname at birth. Thai people do not usually change their nicknames; some do, but fewer compared to changes in their first names and surnames.  Thais’ nicknames have changed over time. In the past, most nicknames were in Thai, which were short and simple. usually named after animals, fruits, colors, and nature, such as Khao (Rice), Kai (Chicken), Fah (Sky/Blue), and Ploy (Gemstone). Nowadays, the number of syllables increases, and the use of foreign languages in nicknames has increased. Nicknames can be random English words, such as Donut, Golf, or New Year, brand names, such as Porsche, Benz, or Pepsi, or even be an alphabet letter, such as A, B, S, or X.

    A person may go by their nickname socially and professionally for their entire life, but only their official given name will appear in legal contracts, government records, and academic certifications. In daily life, individuals are more commonly known by their nickname than their full legal name.

    Further Reading

    If you would like to know how other countries regulate names, do not forget to check out our other blog posts on that topic, among them, Jenny’s post on naming laws in Germany, Kelly’s post on banning baby names in New Zealand, Laney’s on how many times you can change a name in Taiwan, or Elin’s post on Icelandic name laws.


    Subscribe to In Custodia Legis – it’s free! – to receive interesting posts drawn from the Law Library of Congress’s vast collections and our staff’s expertise in U.S., foreign, and international law.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich, Bennet, Hickenlooper Introduce Legislation to Expand and Improve Access to Clean Water for Tribal Families

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Half of households on Native American reservations lack access to reliable water sources, clean drinking water, or adequate sanitation

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.), along with U.S. Senators Michael Bennet (D-Colo.) and John Hickenlooper (D-Colo.), introduced the Tribal Access to Clean Water Act to dramatically expand access to clean water for Tribal families by investing in water infrastructure. This bill would increase funding through the Indian Health Service, the U.S. Department of Agriculture (USDA), and the Bureau of Reclamation to support water infrastructure projects in Tribal communities and help provide clean water to Native American households that currently lack access.

    “Nearly half of Native American households lack access to clean and reliable water supplies. That is completely unacceptable,” said Heinrich. “By addressing a significant backlog of infrastructure projects and removing barriers to federal programs that provide technical and financial assistance to Tribes, this legislation is an important step toward delivering clean drinking water to all families in Indian Country.”

    “Too many Tribal communities in Colorado and across the country cannot access clean, safe water,” said Bennet. “This legislation builds on our efforts to improve access for Tribes in the Bipartisan Infrastructure Law. It fulfills the federal government’s promise to provide these communities with the clean water they deserve.”

    “Clean drinking water is a basic necessity. Yet, so many of our Tribal communities have been left without the infrastructure. It’s unacceptable,” said Hickenlooper. “Let’s cut red tape and invest in modern resources to finally deliver safe, accessible water to every Tribe.”

    Lack of access to clean drinking water is a significant barrier for many Native American communities. According to data from the U.S. Department of Health and Human Services (HHS), Native American households are 19 times more likely than white households to lack indoor plumbing.

    The Tribal Access to Clean Water Act will:

    • Authorize the USDA to make grants and loans for technical and financial assistance, as well as for construction;
    • Increase funding authorizations for USDA’s Rural Development Community Facilities Grant and Loan Program by $100 million per year for five years, provide $30 million per year specifically for technical assistance, and ensure that Native communities are treated equitably and appropriately when considered for grants and loans;
    • Increase funding authorizations for existing programs of the Indian Health Service for water and sanitation facilities construction over a five-year period, including for community facilities ($2.5 billion), technical assistance ($150 million), and operation and maintenance assistance ($500 million); and
    • Authorize $90 million over five years for the Bureau of Reclamation’s existing Native American Affairs Technical Assistance Program.

    “Water is a sacred resource given to us to protect. It is of the utmost importance that Tribes have access to clean water not only for personal consumption and economic development but also for cultural purposes. Many tribes in the Southwest rely on access to clean water to carry on our culture and traditions. We thank U.S. Senators Martin Heinrich and Michael Bennet for reintroducing the Tribal Access to Clean Water Act,” said Myron Armijo, Santa Ana Pueblo Governor.

    “It is far past time to ensure that Native people have the same level of basic water service most Americans take for granted,” said Manuel Heart, Chairman of the Ute Mountain Ute Tribe. “This bill’s recognition of the need for technical support and operation and maintenance assistance for Tribal water supply facilities is not only essential to realizing the benefit of investment in water infrastructure, but also a critical step toward increasing Tribal independence and governance capabilities.”

    “Some of the starkest examples of the public health impacts from not having clean, running water in the home are right in our backyards,” said Anne Castle, co-founder of the initiative on Universal Access to Clean Water for Tribal Communities. “Higher incidence of respiratory disease, gastrointestinal infections, diabetes, and cancer are all linked to ‘water poverty’ – the lack of access to secure and healthy household water – which is particularly acute for Native American households. With targeted resources and Federal agency coordination, we have the ability to solve this longstanding inequity in Indian country.”

    “For far too long, many indigenous Americans – American Indians, Alaska Natives, and Native Hawaiians – have gone without access to a clean and safe drinking water supply,” said John Echohawk, Executive Director and Co-Founder of the Native American Rights Fund and member of the Pawnee Nation. “These are not isolated or regional deficiencies, but rather a nationwide disparity in access to a basic ingredient of life. This bill will help to address gaps in current support for Tribal drinking water access and help to fulfill the Federal government’s treaty and trust responsibility to Native American Tribes.”

    “Every American is entitled to access to clean drinking water,” said Ken Norton, Chairman of the National Tribal Water Council. “But this undeniable truth simply does not hold for far too many Tribal households. It is well past time to bring the necessary resources to bear that will allow all Tribal families to enjoy the same basic services most Americans take for granted.”

    “Water is a basic human right and this bill fulfills the government’s trust obligation to Tribes and Indigenous communities to ensure all Native populations have access to clean drinking water,” said Garrit Voggesser, Senior Director of Tribal Partnerships and Policy, National Wildlife Federation. “For far too long more than half of the country’s Indigenous peoples haven’t had access to clean drinking water. Water must be accessible to not only support public health, but also meet historical, cultural, ecological, and rights-based needs.”

    Heinrich initially introduced this legislation with Bennet in 2021. He also successfully fought to include funding to improve Tribal access to clean water in the Infrastructure Law. The law included $3.5 billion for the Indian Health Service Sanitation Facilities Construction program to address needs for tribal sanitation facilities and services, $1 billion for the Bureau of Reclamation to support legacy rural water supply projects, which will benefit Tribes, and increased funding for the Environmental Protection Agency’s Clean Water Act and Safe Drinking Water Act State Revolving Funds.

    In addition to Heinrich, Bennet, and Hickenlooper, this bill is co-sponsored by U.S. Senators Bernie Sanders (I-Vt.), Ron Wyden (D-Ore.), Elizabeth Warren (D-Mass.), and Alex Padilla (D-Calif.).

    The text of the bill is available here.

    A summary of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: July 22nd, 2025 Heinrich Announces Committee Passage of Over $205 Million for New Mexico’s Military Installations and Significant Wins for Veterans

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Investments Heinrich championed include childcare assistance, improved telehealth & rural health services, & expanded homelessness prevention programs

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.) announced the bipartisan Senate Appropriations Committee passage of the Fiscal Year 2026 (FY26) Military Construction, Veterans Affairs, and Related Agencies Appropriations Bill. With Committee passage of this bill, Heinrich secured support for over $205 million for New Mexico’s military installations and significant wins for New Mexico’s veterans, including over $32 million in Congressionally Directed Spending for five local projects.

    “For our nation’s veterans and military families, this bill keeps our promise: that when they come home, they will receive the recognition, education, housing, and health care that they have earned through their service. It also strengthens New Mexico’s role as a leader in national security and bolsters our local economies,” said Heinrich, a member of the Senate Appropriations Committee. “This bill will also ensure that our service members are best equipped with state-of-the-art technology and resources to defend freedom at home and abroad. As a member of the Senate Appropriations Committee, I am committed to doing everything I can to support the heroic Americans who sacrifice so much to keep us safe.”

    Heinrich is a member of the Senate Appropriations Committee and the former Chair of the Appropriations Subcommittee on Military Construction, Veterans Affairs, and Related Agencies.

    New Mexico Military Construction

    Heinrich secured Committee support of investments in seven New Mexico projects.

    Heinrich successfully included funds for the following projects:

    • $90,000,000 for the construction of a 192-bed dormitory for airmen at Cannon Air Force Base.
    • $83,000,000 for the construction of a new Space Rapid Capabilities Office Headquarters on Kirtland Air Force Base.
    • $18,250,000 to construct a new Explosive Operations Building at Kirtland Air Force Base, which is essential for the safe and efficient handling, inspection, and storage of munitions in alignment with Air Force operational requirements.
    • $3,200,000 to construct a Child Development Center (CDC) on Kirtland Air Force Base that supports the growing childcare needs of Kirtland Air Force Base personnel.

    Heinrich also secured language addressing the ongoing energy infrastructure needs at White Sands Missile Range, ensuring troop readiness and training is prioritized.

    Heinrich and U.S. Senator Ben Ray Luján (D-N.M.) also successfully included funding for the following projects:

    • $8,100,000 to renovate and construct a training facility for Security Forces at Cannon Air Force Base. This will help support the continued growth of this Security Force unit.
    • $2,000,000 to restore and improve antiterrorism technology at the Wyoming Gateat Kirtland Air Force Base.
    • $700,000 to finish the design of a new High Speed Test Track at Holloman Air Force Base.

    Support for Veterans

    Heinrich secured Committee support for key veteran programs.

    Suicide Prevention

    Heinrich successfully secured $18,866,195,000 for mental health treatment, including $697,760,000 for suicide prevention outreach. Heinrich also secured language encouraging the VA to use predictive modeling and analytics for veteran suicide prevention in the Recovery Engagement and Coordination for Health-Veterans Enhanced Treatment (REACH VET) program. This innovative solution would identify veterans with evidence-based risk factors for suicidal ideation in order to get help to veterans before a potential mental health crisis.

    In 2020, Heinrich voted in favor of the Commander John Scott Hannon Veterans Mental Health Care Improvement Act of 2019 (P.L. 116-171), which supported and authorized the REACH VET program.

    Rural Health

    Heinrich successfully secured $342,455,000 for the VA’s Office of Rural Health and its Rural Health Initiative to continue supporting veterans with services like transportation to appointments for highly rural veterans, utilization of innovative transportation service technologies, and outreach to highly rural veterans.

    An estimated 2.7 million rural and highly rural veterans are enrolled in the Veterans Health Administration (VHA). Many rural veterans enrolled in the VA health care system are at an advanced age, with approximately 54 percent aged 65 or older. With the aging veteran population growing increasingly medically complex and more likely to be diagnosed with chronic conditions like diabetes, obesity, high blood pressure, and heart disease, each requiring more frequent, ongoing, and costly care, these funds would help close the gap and get highly rural veterans the care they need.

    Telehealth Services

    Heinrich successfully secured $6,356,035,000 to sustain and increase telehealth capacity and expand the reach of VA medical providers to veterans in highly rural areas through the use of in-home telehealth and remote patient monitoring services. The bill also supports the Veterans Health Administration’s (VHA) rulemaking to eliminate copays for all virtual medical appointments of any type and especially for primary and preventative care appointments.

    Preventing Veteran Homelessness

    Heinrich successfully secured $3,459,121,000 to prevent veteran homelessness, including $702,821,000 to bolster the Supportive Services for Veteran Families Program, which would meet the needs of veterans including help with the rising costs of household goods; $670,900,000 for case management and administration of Housing and Urban Development – Veterans Affairs Supportive Housing vouchers; $323,100,000 for the Grant and Per Diem Program, which would support transitional housing and assist veterans in achieving housing stability; and, $139,843,000 for Veterans Justice Outreach and Legal Services for Veterans grants to award community-based organizations with funds to assist veterans with legal issues like accessing benefits, navigating family law, and securing safe and stable housing.

    Veterans Affairs Service Purchasing (VASP) Program

    Heinrich successfully secured report language directing the VA to explain why it abruptly ended the Veterans Affairs Service Purchasing program, a critical program that would keep veterans who were unable to pay their mortgage in their homes. At least 130 New Mexico veterans could be impacted by this administration’s shortsighted decision to end the Veterans Affairs Service Purchasing program without loss mitigation policies.

    Access to Medications for Substance Use Disorder

    Heinrich successfully secured $709,573,000 for the Opioid Prevention and Treatment programs at the VA, including $454,086,000 for treatment programs and $254,487,000 to continue implementation of the Jason Simcakoski Memorial and Promise Act. Heinrich voted in favor of this bill’s authorizing legislation, the Comprehensive Addiction and Recovery Act, in 2016 (P.L. 114-198).

    Veteran Family Resource Program

    Heinrich successfully secured language to require a status report on the Veteran Family Resource Program rollout, including authorities and funding needed to ensure a successful, continued rollout that reduces rates of child abuse and neglect among families with veterans. Services would include interventions like case management assistance to address evidence-based risk factors like housing and food insecurity in veteran families.

    Childcare Assistance

    Heinrich successfully secured an additional $3,000,000 in the VA’s overall budget to support the expansion of childcare centers at VA medical facilities through a pilot program. Heinrich originally voted in favor of the Caregivers and Veterans Omnibus Health Services Act of 2010 (P.L. 111-163) while Congressman for New Mexico’s 1stCongressional district. This bill led to the VA’s initial childcare pilot program to assess feasibility and advisability of providing childcare services to veterans receiving mental health and intensive health care services.

    As a result, in 2016, the VA launched a childcare pilot program to implement three (3) free, drop-in childcare service centers across three locations in the states of New York and Washington. Survey data indicate nearly a third of veterans are interested in childcare services and approximately 10 percent have had to cancel or reschedule medical appointments due to lack of childcare.

    Grants for Construction of State Extended Care Facilities

    Heinrich successfully secured $171,000,000 in construction funds for state extended care facilities. In New Mexico, there is only one VA long-term care facility, despite demand for additional capacity and facilities. These facilities are particularly important to ensure aging and disabled veterans receive the appropriate level of care.

    Medical and Prosthetics Research

    Heinrich successfully secured $943,000,000 to fund medical, rehabilitative, and health services research and support basic and clinical studies that advance knowledge leading to improvements in the prevention, diagnosis, and treatment of diseases and disabilities. Medical and prosthetic research at the Department of Veterans Affairs includes the fields of prosthetics, orthotics, adaptive equipment for vehicles, sensory aids, and related areas.

    VA Court of Appeals

    Heinrich successful secured language requiring the VA to improve transparency surrounding the large back log of cases at the VA Court of Appeals. According to last year’s Annual Report, there is a backlog of 200,805 cases.

    MIL OSI USA News

  • MIL-OSI United Nations: Amid ‘Horror Show in Gaza’, Humanitarian System Denied Space to Deliver, Multilateral Problem-Solving Needed More than Ever, Secretary-General Tells Security Council

    Source: United Nations General Assembly and Security Council

    Following are UN Secretary-General António Guterres’ remarks to the Security Council on multilateralism and peaceful settlement of disputes, in New York today:

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.  The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.  The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate, when unresolved disputes fuel the flames of conflict and when States lose trust in each other.

    The Charter lays out a number of important tools to forge peace.  Article 2.3 of the UN Charter is clear:  “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice”.  Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.  This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts.  And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.  Malnourishment is soaring.  Starvation is knocking on every door.

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.  That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.  With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck — among them facilities of the UN Office for Project Services and the World Health Organization (WHO), including WHO’s main warehouse.  This is despite all parties having been informed of the locations of these UN facilities.  These premises are inviolable and must be protected under international humanitarian law — without exception.

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.  And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.  But it still holds the power to stop them.  Peace is a choice.  And the world expects the UN Security Council to help countries make this choice.  This Council is at the centre of the global architecture for peace and security.  Its creation reflected a central truth.

    Competition between States is a geopolitical reality.  But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.  Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year.

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.  Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.  The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the cold war, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.  One that successfully deployed a range of peacekeeping missions.  One that opened the door for vital humanitarian aid to flow to people in need.  And one that helped prevent a third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.  This Council should be made more representative of today’s geopolitical realities.  And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.  I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.  The landmark adoption of Security Council resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and rebuild regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of States.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.  The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its eightieth anniversary next year.

    As we mark the eightieth anniversary of our Organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.  I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    MIL OSI United Nations News

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI Security: Across-the-Board Convictions in Final Highs RICO Trial of 2025

    Source: Office of United States Attorneys

    MINNEAPOLIS – Following an eight-day jury trial, a federal jury convicted two defendants of all charged counts for their involvement in the Highs street gang, announced Acting U.S. Attorney Joseph H. Thompson.

    Defendants Cortez Davon Blakemore, 35, and Robert Lesure, 23, were convicted by a jury of federal RICO conspiracy and conspiracy to distribute controlled substances. A sentencing hearing will be set at a later date. According to court documents and evidence presented at trial, Blakemore and Lesure were long-standing and prolific drug traffickers for the Highs criminal street gang.  They sold fentanyl at the intersection of Broadway and Lyndale in North Minneapolis, which the Highs had taken control of and turned into an open-air drug market. As the jury heard at trial, the Highs is a violent criminal street gang that has long wreaked havoc on North Minneapolis, selling fentanyl and other deadly drugs and enforcing its terorrity through violence, kidnapping, and murder, including the murders of innocent civlians caught in the crossfire. Forty members of the Highs gang were charged in this large RICO indictment. Blakemore and Lesure are the 37th and 38th defendants to be convicted in this case. A final RICO defendant is set to be tried in 2026.

    “These convictions bring justice not just to the victims of the Highs gang, but to an entire community that has endured years of violence, fear, and loss,” said Acting U.S. Attorney Joseph H. Thompson. “For too long, this gang terrorized Minneapolis, maintaining control through chaos. Today, the people of this city get something they’ve long been denied: peace. This case is the result of a relentless federal coalition—the U.S. Attorney’s Office side-by-side with our federal, state, and local law enforcement partners.  Our message is clear: if you endanger our communities, we are coming for you.  And we won’t stop until every neighborhood in this city is free from fear.”

    “This isn’t just another trial; it’s a continuation of our full-court press to dismantle the Highs street gang and hold every last member accountable,” said Travis Riddle, ATF Special Agent in Charge of the St. Paul Field Division. “We’re proud to stand alongside our prosecution and investigative partners who’ve shown unmatched determination, trial after trial, to bring justice to the communities harmed by this violence.”

    “As the summer progresses, Minneapolis is continuing to see a drop in violent crime, especially gun violence throughout the city,” said Minneapolis Police Chief Brian O’Hara.  “The outstanding work of MPD officers and our partnership with the U.S. Attorney’s Office have been instrumental in targeting the small number of individuals committing a disproportionate amount of violence in the city. This conviction is the latest result of efforts that can not only be seen in the reduction of crime, but also felt by the community as we work to rebuild trust.”

    “Our focus isn’t just on the money—it’s on the damage that money fuels,” said Jason Bushey, IRS Acting Special Agent in Charge of the Chicago Field Office. “When violent gangs push drugs and fear into our communities, our agents work relentlessly to expose the money behind the violence. This conviction is the result of that effort and a clear reminder that those who profit from chaos and pain will be held accountable.”

    “In the wake of the guilty verdicts in the Highs gang RICO trial, it becomes abundantly clear that the efficacy of our justice system hinges not merely on the application of law, but on the transformative power of collaborative law enforcement partnerships,” stated FBI Minneapolis Special Agent in Charge Alvin M. Winston, Sr. “These alliances are essential, for they weave a fabric of shared intelligence and resources that fortify our collective resolve against violent crime, ensuring that justice is not merely an ideal, but a tangible reality for our communities.”

    This case is the result of an investigation conducted by the ATF, FBI, Minneapolis Police Department, IRS Criminal Investigation, U.S. Postal Inspection Service, Hennepin County Sheriff’s Office, Minnesota Bureau of Criminal Apprehension, and Minnesota Department of Corrections with the assistance of the U.S. Marshals Service, DEA, Homeland Security Investigation, and the Hennepin County Attorney’s Office. The Ramsey County Sheriff’s Office, Dakota County Sheriff’s Office, St. Paul Police Department, and numerous other law enforcement agencies contributed to the investigation.

    The U.S. Attorney’s Office also is deeply grateful to the Justice Department’s Violent Crime & Racketeering Section (VCRS) for their continued partnership and expertise on this and other ongoing RICO cases. This partnership has been critical to the success of these gang prosecutions.

    Assistant U.S. Attorneys Thomas Calhoun-Lopez, Albania Concepcion, and Carla Baumel tried this case.  They are prosecuting the case along with Attorney Brian Lynch of the Justice Department’s Violent Crime & Racketeering Section. 

    MIL Security OSI

  • MIL-OSI Security: Repeat Domestic Violence Offender from Ganado Sentenced to 96 Months in Prison

    Source: Office of United States Attorneys

    PHOENIX, Ariz. – Brian Jason Gishie, 46, of Ganado, Arizona, was sentenced on July 16, by Senior United States District Judge David G. Campbell to 96 months in prison, followed by three years of supervised release. Gishie, an enrolled member of the Navajo Nation, previously pleaded guilty to assault with a dangerous weapon and assault of an intimate partner by strangling.

    On or about June 20, 2024, Gishie brutally assaulted an intimate partner at his home in Greasewood, Arizona, within the Navajo Nation community. Using a baseball bat, Gishie hit the victim several times on her head and body. He then strangled her with both hands for several seconds. The victim was medically treated for injuries related to the assault. Gishie had previously been convicted of multiple domestic violence related offenses, including Aggravated Domestic Violence in Maricopa County in 2004, and Assault by Strangling in the District of Arizona in 2019.

    The FBI Phoenix Division’s Flagstaff office and the Navajo Nation Police Department conducted the investigation in this case. The United States Attorney’s Office, District of Arizona, Phoenix, handled the prosecution.

    CASE NUMBER:           CR-24-08120-PCT-DGC
    RELEASE NUMBER:    2025-123_Gishie

    # # #

    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.

    MIL Security OSI

  • MIL-OSI Security: Federal Grand Jury Indicts Louisville Woman for Defrauding Pool Business Customers

    Source: US FBI

    Louisville, KY – A federal grand jury in Louisville returned an indictment on July 16, 2025, charging a Louisville woman with engaging in a scheme to defraud customers of her pool installation business, Davenport Extreme Pools and Spas Inc.

    U.S. Attorney Kyle G. Bumgarner of the Western District of Kentucky, Acting Special Agent in Charge Olivia Olson of the FBI Louisville Field Office, and Special Agent in Charge Karen Wingerd of the Internal Revenue Service Criminal Investigations, Cincinnati Field Office, made the announcement.

    According to the indictment, Tracy Davenport, 50, was charged with 13 counts of wire fraud, 5 counts of money laundering, and 1 count of bankruptcy fraud. The indictment alleges Tracy Davenport, and others working at her direction, engaged in a scheme to induce customers into signing a contract for a pool installation and paying a large down payment up front. Tracy Davenport then used those funds for purposes other than what was agreed upon.

    The defendant will make her initial court appearance before a U.S. Magistrate Judge of the U.S. District Court for the Western District of Kentucky at a later date. 

    There is no parole in the federal system.

    This case is being investigated by the FBI and IRS-CI, with assistance from the Louisville Metro Police Department, the Jefferson County Commonwealth Attorney’s Office, and the United States Trustee’s Office for the Western District of Kentucky.

    Assistant U.S. Attorney Nicole Elver is prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: New York Man Sentenced for Conspiring to Traffic Firearms from Maine to New York

    Source: Office of United States Attorneys

    BANGOR, Maine: A Syracuse, New York man was sentenced on Monday in U.S. District Court in Bangor for conspiring to violate federal firearms laws and being a felon in possession of a firearm.

    U.S. District Judge John A. Woodcock, Jr. sentenced Tyquinn Montell Cannon (aka “Q”), 32, to 45 months in prison to be followed by three years of supervised release. Cannon pleaded guilty on June 17, 2024.

    According to court records, beginning in May 2022, Cannon knowingly conspired with others in Maine and New York to illegally obtain firearms at federally licensed firearms dealers (FFLs) in central and southern Maine using straw purchasers. Two of the coconspirators in Maine would arrange for the straw purchase of firearms, and Cannon would deliver, or arrange the delivery of, the illegally obtained firearms to coconspirators in New York. In September 2022, Cannon was found in possession of a Glock .40 caliber pistol, which had earlier been straw purchased at an FFL in Maine. Cannon is prohibited from possessing firearms due to felony drug convictions in Illinois.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives and Massachusetts State Police investigated the case.

    STRAW PURCHASING: A straw purchase is an illegal firearm purchase where the actual buyer of the gun, being unable to pass the required federal background check or desiring to not have his or her name associated with the transaction, uses a proxy buyer who can pass the required background check to purchase the firearm for him/her.

    ###

    MIL Security OSI

  • MIL-OSI USA: Lummis Releases Discussion Draft for Comprehensive Digital Asset Market Structure Legislation

    US Senate News:

    Source: United States Senator for Wyoming Cynthia Lummis

    Washington, D.C. –  U.S. Senator Cynthia Lummis (R-WY) joined Senate Banking Committee Chairman Tim Scott (R-SC) and U.S. Senators Bernie Moreno (R-OH) and Bill Hagerty (R-TN) in releasing a discussion draft of the Banking Committee provisions of comprehensive digital asset market structure legislation, building on principles developed in collaboration with Chairman Scott to establish a clear regulatory framework for the digital asset industry.

    The time for regulatory uncertainty in the digital asset space has come to an end,” said Lummis. “This discussion draft represents a thoughtful, balanced approach that will provide the clarity our innovators need while providing robust consumer protections. We cannot allow regulatory confusion to continue driving American innovation overseas. Market structure legislation will establish clear distinctions between digital asset securities and commodities, modernize our regulatory framework, and position the United States as the global leader in digital asset innovation.”

    The discussion draft incorporates key principles designed to:

    • Establish Clear Legal Definitions: Create statutory distinctions between digital asset securities and commodities, providing regulatory certainty and predictability for market participants
    • Allocate Regulatory Authority: Clearly delineates jurisdiction between Federal agencies, ensuring appropriate oversight without regulatory overlap or gaps
    • Modernize Federal Law: Updates securities regulations to account for the unique characteristics of digital assets and distributed ledger technology
    • Protect Consumers and Market Participants: Implements appropriate registration and risk management requirements for centralized digital asset intermediaries while preserving self-custody rights
    • Target Illicit Finance Measures: Include focused provisions to prevent money laundering and sanctions evasion while supporting innovation
    • Foster Responsible Innovation: Encourage federal regulators to provide clear guidance and utilize tools like no-action letters and regulatory sandboxes

    The discussion draft recognizes the different risk profiles of centralized firms versus decentralized protocols and acknowledges that distributed ledger technology extends beyond financial applications. It also emphasizes that tokenization represents an evolution of financial infrastructure that enhances efficiency and transparency.

    Senator Lummis and Chairman Scott are issuing a Request for Information (RFI) for stakeholders to submit feedback on the draft and on a wide range of questions. To participate in the RFI, please submit your feedback to MarketStructure_RFI@banking.senate.gov. 

    A copy of the discussion draft can be found here.

    MIL OSI USA News

  • MIL-OSI Security: Clifton T. Barrett Takes Oath as U.S. Attorney for the Middle District of North Carolina

    Source: Office of United States Attorneys

    GREENSBORO, N.C. – Clifton T. “Cliff” Barrett took the oath of office yesterday to become the United States Attorney for the Middle District of North Carolina. The oath was administered by U.S. District Judge William L. Osteen, Jr. at the L. Richardson Preyer Federal Building in Greensboro. Attorney General Pamela Bondi appointed Mr. Barrett as the interim U.S. Attorney on June 21.

    “I am honored to serve as the U.S. Attorney for the Middle District of North Carolina and thank President Trump and Attorney General Bondi for placing their trust in me,” said U.S. Attorney Barrett. “I look forward, along with other prosecutors in the office, to making the Middle District a safer place to live by holding offenders accountable for their actions.  We will work closely with state, local, and federal law enforcement in addressing President Trump’s law enforcement priorities.”

    As the U.S. Attorney, Mr. Barrett is the top-ranking federal law enforcement official in the Middle District of North Carolina, which covers 24 counties in the central part of the state from Durham County on the east to Yadkin County on the west, stretching up to Virginia on the north side and down to South Carolina on the south. Approximately 3 million people live in the Middle District of North Carolina. The office is responsible for prosecuting federal crimes in the district, including crimes related to immigration, gang violence, National Security, drug trafficking, and violent crime. The office also defends the United States in civil cases and collects debts owed to the United States.

    U.S. Attorney Barrett joined the Department of Justice as an Assistant U.S. Attorney in the Middle District of North Carolina in September 1994. He has prosecuted a broad range of federal criminal cases, including drug trafficking organizations, violent crime, child exploitation, public corruption, tax fraud, and offenses related to terrorism. He has held numerous leadership roles in the office, including 25 years as Chief of the Criminal Division. He has also served in leadership at the Department of Justice as an evaluator of other U.S. Attorney’s Offices and as a member of the Criminal Chiefs Working Group, an appointed committee that works in conjunction with the U.S. Attorney General’s Advisory Commission in providing advice to the U.S. Attorney General.

    Prior to joining the U.S. Attorney’s Office, Barrett was an Assistant District Attorney for nine years in Forsyth County, North Carolina where he primarily prosecuted violent crime cases.

    Barrett received his bachelor’s degree in history cum laude from Wake Forest University in 1982, and his Juris Doctorate from Wake Forest University School of Law in 1985. He has been an Adjunct Professor at Wake Forest University School of Law teaching Criminal Trial Advocacy since 1996.

    ###

    MIL Security OSI

  • MIL-OSI Security: Clifton T. Barrett Takes Oath as U.S. Attorney for the Middle District of North Carolina

    Source: Office of United States Attorneys

    GREENSBORO, N.C. – Clifton T. “Cliff” Barrett took the oath of office yesterday to become the United States Attorney for the Middle District of North Carolina. The oath was administered by U.S. District Judge William L. Osteen, Jr. at the L. Richardson Preyer Federal Building in Greensboro. Attorney General Pamela Bondi appointed Mr. Barrett as the interim U.S. Attorney on June 21.

    “I am honored to serve as the U.S. Attorney for the Middle District of North Carolina and thank President Trump and Attorney General Bondi for placing their trust in me,” said U.S. Attorney Barrett. “I look forward, along with other prosecutors in the office, to making the Middle District a safer place to live by holding offenders accountable for their actions.  We will work closely with state, local, and federal law enforcement in addressing President Trump’s law enforcement priorities.”

    As the U.S. Attorney, Mr. Barrett is the top-ranking federal law enforcement official in the Middle District of North Carolina, which covers 24 counties in the central part of the state from Durham County on the east to Yadkin County on the west, stretching up to Virginia on the north side and down to South Carolina on the south. Approximately 3 million people live in the Middle District of North Carolina. The office is responsible for prosecuting federal crimes in the district, including crimes related to immigration, gang violence, National Security, drug trafficking, and violent crime. The office also defends the United States in civil cases and collects debts owed to the United States.

    U.S. Attorney Barrett joined the Department of Justice as an Assistant U.S. Attorney in the Middle District of North Carolina in September 1994. He has prosecuted a broad range of federal criminal cases, including drug trafficking organizations, violent crime, child exploitation, public corruption, tax fraud, and offenses related to terrorism. He has held numerous leadership roles in the office, including 25 years as Chief of the Criminal Division. He has also served in leadership at the Department of Justice as an evaluator of other U.S. Attorney’s Offices and as a member of the Criminal Chiefs Working Group, an appointed committee that works in conjunction with the U.S. Attorney General’s Advisory Commission in providing advice to the U.S. Attorney General.

    Prior to joining the U.S. Attorney’s Office, Barrett was an Assistant District Attorney for nine years in Forsyth County, North Carolina where he primarily prosecuted violent crime cases.

    Barrett received his bachelor’s degree in history cum laude from Wake Forest University in 1982, and his Juris Doctorate from Wake Forest University School of Law in 1985. He has been an Adjunct Professor at Wake Forest University School of Law teaching Criminal Trial Advocacy since 1996.

    ###

    MIL Security OSI

  • MIL-OSI Security: Illegal Alien Pleads Guilty To Unlawful Reentry

    Source: Office of United States Attorneys

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Angel Urbina-Ramirez, a/k/a Angel Urbina Ramirez, a/k/a Angel Urbinaramirez, age 53, a Mexican national unlawfully present in Poteau, Oklahoma, pleaded guilty to one count of Unlawful Reentry of Removed Alien, punishable by a term of imprisonment of not more than ten years, and a fine of not more than $250,000.00.  

    The charge arose from an investigation by the U.S. Department of Homeland Security’s Immigration and Customs Enforcement Division.

    The Indictment alleged that on June 13, 2025, Urbina-Ramirez, an alien, was found in the United States after having been previously removed on January 30, 2018, without obtaining the express consent of the Secretary of Homeland Security to reapply for admission to the United States.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    The Honorable D. Edward Snow, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.

    A U.S. District Court Judge will determine the sentence to be imposed after considering the U.S. Sentencing Guidelines and other statutory factors.

    Urbina-Ramirez will remain in the custody of the United States Marshals Service pending sentencing.

    Assistant U.S. Attorney Dak T. Cohen represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Illegal Alien Pleads Guilty To Unlawful Reentry

    Source: Office of United States Attorneys

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Angel Urbina-Ramirez, a/k/a Angel Urbina Ramirez, a/k/a Angel Urbinaramirez, age 53, a Mexican national unlawfully present in Poteau, Oklahoma, pleaded guilty to one count of Unlawful Reentry of Removed Alien, punishable by a term of imprisonment of not more than ten years, and a fine of not more than $250,000.00.  

    The charge arose from an investigation by the U.S. Department of Homeland Security’s Immigration and Customs Enforcement Division.

    The Indictment alleged that on June 13, 2025, Urbina-Ramirez, an alien, was found in the United States after having been previously removed on January 30, 2018, without obtaining the express consent of the Secretary of Homeland Security to reapply for admission to the United States.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    The Honorable D. Edward Snow, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.

    A U.S. District Court Judge will determine the sentence to be imposed after considering the U.S. Sentencing Guidelines and other statutory factors.

    Urbina-Ramirez will remain in the custody of the United States Marshals Service pending sentencing.

    Assistant U.S. Attorney Dak T. Cohen represented the United States.

    MIL Security OSI

  • MIL-OSI USA: King Cosponsors Bill to Prohibit Sharing of Personal Data of DACA Program Applicants with Immigration Officials

    US Senate News:

    Source: United States Senator for Maine Angus King

    WASHINGTON — U.S. Senator Angus King (I-ME) has joined legislation to prohibit the sharing of sensitive personal data, like taxpayer and health information, with Immigration and Customs Enforcement (ICE). The Protect DREAMer Confidentiality Act would provide a statutory guarantee to current and prospective Deferred Action for Childhood Arrivals (DACA) program applicants, also known as Dreamers, that the private information they provide in their applications will not be used against them. This comes as the Trump Administration increases information sharing to advance its mass deportation agenda.

    The Protect DREAMer Confidentiality Act will prohibit the DHS Secretary from disclosing information included in an individual’s application for the DACA program to law enforcement agencies, including ICE and U.S. Customs and Border Protection (CBP), for any purpose other than the implementation of the DACA program, with limited exceptions.

    “Dreamers are productive, established members of our community woven into the fabric of our lives; neighbors and friends that go to school, work at the local store, and contribute honestly to American society no matter the passport they hold,” Senator King said. “The Protect DREAMer Confidentiality Act would allow thousands of law-abiding Dreamers to continue living their lives and making contributions to society without fear of their personal information being misused by those enforcing the administration’s misguided deportation agenda.”

    Since 2012, more than 825,000 people have received deferred action pursuant to DACA, contributing an estimated $140 billion to the U.S. economy in spending power and paying $40 billion in combined federal, payroll, state, and local taxes. In 2021, a federal district court judge paused the DACA program and prevented USCIS from approving any new DACA applications. In March 2025, however, a Fifth Circuit decision giving United States Citizenship and Immigration Services (USCIS) the authority to start processing initial DACA applications from states other than Texas went into effect.

    Last month, the Trump Administration gave Department of Homeland Security (DHS) personal data, including immigration status, on millions of Medicaid enrollees and announced it would require some undocumented immigrants to register with DHS. The Administration also finalized an agreement giving U.S. Immigration and Customs Enforcement (ICE) access to taxpayer data from the Internal Revenue Service (IRS) for immigration enforcement. Meanwhile, the Administration’s Department of Government Efficiency (DOGE) recently gained access to key immigration databases, including the Executive Office for Immigration Review’s (EOIR) Courts and Appeals System (ECAS), U.S. Citizenship and Immigration Services’ (USCIS) Data Business Intelligence Services, which contains information on noncitizens who have applied for DACA, and the U.S. Department of Health and Human Services’ (HHS) Unaccompanied Alien Children portal.

    Specifically, the Protect DREAMer Confidentiality Act will:

    1. Direct the DHS Secretary to protect the information included in an individual’s application to the DACA program from disclosure to ICE, CBP, and any other law enforcement agency for any purpose other than the implementation of the DACA program;
    2. Prohibit the DHS Secretary from referring anyone with deferred enforcement protections pursuant to the DACA program to ICE, CBP, the Department of Justice (DOJ), and any other law enforcement agency; and
    3. Provide limited exceptions for when an individual’s application information may be shared with national security and law enforcement agencies, namely:
      1. To identify or prevent fraudulent claims;
      2. For particularized national security concerns; and
      3. For the investigation or prosecution of a felony, provided that the felony in question is not related to the applicant’s immigration status.

    In addition to King, this bill is cosponsored by Senators Martin Heinrich (D-NM), Brian Schatz (D-HI), John Fetterman (D-PA), Sheldon Whitehouse (D-RI), Ben Ray Lujan (D-NM), Patty Murray (D-WA), Mazie Hirono (D-HI), Catherine Cortez Masto (D-NV), Bernie Sanders (I-VT), Ed Markey (D-MA), Tammy Duckworth (D-IL), Jacky Rosen (D-NV), Michael Bennet (D-CO), Elizabeth Warren (D-MA), Chris Van Hollen (D-MD), Ron Wyden (D-OR), Andy Kim (D-NJ), Richard Blumenthal (D-CT), Peter Welch (D-VT), Amy Klobuchar (D-MN.), Lisa Blunt Rochester (D-DE), Jack Reed (D-RI), Alex Padilla (D-CA) and Chris Murphy (D-CT).

    Senator King is a strong opponent of the Trump Administration’s continued efforts to repeal protections for DACA recipients. He has repeatedly sought a legislative solution to provide stability for DACA recipients. Most recently, he sent a letter to Acting Director of U.S. Citizenship and Immigration Services (USCIS) Angelica Alfonso-Royals, highlighting the popular support for providing Dreamers a pathway to citizenship and request that the Trump Administration comply with the recent Fifth Circuit Court of Appeals ruling to resume processing applications for DACA. Previously, Senator King joined a group of his Senate colleagues in a letter urging former Senate Majority Leader Mitch McConnell (R-KY) to immediately take up the bipartisan House-passed American Dream and Promise Act, which would establish a path to citizenship for Dreamers and immigrants with Temporary Protected Status (TPS) or Deferred Enforced Departure (DED). In addition, King led a bipartisan proposal with Senator Mike Rounds (R-SD) that would have provided legislative protections for Dreamers.

    A one-page summary of the bill is here.

    The text of the bill is here.

    MIL OSI USA News

  • MIL-OSI USA: Grothman, Dingell Reintroduce Bipartisan Dillon’s Law

    Source: United States House of Representatives – Congressman Glenn Grothman (R-Glenbeulah 6th District Wisconsin)

    Congressman Glenn Grothman (R-WI) and Congresswoman Debbie Dingell (D-MI) have reintroduced Dillon’s Law, a bipartisan bill that incentivizes states to empower “good Samaritans” to save lives in critical moments. The legislation encourages trained individuals to administer epinephrine in schools during emergencies. Currently, the administration of this medication is limited solely to trained school employees. 

    Dillon’s Law is named in honor of Dillon Mueller, a native of Mishicot, Wisconsin, who tragically passed away in 2014 at just 18 years old after being stung by a bee that resulted in an anaphylactic reaction. At the time of the incident, epinephrine was not readily available and accessible. 

    Several states, including Wisconsin, Minnesota, and Indiana, have enacted versions of Dillon’s Law with strong bipartisan support. While Congress passed a similar measure in 2013 to support epinephrine programs in schools, this legislation expands access further by allowing any trained individual to administer epinephrine in the event of an emergency.  

    Read more about Dillon’s Story HERE. 

    “We’re working to prevent more heartbreaking tragedies like Dillon’s,” said Congressman Grothman. “No parent should ever have to experience the pain of losing a child simply because lifesaving medication wasn’t available in time. 

    “Dillon’s Law gives states the tools to train and empower everyday people to act in emergencies and save lives. Since Wisconsin enacted a version of this law in 2017, thousands of residents have been trained to use epinephrine in life-threatening situations. This commonsense, bipartisan solution is already making a difference in our state, and it can do the same nationwide. I urge my colleagues in Congress to support this bill, honor Dillon’s legacy, and help save lives.” 

    “Deaths like Dillon’s are heartbreaking and preventable, and we should empower good Samaritans to save lives,” said Congresswoman Dingell. “I’m proud to introduce Dillon’s Law with Rep. Grothman to help prepare individuals to respond to anaphylaxis and prevent tragedies like the one experienced by the Mueller family. We’ve seen programs like this work in my home state of Michigan, and we can help so many people by expanding this to the rest of the country.” 

    “Practicing allergists see firsthand how rapidly anaphylaxis can become life-threatening without immediate access to epinephrine,” said ACAAI President, Dr. James Tracy. “Dillon’s Law is a critical step forward in empowering trained individuals on school grounds to act swiftly and save lives. The American College of Allergy, Asthma, and Immunology (ACAAI) strongly supports this bipartisan effort to expand epinephrine access and Good Samaritan protections. This will help ensure no student or staff member loses their life because lifesaving treatment wasn’t readily available.” 

    “Expanding access to epinephrine will save lives,” said AAFA president and CEO, Kenneth Mendez. “Death from anaphylaxis – a potentially life-threatening allergic reaction – is preventable if epinephrine is administered quickly. By encouraging states to allow any trained individual to administer epinephrine at schools, Dillon’s Law will make it more likely that someone experiencing anaphylaxis receives emergency epinephrine when every second counts. We thank Representatives Grothman and Dingell for their leadership on this lifesaving legislation that helps prevent tragedies before they occur.” 

    “Dillon’s Law is about saving lives by ensuring that more people are prepared to respond to anaphylaxis emergencies when every second counts,” said Lynda Mitchell, CEO of Allergy & Asthma Network. “It empowers everyday citizens to step in during a severe allergic reaction and provide life-saving epinephrine, especially in communities where immediate medical help isn’t always available. We fully support this legislation and urge Congress to move it forward.” 

    “FARE applauds Representative Grothman on the introduction of Dillon’s Law, a common-sense, and cost-effective way to prevent future tragedies,” said Sung Poblete, PhD, RN, CEO of FARE. “Considering that on average, there are two children in every U.S. classroom affected by food allergy alone, the need for this legislation is great. Expanded definitions and protections that allow individuals to act in the event of an emergency, along with the recognition of needle-free epinephrine options are measures that are good for everyone.” 

    “On behalf of more than 431,000 nurse practitioners (NPs) nationwide, the American Association of Nurse Practitioners (AANP) thanks Congressman Grothman and all of the other Members of Congress who support Dillon’s Law for their leadership on this important bill,” said American Association of Nurse Practitioners President Valerie Fuller, PhD, DNP, AGACNP-BC, FNP-BC, FNAP, FAANP. “Prompt access to epinephrine is essential when someone is experiencing anaphylaxis and Dillon’s Law will play an important role in increasing the number of trained individuals who can administer this life-saving treatment in schools.” 

    Background Information 

    Anaphylaxis is a severe, life-threatening allergic reaction that can occur within minutes of exposure to triggers like insect stings, certain foods, or medications. In the U.S., it causes up to 1,000 deaths and hundreds of thousands of ER visits each year. 

    Dillon’s Law is named after Dillon Mueller, an 18-year-old from Mishicot, Wisconsin, who tragically died from anaphylaxis after a bee sting. Since his passing, Dillon’s parents have championed efforts to expand epinephrine training, leading to the passage of Dillon’s Law in Wisconsin in 2017. The program, certified by the Wisconsin Department of Health, has already helped save lives. 

    This legislation builds on the Public Health Service Act by prioritizing federal grant funding for states that allow trained individuals to administer epinephrine on school grounds. It also requires states to provide civil liability protections to trained responders who act in good faith. 

    By expanding access to lifesaving medication and empowering more individuals to respond in emergencies, Dillon’s Law strengthens community safety and helps prevent avoidable tragedies. 

    This bill is endorsed by the American College of Allergy, Asthma, and Immunology (ACAAI), Food Allergy Research & Education (FARE), Asthma and Allergy Foundation of America (AAFA), American Association of Nurse Practitioners (AANP), and Allergy & Asthma Network. 

    U.S. Rep. Glenn Grothman (R-Glenbeulah) proudly serves the people of Wisconsin’s 6th Congressional District in the U.S. House of Representatives 

    MIL OSI USA News

  • MIL-OSI Asia-Pac: 15 nomination forms for Election Committee Subsector By-elections received today

    Source: Hong Kong Government special administrative region – 4

    The nomination period for the 2025 Election Committee (EC) Subsector By-elections runs from today (July 22) until August 4. A total of 12 nomination forms for candidates and three nomination forms from designated bodies were received by the Returning Officers for various subsectors today.

    If there is a contested election for an EC subsector, a poll will be held on September 7.

    The By-elections will fill a total of 93 vacancies in the membership of the EC to be returned by election involving 28 subsectors. The breakdown of nominations by subsectors received today is set out below: 
     

    First Sector
    Subsector No. of nomination forms for candidates received today
    Catering 0
    Commercial (first) 0
    Commercial (second) 0
    Commercial (third) 0
    Employers’ Federation of Hong Kong 0
    Hotel 1
    Import and export 0
    Industrial (first) 0
    Industrial (second) 0
    Real estate and construction 0
    Small and medium enterprises 0
    Tourism 0
    Transport 0
    Second Sector
    Subsector No. of nomination forms for candidates received today
    Architectural, surveying, planning and landscape 0
    Chinese medicine 0
    Education 0
    Legal 0
    Medical and health services 0
    Sports, performing arts, culture and publication 0
    Technology and innovation 0
    Third Sector
    Subsector No. of nomination forms for candidates received today
    Agriculture and fisheries 0
    Associations of Chinese fellow townsmen 1
    Grassroots associations 1
    Labour 1
    Fourth Sector
    Subsector No. of nomination forms for candidates received today
    Heung Yee Kuk 0
    Representatives of members of Area Committees, District Fight Crime Committees, and District Fire Safety Committees of Hong Kong and Kowloon 0
    Representatives of members of Area Committees, District Fight Crime Committees, and District Fire Safety Committees of the New Territories 0
    Fifth Sector
    Subsector No. of nomination forms for candidates received today
    Representatives of Hong Kong members of relevant national organisations 8
       
    Total: 12

    Besides, 10 vacancies involving five subsectors to be returned by nomination will be filled through supplementary nominations by designated bodies. Today, three nomination forms for the relevant subsectors are received, with breakdown as below: 
     

    Accountancy
    Designated body No. of nomination forms received from designated bodies today
    Association of Hong Kong Accounting Advisors Limited 0
     
    Sports, performing arts, culture and publication
    Designated body No. of nomination forms received from designated bodies today
    Sports Federation & Olympic Committee of Hong Kong, China 0
    Hong Kong Publishing Federation Limited 0
     
    Technology and innovation
    Designated body No. of nomination forms received from designated bodies today
    The Greater Bay Area Association of Academicians 0
     
    Religious
    Designated body No. of nomination forms received from designated bodies today
    Catholic Diocese of Hong Kong 0
    Chinese Muslim Cultural and Fraternal Association 1 (1 nominee in total)
    The Hong Kong Taoist Association 1 (2 nominees in total)
     
    Representatives of associations of Hong Kong residents in the Mainland
    Designated body No. of nomination forms received from designated bodies today
    Hong Kong Chamber of Commerce in China—Guangdong 1 (1 nominee in total)
       
    Total: 3 (4 nominees in total)

    Particulars of the nominated persons received today will be uploaded to the election website (www.elections.gov.hk).

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: SCS encourages Administrative Service summer interns

    Source: Hong Kong Government special administrative region – 4

         The Secretary for the Civil Service, Mrs Ingrid Yeung, met and shared experiences with over 50 tertiary students participating in the Administrative Service Summer Internship Programme today (July 22). She encouraged them to apply for civil service positions such as the Administrative Officer (AO) post, and to use their professional knowledge to serve the community, benefit people’s livelihood and contribute to the development of Hong Kong.
     
         This year, the Civil Service Bureau (CSB) has arranged for the interns to discuss and submit policy proposals in various areas including transport, planning and development, social enterprises, district affairs, the silver economy, etc, based on their observations and insights gained after working in different bureaux or departments. The CSB will submit these proposals to the bureaux or departments where the interns were assigned to for their reference.

         At the gathering, Mrs Yeung listened to the sharing by interns on both their work experiences and proposed policy initiatives during their internships. Drawing on her nearly 40 years of service in the civil service, she shared valuable insights as an AO and encouraged students to actively enrich themselves, plan ahead for their future and contribute to the development of the country and Hong Kong.
     
         She said, “I am aware that this round of the Programme has received a record number of applications, attracting more than 300 applications from tertiary students in Hong Kong, mainland China and overseas. From your sharing, I can genuinely feel your passion for public service. I would like to take this opportunity to call on young people who are dedicated to serve the community and willing to take on responsibilities to join the civil service.

         “I look forward to interns becoming AOs in the near future, serving the public and contributing to the country and Hong Kong with your own strengths and talents.”

         The Permanent Secretary for the Civil Service, Mr Clement Leung, and Deputy Secretary for the Civil Service Ms Eureka Cheung also joined the sharing session and spoke with interns to learn about their internship experiences and views on Hong Kong’s development.

         AOs are professional public administrators who play a pivotal role in the Government. They are responsible for assisting in the formulation of government policies, co-ordinating and supervising various initiatives, managing the use of public resources, promoting district work and publicising Hong Kong externally, etc. To enable AOs to accumulate experience and unleash their full potential in different public policy areas, they are posted to various bureaux and departments at regular intervals, broadening their horizons and gaining a fuller grasp of the challenges and opportunities in public administration.

         The CSB organises the Administrative Service Internship Programme every summer and winter, offering students who aspire to become AOs opportunities to work alongside serving AOs for around eight weeks to gain early practical experiences in public service and lay a solid foundation for their future career development. Statistics from the past five years show that around one in every five newly recruited AOs had participated in the Programme. 

         The Government will launch a new round of recruitment for the posts of Administrative Officer, Executive Officer II, Assistant Labour Officer II, Assistant Trade Officer II and Management Services Officer II in September this year. Prospective applicants must first take the Common Recruitment Examination (CRE) and the Basic Law and National Security Law Test to attain the requisite scores. The new round of the CRE is currently open for application. Interested candidates are required to apply online by August 1. For details, please refer to the CSB website (www.csb.gov.hk/english/index.html).

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Hongkong Post updates on the information security incident

    Source: Hong Kong Government special administrative region – 4

    Hongkong Post announced today (July 22) on the investigation result so far of the information security incident identified on July 21. According to the investigation, the unauthorised party had cyberattacked the system by making countless attempts at the mid-night of July 20 and the following day to access and retrieve information through the address book function of EC-Ship system. Hongkong Post had activated the blocking mechanism immediately after the abnormal activities being detected by its system and disabled the operation of the EC-Ship account which was involved in the cyberattacks at once. During the above-mentioned blockage and interception of these cyberattacks, the concerned accounts’ address books information, including the senders’ and recipients’ person/company names, addresses, and/or phone numbers, fax numbers, and email addresses, was being accessed and retrieved.

    Hongkong Post has sent emails to inform all affected account holders today and reminded them to remain vigilant, and to immediately inform relevant persons of their address books about this incident and remind them to be vigilant. The Hong Kong Police Force (HKPF) has initiated investigation into the incident and Hongkong Post will fully cooperate with the HKPF in the investigation, and will closely monitor the situation of the involved information.

    Hongkong Post has been following established Government procedures on information and cybersecurity. The Digital Policy Office (DPO) is also in close communication with Hongkong Post on the incident, noting that it has taken immediate actions by promptly blocking the cyberattacks and enhancing the security measures of the system. The services concerned have resumed normal and account holders involved can continue to use the services.

    The spokesman for Hongkong Post said that the global cybersecurity landscape was evolving, with various forms of cyberattacks emerging continuously. Hongkong Post would actively seek advice from the DPO to continuously enhance the cyber resilience level and cybersecurity risk management, to safeguard the information security of users and to prevent similar incidents from happening again.

    Hongkong Post reiterates that it will not send embedded hyperlinks via emails, SMS messages or social media pages for collecting personal information or requesting for payment. Hongkong Post wishes to alert members of the public again to refrain from clicking on any embedded links or providing any personal or financial information such as credit card information, or making any payment to suspicious emails or SMS messages alleged to be sent by Hongkong Post. For enquiries, members of the public may call the Hongkong Post General Enquiry Hotline at 2921 2222.

    MIL OSI Asia Pacific News