Category: KB

  • MIL-OSI USA: VIDEO: Ricketts Fights for America’s Producers

    US Senate News:

    Source: United States Senator Pete Ricketts (Nebraska)

    WASHINGTON, D.C. – This week, during his weekly press call with Nebraska media, U.S. Senator Pete Ricketts (R-NE) discussed the One Big Beautiful Bill and his work to secure the future for those who feed and fuel America.

    Watch the video here.

    Agriculture is the heart and soul of what we do in Nebraska,” said Ricketts.  Family farms, ranches, and agri-businesses are the backbone of communities across our state.  The One Big Beautiful Bill helps producers today and lays the foundation for strong agricultural growth tomorrow. It grows our economy at home and will help gain new markets abroad.”

    TRANSCRIPT:

    Senator Ricketts: “Agriculture is the heart and soul of what we do in Nebraska. 

    “Family farms, ranches, and agri-businesses are the backbone of communities across Nebraska. 

    “The One Big Beautiful Bill helps producers today and lays the foundation for strong agricultural growth tomorrow.  

    “It grows our economy at home and will help gain new markets abroad. 

    “The One Big Beautiful Bill (OBBB) secures the future for those who feed and fuel America—and the world.  

    “The One Big Beautiful Bill backs our way of life. 

    “First of all, the bill avoided a $2,400 tax increase that would have hit the average Nebraska family. 

    “That’s $2,400 that Nebraskans can continue to spend on groceries, electric bills or to save for a family vacation.   

    “The bill also helps farmers plan for the next generation. 

    “Over 80% of Nebraska’s farms are family-owned. 

    “The 2017 Tax Cuts and Jobs Act cut in half the number of farm and ranch families that were going to be subject to the Death Tax. 

    “The Big Beautiful Bill ensures the Death Tax exemption will now be permanent and rise with inflation. 

    “This will ensure that over $200 billion in hard-earned family farm assets across the country will go to the next generation and not the government. 

    “Now, more farms will be passed down, not taxed away to Uncle Sam.  

    “The 45Z clean fuel production credit is another major win for Nebraska. 

    “Biofuels are a win for consumers who save money at the pump. 

    “It’s a win for the environment, because it helps clean up our environment, and it’s a win for our farmers and ranchers. 

    “Last year, Nebraskans saved $325 million using ethanol blends. 

    “Last time I fueled up at Hy-Vee with E10, I saved 55 cents per gallon. 

    “The 45Z credit boosts biofuel production and creates value for farmers and ranchers. 

    “It narrows eligible feedstock commodities to North America, protecting Nebraska farmers from foreign competition. 

    “Producers in Communist China should be prevented from receiving American tax subsidies. 

    “All of this boosts demand for row crops and renewable fuel production. 

    “That means more jobs and better prices. 

    “Nebraska’s 25 ethanol plants support 1,300 jobs and have a $6 billion impact. 

    “The credit gives investors the certainty they need to hire and expand. 

    “Nebraska agriculture feeds and fuels the world. 

    “When I was Governor, I led trade missions to places like Japan and Vietnam to build strong relationships between foreign importers and Nebraska producers. 

    “I launched an international trade council to discover new opportunities for overseas markets. 

    “Nebraska’s economy thrives when our producers can reach high-paying global markets. 

    “Recognizing this, the One Big Beautiful Bill strengthens the Supplemental Agricultural Trade Promotion Program. 

    “It provides $285 million annually to promote U.S. agricultural exports. 

    “It doubles funding for the Market Access Program and the Foreign Market Development program. 

    “That means more demand for Nebraska beef, corn, and soybeans abroad. 

    “Simply put, when agriculture thrives, so does the entire Nebraska economy. 

    “Maintaining current exports and opening up markets under the bill will help get better prices for their products for our producers.

    “The big beautiful bill gives critical support to young farmers and ranchers, as well, taking over the family business or starting out on their own.  

    “The Beginning Farmer and Rancher Development Benefit was extended from five years to ten years.  

    “That gives new producers access to critical risk management tools.   

    “The bill also supports educational access for rural students.   

    “It excludes agricultural assets from student financial aid calculations. 

    “That means farm kids will not be discriminated against when applying for financial aid.  

    “For young Nebraskans, the bill expands Pell Grant eligibility to short-term job training. 

    “That includes hands-on fields like welding, diesel tech, and irrigation systems. 

    “Now, a young Nebraskan in Scottsbluff, for example, can learn a trade and start working at places like Aulick Industries without piling up debt.  

    “The One Big Beautiful Bill helps Nebraska producers grow and reinvest. 

    “Full expensing is now permanent for property like tractors and other heavy machinery. 

    “A corn grower in Custer County will be able to fully write off a new, more efficient combine. 

    “Another provision in the bill boosts expensing for tools and equipment. 

    “This helps small businesses from welders to seed dealers invest to improve productivity. 

    “The Big Beautiful Bill gives producers needed updates to the farm safety net. 

    “Reference prices now reflect today’s markets. 

    “Drought aid under the Livestock Forage Program has been improved. 

    “Now, producers facing feed losses from grazing shortfalls will see faster relief. 

    “These updates give producers support, stability, and long-term certainty.  

    “Nebraska’s future depends on certainty for farmers, ranchers, and agri-business. 

    “The One Big Beautiful Bill supports agriculture today and protects the next generation of farmers and ranchers. 

    “That is how we keep producing the Good Life.” 

    MIL OSI USA News

  • MIL-OSI USA: 07.31.2025 Sen. Cruz Introduces Bill Safeguarding Schools From Influence by Foreign Adversaries

    US Senate News:

    Source: United States Senator for Texas Ted Cruz

    WASHINGTON, D.C. – U.S. Sens. Ted Cruz (R-Texas) and Cynthia Lummis (R-Wyo.) introduced the Transparency in Reporting of Adversarial Contributions to Education (TRACE) Act to enhance transparency for parents regarding foreign funding in K-12 schools.
    Sen. Cruz said, “The Chinese Communist Party spends vast resources to control what Americans see, hear, and ultimately think. Our foreign adversaries are actively targeting American educational institutions, and the TRACE Act will help protect our classrooms from foreign influence by providing parents with the transparency they deserve. I urge my colleagues to pass this legislation without delay.”
    Sen. Lummis said, “The Chinese Communist Party has spread its influence across American life, targeting our farmland, technology, and even school systems. Parents deserve peace of mind knowing their children are learning American values, not propaganda from our foreign adversaries. This legislation prioritizes transparency while protecting our children from harmful foreign agendas.”
    Companion legislation was introduced in the House by Rep. Aaron Bean (R-FL-04).
    Rep. Bean said, “American schools are for education, not espionage. We cannot allow our students—the future of our great nation—to be corrupted by foreign adversaries who are systematically and aggressively attempting to influence our nation’s K-12 schools. That’s why it’s crucial we parents understand the potential impact of foreign influence on our children’s classrooms and take concrete steps to prevent foreign nations from reaching America’s youth. I want to thank Senator Cruz for joining me in this critical effort and spearheading this legislation in the Senate.”
    This bill is supported by the Parents Defending Education Action and Heritage Action.
    Alfonso Aguilar, Director of Federal Affairs for Parents Defending Education Action said, “Senator Cruz’s TRACE Act is extremely necessary. Parents should know if a foreign government or entity is providing funding to their children’s schools, trying to influence what is taught to them or seeking to access important data and intellectual property. A 2023 investigation from our partner organization Defending Education uncovered Chinese Communist Party (CCP) influence in numerous public schools and school districts across the nation. Their research showed that entities with ties to the CCP such as the Confucius Institutes have provided curriculum content, funding and Chinese teachers to U.S. public schools. Disturbingly, they also found that the Chinese government efforts appeared to target school districts near over twenty American bases. Our investigation, however, only discovered some or the CCP’s growing involvement in our public schools. The TRACE Act would ensure that parents have a full and continuous accounting of China’s meddling in their children’s education.”
    Read the full text of the bill here.
    BACKGROUND
    The Transparency in Reporting of Adversarial Contributions to Education (TRACE) Act will:

    Require schools to allow parents the opportunity to review curriculum that has been provided by or purchased with foreign funds.
    Require that schools notify parents of any foreign contracts or financial transactions they partake in.
    Stipulate parents be notified of how many school employees are being compensated by another country or foreign adversary, and whether foreign nations have donated to the institution.

    Sen. Cruz first introduced this legislation in 2024.

    MIL OSI USA News

  • MIL-OSI USA: Kaine, Schumer, Shaheen, & Wyden Announce Intent to Challenge Trump’s Tariffs on Brazil

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine

    WASHINGTON, D.C.—Today, U.S. Senator Tim Kaine (D-VA), Senate Minority Leader Chuck Schumer (D-NY), and U.S. Senators Jeanne Shaheen (D-NH) and Ron Wyden (D-OR) announced their intent to file privileged legislation to challenge President Donald Trump’s tariffs on goods from Brazil in response to steps Brazil is taking to hold friend of Trump and former Brazilian President Jair Bolsonaro accountable for attempting a coup. The additional tariffs announced by Trump will put the total Trump tariffs on Brazilian exports at 50 percent, raising costs for Americans on basic household goods.

    In an executive order issued yesterday, Trump invoked the International Emergency Economic Powers Act (IEEPA) to impose the tariffs. Any one senator can challenge the use of IEEPA with a privileged resolution, such as the one the lawmakers will file. That means the Senate will be required to vote on the legislation.

    “President Trump has no interest in lowering costs for the American people. If he did, he would not be imposing tariffs and starting senseless trade wars,” said the senators. “We’re particularly concerned about these tariffs on Brazil—which are being put into place to get the Brazilian Supreme Court to stop its prosecution of Trump’s longtime friend Jair Bolsonaro, Brazil’s former president who is facing criminal charges for inciting a violent coup. This is certainly not what tariffs are intended to be used for, and they will raise prices for Americans. That’s why we’ll be introducing legislation to challenge these reckless tariffs against Brazil.”

    Americans import more than $40 billion annually from Brazil, including nearly $2 billion’s worth of coffee. Trade between the U.S. and Brazil supports nearly 130,000 jobs in the U.S., and the U.S. actually has a trade surplus with Brazil. A trade war with Brazil would make life more expensive for Americans, harm both the American and Brazilian economies, and drive Brazil closer to China.

    Last week, Kaine and Shaheen led their colleagues in sending a letter to Trump urging him to end his threats of tariffs on Brazil.

    MIL OSI USA News

  • MIL-OSI USA: Kaine, Curtis, And Merkley Introduce Bipartisan Bill to Address Crimes in Brazilian Amazon and Strengthen Regional Stability

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine

    WASHINGTON, D.C. – Today, U.S. Senators Tim Kaine (D-VA), John Curtis (R-UT), and Jeff Merkley (D-OR), senior members of the Senate Foreign Relations Subcommittee on the Western Hemisphere, introduced the Strengthening the Rule of Law in the Brazilian Amazon Act. The bipartisan legislation addresses crimes committed by transnational criminal organizations and drug trafficking groups, which are devastating communities in and around the Brazilian Amazon, upending the rule of law, and accelerating environmental degradation and deforestation. Violent deaths in the Brazilian Amazon are significantly higher than in other parts of the country. The bill would provide the U.S. government with more tools to support U.S.-Brazil efforts to address these crimes and prioritize identifying investment opportunities for U.S. companies in the Brazilian Amazon.

    “Addressing cartel violence and deforestation in the Brazilian Amazon is important to protecting our national security, promoting stability in the Western Hemisphere, and preserving the environment,” said Kaine, Ranking Member of the SFRC Subcommittee on the Western Hemisphere. “I’m proud to join with Senators Curtis and Merkley to introduce this bipartisan legislation to expand the United States’ role in cracking down on violence, forced displacement, and environmental degradation in the Amazon.”

    “Criminal networks thrive where the rule of law is weak—and when they do, both people and the planet suffer,” said Curtis, Chair of the SFRC Subcommittee on the Western Hemisphere. “This bill helps us partner with Brazil to crack down on lawlessness in the Amazon and support a model of conservation that is also rooted in economic opportunity.“

    “The Amazon provides sanctuary for countless wildlife, and the trees of this tropical forest support not only Brazil’s environment, but also the lungs of the planet,” said Merkley, a senior member of the Senate Foreign Relations Committee.?“As the impacts of climate chaos become deadlier and more frequent—threatening our health, planet, and future—the U.S. must support Brazil’s efforts to stand against the criminal and often violent efforts driving deforestation and environmental degradation in the Brazilian Amazon.”

    Specifically, the bipartisan Strengthening the Rule of Law in the Brazilian Amazon would:

    • Direct the U.S. Secretary of State, in coordination with other U.S. federal agencies, to prioritize supporting Brazil’s efforts to identify and disrupt transnational criminal networks committing environmental crimes.
    • Direct support to local communities and vulnerable areas in the Brazilian Amazon.
    • Recommend the U.S. International Development Finance Corporation (DFC) place an individual in Brazil responsible for identifying sustainable economic opportunities for U.S. businesses in the Brazilian Amazon.
    • Require the Secretary of State to submit a report to Congress regarding drivers of deforestation and environmental degradation in the Brazilian Amazon.
    • Advise the United States to encourage international financial institutions to prioritize promoting sustainable development in the Amazon and oppose loans or programs that would exacerbate environmental crimes in the region.

    Full text of the bill is available here.

    MIL OSI USA News

  • Judges question whether Trump tariffs are authorized by emergency powers

    Source: Government of India

    Source: Government of India (4)

    U.S. appeals court judges sharply questioned on Thursday whether President Donald Trump’s tariffs were justified by the president’s emergency powers, after a lower court said he exceeded his authority with sweeping levies on imported goods.

    The U.S. Court of Appeals for the Federal Circuit in Washington, D.C., is considering the legality of “reciprocal” tariffs that Trump imposed on a broad range of U.S. trading partners in April, as well as tariffs imposed in February against China, Canada and Mexico.

    In hearing arguments in two cases brought by five small U.S. businesses and 12 Democratic-led U.S. states, judges pressed government lawyer Brett Shumate to explain how the International Emergency Economic Powers Act (IEEPA), a 1977 law historically used for sanctioning enemies or freezing their assets, gave Trump the power to impose tariffs.

    Trump is the first president to use IEEPA to impose tariffs.

    The judges frequently interrupted Shumate, peppering him with a flurry of challenges to his arguments.

    “IEEPA doesn’t even say tariffs, doesn’t even mention them,” one of the judges said.

    Shumate said that the law allows for “extraordinary” authority in an emergency, including the ability to stop imports completely. He said IEEPA authorizes tariffs because it allows a president to “regulate” imports in a crisis.

    The states and businesses challenging the tariffs argued that they are not permissible under IEEPA and that the U.S. Constitution grants Congress, and not the president, authority over tariffs and other taxes.

    Neal Katyal, a lawyer for the businesses, said the government’s argument that the word “regulate” includes the power to tax would be a vast expansion of presidential power, Katyal said.

    The arguments – one day before Trump plans to increase tariff rates on imported goods from nearly all U.S. trading partners – mark the first test before a U.S. appeals court of the scope of his tariff authority. The president has made tariffs a central instrument of his foreign policy, wielding them aggressively in his second term as leverage in trade negotiations and to push back against what he has called unfair practices.

    Trump has said the April tariffs were a response to persistent U.S. trade imbalances and declining U.S. manufacturing power.

    He said the tariffs against China, Canada and Mexico were appropriate because those countries were not doing enough to stop illegal fentanyl from crossing U.S. borders. The countries have denied that claim.

    Shumate cited a 1975 appeals court decision that authorized President Richard Nixon’s across-the board surcharge of 10% on imported merchandise to slow inflation. But that decision added that the president did not have authority to impose “whatever tariff rates he deems desirable.”

    Shumate also said that courts cannot review a president’s actions under IEEPA or impose additional limits that are not included in the law. Several judges said that the argument would essentially allow one law, IEEPA, to overwrite all other U.S. laws related to tariffs and imports.

    Katyal said the Trump administration’s argument ignored the more limited nature of Nixon’s tariffs and changes to the law since the 1970s.

    “No trade law in 200 years has been interpreted to give the president this power,” Katyal said.

    The case is being heard by a panel of all of the court’s active judges, eight appointed by Democratic presidents and three appointed by former Republican presidents. The timing of the court’s decision is uncertain, and the losing side will likely appeal quickly to the U.S. Supreme Court.

    TRADE NEGOTIATIONS

    Tariffs are starting to build into a significant revenue source for the federal government, with customs duties in June quadrupling to about $27 billion, a record, and through June have topped $100 billion for the current fiscal year. That income could be crucial to offset lost revenue from Trump’s tax bill passed into law earlier this month.

    But economists say the duties threaten to raise prices for U.S. consumers and reduce corporate profits. Trump’s on-again, off-again tariff threats have roiled financial markets and disrupted U.S. companies’ ability to manage supply chains, production, staffing and prices.

    On May 28, a three-judge panel of the U.S. Court of International Trade sided with the Democratic states and small businesses that challenged Trump. It said that the IEEPA did not authorize tariffs related to longstanding trade deficits.

    The Federal Circuit has allowed the tariffs to remain in place while it considers the administration’s appeal.

    The case will have no impact on tariffs levied under more traditional legal authority, such as duties on steel and aluminum imports.

    The president recently announced trade deals that set tariff rates on goods from the European Union and Japan, following smaller trade agreements with Britain, Indonesia and Vietnam. Trump’s Department of Justice has argued that limiting the president’s tariff authority could undermine ongoing trade negotiations, while other Trump officials have said that negotiations have continued with little change after the initial setback in court.

    Trump has set an August 1 date for higher tariffs on countries that don’t negotiate new trade deals.

    There are at least seven other lawsuits challenging Trump’s invocation of IEEPA, including cases brought by other small businesses and California.

    A federal judge in Washington, D.C., ruled against Trump in one of those cases, and no judge has yet backed Trump’s claim of unlimited emergency tariff authority.

    (Reuters)

  • MIL-OSI United Nations: IAEA-Supported Laboratory Opens to Fight Microplastics in Galapagos Islands

    Source: International Atomic Energy Agency (IAEA)

    A new laboratory supported by the International Atomic Energy Agency (IAEA) was officially inaugurated this month in the Galapagos Islands to address the growing threat of marine microplastic pollution.

    The Oceanography and Microplastics Laboratory was established by the government in Ecuador, with support from the IAEA, to monitor and analyse microplastic pollution in the Galapagos Islands. Designated a UNESCO World Heritage Site, the Galapagos Islands are renowned for their extraordinary biodiversity and unique evolutionary adaptations, shaped by their remote location some 1000 kilometres west of mainland Ecuador.

    While a robust monitoring and cleanup programme is in place to tackle the estimated six tonnes of plastic waste that wash ashore on the islands each year, microplastics — plastic particles smaller than five millimetres — pose a more complex challenge for the Galapagos National Park, a protected area encompassing 97% of the islands.

    Nuclear-derived techniques can help detect and analyse microplastic particles too small for traditional monitoring. The laboratory is now analysing water samples and will be able to analyse sediment, and biota samples from the islands at a microscopic scale to identify the types of polymers and improve the understanding of how they disperse in the marine environment where they can endanger marine life.

    In a video address at the opening ceremony for the laboratory on 17 July, IAEA Director General Rafael Mariano Grossi said the laboratory — situated on the Santa Cruz Island — will be an active partner in environmental monitoring and reporting of microplastic pollution for Ecuador, including the Galapagos Islands.

    “The laboratory offers new opportunities to conduct studies on the environmental impact on the vulnerable and relevant biodiversity of the Islands, helping authorities to take and implement more precise control measures aimed at the protection and conservation of the Galapagos National Park,” he added.

    The new laboratory marks a significant milestone in the IAEA’s NUTEC Plastics initiative, which has supported countries since its launch in 2020 in researching microplastics and applying nuclear techniques to enhance recycling processes. The support to the Galapagos Islands follows the IAEA’s work in Antarctica — another valuable ecosystem — with the launch of microplastics research there in 2024.

    The data generated in the new laboratory will enable local and national authorities to more accurately assess plastic pollution levels and design targeted strategies to mitigate their impact. The information will also feed into the IAEA’s coordinated efforts under the IAEA Marine Environment Laboratories in Monaco to build a global network of laboratories with analytical capacities to monitor and mitigate marine microplastic pollution.

    The IAEA, through its technical cooperation programme, has also strengthened monitoring and analytical capacities in institutions such as the Galapagos National Park and the Escuela Superior Politécnica del Litoral (ESPOL) in Guayaquil, to address the growing threat of marine pollution from microplastics in the Galapagos Islands. The IAEA has allocated nearly €1 million to provide the new laboratory with equipment and training for monitoring marine stressors such as ocean acidification, eutrophication, and microplastic pollution — all of which threaten the region’s unique biodiversity and ecosystems.

    MIL OSI United Nations News

  • MIL-OSI USA News: ICYMI: “Trump nailed the biggest trade deal in American history and proved everyone wrong – again!”

    Source: US Whitehouse

    President Donald J. Trump’s trade deal with the European Union has been hailed as among the most consequential trade deals in history — securing massive investments, finally addressing the lopsided trade deficitsecuring new market access, and more.

    It’s just the latest example of just how wrong President Trump’s critics have been — a fact highlighted by the New York Post’s Miranda Devine in a new op-ed:

    “When President Trump nailed the biggest deal in history on Sunday with the European Union on trade, you could almost hear the sound of egg splattering all over the faces of experts across the Atlantic.

    Economists, Democrats and Never-Trumpers have confidently predicted economic doom and gloom, ever since the self-proclaimed Tariff Man declared April 2 as ‘Liberation Day,’ fulfilling his long-held personal theory that tariffs are key to economic wealth.

    Trade war! Recession! Stagflation! Skyrocketing inflation! Stock market crash!

    You name it, they predicted Trump’s tariffs would sink the economy.

    Trump was defying economic orthodoxy, so he just had to be wrong.

    But it’s turned out that the lofty group-thinkers were wrong, not that most of them will admit it.”

    Click here to read the full article.

    MIL OSI USA News

  • MIL-OSI USA: Attorney General Bonta Issues Consumer Alert Amid Increase in Reported Scams Targeting the Military Community

    Source: US State of California

    Thursday, July 31, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    Does an offer seem too good to be true? Take a tactical pause to evaluate  

    OAKLAND — In recognition of Military Consumer Month, Attorney General Rob Bonta today issued a consumer alert to help protect California service members, veterans, and their family members from targeted common scams and fraud. The military community and their families are often targets for predatory scammers: According to the Federal Trade Commission, military consumers nationwide reported over 99,400 fraud complaints last year — an increase from 2023’s approximately 93,000 complaints — including 44,587 imposter scams that reportedly cost them and their families over $199 million.  

    “More and more often, service members, veterans, and their families are targets for predatory scammers promising everything from home loans to jobs, and continuing education. This is absolutely unacceptable. As part of our commitment to protect those who protect us, my office will continue to bring the full force of the law against those who seek to exploit California’s military community,” said Attorney General Bonta. “If you have fallen victim to a scam or suspect fraudulent activity, get help and share your story so that we can help your fellow service members. You can report fraud to your local military or civilian law enforcement agency, or to the California Department of Justice at oag.ca.gov/report.”

    Why is the Military Community Targeted? 

    Military service members, veterans, and their families are frequently targeted by scammers who want access to their pay and benefits, and who know that military members will often pay even fraudulent or over-stated debts to avoid security clearance issues or other disruptions to their military careers. In addition, the camaraderie that unites the military community is often exploited by impostors who claim to be veterans in attempts to perpetrate scams or access personal information for fraudulent purposes.   

    Common Scams Targeting the Military Community:

    Scammers use a variety of tactics to gain trust. Protect yourself by staying up to date on common military- and veteran-targeted scams. Beware of the following: 

    • Charity Scams: Just because a charity includes the word “veteran” in its name doesn’t mean that veterans are members of the group, or that veterans or their families will benefit from a donation. Scammers will use names that sound legitimate or those that mimic the names of well-known charities to create confusion. Take the time to make an informed decision and be wary of aggressive solicitations. Go to oag.ca.gov/charities, under the Resources & Tools section, and click on Registry Verification Search. If a charity is not listed, it should not be soliciting funds in California. If it is listed, you can view its financial reports, including the IRS Form 990 that the charity is required to file with DOJ’s Registry of Charitable Trusts.
    • Predatory Schools: The GI Bill and other military education programs offer you the chance to attend school and plan for your future, but for-profit schools sometimes target service members and veterans with false promises. Slow down and take the time you need to make the right decision. Predatory schools often use high-pressure sales tactics to try to get you to sign up. It’s important to ask for information about the programs, such as graduation rates, job placement, and graduate salary information. Offers that seem too good to be true generally are. Further, don’t forget that educational opportunities at the California Community Colleges, California State University, and University of California may be available to you. 
    • Home Loan Scams: Be aware of scammers that — through phone calls or fraudulent mailers — claim to be affiliated with the government, the Department of Veterans Affairs, or your home loan servicer. These fraudsters may attempt to convince you to agree to loan modifications, refinance your home, or make payments on your loans. Be cautious of any individual or lender that contacts you and asks you to pay fees upfront before receiving any services; tells you to cancel your mortgage payment and resend the funds elsewhere; tells you to make payments to someone other than your current loan servicer; or pressures you to sign papers you haven’t had a chance to read thoroughly or that you don’t understand — including asking you to sign over the title to your property. 
    • Identity Theft and Fraud: Some scammers will pretend to be from the Department of Defense, Department of Veterans Affairs, or other official organizations in order to get your personal information so that they can commit identity theft or fraud. Before you provide any information, always make sure a request is coming from an official organization by doing a quick search on the internet or consulting a trusted source to get the organization’s real contact information. Never trust the contact information given by the person that is asking for your personal information, as scammers often give out fake contact information. Be wary of letters and emails that have misspellings, look unprofessional, or send you to a non-government website for information or action, as these are almost always fake. Lastly, never give out your Social Security number to receive military or veteran discounts. Scammers often promise military or veteran discounts in order to obtain personal information. 
    • Job Scams: Service members looking for new career opportunities after leaving service are a target for scammers posting fictitious job listings with the goal of stealing their personal information and finances. Avoid becoming a victim of job scams by conducting thorough research on the company. Additionally, stick to well-known job search platforms and government career websites when looking for job opportunities. Remember, legitimate employers will never require you to pay fees for applications, interviews, or background checks. You should also look out for fake check scams, which occur when a scammer posing as an employer sends you a counterfeit check to deposit into your account. The scammer will then ask you to send a portion of the funds back to them or a third party, while letting you keep some as payment. Eventually, the bank reverses the fake check, leaving you stuck paying the money back to the bank. If something feels off or suspicious during the job search, trust your instincts and end communication immediately.
    • Pension Scams: Veterans ages 65 and over are targeted by scam financial advisers who try to persuade senior veterans to buy costly annuities or transfer their assets into trusts, or pay unnecessary and illegal fees for help with a veterans pension application. These “advisers” claim to help veterans qualify for Aid and Attendance or other veterans benefits, but may cause you to lose eligibility or access to pension, disability, or healthcare benefits. If you are interested in Aid and Attendance or other veterans benefits, you can get free help from your County Veterans Service Office here.
    • Affinity Fraud: Affinity scams target members of identifiable groups, including the military. The perpetrators are — or pretend to be — members of the targeted group, and use sales pitches that rely on group trust and loyalty. In the military community, this includes exploiting the trust that service members have for their fellow service members, and for veterans who previously served. Don’t make a significant purchase, or an investment decision, based on the salesperson’s supposed military service, or the claim that a business is military-friendly or endorsed by the Armed Forces. Take a tactical pause, and shop around for the best deal.
    • Debt Collection and Illegal Threats: Debt collectors may try to trick or scare service members into making payments on debts. It is illegal for debt collectors to do any of the following: revoke your security clearance; contact your command in order to collect a debt (unless they have your consent, given after the debt came due, to do so); discipline or demote you; or garnish your pay. If a debt collector is trying to collect a debt that you do not owe or have already paid, dispute the debt in writing. Tell the debt collector why you do not owe the debt, include copies of any evidence you have, and mail this dispute to the debt collector using registered mail so that you have proof that the collector received it — and make sure to keep copies of everything for yourself. If you dispute the debt within 30 days after the collector first contacted you, the collector must stop collection until it shows you written proof of the debt.
    • Rental Housing Scams: These scams target military personnel looking for housing near a base, especially prevalent during the Permanent Change of Station season. Scammers pretend to be real estate agents and post fake ads for rental properties on websites, sometimes promising military discounts and other incentives in order to get service members to send them money for fees and deposits upfront. If someone insists on receiving money or other payments before a property has been seen, it is likely a rental scam. Avoid wiring money to reserve apartments, and use your installation housing office or established property management companies to locate potential housing. 
    • Predatory Auto Sales and Financing: Car dealers located near military bases may try to lure service members with promises of special deals for military personnel. Often, these so-called deals conceal the terms of purchase for the vehicle and result in the service member drastically overpaying for both the vehicle and the cost of financing. For example, dealers may insist that military personnel will not qualify for financing unless they purchase overpriced and unnecessary add-ons. Other times, the dealer may tell a service member who just purchased a car that the initial financing fell through and insist on renegotiating for worse terms. You should not rely on oral promises, nor feel pressured to enter into any purchase, without first reading and understanding the contract. If you are looking to purchase a car, you should explore all of your options for financing — including by contacting your bank or credit union — before making a purchase.  

    Protect Yourself from Scams:  

    • Bring a battle buddy when making big decisions, and take a tactical pause: Take your time with big decisions and get advice. A business that pressures you to make a quick decision or to not talk with your family, friends, a military financial counselor, or an officer or NCO that you trust may be out to scam you.
    • Take advantage of free annual credit reports: You are entitled to one free credit report every year from each of the three national credit bureaus: Equifax, Experian and TransUnion. Your credit history contains information from financial institutions, utilities, landlords, insurers, and others. By checking your credit reports at least once a year, you can identify signs of identity theft, as well errors in your report that could be raising the cost of your credit. Order your free annual credit reports by phone, toll-free, at 1-877-322-8228, or online at www.annualcreditreport.com.
    • Place a Fraud Alert: If your identity is stolen, put a fraud alert on your credit report by contacting the three main credit reporting agencies: Equifax, Experian, and TransUnion. Also, consider requesting a credit freeze, which will restrict access to your credit file, making it difficult for identity thieves to open new accounts in your name. Report identity theft right away and get a recovery plan at identitytheft.gov. Additionally, file a police report with your local sheriff or police department and keep a copy for your records.
    • Report Suspicious Activity: Never give out personal information to a lender or servicer that contacts you out of the blue. If you are feeling unsure, hang up and call your loan servicer directly at the number that is listed on your mortgage statement. Report suspicious activity to the Office of the Attorney General at oag.ca.gov/report and file a complaint with the FTC at reportfraud.ftc.gov.
    • Protect your online information and accounts with strong passwords: Protect yourself by using different, unique passwords for each of your online accounts. Make sure that the passwords you use are at least eight characters, including a mix of letters, numbers, and symbols.
    • Check your credit card bills and bank statements often: Look for unauthorized charges, withdrawals, or unexpected bills, and report irregular activity to your bank as soon as you see it. If you notice that a bill didn’t arrive on time, it may mean that someone has changed the contact information on your account in order to hide fraudulent charges. Don’t share personal information: Be careful about what personal information you share, such as your address or financial information.
    • Sign up for the Enhanced Homeowner Notification Program: If you reside in Los Angeles County, you may sign up to receive mailed copies of documents recorded against your home, allowing you to review recorded real estate documents so you are aware of actions taken against your property.

    If you believe you have been the victim or target of a scam, immediately contact your local police department or reach out to your base legal office. For the legal office’s contact information, ask your command or visit to legalassistance.law.af.mil/. California National Guard personnel can also obtain legal help at calguard.ca.gov. You may also file a complaint with the Office of the Attorney General at oag.ca.gov/report. For additional information on military-targeted scams, visit our website at oag.ca.gov/consumers/general/military.

    # # #

    MIL OSI USA News

  • MIL-OSI Security: Hays man sentenced to 4 years in prison on gun charges

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    BILLINGS – A Hays man who possessed illegal firearms was sentenced today to 48 months in prison to be followed by 3 years of supervised release, U.S. Attorney Kurt Alme said.

    Wylon Alfred Plainfeather, 54, pleaded guilty in March 2025 to one count of possession of an unregistered firearm and one count of possession of an unregistered silencer.

    U.S. District Judge Susan P. Watters presided.

    The government alleged in court documents that on December 27, 2022, law enforcement officers responded to a Billings residence to search for a probationer. The probationer was not present, but officers searched the house and found three firearms in the basement.

    As law enforcement was preparing to leave the residence following the search, Plainfeather pulled into the driveway. He admitted owning all three guns and acknowledged one was a sawed-off shotgun and another, a .22 caliber rifle, had a tube on it. Plainfeather said he fired the gun with the tube and claimed it was not very effective at making it quieter. He said he got all the firearms from the reservation and that he traded for them. Law enforcement officers confirmed the firearms were in operable condition but not registered to Plainfeather (or anyone else) in the National Firearms Registration and Transfer Record (NFRTR).

    Assistant U.S. Attorney Kelsey Hendricks prosecuted the case. The investigation was conducted by the ATF, Montana Division of Criminal Investigation, and Montana Probation and Parole.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    XXX

    MIL Security OSI

  • MIL-OSI Security: D.C. Guard Tests Skills With Jamaican, Barbadian Forces

    Source: United States SOUTHERN COMMAND

    Soldiers from the District of Columbia National Guard; Jamaica Defence Force, or JDF; Jamaica National Reserve; and Barbados Defence Force Reserves recently participated in the Caribbean Regional Training Camp 2025, a joint exercise aimed at bolstering regional security, enhancing disaster response capabilities and strengthening interoperability among the participating nations.

    MIL Security OSI

  • MIL-OSI NGOs: IAEA-Supported Laboratory Opens to Fight Microplastics in Galapagos Islands

    Source: International Atomic Energy Agency (IAEA) –

    The Galapagos Islands where the Oceanography and Microplastics Laboratory, supported by the IAEA, was established to monitor and analyse microplastic pollution.

    A new laboratory supported by the International Atomic Energy Agency (IAEA) was officially inaugurated this month in the Galapagos Islands to address the growing threat of marine microplastic pollution.

    The Oceanography and Microplastics Laboratory was established by the government in Ecuador, with support from the IAEA, to monitor and analyse microplastic pollution in the Galapagos Islands. Designated a UNESCO World Heritage Site, the Galapagos Islands are renowned for their extraordinary biodiversity and unique evolutionary adaptations, shaped by their remote location some 1000 kilometres west of mainland Ecuador.

    While a robust monitoring and cleanup programme is in place to tackle the estimated six tonnes of plastic waste that wash ashore on the islands each year, microplastics — plastic particles smaller than five millimetres — pose a more complex challenge for the Galapagos National Park, a protected area encompassing 97% of the islands.

    Nuclear-derived techniques can help detect and analyse microplastic particles too small for traditional monitoring. The laboratory is now analysing water samples and will be able to analyse sediment, and biota samples from the islands at a microscopic scale to identify the types of polymers and improve the understanding of how they disperse in the marine environment where they can endanger marine life.

    In a video address at the opening ceremony for the laboratory on 17 July, IAEA Director General Rafael Mariano Grossi said the laboratory — situated on the Santa Cruz Island — will be an active partner in environmental monitoring and reporting of microplastic pollution for Ecuador, including the Galapagos Islands.

    “The laboratory offers new opportunities to conduct studies on the environmental impact on the vulnerable and relevant biodiversity of the Islands, helping authorities to take and implement more precise control measures aimed at the protection and conservation of the Galapagos National Park,” he added.

    The new laboratory marks a significant milestone in the IAEA’s NUTEC Plastics initiative, which has supported countries since its launch in 2020 in researching microplastics and applying nuclear techniques to enhance recycling processes. The support to the Galapagos Islands follows the IAEA’s work in Antarctica — another valuable ecosystem — with the launch of microplastics research there in 2024.

    The data generated in the new laboratory will enable local and national authorities to more accurately assess plastic pollution levels and design targeted strategies to mitigate their impact. The information will also feed into the IAEA’s coordinated efforts under the IAEA Marine Environment Laboratories in Monaco to build a global network of laboratories with analytical capacities to monitor and mitigate marine microplastic pollution.

    The IAEA, through its technical cooperation programme, has also strengthened monitoring and analytical capacities in institutions such as the Galapagos National Park and the Escuela Superior Politécnica del Litoral (ESPOL) in Guayaquil, to address the growing threat of marine pollution from microplastics in the Galapagos Islands. The IAEA has allocated nearly €1 million to provide the new laboratory with equipment and training for monitoring marine stressors such as ocean acidification, eutrophication, and microplastic pollution — all of which threaten the region’s unique biodiversity and ecosystems.

    MIL OSI NGO

  • MIL-OSI USA: ICYMI: Congressman Nathaniel Moran Joins NewsNation to Discuss Israel, Trade with Europe and China

    Source: Congressman Nathaniel Moran (R-TX-01)

    In case you missed it, Congressman Nathaniel Moran (TX-01) joined NewsNation’s Morning in America to weigh in on key national and international issues, including the humanitarian situation in Gaza, trade negotiations with the EU and China.

    Congressman Moran, a member of the House Ways and Means Committee and the House Select Committee on the Chinese Communist Party, offered the following remarks:

    On the Gaza humanitarian crisis and Israel’s responsibility:

    “I’m glad to see more is being done to address the humanitarian crisis in Gaza. But let’s not forget that the cause of this crisis is Hamas. Hamas is the aggressor and a terrorist organization. It could end this overnight by laying down its arms and choosing peace—but it won’t.”

    On President Trump’s Trade Talks with the EU:

    “President Trump is being very effective. He’s shown power and prowess on the world stage. Because he’s engaged, so many countries are coming to the table. We’re getting closer and closer to finalizing deals that prioritize fair and reciprocal trade.”

    On Treasury-Led Talks with China:

    “I’m glad to see the U.S. Treasury engaging China directly. But we must remember: China sees us as an adversary. Any agreement must include strong enforcement mechanisms—because they will try to circumvent the rules and cheat to their advantage.”

    Watch the full interview HERE.

    ###

    MIL OSI USA News

  • MIL-OSI Analysis: European gloom over the Trump deal is misplaced. It’s probably the best the EU could have achieved

    Source: The Conversation – UK – By Maha Rafi Atal, Adam Smith Senior Lecturer in Political Economy, School of Social and Political Sciences, University of Glasgow

    The trade deal between the US and the European Union, squeezed in days before the re-introduction of Donald Trump’s “liberation day” tariffs, is reflective of the new politics of global trade. Faced with the threat of 30% baseline tariffs from Washington, as well as additional levies on specific sectors, the EU has secured a partial reprieve of a flat 15% tariff on all goods.

    Was this the best the bloc could have achieved? In the time available, it may well have been. The 15% rate is higher than the UK secured earlier this year, but it’s significantly below the level applied to China and Mexico, and on par with Japan.

    The EU has also managed a “zero-for-zero” tariffs deal on some hi-tech goods, notably semiconductors vital for products like phones and laptops. This is something the UK did not push for or secure in its own framework agreed with the US president.




    Read more:
    Donald Trump has reduced tariffs on British metals and cars, but how important is this trade deal? Experts react


    What’s more, EU leaders have argued that agreeing to the deal has security benefits in protecting dwindling US support for European defence. The urgency of Europe’s security concerns in Ukraine made these talks different from trade negotiations in the first Trump administration, when Europe could afford to be more aggressive.

    The biggest winners in this deal are Europe’s carmakers. The US has collapsed various sector-specific duties on goods like aircraft, cars and automotive parts into the 15% ceiling. This effectively reduces tariffs on EU-made cars (from 27.5%).

    American automakers, meanwhile, rely heavily on parts from Mexico and China – still subject to higher tariffs at the time of writing. This makes EU vehicles more competitive for US consumers than “American” cars that rely on overseas parts.

    Most importantly however, like the UK deal before it, the new EU agreement is a statement of understanding between the White House and the European Commission, rather than a formal treaty. A treaty would be subject to parliamentary ratification on both sides.

    But the semi-formal nature of this agreement allows both Trump and European leaders to portray the deal as a “win” by playing fast and loose with what’s actually in it.

    For example, the Trump administration will celebrate an EU commitment to buy US$250 billion (£189 billion) in US energy imports annually. Yet the concession holds no legal weight in the EU. The European Commission, which negotiated with Trump, does not buy any energy nor does it manage the power grid inside its 27 member states.

    The commission can encourage, but cannot compel, those states to buy American. (Indeed, it might want to do so anyway, since it helps it to pivot away from Russian gas). But ultimately, member states and businesses decide where their energy supply comes from, and they are not direct parties to the deal. Only a formal treaty ratified by the European parliament would compel them.

    No guarantees from Trump

    The informal nature of this agreement also allows EU member states to protest against what they see as capitulation to Trump’s demands without real consequence. After all, there is not yet a treaty text they would be required to vote on or implement.

    The Trump administration similarly imposed its sweeping tariff threats in early spring without a vote from Congress, and has been making ad hoc changes to the rates in the same way.

    On the one hand, this means European countries may not ultimately be required to implement some of the deal’s less savoury elements such as the energy purchases or lowering the bloc’s own tariffs on US goods.

    On the other hand, this means the Trump administration – notorious for abrupt changes of turn – can also renege at any time. In reality, there is little the EU can do about this. The question of leverage looms large. Trump’s longstanding antipathy towards the EU – seeing it less as an ally and more as a rival – meant that Brussels was never negotiating from a position of strength.

    The fact that the EU avoided the worst-case scenario, protected key sectors and secured other sector-specific advantages suggests a deal shaped not by triumph, but by containment of Trump. Since the deal was announced, the picture emerging from many European leaders has been one of gloom. True, the EU didn’t win – but it survived. And that, for now, is probably enough.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.

    Maha Rafi Atal does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. European gloom over the Trump deal is misplaced. It’s probably the best the EU could have achieved – https://theconversation.com/european-gloom-over-the-trump-deal-is-misplaced-its-probably-the-best-the-eu-could-have-achieved-262369

    MIL OSI Analysis

  • MIL-OSI Analysis: Will the latest diplomatic moves to end the war in Gaza work?

    Source: The Conversation – UK – By Jonathan Este, Senior International Affairs Editor, Associate Editor, The Conversation

    This article was first published in The Conversation UK’s World Affairs Briefing email newsletter. Sign up to receive weekly analysis of the latest developments in international relations, direct to your inbox.


    It feels as if things are moving at completely different speeds in Gaza and in the outside world. From the embattled Gaza Strip the narrative is depressingly familiar. Dozens more Palestinian civilians have been killed in the past 24 hours as they try to get hold of scarce supplies of food.

    Aid agencies report that despite air drops of supplies and “humanitarian pauses” in the fighting, the amount of food getting through to the starving people of Gaza remains pitifully insufficient.

    Two more children are reported to have died of starvation, bringing the total number of hunger-related deaths to 159, according to Palestinian sources quoted by al-Jazeera.

    US envoy Steve Witkoff arrived in Jerusalem for more talks as the US president Donald Trump posted his latest bout of social media diplomacy on his TruthSocial site, a message which appears pretty faithful to the Netanyahu government’s position: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Both sides continue to reject the other side’s demands, bringing ceasefire negotiations to an effective standstill.

    In the outside world, meanwhile, events seem to be gathering pace. A “high-level conference” at the United Nations in New York brought together representatives of 17 states, the European Union and the Arab League, resulting in “a comprehensive and actionable framework for the implementation of the two-state solution and the achievement of peace and security for all”.


    Sign up to receive our weekly World Affairs Briefing newsletter from The Conversation UK. Every Thursday we’ll bring you expert analysis of the big stories in international relations.


    What first catches the eye about this proposal, which was signed by Saudi Arabia,
    Qatar, Egypt and Jordan, is that it links a peace deal with the disarming and disbanding of Hamas. It also condemns the militant group’s savage attack on southern Israel on October 23 2023, which was the catalyst for the latest and arguably most grievous chapter of this eight-decade conflict. It’s the first time the Arab League has taken either of these positions.

    The New York declaration, as it has been dubbed, envisages the complete withdrawal of Israeli security forces from Gaza and an end to the displacement of Palestinians. Government will be the responsibility of the Palestinian Authority (PA), and a conference to be scheduled in Egypt will design a plan for the reconstruction of Gaza, much of which has been destroyed in the 20-month assault by the Israel Defense Forces.

    It is, writes Scott Lucas, a “bold initiative” which, “in theory could end the Israeli mass killing in Gaza, remove Hamas from power and begin the implementation of a process for a state of Palestine. The question is whether it has any chance of success.”

    Lucas, an expert in US and Middle East politics at the Clinton Institute of University College Dublin, is not particularly sanguine about the short-term prospects for a ceasefire and the alleviation of the desperate conditions for the people of Gaza. But what it represents more than anything else, is “yet another marker of Israel’s increasing isolation”.

    He points to recent announcements that France, the UK (subject to conditions) and Canada will recognise the state of Palestine at the UN general assembly in September. The prospect of normalisation between Israel and Arab states, at the top of the agenda a few short years ago, is now very unlikely. And in the US, which remains Israel’s staunchest ally, a Gallup poll recently found that public opinion is turning against Israel and its prime minister, Benjamin Netanyahu.




    Read more:
    New peace plan increases pressure on Israel and US as momentum grows for Palestinian statehood


    But how important are the declarations by France, the UK and Canada of intent to potentially recognise Palestinian statehood, asks Malak Benslama-Dabdoub. As expert in international law at Royal Holloway University of London, who has focused on the question of Palestinian statelessness, Benslama-Dabdoub thinks that the French and British pledges bear closer examination.

    The French declaration was made on July 24 on Twitter by the president, Emmanuel Macron. Macron envisages a “demilitarised” state, something Benslama-Dabdoub sees as a serious problem, as it effectively denies the fundamental right of states to self-determination and would rob a future Palestinian state of the necessary right to self-defence.

    The declaration by the UK prime minister that Britain may also recognise Palestinian statehood in September is framed as a threat rather than a pledge. Unless Israel agrees to a ceasefire, allows the UN to recommence humanitarian efforts and engages in a long-term sustainable peace process, the UK will go ahead with recognising Palestine at the UN.

    You have to consider that the UK government’s statement said that the position has always been that “Palestinian statehood is the inalienable right of the Palestinian people”. So to frame this as a threat rather than a demand is arguably to deny that “inalienable right”.




    Read more:
    UK to recognise Palestinian statehood unless Israel agrees to ceasefire – here’s what that would mean


    Paul Rogers also sees serious problems with the pledges to recognise Palestinian statehood. Demands for Hamas to disarm and play no further role in Palestinian government he sees as a non-starter as is the thought of a demilitarised Palestine. “Neither plan has the slightest chance of getting off the ground.”

    Rogers, who has researched and written on the Middle East for more than 30 years, also thinks that without the full backing of the US there is very little chance that a peace plan could succeed.

    Rogers finds it hard to believe that Washington will change tack on the Palestinian question, “unless the US president somehow gets the idea that his own reputation is being damaged”. There’s always a chance of this. News from the Gaza Strip is relentlessly horrifying and the aforementioned polls suggest many voters are reassessing their views of the conflict. But Trump is heavily indebted for his re-election to the far-right Christian Zionist movement, who wield a great deal of power with the White House.

    The other thing that might influence the conflict is if enough of the IDF’s top brass recognise the futility of waging what has always been an unwinnable conflict. This, writes Rogers, is whispered about in Israel’s military circles and one eminent retired general, Itzhak Brik, has come out and said: “Hamas has defeated us.”

    These, writes Rogers, are currently the only routes to an end to the conflict.




    Read more:
    UK and France pledges won’t stop Netanyahu bombing Gaza – but Donald Trump or Israel’s military could


    Inside Trumpian diplomacy

    We mentioned earlier that the Canadian prime minister, Mark Carney, has also pledged to recognise the state of Palestine in September. This was immediately greeted by Trump with the threat that he does so it will derail a trade deal with the US. Whether this will cut any ice with Carney, who had to make concessions to get the trade deal done in the first place, remains to be seen.

    But there’s a broader point here, writes Stefan Wolff. As Wolff reports, this week the foreign ministers of the Democratic Republic of Congo and Rwanda got together in Washington to sign a ceasefire deal, brokered by the US. Trump also claims to have successfully ended a conflict between India and Pakistan at the end of May and hostilities between Thailand and Cambodia earlier this month.

    Meanwhile his efforts to secure peace deals, or even a lasting ceasefire, in Gaza or Ukraine have been unsuccessful.

    Wolff considers why some countries respond to Trump’s diplomatic efforts while others don’t. There are a number of reasons, principally the US president’s ability to apply leverage through trade deals or sanctions and the differing complexity of the conflicts.

    He also points to the depleted resources of the US state department, Trump’s use of personal envoys with little foreign affairs experience and the US president’s insistence on making all the important decisions himself. He concludes: “The White House simply may not have the bandwidth for the level of engagement that would be necessary to get to a deal in Ukraine and the Middle East.”




    Read more:
    Why Donald Trump has stopped some conflicts but is failing with Ukraine and Gaza


    One US government department whose resources haven’t been depleted under Donald Trump is the US Immigration and Customs Enforcement agency, known as Ice. Part of the Department of Homeland Security, Ice has been responsible for identifying and detaining non-citizens and undocumented migrants.

    Their agents carry guns, wear masks and typically operate in plain clothes, although they often wear military kit. The agency received massive funding via Trump’s One Bzig Beautiful Bill Act earlier this month, which will allow the agency to recruit hundreds, if not thousands, of new agents. The number of arrests is increasing steadily, as is the disquiet their operations are prompting in many American cities, where opposition protests are also growing.

    Dafydd Townley, an expert in US politics at the University of Portsmouth, explains how Ice operates and where it sits in Donald Trump’s plan to deport millions of illegal migrants from the US.




    Read more:
    Masked and armed agents are arresting people on US streets as aggressive immigration enforcement ramps up


    World Affairs Briefing from The Conversation UK is available as a weekly email newsletter. Click here to get updates directly in your inbox.


    ref. Will the latest diplomatic moves to end the war in Gaza work? – https://theconversation.com/will-the-latest-diplomatic-moves-to-end-the-war-in-gaza-work-262380

    MIL OSI Analysis

  • MIL-OSI Canada: Classrooms under construction will add nearly 1,500 student spaces

    Source: Government of Canada regional news

    Construction is underway for new classrooms at seven schools across B.C., creating nearly 1,500 additional student spaces to support rapidly growing communities.

    “Communities across the province are growing, and with that comes the urgent need for more schools and more classroom space,” said Bowinn Ma, Minister of Infrastructure. “We’re building schools faster than we ever have before, and we’re doing it with smart solutions that get students into safe, modern classrooms right in their neighbourhood.”

    New K-12 classrooms are breaking ground this summer in:

    • Chilliwack;
    • Delta;
    • Fort St. John;
    • West Kelowna;
    • Richmond;
    • North Vancouver; and
    • Maple Ridge.

    “Every dollar we invest in education is an investment in our future,” said Lisa Beare, Minister of Education and Child Care. “With modern learning environments, students are better equipped to thrive academically, socially and emotionally.”

    The Province has invested approximately $119 million in these classrooms to support growing school districts.

    “The new addition to Westview Elementary supports a healthy and vibrant learning community,” said Linda Munro, chair, North Vancouver school board. “We are excited by the innovative approach to building that will add more space and modern classrooms to better meet students’ needs.”

    Since 2017, the Province has invested more than $6 billion in school construction and renovation, creating nearly 43,000 new student spaces and more than 39,000 seismically safe seats in B.C. schools. As the province grows, government is committed to working with both school districts and municipalities to provide all students with safe, modern and inspiring places to learn.

    Quotes:

    Kelly Greene, MLA for Richmond-Steveston –

    “This project represents an important investment in the future of our communities. I am so excited to see Tomsett Elementary start construction, as well as the other projects underway across Richmond, like the Diefenbaker Elementary school replacement. When we strengthen our schools, we strengthen our neighbourhoods, support working families and create lasting opportunities for the next generation.”

    Susie Chant, MLA for North Vancouver-Seymour –

    “This is a critical step in meeting the needs of our rapidly growing community. By expanding student spaces, we’re ensuring that every child has access to a quality learning environment close to home.”

    Learn More:

    For more information about K-12 school capital projects in B.C., visit: https://www2.gov.bc.ca/gov/content/education-training/k-12/administration/capital

    A backgrounder follows.

    MIL OSI Canada News

  • MIL-OSI Security: U.S. Marshals Arrest Fugitive Charged with Killing 3 During 2024 Block Party

    Source: US Marshals Service

    Philadelphia, PA – Members of the U.S. Marshals Eastern Pennsylvania Violent Crimes Fugitive Task Force arrested Amir Jones, 32, in the 4900 block of Kershaw Street in Philadelphia. Jones was wanted by the Philadelphia Police Department for 3 counts of homicide in relation to a July 21, 2024, mass shooting in the 1200 block of N. Alden Street. Three people were killed and six injured during a gun battle between two group of males that occurred during a neighborhood block party. On July 23rd, a warrant was issued for Amir Jones, and the case was delegated to the Marshal’s Fugitive Task Force. 

    At 6:00 a.m., investigators from the Marshals Fugitive Task Force in Philadelphia executed a search warrant at an apartment in the 4900 block of Kershaw Street where investigators believed Jones was hiding. Jones initially refused to comply with commands but after 30 minutes of negotiating, Jones surrendered without incident. 

    “High profile shootings will always garner U.S. Marshals Service attention. Be assured, our relentless pursuit of those involved never ceases until the perpetrators of these crimes are captured” said Eric Gartner, United States Marshal for the Eastern District of Pennsylvania.

    The Eastern Pennsylvania Violent Crimes Fugitive Task Force is a team of law enforcement officers led by U.S. Marshals in Philadelphia and the surrounding counties. The task force’s objective is to seek out and arrest violent crime fugitives. Membership agencies include the Philadelphia Police Department, Pennsylvania State Parole Officers, Pennsylvania State Police, Pennsylvania Attorney General Agents, Immigration Customs Enforcement, Chester Police Department, Bucks County Sheriff’s Office, and Delaware County Sheriff’s Office.

    MIL Security OSI

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI: LYNO Launches Early Bird Presale Phase with 16 Million Tokens at $0.050

    Source: GlobeNewswire (MIL-OSI)

    ROAD TOWN, British Virgin Islands, July 31, 2025 (GLOBE NEWSWIRE) — LYNO, a decentralized cross-chain arbitrage protocol powered by artificial intelligence (AI), has officially launched the Early Bird phase of its token presale. This initial phase is offering 16 million $LYNO tokens at the price of $0.050 per token. Once this allocation is sold out, the next phase will see the token price increase to $0.055. This announcement marks the beginning of LYNO’s public sale process as it aims to distribute 28% of its total token supply through a seven-phase community presale.

    This milestone represents a significant step forward in LYNO’s roadmap as it prepares for its official platform deployment. The project’s token sale structure is designed to progressively increase the token price at each stage, incentivizing early participation and distributing value to early supporters.

    Purpose-Built Arbitrage Protocol for DeFi

    LYNO is engineered to automate cross-chain arbitrage opportunities across fragmented decentralized finance (DeFi) markets. Its infrastructure enables users to benefit from price inefficiencies across different blockchain networks, executing profitable trades without requiring any manual intervention. The platform supports over 15 EVM-compatible chains, maximizing market coverage and arbitrage scope.

    The protocol operates on a four-layer architectural model: DataAIExecution, and Settlement. This layered system allows LYNO to constantly monitor real-time price feeds, apply machine learning algorithms to identify profitable opportunities, and execute trades using smart contracts and flash loans. This approach aims to deliver high-speed execution and accuracy, setting the stage for a more efficient decentralized trading environment.

    Integration with Leading Blockchain Bridges

    LYNO’s design includes compatibility with several of the leading cross-chain messaging and liquidity bridges. This includes integration with LayerZeroAxelarWormhole, and others, which ensures seamless capital movement across networks. By using these bridges, LYNO can minimize slippage, reduce latency, and increase transaction success rates in arbitrage operations. These integrations are essential for real-time cross-chain trading, enabling LYNO to maintain its operational speed and accuracy across diverse DeFi markets.

    Utility and Tokenomics

    The $LYNO token is central to the protocol’s operation. It will serve multiple functions within the LYNO ecosystem, including:

    • Governance participation: Token holders can vote on protocol upgrades, fee structures, and future proposals.
    • Staking: Users can stake tokens to receive a share of the protocol’s profits.
    • Tool access: Holders can unlock AI-based real-time analytics and arbitrage monitoring tools.

    LYNO has implemented a multi-layered tokenomic model designed to align user incentives with the long-term success of the platform. Key features include:

    • Buyback and burn mechanisms to support price stability and reduce circulating supply.
    • Liquidity mining incentives for early liquidity providers.
    • Revenue sharing model distributing up to 60% of platform fees to stakers and participants.

    These mechanisms are intended to increase transparency, support decentralization, and maintain consistent user engagement. The project has been audited by Cyberscope, further enhancing its credibility and focus on smart contract security.

    How to Participate in the Presale

    Investors who wish to take part in the Early Bird presale can do so by connecting their wallets—such as MetaMask, Trust Wallet, or any WalletConnect-compatible wallet—to the LYNO presale platform at https://lyno.ai/#presale. The supported payment options for purchasing $LYNO tokens include ETHUSDC, and USDT. Tokens purchased during the presale will be claimable after the conclusion of all presale phases.

    This Early Bird phase is time-sensitive and available on a first-come, first-served basis. After the initial 16 million tokens are sold, the token price will increase from $0.050 to $0.055 in the next stage. This price progression will continue through the subsequent rounds, designed to reward early contributors before the token listing on exchanges.

    Building a Transparent and Automated DeFi Future

    LYNO is part of a new wave of DeFi protocols aiming to reduce inefficiencies and human error in the arbitrage trading process. By leveraging artificial intelligence, cross-chain compatibility, and fully automated systems, LYNO introduces an alternative to manual DeFi trading strategies.

    With increasing fragmentation in liquidity across blockchains and growing interest in interoperable DeFi solutions, LYNO’s protocol arrives at a time when seamless arbitrage execution is becoming increasingly important. The LYNO platform aims to help users unlock value from market inefficiencies while offering governance and income opportunities via staking and community engagement.

    About LYNO

    LYNO is an AI-powered, decentralized cross-chain arbitrage protocol built to automate real-time profitable trades across multiple EVM-compatible chains. The protocol is designed to optimize DeFi trading by offering speed, transparency, and efficiency while leveraging powerful AI technologies and smart contract automation. LYNO’s infrastructure is compatible with top bridge solutions, making it a versatile and forward-looking solution for decentralized arbitrage.

    For More Information, Please Visit:

    Contact:
    LYNO AI
    Email: contact@lyno.ai

    Disclaimer: This content is provided by LYNO. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility.Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7f1c0f27-b1f5-4966-b736-ef6709c13738

    https://www.globenewswire.com/NewsRoom/AttachmentNg/88ca5dde-10a7-4491-b8c2-fd5abf715a3a

    The MIL Network

  • MIL-OSI USA: Congressman Jonathan L. Jackson Commemorates the Illustrious Career of Congressman Danny Davis

    Source: United States House of Representatives – Representative Jonathan Jackson – Illinois (1st District)

    FOR IMMEDIATE RELEASE

    Congressman Jonathan L. Jackson Commemorates the Illustrious Career of Congressman Danny Davis

    WASHINGTON, D.C. – Congressman Jonathan L. Jackson today issued the following statement regarding Congressman Danny Davis’s announcement that he will not seek reelection, marking the conclusion of a truly remarkable career in public service:

    “It is with profound respect and admiration that we acknowledge the impending retirement of my esteemed colleague, Congressman Danny Davis. For decades, Congressman Davis has served the people of Illinois’ 7th Congressional District with unparalleled dedication, embodying a spirit of advocacy that deeply mirrors the African experience of perseverance and progress.

    Chicago is fortunate to call Danny Davis our very own. His journey, beginning in a one-room schoolhouse in Arkansas, is a testament to his extraordinary grit and determination. Rising from such humble beginnings to earn a Ph.D. and become a revered legislator in the halls of Congress, his story is an inspiration to us all. He holds the unique distinction as the only Black person from Arkansas to be in Congress, a powerful symbol of breaking barriers and achieving the impossible.

    Congressman Davis has consistently been a champion for civil rights, affordable housing, prison reentry, and healthcare. His unwavering commitment to his constituents has made him a highest vote getter time and again, reflecting the deep trust and affection he has earned from those he serves. He carries a profound legacy of greatness, built on tireless work and a genuine desire to uplift communities.

    Beyond his legislative achievements, Congressman Davis has always conducted himself with immense grace and undeniable charm. He has been a mentor, a leader, and a beacon of hope for countless individuals. His presence in Congress will be deeply missed, but his impact will resonate for generations.

    We extend our deepest gratitude to Congressman Davis for his exceptional service and wish him all the best in his well-deserved retirement. His contributions to our nation and to the city of Chicago are indelible.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: Sens. Budd, Heinrich Introduce Amendment to Crack Down on Illicit Anti-Obesity Drugs Entering the U.S. from China

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)

    Bipartisan amendment would help ensure FDA can utilize existing statutory authority to protect Americans from counterfeit, unapproved drugs from unregistered facilities in China

    Washington, D.C. — U.S. Senators Ted Budd (R-N.C.) and Martin Heinrich (D-N.M.) recently introduced an amendment to the 2026 Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act to ensure the Food and Drug Administration (FDA) can activate regulatory and enforcement authorities to prevent the importation of illicit weight loss drugs and Active Pharmaceutical Ingredients (API) from the Republic of China and other foreign countries.

    These illicit products, which include unregulated versions of ingredients used in name-brand GLP-1 medicines, are often produced in facilities in China that are not always registered with the FDA and pose serious risks to American consumers, with sometimes fatal consequences.

    “The Chinese Communist Party has proven time and again that it is willing to exploit our supply chain and endanger American lives to advance its own interests,” said Senator Budd. “That includes flooding our country with counterfeit, unapproved weight-loss drugs made in unregulated facilities. It is critically important that the United States maintains the gold standard for safe, effective medicines and we must act decisively to protect American patients. I am glad to partner with Senator Heinrich on this important issue, and I look forward to working with Commissioner Makary and Secretary Kennedy to help ensure the FDA can shut the door on these dangerous products at our borders and hold bad actors accountable.”

    “We have a responsibility to protect Americans from dangerous, counterfeit drugs entering our country,” said Senator Heinrich. “Too many of these unapproved weight-loss drugs are being produced in unregistered facilities in China with no oversight and no regard for safety. That’s why I’m introducing bipartisan legislation with Senator Budd to ensure the FDA can crack down on these illicit imports and keep American consumers safe.”

    BACKGROUND

    A recent Federal Bureau of Investigation (FBI) public service announcement warned that counterfeit weight loss products have been found to contain both “drugs with high levels of impurities” and “unsafe or unapproved drugs” with misbranded or adulterated packaging. To protect America’s supply chain from these potential threats, actions from the FDA may include refusing the entry of illicit drugs and API, issuing warning letters to foreign suppliers, and initiating civil enforcement actions.

    This amendment follows a bipartisan letter Representative Richard Hudson (R-N.C.-09) led in sending to FDA Commissioner Marty Makary, which urged immediate action against the rising threat of illegal, counterfeit anti-obesity medications entering the United States.

    MIL OSI USA News

  • MIL-OSI USA: Lee Introduces Protecting American Jobs Act

    US Senate News:

    Source: United States Senator for Utah Mike Lee

    WASHINGTON – U.S. Senator Mike Lee (R-UT) introduced legislation today to ensure unbiased due process for American workers and businesses in labor practice complaints. The Protecting American Jobs Act blocks the National Labor Relations Board (NLRB) from prosecuting and adjudicating cases – returning adjudicatory power to the U.S. Courts where it belongs and eliminating biased court decisions.

    “Business disputes should be given a fair trial – not biased decisions from federal bureaucrats cosplaying as judges,” said Senator Mike Lee. “The NLRB should never be allowed to adjudicate the very cases it is prosecuting. My legislation will restore the right to a fair trial for workers and businesses as outlined by the Constitution, providing them due process and protection from biased bureaucrats.” 

    Background:

    The National Labor Relations Board (NLRB) currently investigates and adjudicates union representation disputes, unfair labor practice complaints, and contract disputes with federal court review only allowed in limited circumstances. This means that the NLRB acts as investigator, prosecutor, and judge with an unelected and unaccountable membership that turns over every few years – a structure poorly suited to ensure due process for either employees or employers. This bureaucratic and political mess results in delayed complaint resolutions, a damaged economy, and stalled business decisions which in turn stunt job growth.

    Congress should return the adjudicatory functions of the NLRB to the U.S. Courts as designed by the Constitution and revoke the Board’s power to prosecute unfair labor practice charges. Under this system, victims of unfair labor practices could still bring forth complaints for the NLRB to investigate, but the power to hear and adjudicate complaint cases would remain with the U.S. Court system, as in the adjudication of all other disputes between private parties. 

    Removing the influence of a politically charged federal agency would remove the “thumb on the scale” in these proceedings, providing both workers and businesses with a simplified and unbiased method for resolving disputes and a consistent set of regulations to follow.

    The Protecting American Jobs Act:

    • Removes the NLRB General Counsel’s power to issue complaints related to unfair labor practices.
    • Limits the Board’s rulemaking authority to rules concerning the internal functions of the Board.
    • Removes the Board’s power to bring charges of unfair labor practices and to adjudicate those charges and instead provides the Board with the authority to investigate unfair labor practices.
    • Moves relief of unfair labor practices to the courts where an aggrieved party may bring a civil action.
    • Requires the NLRB to review and revise its regulations to comply with these changes.

    MIL OSI USA News

  • Trump wants deal to end Russia’s war in Ukraine by August 8, US tells UN

    Source: Government of India

    Source: Government of India (4)

    U.S. President Donald Trump has made clear that he wants a deal to end Russia’s war in Ukraine by August 8, the United States told the United Nations Security Council on Thursday.

    “Both Russia and Ukraine must negotiate a ceasefire and durable peace. It is time to make a deal. President Trump has made clear this must be done by August 8. The United States is prepared to implement additional measures to secure peace,” senior U.S. diplomat John Kelley told the 15-member council.

    Trump said on Tuesday that the United States would start imposing tariffs and other measures on Russia “10 days from today” if Moscow showed no progress toward ending its war in Ukraine.

    Kyiv and Moscow have held three rounds of talks in Istanbul this year that yielded exchanges of prisoners and bodies, but no breakthrough to defuse the more than three-year conflict.

    “We intend to continue the negotiations in Istanbul,” Russia’s deputy U.N. Ambassador Dmitry Polyanskiy told the council, but he added: “Despite the meetings in Istanbul, in the West, the war party did not go away … We continue hearing voices of those who think that diplomacy is just a way of criticizing Russia and exerting pressure on it.”

    Ukraine’s deputy U.N. Ambassador Khrystyna Hayovyshyn said Russia must be confronted with “unity, resolve and action.”

    “We seek a comprehensive, just and lasting peace grounded in the principles of the U.N. Charter and nothing less. We repeat – a full, immediate and unconditional ceasefire is essential. It is the first step to halting Russia’s war of aggression against Ukraine,” she told the council.

    (Reuters)

  • MIL-OSI Africa: Justice Mlambo appointed Deputy Chief Justice of SA

    Source: Government of South Africa

    Thursday, July 31, 2025

    President Cyril Ramaphosa has appointed Justice Dunstan Mlambo as Deputy Chief Justice of the Republic of South Africa, with effect from Friday, 1 August 2025.

    The appointment is with accordance with section 174(3) of the Constitution.

    “Judge Mlambo has since November 2012 served as Judge President of the Gauteng Division of the High Court of South Africa. 
    “President Ramaphosa has in writing informed Chief Justice Mandisa Maya that in appointing Justice Mlambo, the President has considered the views of the Judicial Service Commission (JSC) and the views of political parties represented in the National Assembly,” the Presidency said in statement on Thursday night.

    The President also expressed to the Chief Justice his appreciation for the transparent, inclusive and robust process undertaken by the JSC. 

    “This process exemplified the Commission’s commitment to upholding the nation’s constitutional values,” said the Presidency.

    The Presidency added that the Commission had enhanced the nation’s confidence that the appointment of the Deputy Chief Justice was firmly grounded on merit, fidelity to the Constitution and a vision for the continued transformation and strengthening of the Judiciary.

    “President Ramaphosa similarly thanks the incoming Deputy Chief Justice Mlambo for stepping forward to assume a new responsibility of critical national importance, and wishes Justice Mlambo well in strengthening the rule of law, enriching jurisprudence and asserting the rights of all citizens.”

    The position of Deputy Chief Justice had been vacant since then Deputy Chief Justice, Mandisa Maya, became Chief Justice following the retirement of Chief Justice Raymond Zondo last year.

    Earlier this month, the JSC announced that it would recommend Justice Mlambo for the position of Deputy Chief Justice.

    READ | Judge President Mlambo recommended for Deputy Chief Justice

    This as interviews for the position were held.

    In April this year, President Ramaphosa nominated four candidates for the position including Justice Mlambo. –SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Russia: Chinese Defense Minister Says PLA Ready to Seek Complete Reunification of China

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 31 (Xinhua) — Chinese Defense Minister Dong Jun on Thursday said the People’s Liberation Army (PLA) is always ready to pursue the goal of complete reunification of China, resolutely oppose any separatist attempt to gain “Taiwan independence” and suppress any military interference from external forces.

    Dong Jun made the remarks at a grand reception held by the Chinese Ministry of Defense in Beijing to mark the 98th anniversary of the founding of the PLA on August 1.

    The Minister recalled that this year marks the 80th anniversary of the victory in the Chinese People’s War of Resistance against Japanese Aggression and the World Anti-Fascist War, the 80th anniversary of the liberation of Taiwan from Japanese occupation, and the 80th anniversary of the founding of the United Nations.

    On September 3, a military parade will be held in Tiananmen Square in Beijing to commemorate the 80th anniversary of the victory in the Chinese People’s War of Resistance against Japanese Aggression and the World Anti-Fascist War.

    Dong Jun said the parade would demonstrate to the Party and the Chinese people that the PLA is a powerful force that stands guard over peace and justice.

    The Chinese military, the minister added, is ready to work with its counterparts in all countries of the world to implement the concept of a community with a shared future for mankind and the three major global initiatives, jointly respond to risks and challenges, and hand in hand build a world of lasting peace, universal security, common prosperity, openness, inclusiveness, cleanliness and beauty. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Tatyana Golikova held a meeting on the national project “Personnel”.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Deputy Prime Minister Tatyana Golikova held a meeting of the project committee for the national project “Personnel”. The meeting was attended by Minister of Labor and Social Protection Anton Kotyakov, head of the State Council commission on “Personnel”, Governor of the Kaluga Region Vladislav Shapsha, representatives of the Ministry of Education and Science, the Ministry of Education, the Ministry of Finance, the Federal Agency for Youth Affairs and others. The meeting participants discussed the results of the national project implementation in the first half of 2025, as well as the federal projects included in it.

    As noted by Tatyana Golikova, four federal projects are being implemented within the framework of the national project “Personnel”: “Labor Market Management”, “Active Measures to Promote Employment”, “Education for the Labor Market” and “The Labor Person”. Federal projects include measures to actively involve graduates of educational institutions in employment, synchronization of modern qualification requirements in the spheres of labor and education, which will allow for more efficient and high-quality training of personnel for the needs of the economy. In addition, vocational training and additional vocational education are provided for people experiencing difficulties in finding a job, as well as increasing the labor mobility of citizens and the popularity of blue-collar jobs.

    As part of the “Labor Market Management” project, employment centers are being modernized into modern “Work of Russia” personnel centers. They are becoming full-fledged partners of employers in building teams and personal consultants for those wishing to build a career. In total, over 480 centers are planned to be modernized this year; the modernization of the center in Omsk Oblast has already been completed. By the end of 2028, the entire employment service system in the country will be updated. Over 2.5 thousand employees of the employment service have been trained; in total, about 6 thousand employees will be trained this year.

    All regions have approved regional plans to combat illegal employment for the period 2025–2027.

    As part of the implementation of the federal project “Education for the Labor Market”, national rankings of universities and colleges for graduate employment were published on June 15. Since the beginning of the year, a pilot test of methodological recommendations for organizing a system of professional orientation and routing of students and graduates has been conducted in 11 regions. The pilot experience will be replicated throughout the country.

    Preparatory work is underway to modernize career centers. In total, 162 career centers aimed at facilitating graduate employment are planned to be modernized in 2025.

    Under the federal project “Active measures to promote employment” within the framework of the implementation of the vocational training program for certain categories of citizens, 44.2 thousand applications were approved, and 20.7 thousand people were sent for training.

    Within the framework of the federal project “Working Man”, events are planned for the competition “Best in Profession”, the All-Russian Employment Fair, and the All-Russian Competition of Best Practices in Youth Employment.

    On June 27, the federal stage of the All-Russian Job Fair took place. 454 thousand people took part in it. In total, over 529 thousand vacancies were presented by almost 23 thousand employers.

    The regional stages of the “Best in Profession” competition are coming to an end in the regions – a total of 210 regional stages are planned in 73 regions, 183 stages have already been held. The award ceremony will take place in Moscow in early December.

    From June 23 to August 31, the application submission stage for the All-Russian competition of best youth employment practices is underway.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Government meeting.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    On the agenda: the results of a working trip to the Far Eastern and Siberian Federal Districts, writing off debt on budget loans to regions, and increasing the grace period for mortgage payments upon the birth of a second child.

    Opening remarks by Mikhail Mishustin:

    Good afternoon, dear colleagues!

    Before we move on to the agenda of today’s Government meeting, I would like to talk about the results of the trip to Omsk Oblast, which became the final point of our major working trip to the Far Eastern and Siberian Federal Districts.

    The region is developing. Significant infrastructure is being actively built, including transport infrastructure, which is part of the high-speed automobile route “Russia” – from St. Petersburg to Vladivostok. It is necessary to complete all planned work within the established deadlines.

    We visited several healthcare and educational facilities. We made a number of decisions on the hospital and clinic for war veterans so that participants in the special military operation could undergo treatment and recovery in comfortable conditions. Comprehensive support for our heroes is one of the key priorities of the Government.

    Agenda of the meeting

    Materials for the Government meeting on July 31, 2025

    We got acquainted with the course of the admission campaign at Omsk University. We will help with equipping its main building with educational equipment. We will allocate additional funds for major repairs of dormitories.

    The region presented its initiative to create an inter-university campus. The modern educational space will become a point of attraction for talented young people. This will be decided within the framework of the competition of the Ministry of Science and Higher Education.

    Participants of the meeting

    List of participants of the Government meeting, July 31, 2025

    In September, the first branch of a foreign university in our country, the Kazakh National University, will begin teaching students in Omsk. Almost everything is ready for its opening. We will continue to strengthen cooperation between the two countries in the field of higher education and scientific research.

    In the Amur Region, we inspected how the reconstruction of the airport complex is being carried out, the expansion of the road that leads to the airport – the most important objects for the region and residents. Here I would ask, Vitaly Gennadyevich (addressing V. Savelyev), you, the Ministry of Transport to monitor the timing and progress of the work.

    We also visited the customs and logistics terminal and the checkpoint on the border with China – Kani-Kurgan. I know how Vitaly Gennadyevich was actively involved in this. This will be a model checkpoint, to which we distribute, among other things, technological solutions built on domestic software products.

    Completion of its construction will increase the volume of transportation on the new bridge crossing over the Amur River. This is only part, I will say again, of the large work on developing cross-border logistics. Almost 180 billion rubles have been allocated for the modernization of points in the next three years, taking into account the prospective trade turnover and priority areas for the country.

    The most important thing now is that plans for launching such facilities in the region and throughout the country as a whole are implemented clearly and on time.

    In the Trans-Baikal Territory, in Chita, a separate meeting was held on issues of grain export development.

    Our own production covers our domestic needs. Let me remind you that Russia is a world leader in wheat and barley supplies abroad. The potential is even higher. It is important to fully realize it. We will continue to support our farmers, expand port capacities, and create the necessary infrastructure for both storage and transportation of products.

    Oksana Nikolaevna (addressing O. Lut), I would like to ask you to create additional opportunities for domestic agricultural producers to enter foreign markets.

    I know there are a number of questions. I also want to tell the members of the Government that we need to help our exporters in this regard.

    This is also necessary to increase the competitiveness of our economy and to fulfill the task approved by the President to increase exports of the Russian agricultural sector.

    We also inspected the perinatal center in Chita. The national project “Family” provides for its re-equipment already this year. Equipment is being received so that both mothers and babies receive modern treatment.

    This work continues throughout the country. In just six years, advanced equipment will be delivered to 142 perinatal centers, including nine federal ones.

    In Transbaikalia, major repairs are also being carried out at medical institutions, and a number of new ones are being created.

    Mikhail Albertovich (addressing M. Murashko), as we agreed, we need to monitor the construction deadlines to ensure their timely opening. This is very important for people. We need to interact more actively with colleagues from the region in this area.

    Issues of improving healthcare infrastructure were also given attention during a working visit to the Altai Republic. There, under the national project “Long and Active Life”, a hospital admissions department was built using federal funds. High-tech medical care will become even more accessible to local residents. It is in demand there.

    With the head of this Russian subject, Andrey Anatolyevich Turchak, we discussed in detail the progress of the implementation of the individual program of socio-economic development, which, by decision of the President, was formed until 2030.

    We also looked separately at how projects that are important for people are being implemented, including those to strengthen transport connectivity. Roads, bridges, and crossings are being repaired. The airport is being modernized. This is also important given the significant growth in tourist flow to this region. Travelers come there from all over Russia and from abroad. In early July, a separate domestic terminal opened in Gorno-Altaisk, and last week, a new international one, in line with all standards. Its first visitors were guests of the International Environmental Conference, in which we took part.

    Together with our colleagues – heads of government of a number of countries, during the plenary session we exchanged a vision of joint work to protect the environment in the interests of the present and future generations. We will strengthen cooperation in this important area.

    In our country, environmental well-being has been approved by the President as one of the national goals. We will continue to do everything necessary to achieve it. First of all, if we list the priorities, this is the conservation of forests, water bodies, rare species of animals and plants, the development of protected areas. We will also continue to form a closed-loop economy.

    The Ministry of Natural Resources needs to expand cooperation with foreign partners in all these areas. Establish an exchange of best practices, create conditions for ecotourism – all the colleagues who spoke spoke about this – so that more people could see pristine nature.

    And I would also like to say that the topic of ecology and environmental protection is very important for our colleagues from the CIS countries.

    This topic is also relevant for the Altai Territory. We discussed this in detail with Governor Viktor Petrovich Tomenko. In the region, with the support of the federal budget, transport accessibility is being improved, and the infrastructure needed for travelers is being formed. Without a doubt, this work should be continued.

    Colleagues, I ask all area curators to constantly monitor how the implementation of projects is proceeding locally.

    I would like to separately mention one important issue that I discussed with the governors of the Amur Region and the Zabaikalsky Krai – emergency situations caused by forest fires.

    The situation has now stabilized. But the fight against the fire required the involvement of additional forces – specialists, heavy equipment, aviation. In connection with which, of course, the costs of the necessary measures have increased. An order has been prepared to provide almost 1.4 billion rubles to these regions, as well as to Krasnoyarsk Krai and the Republic of Buryatia. These funds will be used to compensate for the costs of extinguishing the fires.

    It is difficult to predict fire situations and their intensity accurately, but I ask the leadership of regions where such cases are not uncommon to pay special attention to prevention. There should be no threats to people’s health and safety. And at the same time, of course, it is necessary to monitor the efficiency of spending budget funds.

    On to another topic.

    Document

    The government has written off debt on budget loans to eight regions that have implemented infrastructure projects

    The government continues to stimulate economic development in Russian regions. To do this, we are reducing the financial burden, primarily for those who actively attract investment and build infrastructure. For them, on the instructions of the President, we have provided the opportunity to write off two-thirds of the debt on budget loans. The corresponding rules were adopted in February.

    Today, we will write off such loans for eight more regions in the amount of over 47.27 billion rubles. These are the republics of Kalmykia and Karelia, as well as the Voronezh, Kirov, Kemerovo, Moscow, Smolensk and Tver regions. They previously allocated funds for the implementation of national projects, improvement of housing and utilities, resettlement of citizens from dilapidated housing, support for industry and other purposes.

    Such a decision on debts should have a positive impact on the budget system of these territories, on the dynamics of their development, which will contribute to the fulfillment of many tasks, including social issues.

    And also – about supporting families with children. This is one of the key priorities of the Government’s work, which the head of state has repeatedly drawn attention to. A number of measures have been taken on his instructions. Today we will supplement them with another one.

    A bill has been prepared that is intended to reduce the burden on parents paying off a mortgage. Currently, when a child is born, the borrower is entitled to a six-month credit holiday if his or her income has decreased by more than 20%, and the costs of servicing the loan exceed 40% of average monthly income.

    Now, for those who have given birth to or adopted a second or subsequent child, the grace period will be increased to one and a half years. At the same time, interest on the principal debt will be charged only from the 7th to the 18th month. And they can be paid not immediately, but after the obligations under the current agreement are paid off. In equal parts and with the same frequency as before.

    This will support families during the most difficult period, when one of the parents is caring for a child and is unable to go to work. And of course, we expect that together with other current measures, this will affect the demographic situation in the country as a whole.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Marat Khusnullin: About 700 km of roads to sports facilities will be updated in 2025 thanks to the national project “Infrastructure for Life”

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Thanks to the national project “Infrastructure for Life”, work continues on upgrading roads leading to stadiums, clubs, youth schools and other sports facilities. In total, this year it is planned to upgrade about 700 km of such sections of regional and local roads, Deputy Prime Minister Marat Khusnullin reported.

    “Updating roads to sports facilities is an important part of creating a comfortable environment. This helps ensure convenient and unimpeded access to sports facilities for thousands of residents. First of all, this is important for popularizing a healthy lifestyle. Thanks to the national project “Infrastructure for Life”, in 2025 we plan to bring 225 sections of the regional and local road network leading to stadiums, clubs, children’s and youth schools and other sports facilities to a regulatory state – this is 695 km of regional and local roads,” said Marat Khusnullin.

    Sporting events often attract large crowds. Good road conditions ensure safe traffic and pedestrian traffic, and reduce the risk of accidents and injuries.

    “In 2024 alone, 270 road sections were updated under the already completed national project “Safe High-Quality Roads”. Their total length was more than 800 km. Sports facilities are visited by people of all ages, including children. Therefore, we pay special attention to safety elements: we equip the necessary signs, traffic lights, sidewalks and pedestrian crossings,” said Minister of Transport Andrei Nikitin.

    In Bryansk, Menzhinsky Street is undergoing a major overhaul along its entire length – 2.3 km. This is the route to the Spartak stadium, which was renovated in 2020. The stadium is home to a sports school of the same name, where more than 200 young football players study. The road surface is being renovated, sidewalks and storm drains are being installed at the site. To ensure traffic safety, a pedestrian fence, outdoor electric lighting lines, speed bumps, bus stops, public transport access pockets and a new bus shelter will be installed, as well as new road signs, paint and thermoplastic markings with reflective elements.

    In the Bolsheglushitsky District of the Samara Region, a 1.4 km section of the access road to the village of Bolshaya Glushitsa is being overhauled. The road leads to the Yubileiny sports complex, which houses a structural division of the children’s and youth sports school based at Secondary Comprehensive School No. 2. There are 10 sports sections here. The school is attended by more than 150 children aged 5 to 18.

    Another significant “sports” route that is being repaired under the national project is a 9.2 km section of the Moscow Highway in Samara. This is part of the route to the Olympic Reserve Sports School No. 7 for Cycling named after Honored Coach of the USSR V.P. Petrov. More than 370 athletes undergo basic training here.

    The road to the sports facility is also being renovated in the Bogatovsky District. A section of the Bogatoye – Samara – Orenburg highway, almost 10 km long, is being repaired here. The highway leads to the district center – the village of Bogatoye. A children’s and youth sports school is located here on the basis of a secondary comprehensive school. 550 children are involved in sections in several areas: football, volleyball and judo. In addition to local children, the school is attended by children from nearby villages, including Andreyevka and Vilovatoye.

    In total, 10 road facilities leading to 25 sports facilities, with a total length of 80.87 km, will be renovated in the Samara Region under the national project “Infrastructure for Life” this year.

    In Krasnoyarsk, a 3.3 km section of Partizana Zheleznyaka Street is being repaired this year under the national project “Infrastructure for Life”. The street leads to the Sokol Ice Palace. Children’s and youth teams of the sports school train here in hockey. In addition, sports matches and figure skating competitions are held, which are attended by thousands of spectators from all over the region.

    Also this year, a 3.6 km section of Sverdlovskaya Street from Aleksandra Matrosova Street to house No. 73 was renovated. Now residents and guests of Krasnoyarsk can comfortably get to the Bobrovy Log ski resort, which includes trails of varying difficulty, a snowboard park, a cross-country ski route and other locations. This is a popular place for active winter recreation. More than 550 thousand residents and guests of the city visit it annually.

    In total, 12 sections of roads to sports facilities with a total length of more than 20 km will be updated in Krasnoyarsk Krai under the national project “Infrastructure for Life” this year.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Marat Khusnullin: Since the beginning of the garage amnesty, Russians have registered more than 605 thousand objects

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Since the garage amnesty law came into effect, Rosreestr has registered more than 605 thousand objects across the country. An unregistered garage and the land underneath it can be registered under a simplified procedure until September 1, 2026, Deputy Prime Minister Marat Khusnullin reported.

    “The President signed the law on garage amnesty in April 2021, it became an important measure of support for Russians who were given the opportunity to register an unregistered garage and the land underneath it under a simplified scheme. Almost four years into its implementation, the garage amnesty continues to show its popularity among the population. More than 605 thousand objects have already been registered under a simplified procedure, including 205 thousand garages and 400 thousand land plots underneath them. This work is aimed at protecting the rights and interests of citizens, and also stimulates the development of the real estate market,” said Marat Khusnullin.

    According to the Deputy Prime Minister, since the law was implemented, the largest number of garages have been registered in Omsk (12.9 thousand), Moscow (9.2 thousand), Tyumen (8.9 thousand), Saratov (8.4 thousand) regions and the Republic of Tatarstan (8.2 thousand). The leaders in the number of registered land plots for garages were Tyumen (21.1 thousand), Moscow (20 thousand), Saratov (17.3 thousand) regions, Perm Krai (15.5 thousand) and Omsk Region (13.7 thousand).

    “In the first half of 2025, almost 87 thousand objects were registered (25 thousand garages and 62 thousand land plots under them), which is comparable to the same period a year earlier (99 thousand objects – 33 thousand garages and 66 thousand land plots). Also, information was additionally included on 27.8 thousand objects, for which changes were made to the information on the type of real estate object in the Unified State Register, thanks to which owners will be able to register the land under the garages,” said Oleg Skufinsky, head of Rosreestr.

    To inform people about how to take advantage of the garage amnesty, Rosreestr is conducting methodological and explanatory work in the regions. All mechanisms and technologies have been debugged, bureaucratic barriers have been eliminated, and citizens have every opportunity to become legal owners of their garages.

    The garage amnesty came into effect in September 2021 on the instructions of the Government. Currently, given the popularity of the service, the issue of its possible extension is being considered so that as many residents of the country as possible can take advantage of this mechanism.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Financial news: Inflation in the regions is declining more and more confidently.

    Translation. Region: Russian Federal

    Source: Central Bank of Russia –

    An important disclaimer is at the bottom of this article.

    In June, prices fell or remained unchanged in 17 Russian regions, in 42 they rose less than in May, and in the rest, price growth accelerated.

    Food prices increased moderately in June, and vegetables and fruits became cheaper even more significantly than usual in the season. Eggs and butter continued to become cheaper, and sugar prices decreased. At the same time, tea, coffee and cocoa became more expensive faster.

    Among non-food products, the most noticeable decline in price was in equipment and electronics. Demand for these products was falling primarily due to the cooling of lending. The strengthening of the ruble also contributed.

    The growth in prices for services remained high, but was much less than in May. In particular, household, medical services, and foreign tourism services increased in price less.

    Annual inflation fell in 68 regions of the country in June. The Bank of Russia will continue to reduce price growth, maintaining high rates. According to the forecast, annual inflation will return to 4% in 2026 and remain close to this level in the future.

    For more information on inflation in each region, seeinformation and analytical materials, published on the website of the Bank of Russia.

    Preview photo: Medvedeva Oxana / Shutterstock / Fotodom

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Financial news: Decision of the Board of Directors on Amendments to the Type C Account Regime

    Translation. Region: Russian Federal

    Source: Central Bank of Russia –

    An important disclaimer is at the bottom of this article.

    On July 31, 2025, the Board of Directors of the Bank of Russia decided to introduce Decision of the Board of Directors of the Bank of Russia dated November 21, 2022 “On the establishment of the type “C” account regime for settlements and the implementation (execution) of transactions (operations) to which the procedure for fulfilling obligations provided for by Decree of the President of the Russian Federation dated March 5, 2022 No. 95 “On the temporary procedure for fulfilling obligations to certain foreign creditors” applies change, adding the following words to paragraph twelve of subparagraph 1.1 of paragraph 1:

    “; transfers by order of a non-resident for whom a type “C” bank account has been opened in favor of a resident for the purpose of fulfilling the non-resident’s obligation to transfer funds, provided that transactions (operations) related to such transfers are concluded between the said resident and the non-resident from whose type “C” bank account funds are debited, which entail the transfer of ownership of securities to the resident in accordance with permits issued on the basis of decrees of the President of the Russian Federation, if the terms of such transactions (operations) provide for the alienation in favor of the non-resident of property (including property rights) recorded abroad, the disposal of which is restricted due to unfriendly actions of foreign states; transfers at the order of a non-resident for whom a type “C” bank account has been opened, in the amount of dividends previously credited to the type “C” bank account due to this non-resident, in favor of the resident for the purpose of fulfilling the non-resident’s obligation to transfer funds, subject to obtaining permission issued on the basis of decrees of the President of the Russian Federation to pay dividends to the non-resident.”

    The decision of the Board of Directors of the Bank of Russia to amend the decision of the Board of Directors of the Bank of Russia dated November 21, 2022 shall apply from the date of its publication on the official website of the Bank of Russia on the information and telecommunications network “Internet”.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News